WO1999027503A1 - The system and method of protection and handling of documents - Google Patents
The system and method of protection and handling of documents Download PDFInfo
- Publication number
- WO1999027503A1 WO1999027503A1 PCT/SK1998/000018 SK9800018W WO9927503A1 WO 1999027503 A1 WO1999027503 A1 WO 1999027503A1 SK 9800018 W SK9800018 W SK 9800018W WO 9927503 A1 WO9927503 A1 WO 9927503A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- document
- block
- crypto
- generation
- γçö
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/004—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
- G07D7/0047—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
Definitions
- the invention relates to the system and method of protection of integrity of printed documents, and to prevention of their unauthorized modification, counterfeiting and performing of related activities, as well as to minimizing of the influence of the human factor.
- the literature describes several ways of the protection of documents, all of which are aimed at the protection and encryption of documents and the prevention of their unauthorized modification and counterfeiting. Considering the system and mode of the protection, there are three basic concepts.
- the first of them deals with the protection of a document as such (i.e. checks, various types of identification documents).
- This group of documents carries protective marks including e.g. a protective type of paper they are made from, ink and fibers sensitive to ultraviolet light, pantographs, artificial water-marks, embossing, etc.
- Numerous reports deal with the protection of checks and other documents, e.g. deeds of donation, motor vehicle identification documents and certificates of titles, airline tickets, school diplomas, various admission tickets, securities, bonds, certified copies of school certificates and various types of legal documents, etc.
- the system involves e.g.
- protective inks either indicating that the document has been altered or enabling the verification of the original copy
- inks fluorescent inks, infra-red inks, inks penetrating into the depth of the paper the document is printed on
- thermochromic inks chemically reactive types of paper, protective fibers, water-marks, etc.
- the systems very often utilize also the photomicrograph.
- This group of "hidden marks” represents an effective deterring means offering an efficient protection against copying and scanning of documents.
- the documents belonging into this group should include several marks (e.g. some types of recently used checks carry up to 16 anti- criminal marks).
- Other often used modes of protection utilize various printing techniques such as multicolor prismatic printing, holographic printing, foil embossing, etc.
- EP 0084441 A2 830727 deals with the mode and technology used for the protection of computer software against unauthorized use. This class of protection methods is the most numerous one and more examples shall be given in the text below.
- Protection of the base of the document through different printing, graphic and paper production technology-related elements may involve chemical, optical, electromagnetic and similar protective elements representing an effective barrier to the illegal production of the protected documents (bills, checks, bonds, securities, admission tickets, etc.).
- the third group is represented by technologies protecting either a certain form of the contents of the document - e.g. its scanned/printed form (including fax) - or a part of a document which is in data form, with the aim to authenticate both the document and its consents.
- the protective mark does not allow for the determination of the data form of the document or of its part.
- This type of protection is represented by various authentication methods based on signature, and is used in the case of electronic form of documents (e.g. US Patents Nos. 5530755, 5255106, 5388158, 5157726).
- the authentication of the document (of its scanned graphic version) will be carried out at the document inspection/use point, verifying thus the integrity/intactness of the content of the document.
- the document itself - in the data form - remains inactive.
- a specific category of technologies is represented by techniques protecting through partially cryptographical methods the content of a document in its printed bitmap form. After encryption (also scrambling), a signature will be created and printed at the sending side. At the receiving side, the document will be decrypted (descrambled) and the correctness/authenticity of the signature will be checked.
- This category allows for direct protection of the contents of the document, regardless of its original data form (e.g. US Patents Nos. 5321749, 5491536).
- the method and the system of the protection of printed documents and operations related to their use are based on the generation of falsification-proof and non-alterable ways of information transfer within the variable environment of the system as a whole.
- the information which is in an electronic form is being transformed into a printed document (hard copy).
- Another important aspects of this invention are the exclusion of the human factor from all critical operations, and the introduction of an effective and falsification-proof feedback from the critical operations themselves as well as from the points where these critical operations are being effected (places of the creation and inspection of the document).
- the subject of the invention is a system designated for the protection of physical documents against illegal and unauthorized modification or counterfeiting, and allowing for falsification-proof confirmation of the inspection of the document and minimizing of the influence of the human factor.
- the system consists of:
- At least one document generation block creating from the data source and with the involvement of an authorized operator the physical form of the document, a crypto-mark carried by the document, and a shadow document database;
- At least one document inspection block scanning and verifying the authenticity of the crypto mark carried by the document, displaying the critical parts of the document, generating the crypto stamp to be placed by an authorized operator or equipment onto the document, and creating the feedback document database;
- the document generation block consists of a processor, carrying out the data processing and containing the crypto keys, a document printing block, a crypto mark generation block, a safety block, a real time block, a displaying block, and a shadow document database generating block.
- the document inspection block consists of a processor carrying out the data processing and containing the crypto keys, a document printing block, a crypto mark scanning block, a safety block, a real time block, displaying block, a shadow document database generating block, and a crypto stamp generation block.
- the key generation and distribution block consists of a generating block, a key storage block, and a key distribution block.
- the database comparison block consists of a comparison and evaluation block, a comparison conditions block, an alarm and warning generating block, and a statistical summaries block.
- the subject of the invention includes also the method of protection of physical document against their illegal and unauthorized modification and counterfeiting, and allowing for falsification-proof confirmation of the inspection of the document and minimizing of the influence of the human factor.
- the system consists of:
- the crypto mark thus generated becomes unseparated part of the physical document which thus becomes its carrier transferring the crypto mark to the place(s) of the use of the document;
- the subject of the invention includes also the collecting at the point of the generation of the document of all document thus created, their equipment with electronic signature and dispatching either individually or in batches in the encrypted (protected) form as a shadow database into the database comparison block.
- All documents that have passed the inspection step shall be gradually accumulated at the document inspection point where they shall be electronically signed and dispatched either individually or in batches in an encrypted (protected) form as a feedback database into the database comparison block.
- the crypto mark thus generated if it is in the form of an individual physical object (e.g. sticker, annex, supplement, etc.), shall be permanently attached to the document.
- an individual physical object e.g. sticker, annex, supplement, etc.
- the crypto mark - if generated in the same way as the document - becomes unseparated part thereof printed (in the form of a bar code or a chain of OCR symbols) on the part of the surface of the carrier material (e.g. paper) designated for that purpose.
- the carrier material e.g. paper
- the crypto mark thus generated may be embedded either into the text of the document and/or into its graphical part (e.g. through watermarking, etc.) or into the printing background of the document.
- the DB comparison block performs the comparison of the database operations over the contents of the shadow DB and feedback DB.
- the crypto stamp generation block located at the document inspection point will generate a crypto stamp, by cryptographic operation.
- the crypto stamp will be either placed, affixed onto or coupled with the document.
- the key generation block will create the encryption and decryption keys which will be distributed by the key distribution block through safe channel(s) into the document generation and document control blocks.
- the operator will then perform the operation related to the verification of his/her authorization to carry out the given set of activities, performed against the document generation block through the security block.
- the operator will then perform the operation related to the verification of his/her authorization to carry out the given set of activities, performed against the document inspection block through the safety block.
- the invention provides solution for the generation of a structure involving safe transfer channels between the document generation, document inspection, key generation and distribution, document database comparison, and document source blocks and determining the relationships of those blocks with the printed document and the crypto mark attached to it, and also with the crypto stamp.
- the invention introduces into one of the most critical activity, i.e. into the procedure of the inspection of the document, at least two operations contributing significantly to the enhancement of both the safety of that activity and the future auditing of the document. Those two operations are the machine-mediated transfer of the contents of the document, or of its most important parts, from the crypto mark, and the transfer of the scanned information into the computer.
- the computer verifies the authenticity and integrity of the document and generates its original/authentic and true form.
- the computer generates a crypto stamp.
- the crypto stamp that is being affixed (either printed or hand-written) onto the document, serves as an undeniable proof that the operator has carried out the required control activity.
- Another important aspect of the invention is the closure of a inspection feedback between the place(s) of generation and inspection of the document, which is effected in the DB comparison block, and which represents a cryptographic and safe closure of all activities directly associated with the cycle consisting of the generation, transport, and inspection of the document.
- the security aspect of the invention is further enhanced by the activities effected within the security block which are aimed at safe determination of the authorization of a given operator to carry out activities associated with the generation/creation and inspection of the document.
- the key generation and distribution block carries out safety operations resulting in cryptographically safe generation of keys, their storage, and safe distribution to the points of their use.
- Figure 1 shows all of the above mentioned blocks which represent the principal components of the invention, and their mutual interconnection and/or functional relationships.
- Figure 2 shows the DB comparison block
- the system as a whole represents a safe and functional environment enabling the creation of a critical document 300.
- the document is generated in the document source 200 which itself is located within the document generation block 100
- the crypto mark 400 may be affixed onto a document either at the time of its generation or later.
- Document 300 with the crypto mark 400 affixed to it is transferred to the document inspection point that is located within the document inspection block 500 Both blocks are connected through a safe and authenticated way with an operator 800 (and/or 801)
- the operator 801 verifies his/her authorization to perform the inspection operations Having scanned the crypto mark 400 from the document 300, the document control block 500 carries out a cryptographic verification of the integrity of the document 300 and displays its electronic form. Operator 801 makes a decision regarding the conclusion of the document control and enters the corresponding command into block 500 The document control block 500 generates through a cryptological method a crypto stamp 900, which will be displayed and either manually attached or directly printed onto the document 400.
- the generation of a document in the document generation block 100 is either accompanied or followed by the generation of a cryptographically protected shadow document database (DB) 101.
- the document is stored in the shadow DB KU and sent in an encrypted and protected form into the DB comparison block 600
- the feedback DB block 503 creates a cryptographically protected database of inspected documents and the electronic form of the document is saved and sent in a protected and encrypted form into the DB comparison block 600
- the key element of the document generation block 100 is the processor 102 integrating within the document generation block 100 the (program) functions of other blocks.
- the crypto mark generation block 103 which may be realized either as an independent block or as a software function within the processor block 102 generates through its cryptographic function a crypto mark that will be subsequently printed onto the document 300.
- the document itself will be created either independently from the crypto mark through the print function 105 or within a single united technological step.
- the document generation block contains the document display block 106 displaying for the needs of the operator 800 the information contained in an electronic or any other form in the document source 200.
- the operator identifies and authenticates himself/herself through the security block 104.
- the real time block 107 maintains the information on the real time required by the cryptographic operations needed for the generation of the crypto mark.
- the crypto mark scanning block 501 transforms the machine-readable crypto mark into the electronic form that is subsequently sent to the processor 502.
- the processor 502 carries out cryptographically the integrity verification and transmits the electronic form of the document 300 into the displaying block 506 where it will be made available to the operator 801 who has meanwhile authenticated himself/herself against the document inspection block 5CK) through the security block 505.
- the crypto stamp generation block 504 will generate a crypto stamp 900.
- the operator 8CU will affix the crypto stamp 900 to the inspected document 300 either manually according to information displayed on the displaying block 504 or, alternatively, via an automated equipment (printer) connected to the crypto stamp generation block 504-
- Key generation and distribution block 700 performs a cryptographically safe generation of keys used in the cryptographic operations carried out within items 100, 500, and 600.
- the key storage block 702 located within the key generation and distribution block stores the keys that are used for the needs of blocks 100, 500, and 600.
- the key distribution blocks 701A and 701B perform - through communication with blocks 100, 500, and 600 - the distribution of the keys and their updating.
- the key generation block 703 generates the crythographically safe keys.
- the DB comparison block 600 which is shown in more detail in Figure 2, performs the comparison of individual items from two databases, i.e. from shadow DB 0 and feedback DB 503 sent into block 600 from block 500.
- the comparison and evaluation proceeds within the block 601 according the appropriate comparison and evaluation criteria available from block 603.
- the results are entered into the alarm and warning block 602.
- the statistics summary block 604 creates databases for the needs of higher statistical operations.
- Example 2
- One of the preferred applications of the presented invention is its use for the protection of both customs documents and operations involving those documents.
- Customs documents are generated in an electronic form to be subsequently converted into their printed versions on internationally standardized forms. At the places of their creation, the appropriate customs officials affix to the documents thus created their traditional stamps and signatures.
- the document contains less than 200 characters which form the critical information.
- the invention enables the documents to be marked by a sticker carrying a crypto mark containing, besides the electronic signature with the secret key of the customs house where the document has been created, also the entire critical information characterizing the document, which is in an encrypted form.
- the crypto mark may be, for example, in the form of a complex bar code printed by a laser printer on a paper base (the sticker).
- One copy of the document remains at the place of its generation, while the other copy (provided with the same sticker) is transferred by the party involved in the customs transaction (e.g. the importer or exporter) to the document control point (e.g. the customs house at the border crossing).
- the party involved in the customs transaction e.g. the importer or exporter
- the document control point e.g. the customs house at the border crossing
- the inspecting authority scans the crypto mark by a laser scanner connected to a computer and the information it contains will be displayed on the screen.
- the critical parts of the documents thus displayed shall be compared with their counterparts which are in the printed form of the same document. Having performed the remaining operations of the customs proceedings (inspection of the cargo and verification of its intactness), the customs officer concludes the proceeding by entering the appropriate command into the computer.
- the data will be entered in an encrypted form into a shadow database, this procedure will be followed by the displaying of a set of numerals representing the crypto stamp which will be written by the customs officer (by hand) onto the document that is being inspected.
- Every customs officer (the operator), whether at the place of the creation of the document or at the document inspection point, proves to the computer his/her authorization to perform the required customs-related operation by the use of a special token (e.g. a special form of a chip card).
- a special token e.g. a special form of a chip card.
- the identity of the customs officer will be recorded in both databases (i.e. the shadow DB located at the place of creation of the document and the feedback DB located at the document inspection point).
- the electronic signature is performed by an asymmetric cryptographic method ensuring the minimization of the danger of the loss of the key (i.e. in the case when the computer at the document control point is a portable hand-held bar code scanner with a built-in micro processor, a small displaying unit and a keyboard capable of the full scale generation of the crypto stamp).
- the Center carries out the complex process of the item-matching process which is based on data extracted from both databases (shadow and feedback) and generates the warning/alarm messages for the appropriate customs authorities.
- the crypto mark and or crypto stamp may be used successfully also in the number of other applications, e.g. in customs warehouses, in the handling of documents associated with the flow of goods to and from warehouses, etc.
- the invention may be utilized also in the handling of the documentation and accompanying subsequent operations within large transport systems (cargo, air, rail, and road transport).
- a viability of the industrial applicability of the invention may by documented by its possible use in the areas of customs-related operations and logistical operations within large transportation system, as outlined in the above described examples.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU11847/99A AU1184799A (en) | 1997-11-24 | 1998-11-09 | The system and method of protection and handling of documents |
HU0100435A HUP0100435A3 (en) | 1997-11-24 | 1998-11-09 | The system and method of protection and handling of documents |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SKPV1584-97 | 1997-11-24 | ||
SK1584-97A SK158497A3 (en) | 1997-11-24 | 1997-11-24 | System and method for protecting documents and manipulating therewith |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999027503A1 true WO1999027503A1 (en) | 1999-06-03 |
Family
ID=20434689
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SK1998/000018 WO1999027503A1 (en) | 1997-11-24 | 1998-11-09 | The system and method of protection and handling of documents |
Country Status (5)
Country | Link |
---|---|
AU (1) | AU1184799A (en) |
HU (1) | HUP0100435A3 (en) |
PL (1) | PL340639A1 (en) |
SK (1) | SK158497A3 (en) |
WO (1) | WO1999027503A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19944595C2 (en) * | 1998-05-07 | 2003-08-14 | Sc Info & Inno Gmbh & Co | Procedure for verifying the integrity and authorship of texts |
EP1744287A1 (en) * | 2005-07-13 | 2007-01-17 | Neopost S.A. | Methods and systems for signing physical documents and for authenticating signatures on physical documents |
US7367048B2 (en) | 2003-07-10 | 2008-04-29 | International Business Machines Corporation | Apparatus and method for autonomic email access control |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0084441A2 (en) | 1982-01-19 | 1983-07-27 | Tabs Limited | Method and apparatus for the protection of proprietary computer software |
EP0547837A2 (en) * | 1991-12-19 | 1993-06-23 | Xerox Corporation | Document copy authentication |
US5231663A (en) | 1991-03-18 | 1993-07-27 | Earl Joseph G | Image processing system |
US5243655A (en) | 1990-01-05 | 1993-09-07 | Symbol Technologies Inc. | System for encoding and decoding data in machine readable graphic form |
US5321749A (en) * | 1992-09-21 | 1994-06-14 | Richard Virga | Encryption device |
US5337362A (en) | 1993-04-15 | 1994-08-09 | Ricoh Corporation | Method and apparatus for placing data onto plain paper |
US5388158A (en) * | 1992-11-20 | 1995-02-07 | Pitney Bowes Inc. | Secure document and method and apparatus for producing and authenticating same |
US5486686A (en) | 1990-05-30 | 1996-01-23 | Xerox Corporation | Hardcopy lossless data storage and communications for electronic document processing systems |
US5488664A (en) | 1994-04-22 | 1996-01-30 | Yeda Research And Development Co., Ltd. | Method and apparatus for protecting visual information with printed cryptographic watermarks |
US5490217A (en) | 1993-03-05 | 1996-02-06 | Metanetics Corporation | Automatic document handling system |
US5502575A (en) | 1992-08-06 | 1996-03-26 | Matsushita Electric Industrial Co., Ltd. | Imaging apparatus having a counterfeiting prevention function |
US5530755A (en) * | 1993-08-18 | 1996-06-25 | France Telecom | Secured apparatus and process for securing the transmission of documents by fax and graphic code for the authentication of an image |
EP0782114A2 (en) * | 1995-12-29 | 1997-07-02 | International Business Machines Corporation | System and method for verifying signatures on documents |
-
1997
- 1997-11-24 SK SK1584-97A patent/SK158497A3/en unknown
-
1998
- 1998-11-09 AU AU11847/99A patent/AU1184799A/en not_active Abandoned
- 1998-11-09 WO PCT/SK1998/000018 patent/WO1999027503A1/en not_active Application Discontinuation
- 1998-11-09 HU HU0100435A patent/HUP0100435A3/en unknown
- 1998-11-09 PL PL98340639A patent/PL340639A1/en unknown
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0084441A2 (en) | 1982-01-19 | 1983-07-27 | Tabs Limited | Method and apparatus for the protection of proprietary computer software |
US5243655A (en) | 1990-01-05 | 1993-09-07 | Symbol Technologies Inc. | System for encoding and decoding data in machine readable graphic form |
US5486686A (en) | 1990-05-30 | 1996-01-23 | Xerox Corporation | Hardcopy lossless data storage and communications for electronic document processing systems |
US5231663A (en) | 1991-03-18 | 1993-07-27 | Earl Joseph G | Image processing system |
EP0547837A2 (en) * | 1991-12-19 | 1993-06-23 | Xerox Corporation | Document copy authentication |
US5502575A (en) | 1992-08-06 | 1996-03-26 | Matsushita Electric Industrial Co., Ltd. | Imaging apparatus having a counterfeiting prevention function |
US5321749A (en) * | 1992-09-21 | 1994-06-14 | Richard Virga | Encryption device |
US5388158A (en) * | 1992-11-20 | 1995-02-07 | Pitney Bowes Inc. | Secure document and method and apparatus for producing and authenticating same |
US5490217A (en) | 1993-03-05 | 1996-02-06 | Metanetics Corporation | Automatic document handling system |
US5337362A (en) | 1993-04-15 | 1994-08-09 | Ricoh Corporation | Method and apparatus for placing data onto plain paper |
US5530755A (en) * | 1993-08-18 | 1996-06-25 | France Telecom | Secured apparatus and process for securing the transmission of documents by fax and graphic code for the authentication of an image |
US5488664A (en) | 1994-04-22 | 1996-01-30 | Yeda Research And Development Co., Ltd. | Method and apparatus for protecting visual information with printed cryptographic watermarks |
EP0782114A2 (en) * | 1995-12-29 | 1997-07-02 | International Business Machines Corporation | System and method for verifying signatures on documents |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19944595C2 (en) * | 1998-05-07 | 2003-08-14 | Sc Info & Inno Gmbh & Co | Procedure for verifying the integrity and authorship of texts |
US7367048B2 (en) | 2003-07-10 | 2008-04-29 | International Business Machines Corporation | Apparatus and method for autonomic email access control |
US7844998B2 (en) | 2003-07-10 | 2010-11-30 | International Business Machines Corporation | Apparatus and method for autonomic email access control |
EP1744287A1 (en) * | 2005-07-13 | 2007-01-17 | Neopost S.A. | Methods and systems for signing physical documents and for authenticating signatures on physical documents |
Also Published As
Publication number | Publication date |
---|---|
HUP0100435A3 (en) | 2002-12-28 |
PL340639A1 (en) | 2001-02-12 |
AU1184799A (en) | 1999-06-15 |
SK158497A3 (en) | 1999-07-12 |
HUP0100435A2 (en) | 2001-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11188898B2 (en) | System and method for providing secure identification solutions | |
CA2242671C (en) | Method of preventing counterfeiting of articles of manufacture | |
US8059858B2 (en) | Identification document and related methods | |
US20060157559A1 (en) | Systems and methods for document verification | |
US20030117262A1 (en) | Encrypted biometric encoded security documents | |
US20030116630A1 (en) | Encrypted biometric encoded security documents | |
US20050087604A1 (en) | Licensing and identification devices having coded marks and methods of making and authenticating such licensing and identification devices | |
CN108122119A (en) | Product certification method | |
WO2007072044A1 (en) | Optical authentication | |
US20110038012A1 (en) | Method and device against forgery | |
WO2007091057A1 (en) | Authentication of cheques and the like | |
WO2001018754A1 (en) | Document authentication method and apparatus | |
WO1999027503A1 (en) | The system and method of protection and handling of documents | |
CN107534553A (en) | The re-authentication of certificate | |
EA002518B1 (en) | Method of confirmation of information authenticity | |
GB2358115A (en) | Method and system for remote printing of duplication resistent documents | |
CZ20001907A3 (en) | System and method of protecting documents | |
Wilson | The “Security Printer” model for CA operations | |
EA007836B1 (en) | Protection system of authenticity of printed information carrier | |
UA73244C2 (en) | Method for protecting documents presented on paper data carriers (method "atlas-krystal") |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE HR HU ID IL JP KG KR KZ LT LV MD MK MN MX NO NZ PL PT RO RU SE SI TM TR UA US UZ VN YU |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
NENP | Non-entry into the national phase |
Ref country code: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: PV2000-1907 Country of ref document: CZ |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: PV2000-1907 Country of ref document: CZ |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: CA |
|
WWR | Wipo information: refused in national office |
Ref document number: PV2000-1907 Country of ref document: CZ |