WO2001027725A1 - Controlling access to electronic content - Google Patents
Controlling access to electronic content Download PDFInfo
- Publication number
- WO2001027725A1 WO2001027725A1 PCT/US2000/041167 US0041167W WO0127725A1 WO 2001027725 A1 WO2001027725 A1 WO 2001027725A1 US 0041167 W US0041167 W US 0041167W WO 0127725 A1 WO0127725 A1 WO 0127725A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic content
- file
- instructions
- envelope
- receiving
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 50
- 238000013480 data collection Methods 0.000 claims description 9
- 230000004044 response Effects 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 description 10
- 238000013475 authorization Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 241000270295 Serpentes Species 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 241001441724 Tetraodontidae Species 0.000 description 2
- 230000001934 delay Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
Definitions
- This invention relates to controlling access to electronic content.
- the invention features a computer-implemented method of controlling access to electronic content includes receiving electronic content and producing a file that includes the electronic content and instructions for collecting and transmitting payment information.
- the method further includes receiving a reply to the transmitted message and selectively providing access to the electronic content based on the reply.
- Advantages can include one or more of the following.
- the envelope creation instructions enable virtually any content developer connected to the Internet to publish and receive payment for electronic content. Additionally, as the envelope instructions remain with the envelope throughout its life, the envelope author continues to receive payment from users accessing the envelope contents regardless of how the users obtained the envelope.
- the envelope provides a simple to use and intuitive user interface that guides recipients through the process of paying for content.
- the presentation of the electronic content in an envelope can be tailored by the envelope creator, for example, by designating content that will be presented automatically when the content is opened. This enables envelope creators to craft the envelopes for different purposes.
- the storage of creator-defined data in the server database permits collection of different information for each envelope such as envelope-specific questionnaires.
- the collected information can be used to target distribution of subsequent envelopes to potentially interested recipients.
- recipients By distributing the envelope via e-mail, recipients need not experience the sometimes lengthy delays associated with downloading web-pages from the Internet.
- FIG. 1 is a diagram an electronic content distribution system.
- FIG. 2 is a flowchart of a process for creating an envelope.
- FIGS. 3-8 are screenshots of a user interface for creating envelopes.
- FIGS. 9-13 are screenshots of another user interface for creating envelopes.
- FIGS. 14-16 are screenshots of a user interface provided by an envelope.
- FIG. 17 is a flowchart of envelope instructions.
- FIGS. 18-19 are flow diagrams illustrating establishment of secure communication between a client and a server.
- FIG. 20 is a diagram of a server database that tracks envelopes.
- FIG. 21 is a flowchart of server access request processing instructions.
- FIG. 22 is a flow diagram of a snake that "flattens" a collection of linked pages.
- an envelope file 102 stores electronic content 108, 110 such as audio, graphics, text, video, and/or computer program instructions.
- the envelope 102 also stores envelope instructions 104 that can extract and present the stored electronic content 108, 110 to a user requesting access to the content 108, 110.
- the envelope instructions 104 may form part of a system that enables an envelope creator to collect payment from each user attempting to access the content 108, 110.
- a user at a client 100 has received an envelope 102, for example, via e-mail or by downloading the file from a networked computer (e.g., an Internet web-server).
- a networked computer e.g., an Internet web-server
- the envelope instructions 104 transmit an access request 124 to a server 112 via a network 132 (e.g., the Internet).
- the access request 124 can include an envelope identifier 106 that uniquely identifies the envelop 106 to the server 112; payment information such as a credit card number, payment amount, and expiration date; and/or demographic information such as a user's address, phone number, and e-mail address.
- the server 112 can store information included in the access request 124 in an envelope database 116, for example, for subsequent marketing analysis.
- the server 112 can also send a payment authorization request 128 to a payment service 1 18 such as MaverickTM.
- the payment service 118 acts as a clearinghouse for different credit card bureaus such as Visa 120 or MasterCard 122.
- the credit card bureaus can process payment authorization requests by deducting the payment amount from a first account (e.g., a user submitting the access request 124) and by crediting a second account (e.g., an account of the envelope creator).
- a first account e.g., a user submitting the access request 12
- a second account e.g., an account of the envelope creator
- the server 112 can transmit an access request response 126 back to the client 100.
- the envelope instructions 104 executing on the client 100 can permit or deny access to the electronic content based on the received access request response 126.
- envelope instructions interact directly with the payment service 118 or credit bureau 120, 122 instead of communicating with these entities via the server 112.
- the envelope instructions 104 ensure that each user has authorized access to the electronic content 108, 110.
- the envelope 102 enables a content distributor to make an envelope 102 freely available with lessened concern over electronic content piracy.
- an envelope distributor can post an envelope 102 for downloading on an Internet web-page or at an FTP (File Transfer Protocol) site.
- a distributor can e-mail envelopes 102 to recipients who have previously requested access to envelopes in the past.
- the ability to target envelopes 102 to interested consumers makes the envelope 102 a valuable marketing tool.
- e-mailing the envelope to selected recipients eliminates the time a user would have to wait for the electronic content to download from a web-site.
- envelope creation instructions 132 enable quick construction of an envelope for distribution. After identifying 134 electronic content for inclusion in the envelope (e.g., by providing file names or URLs (Universal Resource Locators)), a user can configure the envelope to have different characteristics.
- a user can designate 136 electronic content for automatic opening after the server grants access to envelope contents.
- the envelope creator can control the initial presentation of envelope contents rather than leaving users to explore content 108, 110 included in the envelope 102 on their own.
- the user can designate electronic content for automatic opening by naming the file "Startup” (e.g., startup.html). Launching the electronic content can cause an the operating system to open the file using an application corresponding to the file extension (e.g., ".HTML" corresponds to MicrosoftTM ExplorerTM and ".DOC” corresponds to MicrosoftTM Word97TM).
- the creation software 132 also enables a user to define data collected 138 by the envelope instructions 104 prior to requesting access.
- a user can use HTML instructions to define a data collection form having text, graphics, and data fields.
- the envelope instructions 104 interpret the HTML and present the form to a user requesting access.
- a user can collect a wide variety of information such as responses to a questionnaire, demographic information, etc.
- the collected information is transmitted to the server 112 for storage and analysis.
- HTML to specify a data collection form enables creators to take advantage of their existing HTML coding skills.
- the user can specify data collection instructions that collect information from the client 100 WindowsTM RegistryTM instead of interactive collection from a user.
- the envelope creator may specify 140 a price for the electronic content 108, 110.
- the price can be included in each access request sent by the envelope instructions 104 to the server 112.
- an envelope creator can establish the price by calling a server representative or by e-mailing the price to a server daemon. Similar techniques may be used to supply the server with an account number that is to be credited when an envelope recipient pays for access to an envelope.
- each envelope 102 stores 144 an envelope identifier 106 (e.g., a character string) that uniquely identifies the envelope 102 to the server 112.
- the identifier 106 can be determined in a number of different ways. For example, the envelope creation program 132 can append a system clock time to a computer's IP (Internet Protocol) address. Alternatively, the creation software 132 can request a unique envelope identifier from the server 112 during the envelope creation process.
- the creation software 132 builds the envelope 102 from the identified electronic content 108, 110, the envelope identifier 106, and the envelope instructions 104.
- the creation software 132 arranges envelope 102 components such that execution of the envelope file (e.g., "C: run envelope.exe”) causes execution of the envelope instructions.
- the envelope creation instructions 132 can employ a variety of different user interfaces and can use a number of different architectures.
- the envelope creation software 132 may reside on a web server. A user visiting the web server can build an envelope by filling in a series of forms that collect envelope configuration information from a creator.
- a user visiting a web server that offers envelope creation can enter an e-mail address.
- the envelope creation instructions 132 can e- mail the completed envelope to the specified address.
- the user can select from different default data collection forms instead of defining their own.
- the user can also specify password protection and/or certification (see co-pending application 09/119,150, entitled "Tracking Electronic Content”).
- FIGS. 5 and 6 the user can select or designate graphics for an envelope cover (see FIG. 14) and graphics for display when a user opens the envelope (see FIG. 16).
- FIG. 7 the user can specify one or more files for inclusion as electronic content in the envelope.
- the envelope creator receives the completed envelope via e-mail.
- the completed envelope is stored at a web-site for subsequent downloading at the creator's convenience or can be stored on a removable computer- readable medium, such as a CD-ROM, and then be distributed to recipients, e.g., by conventional postal service.
- a removable computer- readable medium such as a CD-ROM
- the envelope creation software 132 is a stand-alone application. As shown in FIG. 9, the application enables a user to create an envelope by dragging-and-dropping files into the envelope. The user can interact with a series of dialogs that enable a user to specify a data collection form (FIG. 10); to specify whether the envelope uses certification (FIG. 11); to specify the cover image (FIG. 12); and to specify whether to automatically open electronic content upon access (FIG. 13).
- the envelope creation software can be coded as a component (e.g., a COM component) that provides a set of public methods such as envelope.Build, envelope.AddContent, and envelope.SetPassword.
- This component can be included in a stand-alone application or called by a program at the web-server.
- FIGS. 14-16 the finished envelope provides recipients with an intuitive user interface when executed.
- the interface uses a vault theme that users can quickly operate without guidance. As shown in FIG. 14, the interface depicts vault doors with handle GUI buttons.
- the vault doors include the envelope cover graphics selected or created by the user.
- the handle GUI buttons causes the access envelope instructions to present the user-defined data collection form shown in FIG. 15.
- the data collection form dialog includes a "SEND" button that causes the instructions to transmit the access request to the server 112 including the collected data.
- the envelope instructions can present the electronic content and/or store the electronic content on the user's machine.
- the envelope instructions 104 can automatically play a .WAV sound file included in the envelope. If access is denied, the envelope typically will no present, decrypt, and/or decompress the stored electronic content.
- the envelope instructions 104 determine 150 if the user has previously received a message from the server granting access to the electronic content 108, 110.
- the envelope instructions may store the envelope ID in the WindowsTM Registry after receiving an access grant. By checking the Registry for the envelope ID, the instructions can avoid asking the same user to pay for electronic content more than once.
- the envelope instructions 104 can present 164 the electronic content by decompressing and/or decrypting the content.
- the instructions 104 may store the decompressed and/or decrypted content in a temporary directory (e.g., "C:/temp/").
- the instructions 104 may also automatically launch any designated startup content.
- the envelope instructions 104 collect 152 data specified during envelope creation and include the data in an access request 156 to the server 112. Prior to transmitting the request, the instructions 104 establish secure communication with the server 112. For example, the instructions 104 may initiate a secure socket layer (SSL) connection between the client 100 and server 112.
- SSL secure socket layer
- the client 100 and server 112 establish secure communication through the use of a key shared 170 both by the client 100 and by server 112.
- the client 100 encrypts 174 (e.g., using Blowfish encryption) a client generated key 172 (e.g., a random number) using the shared key 170.
- the client 100 transmits the encrypted client generated key to the server 112 for decryption 176 using the shared key.
- the client generated key now known by both the client 100 and server 112 is used as an encryption key for subsequent communication from the client 100 to the server 112.
- a similar process is used to generate a server 112 encryption key for communication from the server 112 to the client 100.
- establishing secure communication helps prevent network eavesdroppers from determining credit card numbers and other access request information traveling between the client 100 and server 112.
- the envelope instructions 104 use a variety of techniques to evade network firewalls.
- the data and the names of the collected data fields can be included in the header of an HTTP message.
- an HTTP header may include the string "Name&Robert;Phone&956-5908;CC#&l 1112222333;Exp&01/00" defining the field names and values for name, phone, and credit card information.
- the string is included after a JPEG (Joint Pictures Experts Group) start code to fool a firewall into believing a picture is being transmitted.
- JPEG Joint Pictures Experts Group
- the instructions 104 attempt to transmit the access request via a communication port conventionally associated with browser communication (e.g., port 80). If such an attempt fails, the instructions 104 attempt to transmit the collected data via an SMTP (Simple Mail Transfer Protocol) port (e.g., port 25).
- SMTP Simple Mail Transfer Protocol
- the instructions may also examine the client 112 WindowsTM Registry to determine whether the client connects to the network via a proxy.
- the instructions 104 After transmitting 156 the data, the instructions 104 await 158 an access request response from the server 112. If an access request response indicates the server 112 has granted access, the instructions 104 decompress and/or decrypt 164 the electronic content and launch 166 startup content designated by the user.
- the instructions 104 can also store 166 an indication that the user has received an access grant, for example, by storing the envelope ID or a server supplied key in the
- the instructions 104 can display a message to the user describing why the electronic content is not being presented.
- the server 112 includes an envelope database 116 that tracks each envelope that has generated an access request.
- the database 10 116 includes a master envelope table 200.
- Each row of the master envelope table 200 stores information for a different envelope.
- the master envelope table 200 lists each envelope's ID 202, the price of the envelope's contents 206, and can include a boolean
- activated field 204 that indicates whether or not the server is permitted to grant access. For example, a server 112 administrator may request a fee from an envelope 15 creator before setting the activated field 204 for an envelope to TRUE (e.g.. " 1 ").
- the table may also include an envelope creator's credit card account number (not shown) so that payments may be credited to the creator.
- the database 116 also includes a separate envelope description table 210 for each envelope.
- the columns in the envelope description table 210 include data 0 fields collected by the envelope.
- the server 112 dynamically creates the envelope description table 210 upon receiving the first access request for an envelope. The dynamic creation of an individualized table 210 for an envelope enables the server to store different creator-defined data for each envelope.
- the server instructions 114 process a received access 5 request 230 by determining 232 whether the envelope ID included in the access request already is present in the master envelope table. If not, a row is added in the master envelope table 234 and an independent envelope description table is created
- the collected data included in the access request is added 238 as a row in the envelope description table. 0 If the collected data does not include a "CC#" or "credit card number” data field 240, the server 112 can transmit an access request response to the client 100 granting access to the electronic content.
- the server 112 transmits 242 a payment authorization request to the payment server and awaits a5 response.
- the payment authorization request includes the credit card number and the credit card expiration date.
- the request may also include the envelope price. Alternatively, the price may be stored in the master envelope table.
- the server 112 transmits an access request response to the client 244 indicating that the envelope instructions 114 should grant access.
- the server instructions 114 may track the success and failure of envelope access requests over time.
- a top-level web-page 250 includes URL links to other web-pages 252, 254.
- an envelope creator could include the top-level web-page 250 in an envelope without modification, when a user selected a link (e.g., link 1), the client would be forced to establish a network connection and download the corresponding URL (e.g., www.home.com/linkpagel .html).
- a "snake” e.g., Blue Squirrel Software's Grab-a-Site
- the top-level web-page 256 links to local files linkpagel.html and linkpage2.html instead of their respective URLs.
- These pages can be included in an envelope 102 and permit a user to browse through the pages without waiting for the pages to download.
- a creator can designate the top- level page 256 for automatic launching.
- a recipient is granted access, immediately the recipient is presented with a page that guides the recipient in navigating through the electronic content. This feature can be very useful in distributing marketing material such as electronic catalogs.
- the techniques described here are not limited to any particular hardware or software configuration; they may find applicability in any computing or processing environment.
- the techniques may be implemented in hardware or software, or a combination of the two.
- the techniques are implemented in computer programs executing on programmable computers that each include a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and one or more output devices.
- Program code is applied to data entered using the input device to perform the functions described and to generate output information.
- the output information is applied to one or more output devices.
- Each program is preferably implemented in a high level procedural or object oriented programming language to communicate with a computer system. however, the programs can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language.
- Each such computer program is preferable stored on a storage medium or device (e.g., CD-ROM, hard disk or magnetic diskette) that is readable by a general or special purpose programmable computer for configuring and operating the computer when the storage medium or device is read by the computer to perform the procedures described in this document.
- a storage medium or device e.g., CD-ROM, hard disk or magnetic diskette
- the system may also be considered to be implemented as a computer-readable storage medium, configured with a computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP00981032A EP1222511A1 (en) | 1999-10-14 | 2000-10-13 | Controlling access to electronic content |
AU18213/01A AU1821301A (en) | 1999-10-14 | 2000-10-13 | Controlling access to electronic content |
US11/400,394 US20060195400A1 (en) | 2000-10-13 | 2006-04-10 | Controlling access to electronic content |
US11/889,611 US20080034437A1 (en) | 1999-10-14 | 2007-08-15 | Controlling access to electronic content |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15932799P | 1999-10-14 | 1999-10-14 | |
US60/159,327 | 1999-10-14 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/400,394 Continuation US20060195400A1 (en) | 1999-10-14 | 2006-04-10 | Controlling access to electronic content |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001027725A1 true WO2001027725A1 (en) | 2001-04-19 |
WO2001027725A9 WO2001027725A9 (en) | 2002-08-01 |
Family
ID=22572100
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/041167 WO2001027725A1 (en) | 1999-10-14 | 2000-10-13 | Controlling access to electronic content |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1222511A1 (en) |
AU (1) | AU1821301A (en) |
WO (1) | WO2001027725A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2929024A1 (en) * | 2008-03-18 | 2009-09-25 | Noel Pampagnin | METHOD FOR PUBLICATION OF SECURE ONLINE DOCUMENTS AND PUBLICATION PLATFORM. |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5778367A (en) * | 1995-12-14 | 1998-07-07 | Network Engineering Software, Inc. | Automated on-line information service and directory, particularly for the world wide web |
WO1998030964A2 (en) * | 1997-01-09 | 1998-07-16 | Buyonet International Ab | A system for secure data transmission over an electronic link |
WO1998058306A1 (en) * | 1997-06-17 | 1998-12-23 | Shopnow.Com Inc. | Method and system for securely incorporating electronic information into an online purchasing application |
US5905860A (en) * | 1996-03-15 | 1999-05-18 | Novell, Inc. | Fault tolerant electronic licensing system |
-
2000
- 2000-10-13 WO PCT/US2000/041167 patent/WO2001027725A1/en active Application Filing
- 2000-10-13 AU AU18213/01A patent/AU1821301A/en not_active Abandoned
- 2000-10-13 EP EP00981032A patent/EP1222511A1/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5778367A (en) * | 1995-12-14 | 1998-07-07 | Network Engineering Software, Inc. | Automated on-line information service and directory, particularly for the world wide web |
US5905860A (en) * | 1996-03-15 | 1999-05-18 | Novell, Inc. | Fault tolerant electronic licensing system |
WO1998030964A2 (en) * | 1997-01-09 | 1998-07-16 | Buyonet International Ab | A system for secure data transmission over an electronic link |
WO1998058306A1 (en) * | 1997-06-17 | 1998-12-23 | Shopnow.Com Inc. | Method and system for securely incorporating electronic information into an online purchasing application |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2929024A1 (en) * | 2008-03-18 | 2009-09-25 | Noel Pampagnin | METHOD FOR PUBLICATION OF SECURE ONLINE DOCUMENTS AND PUBLICATION PLATFORM. |
WO2009122032A2 (en) * | 2008-03-18 | 2009-10-08 | Noel Pampagnin | Platform for publishing secure documents online |
WO2009122032A3 (en) * | 2008-03-18 | 2009-12-10 | Noel Pampagnin | Platform for publishing secure documents online |
Also Published As
Publication number | Publication date |
---|---|
EP1222511A1 (en) | 2002-07-17 |
AU1821301A (en) | 2001-04-23 |
WO2001027725A9 (en) | 2002-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20060195400A1 (en) | Controlling access to electronic content | |
JP7405995B2 (en) | User consent framework | |
US9336366B2 (en) | Method and apparatus for identifying installed software and regulating access to content | |
US9059967B2 (en) | Method and apparatus for controlling a computer over a TCP/IP protocol network | |
EP0981885B1 (en) | Apparatus and method for identifying clients accessing network sites | |
US8082328B2 (en) | Method and apparatus for publishing documents over a network | |
US20090313136A1 (en) | Stateless Methods for Resource Hiding and Access Control Support Based on URI Encryption | |
EP0778512A2 (en) | System and method for managing try-and-buy usage of application programs | |
US20100115263A1 (en) | Tracking electronic content | |
US20130024908A1 (en) | System and method for application-integrated information card selection | |
US20100211887A1 (en) | Online legal utility | |
WO2001022687A2 (en) | Systems and methods for protecting private information | |
CN102244674B (en) | System for digital rights management using a standard rendering engine | |
US20060026692A1 (en) | Network resource access authentication apparatus and method | |
US20030158816A1 (en) | Internet-based content billing and protection system | |
EP1183583A1 (en) | System and method for providing user authentication and identity management | |
WO2002006931A2 (en) | Controlling and managing digital assets | |
JP2003263367A (en) | System and method for distributed management of electronic market | |
CA2477246A1 (en) | Electronic document tracking | |
WO2000079367A1 (en) | Method and system for secure guaranteed transactions over a computer network | |
JP4066444B2 (en) | Homepage automatic generation apparatus and method | |
US9619510B2 (en) | Information processing apparatus and computer-readable medium storing information processing program | |
EP1357457B1 (en) | Device and method for managing use of content | |
WO2001027725A1 (en) | Controlling access to electronic content | |
Bertocci | Programming Windows Identity Foundation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2000981032 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2000981032 Country of ref document: EP |
|
AK | Designated states |
Kind code of ref document: C2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: C2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
COP | Corrected version of pamphlet |
Free format text: PAGES 1/20-20/20, DRAWINGS, REPLACED BY NEW PAGES 1/20-20/20; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
NENP | Non-entry into the national phase |
Ref country code: JP |