WO1998048389A2 - Method for mutual authentication between two units - Google Patents
Method for mutual authentication between two units Download PDFInfo
- Publication number
- WO1998048389A2 WO1998048389A2 PCT/EP1998/002231 EP9802231W WO9848389A2 WO 1998048389 A2 WO1998048389 A2 WO 1998048389A2 EP 9802231 W EP9802231 W EP 9802231W WO 9848389 A2 WO9848389 A2 WO 9848389A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- unit
- key
- random number
- message
- units
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
Definitions
- the invention relates to a method for mutual authentication of two communicating units.
- the three-stage authentication takes place, for example, in such a way that the unit B generates a random number and sends it to the unit A. This also generates a random number and encrypts it and the random number received by the unit B with the aid of its secret key.
- the result of this encryption is then transmitted as a message from unit A to unit B. This then decrypts this message with the same secret key and checks whether the random number previously sent to unit A matches the random number obtained from the encrypted message. If this is the case, unit B knows that unit A also has the same secret key. Unit A is thus authenticated with respect to unit B.
- the unit B then exchanges the two random numbers and encrypts them with the shared secret key.
- the message sent by unit B is then decrypted by unit A and the latter compares the random number previously transmitted to unit B with the random number obtained from the message. If this in turn matches the random number generated by unit A, then unit B is also authenticated to unit A.
- This mutual authentication is based on the fact that units A and B use the same secret key to encrypt their messages.
- the encrypted messages are different due to the exchange of the random numbers, it cannot be ruled out that due to the exchange of the random numbers and the associated change in the message when the encryption algorithm is known by listening to the messages for the secret key can be closed.
- the present invention is therefore based on the object of making plain text attacks more difficult by preventing the occurrence of plain text and associated ciphertext during communication. This task is solved by the features specified in claim 1.
- the basic idea of the invention is that a key is transmitted in the first message transmitted in encrypted form from a first unit to a second unit, which key is different from the key used by the first unit to encrypt this message.
- the second unit then encrypts the second message intended for the first unit using the key received from the first unit.
- the second unit is then authenticated by the first unit on the basis of this message.
- Another advantage of the method according to the invention is that a key exchange is possible during the authentication without any administrative effort.
- this key can also be used to encrypt the data exchange between the units.
- the exchanged key can be dynamic and therefore different for each authentication.
- the key used to encrypt the key to be exchanged can also be individual for the respective unit.
- This key is preferably derived from a basic key common to the units of the system, taking into account the respective identifier of the unit, according to a previously defined algorithm.
- the second unit calculates, for example, starting from this basic key and using the identifier received from the first unit, the key used by the first unit to encrypt the message.
- the basic key must of course be kept secret.
- a key derived from a basic key has the advantage that, if the derived key has become insecure for a unit, another derived key can be used to authenticate the unit according to a defined algorithm, without the basic key being changed and encrypted Form must be exchanged between the units.
- the unit which authenticates the other unit selects from a number of secret keys agreed between the units, according to a defined rule, the key which the unit which is to be authenticated used to encrypt the message is.
- the units communicating with one another can be, for example, a chip card and a terminal, as are used in electronic payment transactions.
- the chip card can be assigned to a customer, for example, and the terminal to a dealer or a bank.
- the method according to the invention is of course not only limited to such an application. Rather, it can be used wherever it is necessary to check the authenticity of system-associated units. ascertain. For example, the method could also be used in a mobile radio system.
- the figure shows the process flow for the authentication of the communicating units A and B according to the invention.
- the unit B sends a random number Z_ generated by it to the unit A. Preferably, but not necessarily, this is initiated by a request Ab from unit A.
- Unit A also generates a random number Z a .
- the unit A selects a secret key K_ known only to it.
- unit A encrypts the random numbers Z a and Zb and the key K_ selected by it with the secret key Kab shared by the two units A and B.
- a sequence number SN can be included in the encryption.
- the result of the encryption is then transmitted to unit B as message N1.
- the unit B decrypts the received message Nl with the key Kab.
- the random number Z a ', the random number Zb', the optional sequence number SN 'and the key K_ selected by the unit A are thus obtained in plain text from the message Nl'.
- the unit B compares the random number Zv obtained by decryption from the message Nl with the random number Zb generated by the unit B and transmitted to the unit A. If these match, unit A is recognized by unit B as belonging to the system. If this is not the case, unit A is not authentic and does not belong to the system.
- the sequence number SN ' can also be evaluated by the unit B with regard to its validity.
- the unit A has another secret key Kab 'previously agreed with the unit B for encrypting the D -
- the unit B selects the key Kab- according to a previously defined rule from a protected list in which there are several secret keys Kab ', Kab ", Kab n .
- This key Ka' is then used, as already described above , decrypts the message NI, which enables unit B to successfully authenticate unit A by correctly selecting the key KaK, because units A and B each have several, previously in common are agreed secret keys, units A and B can change the shared secret key Kab 'used for authentication at any time, the change taking place according to a rule previously defined between the units.
- the selection method described enables the units A and B to switch to other secret keys agreed between them without additional administrative effort if one of the keys has become known.
- the mutual authentication of units A and B in the invention can take place independently of the selection of a new shared secret key.
- the authentication of unit B by unit A is described below.
- the unit B encrypts the random numbers Z_- and Zv using the key K_ 'obtained from the message Nl.
- the result of the encryption is transmitted to unit A as message N2.
- the unit A decrypts the message N2 by means of the key Ks previously selected by it and thus receives the random numbers Zb "and Z a " in plain text as message N2 '.
- the random number Z a " is then compared with the random number Z_ generated by the unit A.
- a comparison of the random number Zb "obtained from the message N2 by decryption with the random number Zb received from the unit B can also be carried out by the unit A. If the comparison is positive in both cases, the unit B is considered authentic by the Unit A recognized. Of course, however, it may also be sufficient to only compare the random number Z a "with the random number Z a to authenticate the unit B.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Finance (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP54497298A JP2001523407A (en) | 1997-04-17 | 1998-04-16 | Mutual authentication method between two entities |
AU80135/98A AU8013598A (en) | 1997-04-17 | 1998-04-16 | Method for mutual authentication between two units |
EP98928199A EP1010146A2 (en) | 1997-04-17 | 1998-04-16 | Method for mutual authentication between two units |
IL13237498A IL132374A0 (en) | 1997-04-17 | 1998-04-16 | Method for mutal authentication between two units |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19716111.1 | 1997-04-17 | ||
DE19716111A DE19716111A1 (en) | 1997-04-17 | 1997-04-17 | Procedure for mutual authentication of two units |
Publications (2)
Publication Number | Publication Date |
---|---|
WO1998048389A2 true WO1998048389A2 (en) | 1998-10-29 |
WO1998048389A3 WO1998048389A3 (en) | 1999-01-28 |
Family
ID=7826826
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP1998/002231 WO1998048389A2 (en) | 1997-04-17 | 1998-04-16 | Method for mutual authentication between two units |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1010146A2 (en) |
JP (1) | JP2001523407A (en) |
AU (1) | AU8013598A (en) |
DE (1) | DE19716111A1 (en) |
IL (1) | IL132374A0 (en) |
WO (1) | WO1998048389A2 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1223565A1 (en) * | 2001-01-12 | 2002-07-17 | Motorola, Inc. | Transaction system, portable device, terminal and methods of transaction |
JP2002281027A (en) * | 2001-03-19 | 2002-09-27 | Toshiba Corp | Entity device for authentication system, key updating method and authentication system updating method |
AU2004201742B2 (en) * | 2000-02-15 | 2004-06-03 | Silverbrook Research Pty Ltd | Consumables validation chip |
AU2004205292B2 (en) * | 2000-02-15 | 2004-12-09 | Silverbrook Research Pty Ltd | A system for authenticating an object |
US7003111B2 (en) | 2001-10-11 | 2006-02-21 | International Business Machines Corporation | Method, system, and program, for encoding and decoding input data |
US7865440B2 (en) | 2001-10-11 | 2011-01-04 | International Business Machines Corporation | Method, system, and program for securely providing keys to encode and decode data in a storage cartridge |
GB2493138A (en) * | 2011-07-15 | 2013-01-30 | Flick Mobile Ltd | A system for secure payment transactions |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7702926B2 (en) | 1997-07-15 | 2010-04-20 | Silverbrook Research Pty Ltd | Decoy device in an integrated circuit |
US7249108B1 (en) | 1997-07-15 | 2007-07-24 | Silverbrook Research Pty Ltd | Validation protocol and system |
US6816968B1 (en) | 1998-07-10 | 2004-11-09 | Silverbrook Research Pty Ltd | Consumable authentication protocol and system |
FR2782431B1 (en) * | 1998-08-17 | 2000-09-29 | Gemplus Sca | SYMMETRIC ALGORITHM AUTHENTICATION METHOD AND DEVICE |
DE19953448A1 (en) | 1999-11-06 | 2001-05-10 | Volkswagen Ag | Bumper |
SE518400C2 (en) * | 2000-02-04 | 2002-10-01 | Telia Ab | Procedure and arrangement for mutual authentication in communication between two persons in a communication system |
US7197642B2 (en) | 2000-02-15 | 2007-03-27 | Silverbrook Research Pty Ltd | Consumable authentication protocol and system |
AU2005200945B2 (en) * | 2000-02-15 | 2006-10-05 | Silverbrook Research Pty Ltd | Integrated Circuit For Authenticating an Object |
AU2006252272B2 (en) * | 2000-02-15 | 2007-03-22 | Silverbrook Research Pty Ltd | An apparatus for validating a device using first and second keys |
US7496397B2 (en) | 2004-05-06 | 2009-02-24 | Boston Scientific Scimed, Inc. | Intravascular antenna |
KR100601703B1 (en) * | 2004-10-04 | 2006-07-18 | 삼성전자주식회사 | Method for authenticating the device using broadcast crptography |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2600188A1 (en) * | 1986-06-16 | 1987-12-18 | Bull Cp8 | Method of accrediting an external environment by a portable object associated with this environment |
EP0253722A1 (en) * | 1986-07-17 | 1988-01-20 | Bull Cp8 | Method for diversifying a basic key and for authenticating a key worked out from a predetermined basic key and system for operation |
EP0440800A1 (en) * | 1989-06-05 | 1991-08-14 | Ntt Data Communications Systems Corporation | Ic card for security attestation and ic card service system using said ic card |
FR2681165A1 (en) * | 1991-09-05 | 1993-03-12 | Gemplus Card Int | Process for transmitting confidential information between two chip cards |
EP0548967A2 (en) * | 1991-12-24 | 1993-06-30 | GAO Gesellschaft für Automation und Organisation mbH | Data exchange system with authentification status check |
-
1997
- 1997-04-17 DE DE19716111A patent/DE19716111A1/en not_active Withdrawn
-
1998
- 1998-04-16 IL IL13237498A patent/IL132374A0/en unknown
- 1998-04-16 EP EP98928199A patent/EP1010146A2/en not_active Ceased
- 1998-04-16 JP JP54497298A patent/JP2001523407A/en active Pending
- 1998-04-16 AU AU80135/98A patent/AU8013598A/en not_active Abandoned
- 1998-04-16 WO PCT/EP1998/002231 patent/WO1998048389A2/en not_active Application Discontinuation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2600188A1 (en) * | 1986-06-16 | 1987-12-18 | Bull Cp8 | Method of accrediting an external environment by a portable object associated with this environment |
EP0253722A1 (en) * | 1986-07-17 | 1988-01-20 | Bull Cp8 | Method for diversifying a basic key and for authenticating a key worked out from a predetermined basic key and system for operation |
EP0440800A1 (en) * | 1989-06-05 | 1991-08-14 | Ntt Data Communications Systems Corporation | Ic card for security attestation and ic card service system using said ic card |
FR2681165A1 (en) * | 1991-09-05 | 1993-03-12 | Gemplus Card Int | Process for transmitting confidential information between two chip cards |
EP0548967A2 (en) * | 1991-12-24 | 1993-06-30 | GAO Gesellschaft für Automation und Organisation mbH | Data exchange system with authentification status check |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2004201742B2 (en) * | 2000-02-15 | 2004-06-03 | Silverbrook Research Pty Ltd | Consumables validation chip |
AU2004205292B2 (en) * | 2000-02-15 | 2004-12-09 | Silverbrook Research Pty Ltd | A system for authenticating an object |
EP1223565A1 (en) * | 2001-01-12 | 2002-07-17 | Motorola, Inc. | Transaction system, portable device, terminal and methods of transaction |
JP2002281027A (en) * | 2001-03-19 | 2002-09-27 | Toshiba Corp | Entity device for authentication system, key updating method and authentication system updating method |
US7003111B2 (en) | 2001-10-11 | 2006-02-21 | International Business Machines Corporation | Method, system, and program, for encoding and decoding input data |
US7865440B2 (en) | 2001-10-11 | 2011-01-04 | International Business Machines Corporation | Method, system, and program for securely providing keys to encode and decode data in a storage cartridge |
US9317720B2 (en) | 2001-10-11 | 2016-04-19 | International Business Machines Corporation | Method, system, and program for securely providing keys to encode and decode data in a storage cartridge |
GB2493138A (en) * | 2011-07-15 | 2013-01-30 | Flick Mobile Ltd | A system for secure payment transactions |
Also Published As
Publication number | Publication date |
---|---|
EP1010146A2 (en) | 2000-06-21 |
AU8013598A (en) | 1998-11-13 |
WO1998048389A3 (en) | 1999-01-28 |
IL132374A0 (en) | 2001-03-19 |
DE19716111A1 (en) | 1998-10-22 |
JP2001523407A (en) | 2001-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0631408B1 (en) | Method for authentication between two electronic devices | |
DE69533328T2 (en) | VERIFICATION DEVICE | |
DE3883287T2 (en) | Control of the use of secret transmission keys by control values produced in a production site. | |
DE69829642T2 (en) | AUTHENTICATION SYSTEM WITH CHIP CARD | |
WO1998048389A2 (en) | Method for mutual authentication between two units | |
DE102013206185A1 (en) | Method for detecting a manipulation of a sensor and / or sensor data of the sensor | |
EP1368929B1 (en) | Authentication method | |
EP1076887A1 (en) | Method for authenticating a chip card in a message transmission network | |
EP2567501B1 (en) | Method for cryptographic protection of an application | |
EP2749003A1 (en) | Method for authenticating a telecommunication terminal comprising an identity module on a server device in a telecommunication network, use of an identity module, identity module and computer program | |
DE10026326B4 (en) | A method of cryptographically verifying a physical entity in an open wireless telecommunications network | |
DE102018202176A1 (en) | Master-slave system for communication via a Bluetooth low-energy connection | |
AT504634B1 (en) | METHOD FOR TRANSFERRING ENCRYPTED MESSAGES | |
DE19840742B4 (en) | Method for increasing the security of authentication methods in digital mobile radio systems | |
EP2730050B1 (en) | Method for generating and verifying an electronic pseudonymous signature | |
DE3922642C2 (en) | ||
WO2000067422A1 (en) | Signing and signature authentication of messages | |
EP3367285B1 (en) | Terminal, id-token, computer program and corresponding methods for authenticating access authorization | |
EP1573955B1 (en) | Encoding method | |
EP1163559B1 (en) | Method for securing access to a data processing device and appropriate device | |
WO2018091703A1 (en) | Method and apparatus for securing an electronic data transmission | |
DE19648824A1 (en) | Process for secure message exchange with mass services, and subscriber facility and service provider facility therefor | |
DE102022000857B3 (en) | Procedure for the secure identification of a person by a verification authority | |
EP1400142A2 (en) | Authentication method | |
EP2526646A1 (en) | Secure renewal of cryptographic keys |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 132374 Country of ref document: IL |
|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 1998 544972 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998928199 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09403087 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 1998928199 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: CA |
|
WWR | Wipo information: refused in national office |
Ref document number: 1998928199 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998928199 Country of ref document: EP |