WO2000028398A1 - Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur - Google Patents
Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur Download PDFInfo
- Publication number
- WO2000028398A1 WO2000028398A1 PCT/EP1999/008333 EP9908333W WO0028398A1 WO 2000028398 A1 WO2000028398 A1 WO 2000028398A1 EP 9908333 W EP9908333 W EP 9908333W WO 0028398 A1 WO0028398 A1 WO 0028398A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content information
- content
- procedure
- user
- information
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 63
- 238000004806 packaging method and process Methods 0.000 claims 1
- 238000009877 rendering Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 7
- 230000003993 interaction Effects 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000002688 persistence Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 230000006855 networking Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 210000001992 atrioventricular node Anatomy 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2807—Exchanging configuration information on appliance services in a home automation network
- H04L12/2812—Exchanging configuration information on appliance services in a home automation network describing content present in a home automation network, e.g. audio video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L2012/2847—Home automation networks characterised by the type of home appliance used
- H04L2012/2849—Audio/video appliances
Definitions
- the invention relates to a method of providing controlled access to content data, in particular as provided to an end-user of consumer electronics equipment or a multimedia computer.
- the invention also relates to a method of protecting unauthorized copying of digital data content.
- content and content data refer to data that contains information for the end-user, e.g., alphanumerical text, graphics, video, audio, multimedia, etc.
- digital content is usually sent or streamed to the end-user from a remote server using cable or Internet, or is provided on a DND, etc.
- the content is processed by the receiving device (e.g., a computer, a set-top box ) and rendered to the end user.
- Content can be copyright-protected using "watermarking”: adding digital modifications that are undetectable by the user, but are recognized by the rendering or verifying software or hardware.
- Another way to protect the content is encryption.
- the content data is encoded using special encryption algorithms before sending the data to its destination.
- the stream is decrypted before rendering or storage.
- Watermarking for example, is highly sensitive to content modifications. If the digital content is modified by software/hardware, which is not aware of the "watermark", the watermark is not guaranteed to persist in the original form. For example, picture resizing, storing the picture in a different file format, applying compression techniques, etc., affect also the watermark and make it less useful. Encryption methods also provide a number of challenges. As computer/processing hardware and software become more powerful and sophisticated, well-known algorithms get "cracked” and are rendered obsolete. Another challenge is standardization. That is, in order to address the mass market with multiple vendors, a content protection method needs to be standard.
- the invention provides a method of providing or receiving content information, preferably via a network, as one or more software objects.
- a procedure is encapsulated in the object for access of the information on a runtime environment. That is, the procedure for accessing the information by the end-user is packaged together with the content information for delivery to the end-user.
- a software object comprises content data plus a method or procedure to process the data.
- a method is a programmed procedure that is defined as part of a class and that is included in any object of that class.
- An object can have more than one method.
- a method in an object can only have access to the data known to that object, which ensures data integrity among the set of objects in an application.
- Open distributed software architectures such as HAVi, Java/JINI, Home API based on COM or DCOM technology, CORBA and others allow transfer of software objects over a network (Internet, home network, local area network, wide area network, etc.).
- HAVi the use of COM technology and OLE Automation objects
- 09/165,683 (Attorney Docket PHA 23.483), filed 10/2/98 for Yevgeniy Shteyn for "CALLS IDENTIFY SCENARIO FOR CONTROL OF SOFTWARE OBJECTS VIA PROPERTY ROUTES";
- U.S. Serial No. 09/165,682 (Attorney Docket PHA 23,484), filed 10/2/98 for Yevgeniy Shteyn for "CONTROL PROPERTY IS MAPPED ONTO MODALLY COMPATIBLE GUI ELEMENT " ; and U.S. Serial No.
- a HAVi DCM can be uploaded to an FAV and executed in a Java run-time environment.
- the DCM can be programmed to implement API's for the rendering, storing, recording or other processing of graphics, audio, video, text, image, etc.
- the software object works directly with the rendering machine, without intermediate decryption or modification. All operations are controlled by the object itself and hidden from hostile applications.
- an object-controlled storage API is invoked (for example: Serialization, see further below). Since the object controls the storage (recording) process, the host system has to recreate the object in order to access stored content and therefore its content is protected.
- the object can affect the quality of recording, the number of times the content can be recorded or rendered and other interactions with the host system.
- the software object also can be made time-sensitive. For example, a movie object can be leased, i.e., its rendering API can only be used for a certain amount of time - movie playing time, a day, etc...
- a controlling object does not have to contain all the content. When the content is very large, the object could just keep the reference(s) to content location and does the retrieval as needed. Where necessary or desirable, a chain of objects could control operations. For example, different movie scenes are controlled by different objects.
- An object can be set up to provide free (trial) access to certain parts of the content and require payments for other. Conditional interaction with system resources, based on user preferences, can be accomplished. Advertisements and promotions can be inserted as separate objects, depending on the level of user access (e.g., via subscription).
- An object can wrap up binary code, provided the execution environment of the target client is known or can be detected after object interaction with the device. For example, a better rendering algorithm or a binary upgrade can be delivered to a TriMedia machine running Java VM.
- the proposed method of data content delivery to an end-user through objects is also highly suitable for other usages than copyright protection.
- email, teleconferencing (via telephone) or videoconferencing can be based on the exchange of software objects for security reasons.
- electronic monetary transactions are made secure through the communication of software objects.
- Electronic mail can be implemented as software objects.
- Transport of an object over a network is accomplished through, e.g., object serialization.
- Object serialization in Java supports the encoding of objects, and the objects reachable from them, into a stream of bytes, and it supports the complementary reconstruction of the object graph from the stream.
- Serialization is used for lightweight persistence and for communication via sockets or Remote Method Invocation (RMI).
- RMI Remote Method Invocation
- the default encoding of objects protects private and transient data, and supports the evolution of the classes.
- a separate digital data stream that can be pirated and replicated by hostile parties does not exist in the traditional sense. All what is being sent is the string of bits and it is not possible to the average person to find a clue about its meaning, since procedures and content information are not recognizable from the stream.
- a class may implement its own external encoding to increase security and is then solely responsible for the external format (source: http:// www.iavasoft.com/ products /jdk/1.1/ docs/guide/ serialization/ index.html). Accordingly, a decryption procedure can be encapsulated in the object, together with encrypted content data. The decryption procedure is then invoked at the receiving end, possibly complemented with an also encapsulated verification procedure verifying the receiver's ID, decryption key, or serial number of the rendering device, etc.
- a video conferencing system can provide conventional video streaming and object-encapsulated secure audio and/or graphical data.
- FIGS.1 -5 are block diagrams of examples of a system wherein the method of the invention is implemented.
- Fig.l is a block diagram of a HAVi system 100 for implementing the method of the invention.
- System 100 comprises a storage medium 102 and an FAV (Full AV node) 104 that comprises a digital TV in this example.
- FAV 104 has a Java Virtual Machine 106.
- Storage medium 102 comprises, for example, a buffer that stores a software object 108 received electronically from outside system 100, e.g., via the Internet after de-serialization, or a DVD or another physical data-carrier that contains the software object, here a HAVi DCM 108 with content data 110 and play-out procedures, represented by rendering API 112.
- Software object 108 is uploaded to the rendering process on FAV 104 where rendering API 104 directly interacts with Java VM 106.
- Conditional access to the content can be based on security or on user/system capabilities.
- the object allows invocation for play-out or storage through API's dedicated to verification.
- the run time would have to provide an authorization or an identifier that can be verified by the object.
- parental control can be implemented by a group of objects representing different parts of a movie content.
- an electronic book can encapsulate graphical objects with access restriction requirements.
- Fig.2 is a block diagram of a Jini system 200 which uses a JavaSpaces architecture.
- JavaSpaces is an architecture for creating a distributed operating system and creating repositories for Java-based objects, as well as Java VM's and Java's Remote Method Invocation (RMI) functionality.
- JavaSpaces implementations provide a mechanism for storing a group of related objects and retrieving them based on value-matching look-up for specified fields. This allows a JavaSpaces server to be used for storing and retrieving objects on a remote system.
- the JavaSpaces API uses a specific package to provide basic atomic transactions that group multiple operations across multiple JavaSpaces implementations into a bundle that acts as a single atomic operation.
- the JavaSpaces architecture supports a transaction mechanism allows multi-operation and/or multi-space updates to complete atomically.
- the term "atomicity" means that all operations grouped under a transaction occur or none of them does.
- Jini is a technology, also from Sun Microsystems, for networking of devices.
- Jini is a Java-based software technology that assists in networking PC's and peripherals.
- a Jini-enabled device When plugged into a network, a Jini-enabled device will broadcast its presence. Network clients that are ready to use that device can request the necessary software from the device itself, bypassing a server or a network administrator. This architecture builds on top of an existing network.
- System 200 comprises JavaSpaces servers 202 and 204, and a client 206 connected through a network 208.
- JavaSpaces server 202 or 204 provides a distributed persistence and object exchange mechanism for objects written in the Java programming language. Objects are written in entries that provide a typed grouping of relevant fields. Clients can perform simple operations on a JavaSpaces server to write new new entries, to look-up existing entries, and remove entries from the space. Using these tools a user can write systems that use flow of data to implement distributed algorithms and let the JavaSpaces system implement persistence for the user.
- server 202 transfers an object (through Serialization) to client 206. The transfer is a lease as specified by Java's
- a leased resource or service grant is time-based. When the time for the lease has expired the service ends or the resource is freed.
- server 202 leases a first object to server 204 for temporary storage and a second object to client 206 for temporary storage or rendering.
- This configuration is relevant to, for example, a video- (or audio-) on-demand service provider, a multi-player video game provider, etc.
- a similar client-server architecture can be built using COM/DCOM technology of Microsoft, with a COM client on a Windows operating system.
- Fig.3 is a diagram of a system 300 with a COM/DCOM server 302 and a COM client 304.
- Server 302 provides object access and object storage.
- Client 304 can access server 302 using COM or DCOM mechanisms. For a remote location, DCOM is be used. The access mechanism is transparent to client 304.
- a COM object is transferred into the process on client 304 and an appropriate API is invoked at client 304 in order to produce desirable content.
- the object has full access to system resources and API's such as DirectShow components from Microsoft.
- Fig.4 is a diagram of another configuration of a system 400 in the invention.
- System 400 comprises a server 402 for providing objects and serving as an object repository.
- System 400 further comprises clients 404 and 406.
- System 400 is used for, e.g., multi-client interaction for exchange of content such as in videoconferencing.
- Content objects are placed in server/repository 402 by client 404 and can be retrieved from repository 402 by client 406.
- Fig.5 is a diagram of a system 500 that has a similar configuration as system 400.
- System 500 comprises an object server 502 that serves clients 504, 506, 508 and 510.
- Server 502 functions as an object repository to enable multi-client object interaction.
- Content objects are placed in server 502 by any of clients 504-510 and can be retrieved by any of the other clients 504-510.
- System 500 comprises a relay or replication server 512 to serve clients 514 and 516.
- a content object can be packaged or can expose interfaces based on preferences or access privileges of clients 504-510 and 514-516.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Automation & Control Theory (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Mathematical Physics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Abstract
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000581519A JP2002529844A (ja) | 1998-11-10 | 1999-11-01 | 著作権保護のためソフトウエアオブジェクトとしてコンテンツを供給する方法 |
EP99957978A EP1046095A1 (fr) | 1998-11-10 | 1999-11-01 | Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur |
KR1020007007594A KR20010034000A (ko) | 1998-11-10 | 1999-11-01 | 저작권 보호를 위해 소프트웨어 객체로서 제공된 콘텐트 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18953498A | 1998-11-10 | 1998-11-10 | |
US09/189,534 | 1998-11-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000028398A1 true WO2000028398A1 (fr) | 2000-05-18 |
Family
ID=22697749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP1999/008333 WO2000028398A1 (fr) | 1998-11-10 | 1999-11-01 | Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1046095A1 (fr) |
JP (1) | JP2002529844A (fr) |
KR (1) | KR20010034000A (fr) |
CN (1) | CN1124534C (fr) |
WO (1) | WO2000028398A1 (fr) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001078352A1 (fr) * | 2000-04-07 | 2001-10-18 | Telia Ab | Pret de ressource locale dans un systeme de communication de donnees et de telecommunication |
EP1164523A2 (fr) * | 2000-06-08 | 2001-12-19 | Siemens Aktiengesellschaft | Méthode et arrangement pour l'utilisation sécurisée d'un service |
JP2002007325A (ja) * | 2000-06-23 | 2002-01-11 | Shinkichi Morimoto | デジタルコンテンツの配信方法およびデジタルコンテンツの配信システム |
WO2003040898A1 (fr) * | 2001-11-08 | 2003-05-15 | Beep Science As | Dispositif et procede pour le controle de la police de contenu au moyen d'un environnement de confiance dans un systeme de messagerie multimedia |
US7644444B2 (en) | 2002-10-30 | 2010-01-05 | Ntt Docomo, Inc. | Communication device, program and recording media |
US7818815B2 (en) | 2002-05-17 | 2010-10-19 | Ntt Docomo, Inc. | Communication device |
US7958213B1 (en) | 2000-09-21 | 2011-06-07 | Siemens Enterprise Communications, Inc. | Processing electronic messages |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3788201B2 (ja) * | 2000-06-07 | 2006-06-21 | 日本電信電話株式会社 | 情報カプセル管理方法及び情報カプセル管理プログラムを格納した記憶媒体 |
JP4532068B2 (ja) * | 2001-12-07 | 2010-08-25 | パナソニック株式会社 | コンテンツ配信システムおよび方法 |
EP1470497A1 (fr) | 2002-01-12 | 2004-10-27 | Coretrust, Inc. | Procede et systeme pour la protection des informations d'un contenu numerique |
KR100724439B1 (ko) * | 2005-03-22 | 2007-06-04 | 엘지전자 주식회사 | 콘텐츠 사용권리 보호방법 |
EP1889164B1 (fr) * | 2005-06-03 | 2014-08-13 | Warner Bros. Entertainment Inc. | Systeme visant a garantir que la presence de filigranes dans tous les types de disques optiques audiovisuels soit correctement identifiee |
CN100437612C (zh) * | 2005-10-31 | 2008-11-26 | 华为技术有限公司 | 一种保护内容的方法及装置 |
WO2009083869A1 (fr) * | 2007-12-20 | 2009-07-09 | Koninklijke Philips Electronics N.V. | Dispositif et procédé de gestion de droits numériques |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5420866A (en) * | 1994-03-29 | 1995-05-30 | Scientific-Atlanta, Inc. | Methods for providing conditional access information to decoders in a packet-based multiplexed communications system |
-
1999
- 1999-11-01 WO PCT/EP1999/008333 patent/WO2000028398A1/fr not_active Application Discontinuation
- 1999-11-01 KR KR1020007007594A patent/KR20010034000A/ko not_active Application Discontinuation
- 1999-11-01 EP EP99957978A patent/EP1046095A1/fr not_active Withdrawn
- 1999-11-01 CN CN99803708A patent/CN1124534C/zh not_active Expired - Fee Related
- 1999-11-01 JP JP2000581519A patent/JP2002529844A/ja active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5420866A (en) * | 1994-03-29 | 1995-05-30 | Scientific-Atlanta, Inc. | Methods for providing conditional access information to decoders in a packet-based multiplexed communications system |
Non-Patent Citations (1)
Title |
---|
JAVA SECURITY, XP002092325, Retrieved from the Internet <URL:http://SWISSNET.AI.MIT.EDU/~JBANK/JAVAPAPER/JAVAPAPER.HTML> [retrieved on 19990204] * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001078352A1 (fr) * | 2000-04-07 | 2001-10-18 | Telia Ab | Pret de ressource locale dans un systeme de communication de donnees et de telecommunication |
EP1164523A2 (fr) * | 2000-06-08 | 2001-12-19 | Siemens Aktiengesellschaft | Méthode et arrangement pour l'utilisation sécurisée d'un service |
EP1164523A3 (fr) * | 2000-06-08 | 2006-10-11 | Siemens Aktiengesellschaft | Méthode et arrangement pour l'utilisation sécurisée d'un service |
JP2002007325A (ja) * | 2000-06-23 | 2002-01-11 | Shinkichi Morimoto | デジタルコンテンツの配信方法およびデジタルコンテンツの配信システム |
US7958213B1 (en) | 2000-09-21 | 2011-06-07 | Siemens Enterprise Communications, Inc. | Processing electronic messages |
WO2003040898A1 (fr) * | 2001-11-08 | 2003-05-15 | Beep Science As | Dispositif et procede pour le controle de la police de contenu au moyen d'un environnement de confiance dans un systeme de messagerie multimedia |
US7818815B2 (en) | 2002-05-17 | 2010-10-19 | Ntt Docomo, Inc. | Communication device |
US8087078B2 (en) | 2002-05-17 | 2011-12-27 | Ntt Docomo, Inc. | Communication device |
US7644444B2 (en) | 2002-10-30 | 2010-01-05 | Ntt Docomo, Inc. | Communication device, program and recording media |
Also Published As
Publication number | Publication date |
---|---|
CN1124534C (zh) | 2003-10-15 |
EP1046095A1 (fr) | 2000-10-25 |
KR20010034000A (ko) | 2001-04-25 |
CN1292897A (zh) | 2001-04-25 |
JP2002529844A (ja) | 2002-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4884978B2 (ja) | 安全なマルチメディア転送システム | |
KR100941385B1 (ko) | 조건적 액세스 시스템 | |
CA2539203C (fr) | Procede et systeme de commande d'un contenu video | |
CA2538831C (fr) | Procede destine a empecher une distribution non autorisee d'un contenu multimedia | |
EP1625479B1 (fr) | Procede et systeme de partage de media controle dans un reseau | |
US8813246B2 (en) | Method for playing digital contents protected with a DRM (digital right management) scheme and corresponding system | |
US20020077986A1 (en) | Controlling and managing digital assets | |
WO2000028398A1 (fr) | Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur | |
JP2003132173A (ja) | 電子メディア・コンテナ | |
EP1523133B1 (fr) | Systeme d'authentification interdispositif, et procede, dispositif de communications, et programme informatique | |
US20080060081A1 (en) | State Info in Drm Identifier for Ad Drm | |
KR100740196B1 (ko) | 가정용 네트워크에서 비동기성 데이터를 송신하기 위한 방법 | |
WO2008018310A1 (fr) | Dispositif d'exécution d'application, procédé, et programme | |
EP1410629A1 (fr) | SYSTèME ET MéTHODE DE RECEPTION ET DE STOCKAGE D'UN FLUX DE TRANSPORT | |
WO2001022682A2 (fr) | Procede et systeme de services en continu en temps reel | |
Park et al. | Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments | |
KR101160263B1 (ko) | Dlna 홈 네트워크 및 dlna 홈 네트워크에서의디지털 저작권 처리 방법 | |
Viana et al. | iDTV Home Gateway convergence: an open software model integrating the Ginga middleware and the OSGi framework | |
TWI252663B (en) | Method and system for protecting media data | |
STANDARD | Media Device Control Framework (MDCF) | |
STANDARD | Media Device Control—Part 1: Framework (MDCF) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 99803708.7 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN JP KR |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020007007594 Country of ref document: KR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1999957978 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1999957978 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020007007594 Country of ref document: KR |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1999957978 Country of ref document: EP |
|
WWR | Wipo information: refused in national office |
Ref document number: 1020007007594 Country of ref document: KR |