EP2529300A1 - Autorisations d'accès en fonction du temps - Google Patents
Autorisations d'accès en fonction du tempsInfo
- Publication number
- EP2529300A1 EP2529300A1 EP11736706A EP11736706A EP2529300A1 EP 2529300 A1 EP2529300 A1 EP 2529300A1 EP 11736706 A EP11736706 A EP 11736706A EP 11736706 A EP11736706 A EP 11736706A EP 2529300 A1 EP2529300 A1 EP 2529300A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- network
- users
- operator
- advance
- access permissions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 230000036962 time dependent Effects 0.000 title description 3
- 238000007726 management method Methods 0.000 claims description 44
- 238000000034 method Methods 0.000 claims description 23
- 230000000694 effects Effects 0.000 claims description 4
- 238000012986 modification Methods 0.000 description 12
- 230000004048 modification Effects 0.000 description 12
- 230000035935 pregnancy Effects 0.000 description 8
- 238000013523 data management Methods 0.000 description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Definitions
- the present invention relates to data management systems and methodologies generally and more particularly to data access permission management systems and methodologies.
- the present invention seeks to provide improved data access permission management systems and methodologies.
- a network object access permission management system useful with a computer network including at least one server and a multiplicity of clients, the system including an access permissions subsystem which governs access permissions of users to network objects in the computer network in real time and a future condition based permissions instruction subsystem providing instructions to the access permission subsystem to grant or revoke access permissions of the users to network objects in real time in response to future fulfillment of conditions which are established by an operator in advance.
- the future condition based permission instruction subsystem provides instructions to the access permission subsystem to grant or revoke access permissions of the users to the network objects at future times set in advance by the operator.
- the future condition based permission instruction subsystem provides instructions to the access permission subsystem to grant or revoke access permissions of the users to the network objects in response to the occurrence of future events selected in advance by the operator.
- the future condition based permission instruction subsystem provides instructions to the access permission subsystem to grant and thereafter revoke access permissions of the users to the network objects at future times set in advance by the operator.
- the future condition based permission instruction subsystem provides instructions to the access permission subsystem to revoke and thereafter regrant pre-existing access permissions of the users to the network objects at future times set in advance by the operator. Additionally or alternatively, the future condition based permission instruction subsystem provides instructions to the access permission subsystem to grant to the users access permissions to the network objects for a limited duration set in advance by the operator.
- the future condition based permission instruction subsystem provides instructions to the access permission subsystem to grant or revoke access permissions of the users to the network objects based on changes in at least one characteristic of at least one user of the network object indicated in advance by the operator. Additionally or alternatively, the future condition based permission instruction subsystem provides instructions to the access permission subsystem to grant or revoke access permissions of the users to the network objects based on changes in at least one characteristic of the network object indicated in advance by the operator.
- the future condition based permission instruction subsystem provides instructions to the access permission subsystem to grant or revoke access permissions of the users to the network objects based on activity of at least one user related to the network object as indicated in advance by the operator. Additionally or alternatively, the future condition based permission instruction subsystem provides instructions to the access permission subsystem to grant or revoke access permissions of the users to the network objects based on changes in at least one classification of the network object indicated in advance by the operator.
- a network object access permission management method useful with a computer network including at least one server and a multiplicity of clients, the method including providing instructions to grant or revoke access permissions of users to network objects in real time in response to future fulfillment of conditions which are established by an operator in advance, and governing access permissions of the users to network objects in the computer network in real time in response to the instructions.
- the method includes providing instructions to grant or revoke access permissions of the users to the network objects at future times set in advance by the operator.
- the method includes providing instructions to grant or revoke access permissions of the users to the network objects in response to the occurrence of future events selected in advance by the operator.
- the method includes providing instructions to grant and thereafter revoke access permissions of the users to the network objects at future times set in advance by the operator.
- the method includes providing instructions to revoke and thereafter regrant pre-existing access permissions of the users to the network objects at future times set in advance by the operator. Additionally or alternatively, the method includes providing instructions to grant to the users access permissions to the network objects for a limited duration set in advance by the operator.
- the method includes providing instructions to grant or revoke access permissions of the users to the network objects based on changes in at least one characteristic of at least one user of the network object indicated in advance by the operator. Additionally or alternatively, the method includes providing instructions to grant or revoke access permissions of the users to the network objects based on changes in at least one characteristic of the network object indicated in advance by the operator.
- the method includes providing instructions to grant or revoke access permissions of the users to the network objects based on activity of at least one user related to the network object as indicated in advance by the operator. Additionally or alternatively, the method includes providing instructions to grant or revoke access permissions of the users to the network objects based on changes in at least one classification of the network object indicated in advance by the operator.
- Figs. 1A, IB, 1C, ID, and IE are simplified pictorial illustrations of operation of the data access permission management system of an embodiment of the present invention for revoking and thereafter regranting pre-existing access permissions of a user to network objects at future times set in advance by an operator;
- FIGs. 2A, 2B, 2C, 2D, and 2E are simplified pictorial illustrations of operation of the data access permission management system of an embodiment of the present invention for revoking and thereafter regranting pre-existing access permissions of a user to network objects in response to a future event set in advance by an operator;
- FIGs. 3A, 3B and 3C are simplified pictorial illustrations of operation of the data access permission management system of an embodiment of the present invention for changing access permissions of a user to network objects in response to a future event at a known date set in advance by an operator;
- FIGs. 4A, 4B and 4C are simplified pictorial illustrations of operation of the data access permission management system of an embodiment of the present invention for changing access permissions of a user to network objects in response to a future event associated with a related user at a known date set in advance by an operator;
- Fig. 5 is a simplified flowchart indicating steps in the operation of the data access permission management system of Fig. 1;
- Fig. 6 is another simplified flowchart indicating steps in the operation of the data access permission management system of Fig. 1.
- FIGs. 1A, IB, 1C, ID and IE are simplified pictorial illustrations of operation of the data access permission management system of an embodiment of the present invention for revoking and thereafter regranting pre-existing access permissions of a user to network objects at future times set in advance by an operator.
- the network object access permission management system is useful with a computer network 100 including at least one server 102 and a multiplicity of clients 104.
- One or more storage elements 106 are also preferably provided.
- the system preferably resides on the server 102 and preferably includes:
- an access permissions subsystem 110 which governs access permissions of users to network objects in the computer network 100 in real time;
- a future condition-based permissions instruction subsystem 112 providing instructions to the access permission subsystem 110 to grant or revoke access permissions of the users to network objects in real time in response to future fulfillment of conditions which are established by an operator in advance.
- network object for the purposes of this application is defined to include user generated enterprise computer network resources on any commercially available computer operating system.
- network objects include structured and unstructured computer data resources such as files and folders, and user groups.
- Access permissions of users to network objects may include for example, read or write permissions to a file, modification permissions to a folder (e.g. permissions to create or delete files), and modification permissions to a user group (e.g. permissions to add or remove a user from the group).
- Fig. 1A shows a stage in typical operation of the data access permission management system, wherein an IT manager employs the future condition-based permission instruction subsystem 112 for revoking all access permissions for an employee about to go on vacation.
- the IT manager sets a future start date and a duration for the revocation, after which duration, the access permissions will be automatically restored.
- Fig. IB shows that at 12:01AM on July 15, the future start date set by the IT manager, the future condition-based permission instruction subsystem 112 automatically provides instructions to the access permission subsystem to immediately revoke all access permissions to the employee.
- Fig. ID illustrates that automatically upon expiration of the above duration, the future condition-based permission instruction subsystem automatically provides instructions to the access permission subsystem to immediately regrant all access permissions to the employee and Fig. IE illustrates that thereafter, the employee employs the restored access permissions.
- FIGs. 2A, 2B, 2C, 2D, and 2E are simplified pictorial illustrations of operation of the data access permission management system of an embodiment of the present invention for revoking and thereafter regranting pre-existing access permissions of a user to network objects in response to a future event set in advance by an operator.
- the network object access permission management system is useful with a computer network 200 including at least one server 202 and a multiplicity of clients 204.
- One or more storage elements 206 are also preferably provided.
- the system preferably resides on the server 202 and preferably includes:
- an access permissions subsystem 210 which governs access permissions of users to network objects in the computer network 200 in real time;
- a future condition-based permissions instruction subsystem 212 providing instructions to the access permission subsystem 210 to grant or revoke access permissions of the users to network objects in real time in response to future fulfillment of conditions which are established by an operator in advance.
- Fig. 2A shows a stage in typical operation of the data access permission management system, wherein an IT manager employs the future condition-based permission instruction subsystem 212 for revoking all access permissions for an employee who is about to give birth and go on maternity leave.
- the IT manager sets a condition for revoking access permissions, i.e. maternity leave, after which duration, the access permissions will be automatically restored.
- Fig. 2B shows that at 12:01AM on July 15, the future condition-based permission instruction subsystem 212 routinely queries a human resources system 218 residing on a server 220 connected to the network 200, whether the employee has given birth and is now on maternity leave. Upon discovering that the employee is now indeed on maternity leave, the future condition-based permission instruction subsystem 212 orders the access permissions subsystem 210 to revoke all access permissions from the employee.
- Fig. 2D illustrates that on July 29 the future condition-based permission instruction subsystem 212 routinely queries the human resources system 218 and discovers that the employee is no longer on maternity leave.
- the future condition-based permission instruction subsystem 212 immediately orders the access permissions subsystem 210 to regrant all access permissions to the employee, and
- Fig. 2E illustrates that thereafter, the employee employs the restored access permissions.
- FIGS. 3A, 3B and 3C are simplified pictorial illustrations of operation of the data access permission management system of an embodiment of the present invention for changing access permissions of a user to network objects in response to a future event at a known date set in advance by an operator
- the network object access permission management system is useful with a computer network 300 including at least one server 302 and a multiplicity of clients 304.
- One or more storage elements 306 are also preferably provided.
- the system preferably resides on the server 302 and preferably includes:
- an access permissions subsystem 310 which governs access permissions of users to network objects in the computer network 300 in real time;
- a future condition-based permissions instruction subsystem 312 providing instructions to the access permission subsystem 310 to grant or revoke access permissions of the users to network objects in real time in response to future fulfillment of conditions which are established by an operator in advance.
- Fig. 3A shows a stage in typical operation of the data access permission management system, wherein an IT manager employs the future condition-based permission instruction subsystem 312 for revoking all access permissions for an employee to certain enterprise resources and for granting access permissions for the employee to other enterprise resources, due to the employee transferring to another department in the enterprise.
- the IT manager sets a future start date for the simultaneous revocation and granting of access permissions.
- Fig. 3B shows that at 12:01AM on July 15, the future start date set by the
- the future condition-based permission instruction subsystem 312 automatically provides instructions to the access permission subsystem 310 to immediately revoke all existing access permissions to the employee, and to grant new, alternative, access permissions to the employee.
- FIGs. 4A, 4B and 4C are simplified pictorial illustrations of operation of the data access permission management system of an embodiment of the present invention for changing access permissions of a user to network objects in response to a future event associated with a related user at a known date set in advance by an operator.
- the network object access permission management system is useful with a computer network 400 including at least one server 402 and a multiplicity of clients 404.
- One or more storage elements 406 are also preferably provided.
- the system preferably resides on the server 402 and preferably includes:
- an access permissions subsystem 410 which governs access permissions of users to network objects in the computer network 400 in real time;
- a future condition-based permissions instruction subsystem 412 providing instructions to the access permission subsystem 410 to grant or revoke access permissions of the users to network objects in real time in response to future fulfillment of conditions which are established by an operator in advance.
- Fig. 4A shows a stage in typical operation of the data access permission management system, wherein an IT manager employs the future condition-based permission instruction subsystem 412 for revoking all access permissions for an employee to certain enterprise resources and for granting access permissions for the employee to other enterprise resources, due to the employee transferring to another department in the enterprise as a result of the employee's manager transferring to another department in the enterprise.
- the IT manager sets a future start date for the simultaneous revocation and granting of access permissions.
- Fig. 4B shows that at 12:01AM on July 15, the future start date set by the IT manager, the future condition-based permission instruction subsystem 412 automatically provides instructions to the access permission subsystem 410 to immediately revoke all existing access permissions to the employee, and to grant new, alternative, access permissions to the employee.
- Fig. 5 is a simplified flowchart indicating steps in the operation of the data access- permission management system of Fig. 1.
- an IT manager utilizes the system by entering to the system an access permissions modification instruction to be implemented by the system upon fulfillment of a future condition.
- the future condition may comprise the occurrence of a future date or an employee related event such as leave of absence of an employee, maternity leave, vacation leave, termination of employment of an employee and transfer of an employee to another department in the enterprise.
- the access permissions modification instruction may comprise granting or revoking access permissions of users to network objects.
- the system continuously monitors relevant resources on the computer enterprise network for the fulfillment of the future condition.
- the resources may include, for example, human resources databases and IT security-related systems.
- Fig. 6 is another simplified flowchart indicating steps in the operation of the data access permission management system of Fig. 1.
- an IT manager utilizes the system by entering to the system a temporary access permissions modification instruction to be implemented by the system for the duration of a future state.
- the future state may comprise the occurrence of a future date or range of dates, or an employee related state such as leave of absence of an employee, maternity leave, vacation leave and temporary transfer of an employee to another department in the enterprise.
- the temporary access permissions modification instruction may comprise temporarily granting or revoking access permissions of users to network objects.
- the system continuously monitors relevant resources on the computer enterprise network for the existence of the state.
- the resources may include, for example, human resources databases and IT security-related systems.
- the system Upon discovering the existence of the state, the system implements the temporary access permissions modification instruction. The system continues to monitor relevant resources on the computer enterprise network for the continued existence of the state.
- the system Upon discovering that the state no longer exists, the system reverses the temporary access permissions modification instruction, and removes the temporary access permissions modification instruction and its related future state from the system.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IL2010/000069 WO2011030324A1 (fr) | 2009-09-09 | 2010-01-27 | Gestion de données au niveau de l'entreprise |
US34882210P | 2010-05-27 | 2010-05-27 | |
US12/814,807 US8578507B2 (en) | 2009-09-09 | 2010-06-14 | Access permissions entitlement review |
US12/861,967 US20110061093A1 (en) | 2009-09-09 | 2010-08-24 | Time dependent access permissions |
PCT/IL2011/000078 WO2011092686A1 (fr) | 2010-01-27 | 2011-01-23 | Autorisations d'accès en fonction du temps |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2529300A1 true EP2529300A1 (fr) | 2012-12-05 |
EP2529300A4 EP2529300A4 (fr) | 2017-05-03 |
Family
ID=47074458
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11736706.0A Withdrawn EP2529300A4 (fr) | 2010-01-27 | 2011-01-23 | Autorisations d'accès en fonction du temps |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2529300A4 (fr) |
CN (1) | CN102822793A (fr) |
WO (1) | WO2011092686A1 (fr) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10229191B2 (en) | 2009-09-09 | 2019-03-12 | Varonis Systems Ltd. | Enterprise level data management |
US9904685B2 (en) | 2009-09-09 | 2018-02-27 | Varonis Systems, Inc. | Enterprise level data management |
US10296596B2 (en) | 2010-05-27 | 2019-05-21 | Varonis Systems, Inc. | Data tagging |
CN108920502B (zh) | 2010-05-27 | 2021-11-23 | 瓦欧尼斯系统有限公司 | 数据分类 |
US9251363B2 (en) | 2013-02-20 | 2016-02-02 | Varonis Systems, Inc. | Systems and methodologies for controlling access to a file system |
CN105827635A (zh) * | 2016-05-09 | 2016-08-03 | 乐视控股(北京)有限公司 | 一种基于对象存储的对象访问权限变更方法和系统 |
CN106878002B (zh) * | 2016-07-05 | 2020-04-24 | 阿里巴巴集团控股有限公司 | 一种权限撤销方法及装置 |
CN107315931A (zh) * | 2017-07-05 | 2017-11-03 | 成都牵牛草信息技术有限公司 | 表单字段值操作权限授权方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000025214A1 (fr) * | 1998-10-28 | 2000-05-04 | Crosslogix, Inc. | Maintien de la securite dans un reseau informatique reparti |
US20050251851A1 (en) * | 2003-10-10 | 2005-11-10 | Bea Systems, Inc. | Configuration of a distributed security system |
US20060059117A1 (en) * | 2004-09-14 | 2006-03-16 | Michael Tolson | Policy managed objects |
US20060230282A1 (en) * | 2005-04-06 | 2006-10-12 | Hausler Oliver M | Dynamically managing access permissions |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7779247B2 (en) * | 2003-01-09 | 2010-08-17 | Jericho Systems Corporation | Method and system for dynamically implementing an enterprise resource policy |
US20090031418A1 (en) * | 2005-04-21 | 2009-01-29 | Nori Matsuda | Computer, method for controlling access to computer resource, and access control program |
US8554749B2 (en) * | 2006-10-23 | 2013-10-08 | Adobe Systems Incorporated | Data file access control |
US20080162707A1 (en) * | 2006-12-28 | 2008-07-03 | Microsoft Corporation | Time Based Permissioning |
US8132231B2 (en) * | 2007-12-06 | 2012-03-06 | International Business Machines Corporation | Managing user access entitlements to information technology resources |
-
2011
- 2011-01-23 CN CN2011800163855A patent/CN102822793A/zh active Pending
- 2011-01-23 WO PCT/IL2011/000078 patent/WO2011092686A1/fr active Application Filing
- 2011-01-23 EP EP11736706.0A patent/EP2529300A4/fr not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000025214A1 (fr) * | 1998-10-28 | 2000-05-04 | Crosslogix, Inc. | Maintien de la securite dans un reseau informatique reparti |
US20050251851A1 (en) * | 2003-10-10 | 2005-11-10 | Bea Systems, Inc. | Configuration of a distributed security system |
US20060059117A1 (en) * | 2004-09-14 | 2006-03-16 | Michael Tolson | Policy managed objects |
US20060230282A1 (en) * | 2005-04-06 | 2006-10-12 | Hausler Oliver M | Dynamically managing access permissions |
Non-Patent Citations (1)
Title |
---|
See also references of WO2011092686A1 * |
Also Published As
Publication number | Publication date |
---|---|
CN102822793A (zh) | 2012-12-12 |
EP2529300A4 (fr) | 2017-05-03 |
WO2011092686A1 (fr) | 2011-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20110061093A1 (en) | Time dependent access permissions | |
WO2011092686A1 (fr) | Autorisations d'accès en fonction du temps | |
US9679148B2 (en) | Access permissions management system and method | |
EP2405607B1 (fr) | Système et procédé de gestion de privilèges basés sur un objet | |
EP2529299B1 (fr) | Journal de droits d'autorisations d'accès | |
US10721234B2 (en) | Access permissions management system and method | |
US20200336485A1 (en) | Access permissions management system and method | |
US20080301207A1 (en) | Systems and methods for cascading destruction of electronic data in electronic evidence management | |
US20120233130A1 (en) | System and method for archiving emails | |
US20080301757A1 (en) | Systems and methods for policy enforcement in electronic evidence management | |
CN107451486A (zh) | 一种文件系统的权限设置方法及装置 | |
EP2476052A1 (fr) | Gestion de données au niveau de l'entreprise | |
US20110061110A1 (en) | Viewing Content Under Enterprise Digital Rights Management without a Client Side Access Component | |
WO2011092685A1 (fr) | Gestion de données utilisant des informations d'accès et de contenu | |
CN111382985A (zh) | 待办消息集成推送系统和工作方法 | |
JP2013114475A (ja) | 情報管理システムおよび情報管理方法 | |
JP2008178054A (ja) | プライバシーを守る監視システム | |
EP2577445A1 (fr) | Marquage de données | |
US20080301284A1 (en) | Systems and methods for capture of electronic evidence | |
US20080301084A1 (en) | Systems and methods for dynamically creating metadata in electronic evidence management | |
CN102799818B (zh) | 一种数字资源的管理方法及装置 | |
CN112308542B (zh) | 实现数据智能无感录入的方法及系统 | |
US20080301713A1 (en) | Systems and methods for electronic evidence management with service control points and agents | |
US20080301756A1 (en) | Systems and methods for placing holds on enforcement of policies of electronic evidence management on captured electronic | |
EP2959424B1 (fr) | Systèmes et méthodologies de contrôle d'accès à un système de fichiers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20120822 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
RA4 | Supplementary search report drawn up and despatched (corrected) |
Effective date: 20170330 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 29/06 20060101AFI20170325BHEP Ipc: G06F 21/45 20130101ALI20170325BHEP |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20191206 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20240423 |