WO2000007153A1 - Procede de controle de l'execution d'une demande d'actions transmise par un serveur vers une carte a puce via un terminal - Google Patents
Procede de controle de l'execution d'une demande d'actions transmise par un serveur vers une carte a puce via un terminal Download PDFInfo
- Publication number
- WO2000007153A1 WO2000007153A1 PCT/FR1999/001826 FR9901826W WO0007153A1 WO 2000007153 A1 WO2000007153 A1 WO 2000007153A1 FR 9901826 W FR9901826 W FR 9901826W WO 0007153 A1 WO0007153 A1 WO 0007153A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- card
- action
- server
- counter
- actions
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0833—Card having specific functional components
- G07F7/084—Additional components relating to data transfer and storing, e.g. error detection, self-diagnosis
Definitions
- the present invention relates to systems for exchanging messages between application server and smart cards using a communication network. It applies to exchanges carried out through telecommunication networks, switched telephone network, cellular network or Internet network.
- the messages exchanged between an application server and the corresponding application in a smart card pass through an intermediate piece of equipment which will be designated by terminal below.
- a user's smart card cooperates with the terminal to allow exchanges.
- the terminal is a telecommunications terminal.
- the terminal is computer type computer equipment equipped with a smart card read / write interface.
- a server under the control of a card issuing body wishing to perform a secure action in a smart card (or in an application of said card) via a telephone network, uses cryptographic certificates making it possible to ensure the security of exchanges.
- a message is lost during transmission or execution or if fraud is attempted, the re-synchronization of server-card messages can pose security problems.
- the terminal is a dedicated and secure terminal under the control of the issuing body (by example an ATM machine under the control of a bank)
- the loss of a message is compensated by synchronization mechanisms involving both the server software and the dedicated terminal software.
- the dedicated terminal is either physically secure (DAB) or contains a SAM (Secure Authentication Module) module inside, and in all cases is closely controlled by the issuing body. If the terminal used is not a dedicated terminal
- the synchronization mechanisms cannot be based on the security of the terminal, since it is not controllable by the transmitter. Indeed, it is important to be able to resynchronize the source of the messages and the smart card in the event of transmission problems on the network. This problem was posed in terms of security vis-à-vis operators and service providers. To date, there is no system provided for ensuring synchronization between the card and the server, in cases where during a transaction in progress, consequently accepted by the card, the server takes advantage of the connection to send a message comprising one or more actions to be implemented by the card, these actions can for example be reloading of value units or parameters (monetary or other) or loading of a new application. Indeed, it is provided in the more general framework of multi-application cards, that messages are sent while the user has made a transaction request in order to send orders for actions to be taken during the application process for the current transaction.
- Such messages will make it possible, for example, to order recharging of an electronic purse in the case of an electronic purse application, or to modify banking parameters of the banking application, or the loading of a new application in the card. .
- the object of the invention is that the server can detect the execution faults of one or more actions or commands, linked to a loss of messages between the server and the smart card or to action execution faults in the card, said messages having been transmitted to the card possibly during a transaction in progress, this in order to inform the server so that the latter determines which are the last actions or commands not executed by the card.
- the server may for example send back the message containing the said action or actions and allow their execution.
- the invention particularly relates to a method of controlling the execution of an action request transmitted by a server to a card via a terminal, said card comprising an action counter, characterized in that 'it comprises the following steps: a) on the transmission by the server of a message comprising a request comprising one or more actions to be implemented by the card, the server stores the number n of actions of the request; b) on receipt of the message, the card successively executes the action or actions of the request by incrementing its action counter between each action if the action has been performed correctly and by refusing this action and the successive actions if The action did not perform well without incrementing the counter. c) the variation between the value in the card and that stored in the server is compared and it is determined that the last x actions (commands) are not executed if the result of the comparison has a difference of x.
- the increment of the action counter corresponds to the number of actions correctly executed.
- the number x is equal to 0 if all the actions are correctly executed, this number x can therefore vary from 1 to n if the last or all the actions failed.
- the card transmits to the server the current value of its counter before and after execution of the action command.
- the card calculates the value of the variation in its counter continued upon execution of the action command and transmits it to the server.
- any exchange of the value of the card action counter is carried out systematically in a secure manner.
- the last value of the card action counter is transmitted with a cryptogram, the calculation of which implies the said last value.
- the last current value of the card action counter is transmitted to the server in real time, that is to say during the transaction in progress.
- the value could be transmitted by means of the acknowledgment message of the transaction in progress in the card.
- the value of the card action counter is transmitted to the server in deferred time.
- the value of the action counter could be transmitted by means of a message of a new transaction request by the card by the server.
- the value of the card action counter is transmitted by means of an information message sent for the card to the server.
- the invention also relates to a card for implementing the aforementioned method comprising a counter and means for managing this counter, characterized in that said management means are capable of incrementing said action counter between each action if the The action has been executed well and should not be incremented for this action or for the following actions if this action has not been executed.
- FIG. 1 illustrates the exchange of messages between the server and the smart card according to the invention
- FIG. 2 illustrates in detail the exchange of messages between the server and the smart card in the event of a message loss
- n By request for actions is meant a message comprising a set of n commands, n of course being able to be equal to 1.
- the server 2 takes advantage of a transaction in progress in a card 1 to send it a request comprising one or more actions that the card must perform.
- an action request will be issued with the response to the transaction in progress if said transaction requires a response. If not, create a response containing only the action request.
- the terminal which is in communication with the server receives the message corresponding to this response, cleans this message from its envelope to transmit the actions to the card.
- a request for actions can comprise several actions to be undertaken by the card, that is to say as specified at the beginning of the description, a set of n commands.
- a request for actions could be a request to change one or more parameters in an application program or, loading a new application or, loading value units.
- the change of a parameter corresponds to an action for the card which is an erase and write operation at a predetermined address.
- the change of several parameters corresponds to as many erasing and writing operations at separate addresses as parameters and consequently to as many actions to be undertaken as there are parameters to change.
- Card side
- the card 1 increments after each correctly performed action, the action counter CA as soon as it receives from the server one or more actions to be undertaken and that it has been able to carry out the execution of each of these actions.
- the value of the counter is raised to the server for example each time the card sends a message to the server (message 3 or message 4 in FIG. 1).
- the value of the counter can be raised to server 2 essentially during the following actions:
- the stored transaction is sent back to the server so that the server can start the merchant payment process with which the transaction took place, the action counter CA can be reassembled with this transaction.
- the value of the content of the action counter is always raised to the server either in real time when it is done during an acknowledgment or in deferred time during a new transaction request or during a rise in a transaction storage.
- the server For each card containing an application dedicated to it having a request for actions in progress, the server must store: - the identification number of the application,
- the server to which an application belonging to a multi-application smart card belongs can, during any transaction requested by the card, order an action such as reloading units, or loading a program or loading new parameters for a program residing in the card.
- the server can thus send actions to the card by a script mechanism that cannot be interpreted by the terminal 3, which is located between the server and the card to ensure communication.
- Terminal 3 transmits the message (s) received in the script to the card transparently.
- the card prepares the transaction and a cryptogram, that is to say the authentication data, subsequently designated by MAC and transmits to the terminal.
- the banking application attaches the current value CA of its share counter secured by the cryptogram.
- the terminal reports the transaction to the bank server.
- the card sends a transaction request message containing the MAC1 data as well as the value of the action counter CA, and the identification of the requested transaction.
- the server checks the authentication data of the MAC1 card and processes the transaction.
- the server can at this time perform an action in the card application.
- it may be a loading of monetary parameter in the card, but as has been said, other actions such as recharging an electronic purse are also possible.
- the server will prepare one or more parameters loading commands contained in an information field called script 1 below, and the MAC2 security authentication data.
- the action request is sent by a message 2 which may contain the response to the transaction in progress if such a response is planned for the application concerned.
- script 1 When script 1 is sent to the card, the server stores this script 1 in a database, by associating data relating to the card, as well as the current value CA of the card action counter ( return of the card to the server during the transaction request). This information will allow server-card synchronization.
- the card sends a secure acknowledgment to the server including the content CA 'in real time. This can then compare the value returned by the acknowledgment with the value stored in its database.
- the server identifies that this card has not received script 1 (or that script 1 has not been performed correctly in the card) thanks at the value CA 'of the action counter which is returned to the server and compared to the CA value stored in the server.
- CA ' is less than CA and not equal, this means that the last or the last actions were not carried out correctly.
- the server updates its database DB, by erasing the value CA to set the value CA '.
- the server is again synchronized and can restart the last action or actions not executed by the card.
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Credit Cards Or The Like (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000562871A JP2002521772A (ja) | 1998-07-27 | 1999-07-26 | サーバーによって端末を介してチップカードに伝送される動作要求の実行の制御方法 |
CA002338447A CA2338447A1 (fr) | 1998-07-27 | 1999-07-26 | Procede de controle de l'execution d'une demande d'actions transmise par un serveur vers une carte a puce via un terminal |
EP99932970A EP1101205A1 (fr) | 1998-07-27 | 1999-07-26 | Procede de controle de l'execution d'une demande d'actions transmise par un serveur vers une carte a puce via un terminal |
BR9912419-0A BR9912419A (pt) | 1998-07-27 | 1999-07-26 | Método para controlar a execução de um pedido de ações transmitido por um servidor para um cartão de microplaqueta por meio de um terminal |
AU49168/99A AU4916899A (en) | 1998-07-27 | 1999-07-26 | Method for controlling the execution of a request for action transmitted by a server to a chip card via a terminal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9809575A FR2781592B1 (fr) | 1998-07-27 | 1998-07-27 | Procede de controle de l'execution d'une demande d'actions transmise par un serveur vers une carte a puce via un terminal |
FR98/09575 | 1998-07-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000007153A1 true WO2000007153A1 (fr) | 2000-02-10 |
Family
ID=9529050
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR1999/001826 WO2000007153A1 (fr) | 1998-07-27 | 1999-07-26 | Procede de controle de l'execution d'une demande d'actions transmise par un serveur vers une carte a puce via un terminal |
Country Status (8)
Country | Link |
---|---|
EP (1) | EP1101205A1 (fr) |
JP (1) | JP2002521772A (fr) |
CN (1) | CN1310832A (fr) |
AU (1) | AU4916899A (fr) |
BR (1) | BR9912419A (fr) |
CA (1) | CA2338447A1 (fr) |
FR (1) | FR2781592B1 (fr) |
WO (1) | WO2000007153A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6824064B2 (en) | 2000-12-06 | 2004-11-30 | Mobile-Mind, Inc. | Concurrent communication with multiple applications on a smart card |
CN103036654A (zh) * | 2012-12-26 | 2013-04-10 | 无锡博欧节能科技有限公司 | 用于物联网的非实时单向链路通讯方法 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE502006000840D1 (de) * | 2006-01-30 | 2008-07-10 | Skidata Ag | System mit mehreren Leistungseinrichtungen mit Zugangskontrolleinrichtungen |
US11234235B2 (en) | 2019-04-30 | 2022-01-25 | Bank Of America Corporation | Resource distribution hub generation on a mobile device |
US11196737B2 (en) | 2019-04-30 | 2021-12-07 | Bank Of America Corporation | System for secondary authentication via contactless distribution of dynamic resources |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4654480A (en) * | 1985-11-26 | 1987-03-31 | Weiss Jeffrey A | Method and apparatus for synchronizing encrypting and decrypting systems |
US5161231A (en) * | 1986-09-27 | 1992-11-03 | Kabushiki Kaisha Toshiba | Processing system which transmits a predetermined error code upon detection of an incorrect transmission code |
FR2716021A1 (fr) * | 1994-02-09 | 1995-08-11 | Gemplus Card Int | Procédé et système de transaction par carte à puce. |
EP0789336A2 (fr) * | 1996-02-10 | 1997-08-13 | Deutsche Telekom AG | Méthode pour vérifier des transactions avec des systèmes à porte-monnaie électronique |
EP0795844A1 (fr) * | 1996-03-11 | 1997-09-17 | Koninklijke KPN N.V. | Méthode pour modifier avec sécurité des données d'une carte à puce |
FR2748880A1 (fr) * | 1996-05-17 | 1997-11-21 | Gemplus Card Int | Message ameliore et procede correspondant de synchronisation et de securisation d'un echange de messages ameliores dans un systeme de radiocommunication cellulaire |
FR2757664A1 (fr) * | 1996-12-24 | 1998-06-26 | Bull Cp8 | Terminal et procede d'autodiagnostic ou de supervision et objet portatif utilise dans un tel terminal ou procede |
FR2775375A1 (fr) * | 1998-02-23 | 1999-08-27 | Solaic Sa | Chargement de programmes informatiques en blocs |
-
1998
- 1998-07-27 FR FR9809575A patent/FR2781592B1/fr not_active Expired - Fee Related
-
1999
- 1999-07-26 WO PCT/FR1999/001826 patent/WO2000007153A1/fr not_active Application Discontinuation
- 1999-07-26 CN CN 99808926 patent/CN1310832A/zh active Pending
- 1999-07-26 AU AU49168/99A patent/AU4916899A/en not_active Abandoned
- 1999-07-26 JP JP2000562871A patent/JP2002521772A/ja active Pending
- 1999-07-26 EP EP99932970A patent/EP1101205A1/fr not_active Withdrawn
- 1999-07-26 CA CA002338447A patent/CA2338447A1/fr not_active Abandoned
- 1999-07-26 BR BR9912419-0A patent/BR9912419A/pt not_active Application Discontinuation
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4654480A (en) * | 1985-11-26 | 1987-03-31 | Weiss Jeffrey A | Method and apparatus for synchronizing encrypting and decrypting systems |
US5161231A (en) * | 1986-09-27 | 1992-11-03 | Kabushiki Kaisha Toshiba | Processing system which transmits a predetermined error code upon detection of an incorrect transmission code |
FR2716021A1 (fr) * | 1994-02-09 | 1995-08-11 | Gemplus Card Int | Procédé et système de transaction par carte à puce. |
EP0789336A2 (fr) * | 1996-02-10 | 1997-08-13 | Deutsche Telekom AG | Méthode pour vérifier des transactions avec des systèmes à porte-monnaie électronique |
EP0795844A1 (fr) * | 1996-03-11 | 1997-09-17 | Koninklijke KPN N.V. | Méthode pour modifier avec sécurité des données d'une carte à puce |
FR2748880A1 (fr) * | 1996-05-17 | 1997-11-21 | Gemplus Card Int | Message ameliore et procede correspondant de synchronisation et de securisation d'un echange de messages ameliores dans un systeme de radiocommunication cellulaire |
FR2757664A1 (fr) * | 1996-12-24 | 1998-06-26 | Bull Cp8 | Terminal et procede d'autodiagnostic ou de supervision et objet portatif utilise dans un tel terminal ou procede |
FR2775375A1 (fr) * | 1998-02-23 | 1999-08-27 | Solaic Sa | Chargement de programmes informatiques en blocs |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6824064B2 (en) | 2000-12-06 | 2004-11-30 | Mobile-Mind, Inc. | Concurrent communication with multiple applications on a smart card |
CN103036654A (zh) * | 2012-12-26 | 2013-04-10 | 无锡博欧节能科技有限公司 | 用于物联网的非实时单向链路通讯方法 |
CN103036654B (zh) * | 2012-12-26 | 2015-10-28 | 无锡博欧节能科技有限公司 | 用于物联网的非实时单向链路通讯方法 |
Also Published As
Publication number | Publication date |
---|---|
AU4916899A (en) | 2000-02-21 |
FR2781592A1 (fr) | 2000-01-28 |
CA2338447A1 (fr) | 2000-02-10 |
EP1101205A1 (fr) | 2001-05-23 |
BR9912419A (pt) | 2001-04-17 |
CN1310832A (zh) | 2001-08-29 |
JP2002521772A (ja) | 2002-07-16 |
FR2781592B1 (fr) | 2000-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9307341B2 (en) | Payment application download to mobile phone and phone personalization | |
EP1571607B1 (fr) | Systeme pour transactions comprenant des terminaux et des cartes à mémoire et carte à mémoire correspondante | |
FR2820853A1 (fr) | Procede et systeme de telepaiement | |
EP0928464A1 (fr) | Systeme de controle et de gestion de services | |
EP0626664A1 (fr) | Système de communication avec cartes à puce | |
FR2757661A1 (fr) | Procede de transfert securise de donnees par un reseau de communication | |
CN110930152A (zh) | 一种基于区块链的数据处理方法及相关设备 | |
EP4305573A1 (fr) | Canal de paiement universel | |
WO2000007153A1 (fr) | Procede de controle de l'execution d'une demande d'actions transmise par un serveur vers une carte a puce via un terminal | |
EP4359986A1 (fr) | Procédé et dispositif de paiement par chaînes de blocs | |
CA2999731A1 (fr) | Procede de traitement de donnees par un terminal de paiement, terminal de paiement et programme correspondant | |
CN114818001A (zh) | 一种数据处理方法、装置及介质 | |
FR3090959A1 (fr) | Traitement d’un service de tickets électroniques | |
FR3025631A1 (fr) | Selection securisee d'une application dans une carte a puce ou equivalent | |
EP2800072A2 (fr) | Procédé de délivrance par un automate de cartes de téléphonie mobile SIM à abonnement prépayé ou postpayé | |
CA2324879C (fr) | Procede pour modifier de maniere indivisible une pluralite d'emplacements de la memoire non volatile d'une carte a microcircuit, notamment une carte sans contact | |
US20220300923A1 (en) | Systems and methods for secondary merchant card delivery | |
US20240127226A1 (en) | Systems and methods for using single or multi-chain deposit tokens | |
WO2024188822A1 (fr) | Procédé et dispositif de paiement confidentiel sur chaîne de blocs | |
EP4099249A1 (fr) | Procédé et dispositif de transmission d'un identifiant d'un utilisateur lors d'un paiement électronique réalisépar l utilisateur | |
EP3639235A1 (fr) | Procédé de gestion d'identifiants de fidélité, procédé de traitement de données de fidélité, serveur, dispositif de transaction et programmes correspondants | |
CN117015786A (zh) | 通用支付通道 | |
WO2024081843A1 (fr) | Systèmes et procédés d'utilisation de jetons de dépôt à chaîne unique ou multi-chaîne | |
WO2023099238A1 (fr) | Procédé de réalisation d'une transaction, dispositifs et programmes correspondants. | |
EP0831434A1 (fr) | Procédé de fermeture, notamment de mise en opposition, d'une pluralité de services, et serveur de fermeture, terminal d'acceptation et dispositifs portatifs associés |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 99808926.5 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1999932970 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2338447 Country of ref document: CA Ref document number: 2338447 Country of ref document: CA Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2000 562871 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09744652 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 1999932970 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1999932970 Country of ref document: EP |