WO1999000719A1 - Access-controlled computer system with automatic speech recognition - Google Patents
Access-controlled computer system with automatic speech recognition Download PDFInfo
- Publication number
- WO1999000719A1 WO1999000719A1 PCT/IB1998/001110 IB9801110W WO9900719A1 WO 1999000719 A1 WO1999000719 A1 WO 1999000719A1 IB 9801110 W IB9801110 W IB 9801110W WO 9900719 A1 WO9900719 A1 WO 9900719A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- specific
- speech
- identification
- specific user
- Prior art date
Links
- 238000012795 verification Methods 0.000 claims description 59
- 238000000034 method Methods 0.000 claims description 34
- 230000006978 adaptation Effects 0.000 claims description 9
- 238000012986 modification Methods 0.000 claims description 5
- 230000004048 modification Effects 0.000 claims description 5
- 239000003112 inhibitor Substances 0.000 claims 2
- 238000012544 monitoring process Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 8
- 230000001419 dependent effect Effects 0.000 description 6
- 238000013475 authorization Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/16—Sound input; Sound output
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
Definitions
- the present invention relates to access-controlled computer systems, and more particularly to such systems with automatic speech recognition.
- a computer system for operation based on text inputs derived from automatic recognition of speech of a plurality of users providing spoken inputs.
- the system has a plurality of speech - enabled terminals, each terminal for receiving speech from a user.
- An identification comparator compares a non-keyboard user identification provided by a specific user with data stored in a user identification data base to determine if the specific user is an authorized user.
- an automatic speech recognizer derives text from speech provided by the specific user at a given one of the speech-enabled terminals.
- a profile loader is provided to load a user-specific profile pertinent to the specific user into the automatic speech recognizer; and, finally, a system access provider provides computing access to the specific user if determined to be authorized by the identification comparator.
- the non-keyboard user identification is spoken by the specific user or alternatively contained in a digitally encoded card presented by the specific user.
- the user identification database may contain voice prints of authorized users, and the identification comparator compares a voice print derived from the spoken user identification with voice prints in the user identification database.
- the user identification database may contain passwords of authorized users and the spoken user identification is a password; the user identification database may optionally store the passwords as text derived from utterances using automatic speech recognition.
- each speech-enabled terminal is coupled to a telephone line permitting a user to access the computer system by telephone.
- each speech-enabled terminal is associated with a separate local processor and a local automatic speech recognizer.
- the system may additionally include a user verification comparator for comparing a user verification provided by the specific user with data stored in a user verification data base to verify the identity of the specific user as an authorized user.
- the system access provider provides computing access to the specific user only if the identity of the specific user has been verified as an authorized user by the verification comparator.
- the user verification may be spoken by the specific user, or alternatively may, for example, be entered by means of a keyboard or by other non-keyboard means .
- a method for providing access to a computer system that has an automatic speech recognizer and operates based on text inputs derived from automatic recognition of speech from a plurality of users provided via a plurality of speech-enabled terminals.
- the access is provided to a specific user at a given one of the speech-enabled terminals.
- the method includes the following steps: a. receiving a non-keyboard user identification provided by the specific user; b. comparing the user identification with data stored in a user identification data base to determine whether the specific user is an authorized user; and c. if the specific user has been determined to be an authorized user, i.
- Further and related embodiments include the steps of receiving a user verification provided by the specific user and comparing the user verification with data stored in a user verification data base to verify the identity of the specific user as an authorized user.
- the step of providing access to the system to the specific user is performed only if the identity of the specific user has been verified as an authorized user.
- the user identification and the user verification may be implemented as discussed above.
- a method for providing access by a plurality of users to a computer system having automatic recognition of speech provided at a plurality of speech- enabled terminals includes the steps of a. generating a prompt for a spoken user identification over one of the plurality of speech-enabled terminals; b. comparing the spoken user identification with data stored in a user identification data base to determine if the user is an authorized user; c. providing an automatic speech recognizer for deriving text from speech provided at a speech-enabled terminal; d. loading user-specific profiles pertinent to a user who has been determined to be authorized into the automatic speech recognizer; and e. providing access to the system to a user who has been determined to be authorized.
- Fig. 1 is a block diagram of a system to which the present invention is applicable;
- Fig. 2 is a block diagram of a method in accordance with a preferred embodiment of the invention;
- Fig. 3 is a block diagram of a method, similar to that of Fig. 2, but also providing user verification;
- Fig. 4 is a block diagram of a preferred embodiment of a system in accordance with a preferred embodiment of the invention corresponding generally to the method of Fig. 3.
- FIG. 1 is a block diagram of a system to which the present invention is applicable.
- a computer system 11 has a plurality of speech-enabled terminals 131 , 132, ... 133 to accommodate up to an arbitrary number n of users.
- the computer system includes an automatic speech recognizer 12.
- the speech recognizer may be hard wired or it may be implemented as a process running in the computer system 1 1.
- the computer system may include a general purpose computer in which the process is defined by a computer program loaded into the computer.
- Each of the speech-enabled terminals 131 , 132, ... 133 may be associated with a separate local processor; in such a configuration, each local processor may be associated with a local automatic speech recognizer.
- the local automatic speech recognizer may, but need not necessarily, be implemented as a process running in the local processor.
- Each of the speech-enabled terminals 131 , 132, ... 133 may also (or alternatively) be coupled to a telephone line permitting a user to access the computer system by telephone.
- Fig. 2 is a block diagram of a method, in accordance with a preferred embodiment of the invention, for providing access by a plurality of users to a computer system having automatic recognition of speech provided at a plurality of speech-enabled terminals.
- a non- keyboard user identification is provided over one of the speech-enabled terminals 131, 132, ... 133 of Fig. 1.
- the user identification may, for example, be spoken via microphone or be contained in a digitally encoded card presented by the user to a card reader.
- the user identification is compared with data stored in a user identification data base to determine if the user is an authorized user.
- the user identification database contains voice prints of authorized users, and in step 22, the comparison is between a voice print derived from the spoken user identification with voice prints in the user identification database.
- the user identification database contains passwords of authorized users and the spoken user identification is a password; in such a case, the spoken input may be processed initially by a speech recognizer associated with the system. If in step 23, the comparison shows that there is not a match, and if in step 24 the match has not failed three times, the method permits the receipt of a new user identification in step 21 , and the comparison of step 22 is reinitiated. If in step 24 the match has failed three times, the method terminates in step 27.
- step 25 a user-specific profile is loaded for automatic speech recognition of the user who has been determined to be authorized.
- step 26 access to the system is provided to the user who has been determined to be authorized.
- the level of access to the system may be controlled on a user-by-user basis in accordance with standard techniques known in the art for computer networks; thus the level of access by a user to the system may be subject to control, and the user will be given the level of access for which the system has been configured to provide to such user.
- Fig. 3 is a block diagram of a method, similar to that of Fig. 2, but also providing user verification. Steps 31 , 32, 33, 34, 35, 36 and 37 of Fig. 3 are comparable to steps 21 , 22, 23, 24, 25, 26, and 27 of Fig. 2 previously discussed. However, if a user identification has been matched as a result of the comparison step 32, the method next proceeds with a user verification procedure. In step 381 , the user verification is received. Such a verification may be spoken, or alternatively may be entered by keyboard, or may be provided by other non-keyboard arrangements. In step 382, the user verification is compared with data in a user verification data base.
- step 383 If there is a match in step 383, then the user-specific profile for automatic speech recognition is loaded into the recognizer (step 35), and computing access is provided to the user at the level for which the user is authorized (step 36). If there is no match, in step 384, the method tests to determine whether there have been three consecutive failed matches, and if so, the method terminates; otherwise processing is repeated back at step 31.
- Fig. 4 is a block diagram of a preferred embodiment of a system in accordance with a preferred embodiment of the invention corresponding generally to the method of Fig. 3.
- the system includes speech-enabled terminals 41 from which may be received a spoken user identification.
- An automatic speech recognizer 46 has two modes of operation. In a first mode, the recognizer can operate in speaker-independent fashion to recognize a spoken user identification, which is fed to the identification comparator 42, and a user verification, which is fed to verification comparator 43. In a second mode, the recognizer can operate in speaker-dependent fashion, utilizing additional information in the form of a user-specific profile for a user that has been identified by the identification comparator 42.
- an applicable one of the user-specific profiles can be loaded after an unverified user identification has been made by the identification comparator 42, and the recognizer can operate in a speaker-dependent mode when feeding text to the verification comparator.
- the comparators 42 and 43 may in fact be implemented in an integrated arrangement. For example, a user speaking his name (or a password uniquely identifying him) can provide a basis for both identification as well as verification using speaker-dependent templates. Further material on speech recognizer design may be found, for example, in Rabiner and Juang, Fundamentals of Speech Recognition, 1993, which is hereby incorporated herein by reference. In operation, a user identification is received by the identification comparator 42.
- the identification can take many forms, including speech (which is here converted to text by the recognizer 46 to furnish an input to the comparator 42) or a digitally encoded card that is read by a card reader.
- a user identification that has been received by the identification comparator is stored in storage region 421.
- identification comparator 42 compares the user identification that is stored in storage region 421 with user identification data in the identification data base that is stored in storage region 422. If the comparator 42 makes a successful match, then operation of the verification comparator 43 is triggered.
- the verification comparator receives a text input from the recognizer 46, and the input is stored in region 431 and compared with data in the verification data base that is stored in region 432.
- the profile loader 44 is caused to access and load one of the user-specific profiles (corresponding to the user who was matched by the comparators 42 and 43) stored in region 441 into the recognizer 46. In this fashion there is provided enhanced recognition of speech of the user who has been determined to be authorized.
- system access provider 45 is caused to provide access to the system to a user who has been determined to be authorized in accordance with the user authorization levels stored in region 451. It is contemplated that the identification comparator 42, the verification comparator 43, the automatic speech recognition user-specific profile loader 44, and the system access provider 45 may (but need not necessarily) be implemented as processes running in a general purpose computer. Indeed, the processes need not be running on the same computer.
- the system access provider 45 may be implemented on a server handling system access for all users of the system.
- the present invention is also applicable to any speech recognition system, capable of speaker adaptation, that has more than one user. Each user of such a system has a potentially unique user-specific profile resulting from speaker adaptation. In a multi-user environment, such a profile is subject to the risk of undesirable modification as a result of adaptation to the speech of a person other than the user.
- An embodiment of the present invention prevents undesirable modification of a user-specific profile for speech recognition by requiring user identification before at least one of modifying a user-specific profile (for example, at the beginning of an adaptation session) or saving a modification of a user-specific profile (for example, at the end of an adaptation session).
- such an embodiment has a speech profile adaptor 442 in communication with the automatic speech recognizer 46, for modifying the user-specific profiles 441.
- An adaptation controller 443 responsive to the identification comparator 42 controls the speech profile adaptor 442.
- the adaptation controller 443 enables operation of the speech profile adaptor 442 to permit updating of the user-specific profile.
- both user and identification and verification are required to enable the speech profile adaptor 442.
- the identification may be by the keyboard, or, as in the embodiments described previously, the identification may be a non-keyboard identification, as by speech or digitally encoded card.
- the access control system uses voice print matching of user provided speech.
- voice print matching can employ either text dependent verification, or text independent verification.
- Text dependent verification is the use of passwords and associated voice prints already described.
- Text independent verification operates with freely selected user speech input during normal use of the automatic speech recognition system.
- this implicit verification is implemented as a safeguard mechanism in combination with the explicit text dependent password and voice print technique.
- the text independent verification occurs in the background during system use as spoken text input progresses.
- the identification comparator 42 and verification comparator 43 continue to monitor the operation of the automatic speech recognizer 46.
- the identification comparator 42 and/or verification comparator 43 compares the incoming speech signal associated with the recognized text to stored user identification data 422 and/or stored user verification data 432. If the characteristics of the incoming speech fail to match the stored characteristics for the recognized user within an acceptability threshold, the identification comparator 42 and/or verification comparator 43 then disables the system access provider 45.
- the speech profile adaptor 442 is prevented from modifying the user-specific speech profiles 441. Then, the automatic speech recognizer 46 operates only to perform the user verification and access method previously described.
- This embodiment is especially useful in a situation where an authorized user has accessed the system and momentarily walks away.
- Text independent verification running in the application background prevents another, possibly unfriendly, user from invoking or altering the authorized user's speech profile. This effectively prevents use of the system by such an unauthorized person.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP98930984A EP0991990A1 (de) | 1997-06-27 | 1998-06-25 | Zugangsgesteuertes rechnersystem mit automatischer spracherkennung |
JP50540299A JP2002507298A (ja) | 1997-06-27 | 1998-06-25 | 自動音声認識を有するアクセス制御コンピュータシステム |
CA002288183A CA2288183A1 (en) | 1997-06-27 | 1998-06-25 | Access-controlled computer system with automatic speech recognition |
AU81251/98A AU8125198A (en) | 1997-06-27 | 1998-06-25 | Access-controlled computer system with automatic speech recognition |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US5102597P | 1997-06-27 | 1997-06-27 | |
US60/051,025 | 1997-06-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999000719A1 true WO1999000719A1 (en) | 1999-01-07 |
Family
ID=21968901
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB1998/001110 WO1999000719A1 (en) | 1997-06-27 | 1998-06-25 | Access-controlled computer system with automatic speech recognition |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP0991990A1 (de) |
JP (1) | JP2002507298A (de) |
AU (1) | AU8125198A (de) |
CA (1) | CA2288183A1 (de) |
WO (1) | WO1999000719A1 (de) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1152326A2 (de) * | 2000-05-04 | 2001-11-07 | International Business Machines Corporation | Verfahren zur Ausführung kontinuierlicher Spracherkennung als Alternativeingabegerät zu verarbeitungsleistungsbegrenzten Einheiten |
EP1164576A1 (de) * | 2000-06-15 | 2001-12-19 | Swisscom AG | System und Verfahren zur Sprechererkennung mittels Sprachmodellen |
WO2002086865A1 (en) * | 2001-04-13 | 2002-10-31 | Koninklijke Philips Electronics N.V. | Speaker verification in a spoken dialogue system |
EP1267242A2 (de) * | 2001-05-31 | 2002-12-18 | Alcatel S.A. | Benutzerverifizierungsverfahren in einem multimediafähigen Netzwerk |
JP2003502701A (ja) * | 1999-06-21 | 2003-01-21 | パルックス アクチエンゲゼルシャフト | 自動機械を制御する制御装置 |
US6744868B2 (en) | 2001-05-31 | 2004-06-01 | Alcatel | Call party profile presentation service in a multimedia-capable network |
WO2004055780A1 (en) * | 2002-12-16 | 2004-07-01 | Koninklijke Philips Electronics N.V. | Method of creating an acoustic model for a speech recognition system |
DE102007043254A1 (de) * | 2007-09-11 | 2009-03-12 | Siemens Ag | Verfahren und Vorrichtung zum durch Zugriffsrechte geschützten Zugriff auf eine Datenbank |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6392374B2 (ja) * | 2014-12-25 | 2018-09-19 | マクセル株式会社 | ヘッドマウントディスプレイシステム及びヘッドマウントディスプレイ装置の操作方法 |
CN106710593B (zh) * | 2015-11-17 | 2020-07-14 | 腾讯科技(深圳)有限公司 | 一种添加账号的方法、终端、服务器 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0621532A1 (de) * | 1993-04-23 | 1994-10-26 | AT&T Corp. | System zur Prüfung des Schutzwortes |
EP0622780A2 (de) * | 1993-04-30 | 1994-11-02 | AT&T Corp. | Verfahren und System zur Identitätsprüfung eines Sprechers |
WO1995018441A1 (en) * | 1993-12-29 | 1995-07-06 | At & T Corp. | Voice command control and verification system and method |
DE19515123C1 (de) * | 1995-04-25 | 1996-08-22 | Orga Kartensysteme Gmbh | Vorrichtung zur Sicherung von Gegenständen |
-
1998
- 1998-06-25 JP JP50540299A patent/JP2002507298A/ja active Pending
- 1998-06-25 WO PCT/IB1998/001110 patent/WO1999000719A1/en not_active Application Discontinuation
- 1998-06-25 EP EP98930984A patent/EP0991990A1/de not_active Withdrawn
- 1998-06-25 CA CA002288183A patent/CA2288183A1/en not_active Abandoned
- 1998-06-25 AU AU81251/98A patent/AU8125198A/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0621532A1 (de) * | 1993-04-23 | 1994-10-26 | AT&T Corp. | System zur Prüfung des Schutzwortes |
EP0622780A2 (de) * | 1993-04-30 | 1994-11-02 | AT&T Corp. | Verfahren und System zur Identitätsprüfung eines Sprechers |
WO1995018441A1 (en) * | 1993-12-29 | 1995-07-06 | At & T Corp. | Voice command control and verification system and method |
DE19515123C1 (de) * | 1995-04-25 | 1996-08-22 | Orga Kartensysteme Gmbh | Vorrichtung zur Sicherung von Gegenständen |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003502701A (ja) * | 1999-06-21 | 2003-01-21 | パルックス アクチエンゲゼルシャフト | 自動機械を制御する制御装置 |
EP1152326A2 (de) * | 2000-05-04 | 2001-11-07 | International Business Machines Corporation | Verfahren zur Ausführung kontinuierlicher Spracherkennung als Alternativeingabegerät zu verarbeitungsleistungsbegrenzten Einheiten |
EP1152326A3 (de) * | 2000-05-04 | 2004-02-11 | International Business Machines Corporation | Verfahren zur Ausführung kontinuierlicher Spracherkennung als Alternativeingabegerät zu verarbeitungsleistungsbegrenzten Einheiten |
US8355912B1 (en) | 2000-05-04 | 2013-01-15 | International Business Machines Corporation | Technique for providing continuous speech recognition as an alternate input device to limited processing power devices |
EP1164576A1 (de) * | 2000-06-15 | 2001-12-19 | Swisscom AG | System und Verfahren zur Sprechererkennung mittels Sprachmodellen |
WO2002086865A1 (en) * | 2001-04-13 | 2002-10-31 | Koninklijke Philips Electronics N.V. | Speaker verification in a spoken dialogue system |
CN1302455C (zh) * | 2001-04-13 | 2007-02-28 | 皇家菲利浦电子有限公司 | 语音对话系统中的说话人的验证的方法 |
EP1267242A2 (de) * | 2001-05-31 | 2002-12-18 | Alcatel S.A. | Benutzerverifizierungsverfahren in einem multimediafähigen Netzwerk |
EP1267242A3 (de) * | 2001-05-31 | 2003-09-03 | Alcatel S.A. | Benutzerverifizierungsverfahren in einem multimediafähigen Netzwerk |
US6744868B2 (en) | 2001-05-31 | 2004-06-01 | Alcatel | Call party profile presentation service in a multimedia-capable network |
WO2004055780A1 (en) * | 2002-12-16 | 2004-07-01 | Koninklijke Philips Electronics N.V. | Method of creating an acoustic model for a speech recognition system |
DE102007043254A1 (de) * | 2007-09-11 | 2009-03-12 | Siemens Ag | Verfahren und Vorrichtung zum durch Zugriffsrechte geschützten Zugriff auf eine Datenbank |
Also Published As
Publication number | Publication date |
---|---|
AU8125198A (en) | 1999-01-19 |
EP0991990A1 (de) | 2000-04-12 |
CA2288183A1 (en) | 1999-01-07 |
JP2002507298A (ja) | 2002-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7240007B2 (en) | Speaker authentication by fusion of voiceprint match attempt results with additional information | |
US6073101A (en) | Text independent speaker recognition for transparent command ambiguity resolution and continuous access control | |
EP0621532B1 (de) | System zur Prüfung des Schutzwortes | |
US8010367B2 (en) | Spoken free-form passwords for light-weight speaker verification using standard speech recognition engines | |
US6119084A (en) | Adaptive speaker verification apparatus and method including alternative access control | |
US6691089B1 (en) | User configurable levels of security for a speaker verification system | |
US5832063A (en) | Methods and apparatus for performing speaker independent recognition of commands in parallel with speaker dependent recognition of names, words or phrases | |
US20030074201A1 (en) | Continuous authentication of the identity of a speaker | |
EP1019904B1 (de) | Verfahren zum lernen von mustern für die sprach- oder die sprechererkennung | |
US5717743A (en) | Transparent telephone access system using voice authorization | |
US20080059805A1 (en) | Biometrics authentication apparatus | |
US20070219792A1 (en) | Method and system for user authentication based on speech recognition and knowledge questions | |
US20140350932A1 (en) | Voice print identification portal | |
US20050273333A1 (en) | Speaker verification for security systems with mixed mode machine-human authentication | |
US5832429A (en) | Method and system for enrolling addresses in a speech recognition database | |
US9373325B2 (en) | Method of accessing a dial-up service | |
US6246987B1 (en) | System for permitting access to a common resource in response to speaker identification and verification | |
EP0991990A1 (de) | Zugangsgesteuertes rechnersystem mit automatischer spracherkennung | |
US20080071538A1 (en) | Speaker verification method | |
EP0762709B1 (de) | System und Verfahren zur Aufnahme von Namen in einer Spracherkennungsdatenbank | |
JPH10173644A (ja) | 本人認証方法 | |
US9978373B2 (en) | Method of accessing a dial-up service | |
EP1758351B1 (de) | System und Verfahren zur Aufnahme von Namen in einer Spracherkennungsdatenbank | |
JPH02149900A (ja) | 音声認識応答装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU CA JP |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1998930984 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2288183 Country of ref document: CA Ref country code: CA Ref document number: 2288182 Kind code of ref document: A Format of ref document f/p: F Ref country code: CA Ref document number: 2288183 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 81251/98 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 1998930984 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998930984 Country of ref document: EP |