WO1999000719A1 - Systeme informatique a acces commande comprenant une reconnaissance vocale automatique - Google Patents

Systeme informatique a acces commande comprenant une reconnaissance vocale automatique Download PDF

Info

Publication number
WO1999000719A1
WO1999000719A1 PCT/IB1998/001110 IB9801110W WO9900719A1 WO 1999000719 A1 WO1999000719 A1 WO 1999000719A1 IB 9801110 W IB9801110 W IB 9801110W WO 9900719 A1 WO9900719 A1 WO 9900719A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
specific
speech
identification
specific user
Prior art date
Application number
PCT/IB1998/001110
Other languages
English (en)
Inventor
Dirk Van Compernolle
Scott Garlick
Original Assignee
Lernout & Hauspie Speech Products N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lernout & Hauspie Speech Products N.V. filed Critical Lernout & Hauspie Speech Products N.V.
Priority to AU81251/98A priority Critical patent/AU8125198A/en
Priority to CA002288183A priority patent/CA2288183A1/fr
Priority to JP50540299A priority patent/JP2002507298A/ja
Priority to EP98930984A priority patent/EP0991990A1/fr
Publication of WO1999000719A1 publication Critical patent/WO1999000719A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/16Sound input; Sound output
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques

Definitions

  • the present invention relates to access-controlled computer systems, and more particularly to such systems with automatic speech recognition.
  • a computer system for operation based on text inputs derived from automatic recognition of speech of a plurality of users providing spoken inputs.
  • the system has a plurality of speech - enabled terminals, each terminal for receiving speech from a user.
  • An identification comparator compares a non-keyboard user identification provided by a specific user with data stored in a user identification data base to determine if the specific user is an authorized user.
  • an automatic speech recognizer derives text from speech provided by the specific user at a given one of the speech-enabled terminals.
  • a profile loader is provided to load a user-specific profile pertinent to the specific user into the automatic speech recognizer; and, finally, a system access provider provides computing access to the specific user if determined to be authorized by the identification comparator.
  • the non-keyboard user identification is spoken by the specific user or alternatively contained in a digitally encoded card presented by the specific user.
  • the user identification database may contain voice prints of authorized users, and the identification comparator compares a voice print derived from the spoken user identification with voice prints in the user identification database.
  • the user identification database may contain passwords of authorized users and the spoken user identification is a password; the user identification database may optionally store the passwords as text derived from utterances using automatic speech recognition.
  • each speech-enabled terminal is coupled to a telephone line permitting a user to access the computer system by telephone.
  • each speech-enabled terminal is associated with a separate local processor and a local automatic speech recognizer.
  • the system may additionally include a user verification comparator for comparing a user verification provided by the specific user with data stored in a user verification data base to verify the identity of the specific user as an authorized user.
  • the system access provider provides computing access to the specific user only if the identity of the specific user has been verified as an authorized user by the verification comparator.
  • the user verification may be spoken by the specific user, or alternatively may, for example, be entered by means of a keyboard or by other non-keyboard means .
  • a method for providing access to a computer system that has an automatic speech recognizer and operates based on text inputs derived from automatic recognition of speech from a plurality of users provided via a plurality of speech-enabled terminals.
  • the access is provided to a specific user at a given one of the speech-enabled terminals.
  • the method includes the following steps: a. receiving a non-keyboard user identification provided by the specific user; b. comparing the user identification with data stored in a user identification data base to determine whether the specific user is an authorized user; and c. if the specific user has been determined to be an authorized user, i.
  • Further and related embodiments include the steps of receiving a user verification provided by the specific user and comparing the user verification with data stored in a user verification data base to verify the identity of the specific user as an authorized user.
  • the step of providing access to the system to the specific user is performed only if the identity of the specific user has been verified as an authorized user.
  • the user identification and the user verification may be implemented as discussed above.
  • a method for providing access by a plurality of users to a computer system having automatic recognition of speech provided at a plurality of speech- enabled terminals includes the steps of a. generating a prompt for a spoken user identification over one of the plurality of speech-enabled terminals; b. comparing the spoken user identification with data stored in a user identification data base to determine if the user is an authorized user; c. providing an automatic speech recognizer for deriving text from speech provided at a speech-enabled terminal; d. loading user-specific profiles pertinent to a user who has been determined to be authorized into the automatic speech recognizer; and e. providing access to the system to a user who has been determined to be authorized.
  • Fig. 1 is a block diagram of a system to which the present invention is applicable;
  • Fig. 2 is a block diagram of a method in accordance with a preferred embodiment of the invention;
  • Fig. 3 is a block diagram of a method, similar to that of Fig. 2, but also providing user verification;
  • Fig. 4 is a block diagram of a preferred embodiment of a system in accordance with a preferred embodiment of the invention corresponding generally to the method of Fig. 3.
  • FIG. 1 is a block diagram of a system to which the present invention is applicable.
  • a computer system 11 has a plurality of speech-enabled terminals 131 , 132, ... 133 to accommodate up to an arbitrary number n of users.
  • the computer system includes an automatic speech recognizer 12.
  • the speech recognizer may be hard wired or it may be implemented as a process running in the computer system 1 1.
  • the computer system may include a general purpose computer in which the process is defined by a computer program loaded into the computer.
  • Each of the speech-enabled terminals 131 , 132, ... 133 may be associated with a separate local processor; in such a configuration, each local processor may be associated with a local automatic speech recognizer.
  • the local automatic speech recognizer may, but need not necessarily, be implemented as a process running in the local processor.
  • Each of the speech-enabled terminals 131 , 132, ... 133 may also (or alternatively) be coupled to a telephone line permitting a user to access the computer system by telephone.
  • Fig. 2 is a block diagram of a method, in accordance with a preferred embodiment of the invention, for providing access by a plurality of users to a computer system having automatic recognition of speech provided at a plurality of speech-enabled terminals.
  • a non- keyboard user identification is provided over one of the speech-enabled terminals 131, 132, ... 133 of Fig. 1.
  • the user identification may, for example, be spoken via microphone or be contained in a digitally encoded card presented by the user to a card reader.
  • the user identification is compared with data stored in a user identification data base to determine if the user is an authorized user.
  • the user identification database contains voice prints of authorized users, and in step 22, the comparison is between a voice print derived from the spoken user identification with voice prints in the user identification database.
  • the user identification database contains passwords of authorized users and the spoken user identification is a password; in such a case, the spoken input may be processed initially by a speech recognizer associated with the system. If in step 23, the comparison shows that there is not a match, and if in step 24 the match has not failed three times, the method permits the receipt of a new user identification in step 21 , and the comparison of step 22 is reinitiated. If in step 24 the match has failed three times, the method terminates in step 27.
  • step 25 a user-specific profile is loaded for automatic speech recognition of the user who has been determined to be authorized.
  • step 26 access to the system is provided to the user who has been determined to be authorized.
  • the level of access to the system may be controlled on a user-by-user basis in accordance with standard techniques known in the art for computer networks; thus the level of access by a user to the system may be subject to control, and the user will be given the level of access for which the system has been configured to provide to such user.
  • Fig. 3 is a block diagram of a method, similar to that of Fig. 2, but also providing user verification. Steps 31 , 32, 33, 34, 35, 36 and 37 of Fig. 3 are comparable to steps 21 , 22, 23, 24, 25, 26, and 27 of Fig. 2 previously discussed. However, if a user identification has been matched as a result of the comparison step 32, the method next proceeds with a user verification procedure. In step 381 , the user verification is received. Such a verification may be spoken, or alternatively may be entered by keyboard, or may be provided by other non-keyboard arrangements. In step 382, the user verification is compared with data in a user verification data base.
  • step 383 If there is a match in step 383, then the user-specific profile for automatic speech recognition is loaded into the recognizer (step 35), and computing access is provided to the user at the level for which the user is authorized (step 36). If there is no match, in step 384, the method tests to determine whether there have been three consecutive failed matches, and if so, the method terminates; otherwise processing is repeated back at step 31.
  • Fig. 4 is a block diagram of a preferred embodiment of a system in accordance with a preferred embodiment of the invention corresponding generally to the method of Fig. 3.
  • the system includes speech-enabled terminals 41 from which may be received a spoken user identification.
  • An automatic speech recognizer 46 has two modes of operation. In a first mode, the recognizer can operate in speaker-independent fashion to recognize a spoken user identification, which is fed to the identification comparator 42, and a user verification, which is fed to verification comparator 43. In a second mode, the recognizer can operate in speaker-dependent fashion, utilizing additional information in the form of a user-specific profile for a user that has been identified by the identification comparator 42.
  • an applicable one of the user-specific profiles can be loaded after an unverified user identification has been made by the identification comparator 42, and the recognizer can operate in a speaker-dependent mode when feeding text to the verification comparator.
  • the comparators 42 and 43 may in fact be implemented in an integrated arrangement. For example, a user speaking his name (or a password uniquely identifying him) can provide a basis for both identification as well as verification using speaker-dependent templates. Further material on speech recognizer design may be found, for example, in Rabiner and Juang, Fundamentals of Speech Recognition, 1993, which is hereby incorporated herein by reference. In operation, a user identification is received by the identification comparator 42.
  • the identification can take many forms, including speech (which is here converted to text by the recognizer 46 to furnish an input to the comparator 42) or a digitally encoded card that is read by a card reader.
  • a user identification that has been received by the identification comparator is stored in storage region 421.
  • identification comparator 42 compares the user identification that is stored in storage region 421 with user identification data in the identification data base that is stored in storage region 422. If the comparator 42 makes a successful match, then operation of the verification comparator 43 is triggered.
  • the verification comparator receives a text input from the recognizer 46, and the input is stored in region 431 and compared with data in the verification data base that is stored in region 432.
  • the profile loader 44 is caused to access and load one of the user-specific profiles (corresponding to the user who was matched by the comparators 42 and 43) stored in region 441 into the recognizer 46. In this fashion there is provided enhanced recognition of speech of the user who has been determined to be authorized.
  • system access provider 45 is caused to provide access to the system to a user who has been determined to be authorized in accordance with the user authorization levels stored in region 451. It is contemplated that the identification comparator 42, the verification comparator 43, the automatic speech recognition user-specific profile loader 44, and the system access provider 45 may (but need not necessarily) be implemented as processes running in a general purpose computer. Indeed, the processes need not be running on the same computer.
  • the system access provider 45 may be implemented on a server handling system access for all users of the system.
  • the present invention is also applicable to any speech recognition system, capable of speaker adaptation, that has more than one user. Each user of such a system has a potentially unique user-specific profile resulting from speaker adaptation. In a multi-user environment, such a profile is subject to the risk of undesirable modification as a result of adaptation to the speech of a person other than the user.
  • An embodiment of the present invention prevents undesirable modification of a user-specific profile for speech recognition by requiring user identification before at least one of modifying a user-specific profile (for example, at the beginning of an adaptation session) or saving a modification of a user-specific profile (for example, at the end of an adaptation session).
  • such an embodiment has a speech profile adaptor 442 in communication with the automatic speech recognizer 46, for modifying the user-specific profiles 441.
  • An adaptation controller 443 responsive to the identification comparator 42 controls the speech profile adaptor 442.
  • the adaptation controller 443 enables operation of the speech profile adaptor 442 to permit updating of the user-specific profile.
  • both user and identification and verification are required to enable the speech profile adaptor 442.
  • the identification may be by the keyboard, or, as in the embodiments described previously, the identification may be a non-keyboard identification, as by speech or digitally encoded card.
  • the access control system uses voice print matching of user provided speech.
  • voice print matching can employ either text dependent verification, or text independent verification.
  • Text dependent verification is the use of passwords and associated voice prints already described.
  • Text independent verification operates with freely selected user speech input during normal use of the automatic speech recognition system.
  • this implicit verification is implemented as a safeguard mechanism in combination with the explicit text dependent password and voice print technique.
  • the text independent verification occurs in the background during system use as spoken text input progresses.
  • the identification comparator 42 and verification comparator 43 continue to monitor the operation of the automatic speech recognizer 46.
  • the identification comparator 42 and/or verification comparator 43 compares the incoming speech signal associated with the recognized text to stored user identification data 422 and/or stored user verification data 432. If the characteristics of the incoming speech fail to match the stored characteristics for the recognized user within an acceptability threshold, the identification comparator 42 and/or verification comparator 43 then disables the system access provider 45.
  • the speech profile adaptor 442 is prevented from modifying the user-specific speech profiles 441. Then, the automatic speech recognizer 46 operates only to perform the user verification and access method previously described.
  • This embodiment is especially useful in a situation where an authorized user has accessed the system and momentarily walks away.
  • Text independent verification running in the application background prevents another, possibly unfriendly, user from invoking or altering the authorized user's speech profile. This effectively prevents use of the system by such an unauthorized person.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computer Security & Cryptography (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Ce système de commande d'accès, destiné à un système informatique, met en oeuvre des entrées de textes dérivées de la reconnaissance automatique d'entrées parlées, afin de constituer un accès informatique à des utilisateurs autorisés. Plusieurs terminaux actionnés par la parole reçoivent un discours d'un utilisateur. Un dispositif de reconnaissance vocale automatique dérive un texte à partir du discours fourni par l'utilisateur en question au niveau d'un des terminaux donnés actionnés par la parole. Un comparateur d'identification compare une identification d'utilisateur non effectuée via le clavier, fournie par l'utilisateur en question, avec des données stockées dans une base de données d'identification d'utilisateurs, afin de déterminer si cet utilisateur est un utilisateur autorisé. Un module de charge de profils sert à charger un profil utilisateur se rapportant à l'utilisateur en question, dans le dispositif de reconnaissance vocale automatique, l'accès étant finalement permis par un fournisseur d'accès du système.
PCT/IB1998/001110 1997-06-27 1998-06-25 Systeme informatique a acces commande comprenant une reconnaissance vocale automatique WO1999000719A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
AU81251/98A AU8125198A (en) 1997-06-27 1998-06-25 Access-controlled computer system with automatic speech recognition
CA002288183A CA2288183A1 (fr) 1997-06-27 1998-06-25 Systeme informatique a acces commande comprenant une reconnaissance vocale automatique
JP50540299A JP2002507298A (ja) 1997-06-27 1998-06-25 自動音声認識を有するアクセス制御コンピュータシステム
EP98930984A EP0991990A1 (fr) 1997-06-27 1998-06-25 Systeme informatique a acces commande comprenant une reconnaissance vocale automatique

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US5102597P 1997-06-27 1997-06-27
US60/051,025 1997-06-27

Publications (1)

Publication Number Publication Date
WO1999000719A1 true WO1999000719A1 (fr) 1999-01-07

Family

ID=21968901

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB1998/001110 WO1999000719A1 (fr) 1997-06-27 1998-06-25 Systeme informatique a acces commande comprenant une reconnaissance vocale automatique

Country Status (5)

Country Link
EP (1) EP0991990A1 (fr)
JP (1) JP2002507298A (fr)
AU (1) AU8125198A (fr)
CA (1) CA2288183A1 (fr)
WO (1) WO1999000719A1 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1152326A2 (fr) * 2000-05-04 2001-11-07 International Business Machines Corporation Technique pour assurer la reconnaissance de parole continue comme dispositif d'entrée alternative aux dispositifs de puissance de traitement limitée
EP1164576A1 (fr) * 2000-06-15 2001-12-19 Swisscom AG Système et méthode de vérification du locuteur à partir de modèles de voix
WO2002086865A1 (fr) * 2001-04-13 2002-10-31 Koninklijke Philips Electronics N.V. Verification du locuteur dans un systeme d'interaction vocale
EP1267242A2 (fr) * 2001-05-31 2002-12-18 Alcatel S.A. Système de vérification d'un utilisateur dans un réseau multimédia-capable
JP2003502701A (ja) * 1999-06-21 2003-01-21 パルックス アクチエンゲゼルシャフト 自動機械を制御する制御装置
US6744868B2 (en) 2001-05-31 2004-06-01 Alcatel Call party profile presentation service in a multimedia-capable network
WO2004055780A1 (fr) * 2002-12-16 2004-07-01 Koninklijke Philips Electronics N.V. Procede pour creer un modele acoustique pour un systeme de reconnaissance vocale
DE102007043254A1 (de) * 2007-09-11 2009-03-12 Siemens Ag Verfahren und Vorrichtung zum durch Zugriffsrechte geschützten Zugriff auf eine Datenbank

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016103415A1 (fr) * 2014-12-25 2016-06-30 日立マクセル株式会社 Système de visiocasque et procédé de fonctionnement pour dispositif de visiocasque
CN106710593B (zh) * 2015-11-17 2020-07-14 腾讯科技(深圳)有限公司 一种添加账号的方法、终端、服务器

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0621532A1 (fr) * 1993-04-23 1994-10-26 AT&T Corp. Système de vérification de mot de passe
EP0622780A2 (fr) * 1993-04-30 1994-11-02 AT&T Corp. Procédé et système de contrôle de l'identité d'un locuteur
WO1995018441A1 (fr) * 1993-12-29 1995-07-06 At & T Corp. Systeme et procede de controle et verification a commande vocale
DE19515123C1 (de) * 1995-04-25 1996-08-22 Orga Kartensysteme Gmbh Vorrichtung zur Sicherung von Gegenständen

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0621532A1 (fr) * 1993-04-23 1994-10-26 AT&T Corp. Système de vérification de mot de passe
EP0622780A2 (fr) * 1993-04-30 1994-11-02 AT&T Corp. Procédé et système de contrôle de l'identité d'un locuteur
WO1995018441A1 (fr) * 1993-12-29 1995-07-06 At & T Corp. Systeme et procede de controle et verification a commande vocale
DE19515123C1 (de) * 1995-04-25 1996-08-22 Orga Kartensysteme Gmbh Vorrichtung zur Sicherung von Gegenständen

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003502701A (ja) * 1999-06-21 2003-01-21 パルックス アクチエンゲゼルシャフト 自動機械を制御する制御装置
EP1152326A2 (fr) * 2000-05-04 2001-11-07 International Business Machines Corporation Technique pour assurer la reconnaissance de parole continue comme dispositif d'entrée alternative aux dispositifs de puissance de traitement limitée
EP1152326A3 (fr) * 2000-05-04 2004-02-11 International Business Machines Corporation Technique pour assurer la reconnaissance de parole continue comme dispositif d'entrée alternative aux dispositifs de puissance de traitement limitée
US8355912B1 (en) 2000-05-04 2013-01-15 International Business Machines Corporation Technique for providing continuous speech recognition as an alternate input device to limited processing power devices
EP1164576A1 (fr) * 2000-06-15 2001-12-19 Swisscom AG Système et méthode de vérification du locuteur à partir de modèles de voix
WO2002086865A1 (fr) * 2001-04-13 2002-10-31 Koninklijke Philips Electronics N.V. Verification du locuteur dans un systeme d'interaction vocale
CN1302455C (zh) * 2001-04-13 2007-02-28 皇家菲利浦电子有限公司 语音对话系统中的说话人的验证的方法
EP1267242A2 (fr) * 2001-05-31 2002-12-18 Alcatel S.A. Système de vérification d'un utilisateur dans un réseau multimédia-capable
EP1267242A3 (fr) * 2001-05-31 2003-09-03 Alcatel S.A. Système de vérification d'un utilisateur dans un réseau multimédia-capable
US6744868B2 (en) 2001-05-31 2004-06-01 Alcatel Call party profile presentation service in a multimedia-capable network
WO2004055780A1 (fr) * 2002-12-16 2004-07-01 Koninklijke Philips Electronics N.V. Procede pour creer un modele acoustique pour un systeme de reconnaissance vocale
DE102007043254A1 (de) * 2007-09-11 2009-03-12 Siemens Ag Verfahren und Vorrichtung zum durch Zugriffsrechte geschützten Zugriff auf eine Datenbank

Also Published As

Publication number Publication date
AU8125198A (en) 1999-01-19
JP2002507298A (ja) 2002-03-05
CA2288183A1 (fr) 1999-01-07
EP0991990A1 (fr) 2000-04-12

Similar Documents

Publication Publication Date Title
US7240007B2 (en) Speaker authentication by fusion of voiceprint match attempt results with additional information
US6073101A (en) Text independent speaker recognition for transparent command ambiguity resolution and continuous access control
EP0621532B1 (fr) Système de vérification de mot de passe
US8010367B2 (en) Spoken free-form passwords for light-weight speaker verification using standard speech recognition engines
US6691089B1 (en) User configurable levels of security for a speaker verification system
US5832063A (en) Methods and apparatus for performing speaker independent recognition of commands in parallel with speaker dependent recognition of names, words or phrases
US20030074201A1 (en) Continuous authentication of the identity of a speaker
EP1019904B1 (fr) Procede pour l'apprentissage de modeles pour la reconnaissance de parole ou de locuteur
US5717743A (en) Transparent telephone access system using voice authorization
US20080059805A1 (en) Biometrics authentication apparatus
US20140350932A1 (en) Voice print identification portal
US20050273333A1 (en) Speaker verification for security systems with mixed mode machine-human authentication
US5832429A (en) Method and system for enrolling addresses in a speech recognition database
US9373325B2 (en) Method of accessing a dial-up service
US6246987B1 (en) System for permitting access to a common resource in response to speaker identification and verification
WO1999000719A1 (fr) Systeme informatique a acces commande comprenant une reconnaissance vocale automatique
US20080071538A1 (en) Speaker verification method
EP0762709B1 (fr) Méthode et système d'introduction de noms dans une base de données avec reconnaissance de la parole
JPH10173644A (ja) 本人認証方法
US9978373B2 (en) Method of accessing a dial-up service
EP1758351B1 (fr) Méthode et système d'introduction de noms dans une base de données avec reconnaissance de la parole
JPH02149900A (ja) 音声認識応答装置

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU CA JP

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 1998930984

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2288183

Country of ref document: CA

Ref country code: CA

Ref document number: 2288182

Kind code of ref document: A

Format of ref document f/p: F

Ref country code: CA

Ref document number: 2288183

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 81251/98

Country of ref document: AU

WWP Wipo information: published in national office

Ref document number: 1998930984

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1998930984

Country of ref document: EP