WO2000042794A1 - Apparatus and method relating to authorisation control - Google Patents

Apparatus and method relating to authorisation control Download PDF

Info

Publication number
WO2000042794A1
WO2000042794A1 PCT/AU2000/000023 AU0000023W WO0042794A1 WO 2000042794 A1 WO2000042794 A1 WO 2000042794A1 AU 0000023 W AU0000023 W AU 0000023W WO 0042794 A1 WO0042794 A1 WO 0042794A1
Authority
WO
WIPO (PCT)
Prior art keywords
personal identification
access
identification number
party
receiving apparatus
Prior art date
Application number
PCT/AU2000/000023
Other languages
French (fr)
Inventor
Keith Benson
Original Assignee
Keith Benson
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Keith Benson filed Critical Keith Benson
Priority to AU24250/00A priority Critical patent/AU2425000A/en
Publication of WO2000042794A1 publication Critical patent/WO2000042794A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • This invention relates to communication equipment and especially equipment of a type requiring a security code to be input for the communication equipment to effect communication of a selected type.
  • the network provider would not wish to interfere with a third party service provider provided the communication services which are different from those of the third party services are being paid for.
  • An object of this invention is to provide an arrangement and method which provides the public with a useful alternative service to that available at the present time.
  • such means to accept or reject are instructed by information either held in a memory of the receiving apparatus or in a remote memory which is accessed by the receiving apparatus when required.
  • the means to accept or reject are held in a local memory, then there is a look up reference so that if a first password is input, then the receiving apparatus will use this to check a status of the identified input by reference to a look up reference in memory and if cleared, transmit a further password to the identification member.
  • the receiving apparatus means to receive an input from a third party which will enable access to an identification member and enable with authorised access a change of a password required for access to the member and its authorisation of other effects.
  • a means which will interrogate a remote data base with a first pass word which will be matched to a status flag and, if accepted, transmit back an approval code which is unique to the identifying member.
  • Such a member could be a sim card for a mobile phone or a smart card which can be used for a multitude of purposes.
  • the process anticipated is to have a receiver eg a mobile phone with additional logic.
  • a third party has an authorised arrangement with the user of sim card that use of this will be subject to the approval of the third party.
  • a different personal identification number be programmed into the sim card which is either only known to the third party or is embedded electronically so that only machines can "know” and transmit the personal identification number.
  • the user has a different personal identification number which is used to get into the receiving apparatus but not the member (sim card).
  • This first access then triggers an enquiry either in the receiving apparatus or a remote data base which obtains the further personal identification number for the member only if there is an approved status detected for that first personal identification number.
  • the invention can reside in an arrangement of the receiving means so structured as to perform the said tasks on receipt of a first enquiry with an identification member which has a detectable personal identification number requirement .
  • the invention can reside in the method of handling an enquiry for approval which includes the steps of having a first password or personal identification number access requirement that then is checked against an approval flag either internally or remotely, and only if approved will a further personal identification number be used to access the member which personal identification number is not known by the first user.
  • the invention can be said to reside in an arrangement by which a third party can effect control of access to an identification member by introducing a different personal identification number into the member which is only known to the third party either directly or indirectly and there are means to effect an interrogation of a status data base when a first personal identification number is input into a receiving apparatus, and only if an approved status is obtained does there result in the further access being effected through the personal identification number which is unknown to the first user.
  • FIG 1 is a schematic drawing of a mobile phone with a credit card reader integrated therein and also a remote receiver, lookup up table reference system, and transmitter, and
  • FIG 2 is a flow diagram showing how the steps for the embodiment would be actioned.
  • a digital mobile phone 1 of a type having firstly a conventional subscriber identification module which is not specifically shown (but which can also be a universal identification module which enables access through a network provider to a network).
  • a smart card reader 2 with the phone which is arranged to read information from an inserted card 3 which can then be used for a number of purposes to effect payment of accounts, transfer money, and otherwise generally effect money transactions.
  • This embodiment then provides that there is a first requirement for an input of a code such as a personal identification number whereupon there is logic in the form of a computer with memory in the phone which is arranged to transmit that information to a remote center 4 through network 5.
  • the center 5 includes a receiver 6 with appropriate logic so that a look-up table 7 is consulted when a query is received and if the account has an approved status in the look up table 7 then there is generated a further code which is transmitted back through the network 5 to the phone 1.
  • This further code which is a secret code is not known to the user of the phone and it is such that it will empower the use of the card and whatever functionality is agreed should be available.
  • the secret code can be chosen to indicate different status approvals, for instance it can allow a limit of a size of transaction or it can otherwise inhibit or allow actions as shall be agreed.
  • Figure 2 illustrates the steps that are used by the respective processors in effecting the method.
  • This dedicated receiver forms part of a center which has logic that takes an incoming enquiry and then matches this with respect to a look up table 14.
  • Dependent on the status found, there will then be generated a further code in unit 14a which will remain secret to the user which is then returned to a transmitter 15 where it is transmitted to the receiver part 16 of the mobile phone 10. .
  • the logic 17 in the phone then empowers the use of a credit card or smart card information to be used according to the authorisation obtained which will automatically occur.
  • This invention can be used in a variety of ways including such applications as automatic teller machines, smart card readers or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to an arrangement where a third party can effect control of access to an identification member (such as a SIM card) by introducing a further and/or different personal identification number (PIN) into the member and that is known either directly or indirectly to the third party only. In the example of a mobile phone a user generally inputs their PIN to effect control of the SIM card or phone. This PIN is checked against an approval flag either internally in the memory of the phone or at a remote site, and only if approved will the further PIN be provided to enable access by a user to the SIM card. This results in controlled access to the SIM that is controlled by a third party and not by the general network provider.

Description

APPARATUS AND METHOD RELATING TO AUTHORISATION CONTROL
This invention relates to communication equipment and especially equipment of a type requiring a security code to be input for the communication equipment to effect communication of a selected type.
The invention will be described with respect to mobile telephones in one case and smart cards in another, but it is not intended that the concept be so limited.
It is conventional to have an identification module within a mobile telephone which requires a confidential personal identification number to be input by a user to enable access through the mobile phone to a network provider.
This allows a telephone network provider to be sure that use is authorised and that the user can be identified.
There could be value however if authorisation could be available to others other than the network provider.
This is generally commercially very difficult because others may have a different service offering and the network provider may not wish to convey or may not be entitled to convey any confidential information to any third party.
Also, the network provider would not wish to interfere with a third party service provider provided the communication services which are different from those of the third party services are being paid for.
It is irrelevant to the network provider that some other service is not being paid for or is being requested and not authorised.
An object of this invention is to provide an arrangement and method which provides the public with a useful alternative service to that available at the present time. In accord with this invention there are proposed means to interpose by an "identification member receiving apparatus" means to accept or reject the access to the identification member.
In preference such means to accept or reject are instructed by information either held in a memory of the receiving apparatus or in a remote memory which is accessed by the receiving apparatus when required.
In preference, if the means to accept or reject are held in a local memory, then there is a look up reference so that if a first password is input, then the receiving apparatus will use this to check a status of the identified input by reference to a look up reference in memory and if cleared, transmit a further password to the identification member.
In preference there are, in the receiving apparatus, means to receive an input from a third party which will enable access to an identification member and enable with authorised access a change of a password required for access to the member and its authorisation of other effects.
In an alternative arrangement, in preference, there is provided that there is, within the receiving means, a means which will interrogate a remote data base with a first pass word which will be matched to a status flag and, if accepted, transmit back an approval code which is unique to the identifying member.
By accessing from time to time the identifying member and being able to introduce its own password access into this means that a third party can control access to the benefits of the member.
Such a member, as previously stated could be a sim card for a mobile phone or a smart card which can be used for a multitude of purposes.
The process anticipated is to have a receiver eg a mobile phone with additional logic. A third party has an authorised arrangement with the user of sim card that use of this will be subject to the approval of the third party. Accordingly, there is arranged that a different personal identification number be programmed into the sim card which is either only known to the third party or is embedded electronically so that only machines can "know" and transmit the personal identification number. Then, the user has a different personal identification number which is used to get into the receiving apparatus but not the member (sim card). This first access then triggers an enquiry either in the receiving apparatus or a remote data base which obtains the further personal identification number for the member only if there is an approved status detected for that first personal identification number.
The invention can reside in an arrangement of the receiving means so structured as to perform the said tasks on receipt of a first enquiry with an identification member which has a detectable personal identification number requirement .
The invention can reside in the method of handling an enquiry for approval which includes the steps of having a first password or personal identification number access requirement that then is checked against an approval flag either internally or remotely, and only if approved will a further personal identification number be used to access the member which personal identification number is not known by the first user.
In a further form the invention can be said to reside in an arrangement by which a third party can effect control of access to an identification member by introducing a different personal identification number into the member which is only known to the third party either directly or indirectly and there are means to effect an interrogation of a status data base when a first personal identification number is input into a receiving apparatus, and only if an approved status is obtained does there result in the further access being effected through the personal identification number which is unknown to the first user.
For a better understanding of this invention it will now be described with reference to a preferred embodiment which shall be described with the assistance of drawings wherein
FIG 1 is a schematic drawing of a mobile phone with a credit card reader integrated therein and also a remote receiver, lookup up table reference system, and transmitter, and
FIG 2 is a flow diagram showing how the steps for the embodiment would be actioned. Referring in detail to the drawings there is first shown a digital mobile phone 1 of a type having firstly a conventional subscriber identification module which is not specifically shown (but which can also be a universal identification module which enables access through a network provider to a network). As well there is provided a smart card reader 2 with the phone which is arranged to read information from an inserted card 3 which can then be used for a number of purposes to effect payment of accounts, transfer money, and otherwise generally effect money transactions.
However, the problem with an ordinary system is that there is no obviously efficient and safe system that will ensure that an account or access for any purpose is not approved.
This embodiment then provides that there is a first requirement for an input of a code such as a personal identification number whereupon there is logic in the form of a computer with memory in the phone which is arranged to transmit that information to a remote center 4 through network 5. The center 5 includes a receiver 6 with appropriate logic so that a look-up table 7 is consulted when a query is received and if the account has an approved status in the look up table 7 then there is generated a further code which is transmitted back through the network 5 to the phone 1. This further code which is a secret code is not known to the user of the phone and it is such that it will empower the use of the card and whatever functionality is agreed should be available. The secret code can be chosen to indicate different status approvals, for instance it can allow a limit of a size of transaction or it can otherwise inhibit or allow actions as shall be agreed.
Figure 2 illustrates the steps that are used by the respective processors in effecting the method.
Accordingly, there is an input at 8 into the keyboard 9 of the digital phone 10. This is a first code number that is a personal identification number. However, this is for access to a card credit system available through a card reader with the phone and accordingly, there is a logic in the phone to effect a transmission of the information which has been input out through a transmission part 11 of the phonel 0 and a network 12 to a dedicated receiver 13. This dedicated receiver forms part of a center which has logic that takes an incoming enquiry and then matches this with respect to a look up table 14. Dependent on the status found, there will then be generated a further code in unit 14a which will remain secret to the user which is then returned to a transmitter 15 where it is transmitted to the receiver part 16 of the mobile phone 10. .What then happens is that the logic 17 in the phone then empowers the use of a credit card or smart card information to be used according to the authorisation obtained which will automatically occur..
This invention can be used in a variety of ways including such applications as automatic teller machines, smart card readers or the like.

Claims

1. A communication arrangement including a mobile telephone of a type including a separable subscriber identification module and having at least one further identification receiving means, a program associated with the arrangement by which a third party can effect control of access to an identification member by introducing a further code into the member which is only known to the third party either directly or indirectly and there are means to effect an interrogation of a status data base when a first personal identification number is input into a receiving apparatus, and only if an approved status is obtained does there result in the further access being effected through the supply of an identification code which is expected to be unknown to the first user.
2. A communication arrangement by which a third party can effect control of access to an identification member by introducing a different personal identification code into the member which is only known to the third party either directly or indirectly and where there are means to effect an interrogation of a status data base when a first personal identification number is input into a receiving apparatus, and only if an approved status is obtained does there result in the further access being effected through the input of a personal identification code which is expected to be unknown to the first user.
3. A communication arrangement as in either of the preceding claims further characterised in that there are means to interpose by an "identification member receiving apparatus" means to accept or reject the access to the identification member.
4. A communication arrangement as in the immediately preceding claim further characterised in that such means to accept or reject are instructed by information either held in a memory of the receiving apparatus or in a remote memory which is accessed by the receiving apparatus when required.
5. A communication arrangement as in the immediately preceding claim further characterised in that with the means to accept or reject being held in a local memory, there is a look up reference so that if a first personal identification number is input, then the receiving apparatus will use this to check a status of the identified input by reference to a look up reference in memory and if cleared, transmit a further password to the identification member.
6. A communication arrangement as in any one of the preceding claims further characterised in that there are, in the receiving apparatus, means to receive an input from a third party which will enable access to an identification member and enable with authorised access a change of a password required for access to the member and its authorisation of other effects.
7. A communication arrangement as in any one of the preceding claims further characterised in that there is provided that there is, within the receiving means, a means which will interrogate a remote data base with a first personal identification number which will be matched to a status flag and, if accepted, transmit back an approval code which is unique to the identifying member.
8. A communication arrangement as in any one of the preceding claims further characterised in that the member is a subscriber card for a mobile phone.
9. A communication arrangement as in any one of the preceding claims further characterised in that the member is a smart card.
10. A communication arrangement as in any one of the preceding claims further characterised in that there is arranged that a different personal identification number be programmed into a subscriber identification module card which is either only known to the third party or is embedded electronically so that only machines can "know" and transmit the personal identification number and such that a user has a different personal identification number which is used to get into the receiving apparatus but not the member (sim card) and adapted whereby a first access by a user then triggers an enquiry either in the receiving apparatus or a remote data base which obtains the further personal identification number for the member only if there is an approved status detected for that first personal identification number.
11. A communication arrangement as in any one of the preceding claims further characterised in that there is an arrangement of the receiving means so structured as to perform the said tasks on receipt of a first enquiry with an identification member which has a detectable personal identification number requirement .
12. A method of handling an enquiry for approval which includes the steps of having an arrangement with a first password or personal identification number access requirement that then is checked against an approval status either internally or remotely, and only if approved after reference to a status will a further password or personal identification code be provided that is not available or accessible to the user that will then be used to access the member which personal identification number is not known by the first user.
13. A communication arrangement by which a third party can effect control of access to an identification member by introducing a different personal identification code into the member which is only known to the third party either directly or indirectly and where there are means to effect an interrogation of a status data base when a first personal identification number is input into a receiving apparatus, and only if an approved status is obtained does there result in the further access being effected through the input of a personal identification code which is expected to be unknown to the first user.
PCT/AU2000/000023 1999-01-18 2000-01-17 Apparatus and method relating to authorisation control WO2000042794A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU24250/00A AU2425000A (en) 1999-01-18 2000-01-17 Apparatus and method relating to authorisation control

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AUPP8185A AUPP818599A0 (en) 1999-01-18 1999-01-18 Apparatus & method relating to authorisation control
AUPP8185 1999-01-18

Publications (1)

Publication Number Publication Date
WO2000042794A1 true WO2000042794A1 (en) 2000-07-20

Family

ID=3812390

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2000/000023 WO2000042794A1 (en) 1999-01-18 2000-01-17 Apparatus and method relating to authorisation control

Country Status (2)

Country Link
AU (1) AUPP818599A0 (en)
WO (1) WO2000042794A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1176844A2 (en) 2000-07-25 2002-01-30 Vodafone Limited Telecommunication systems and methods
WO2002030039A1 (en) * 2000-10-05 2002-04-11 France Telecom Sa Method for authenticating an electronic document
WO2003017215A1 (en) * 2001-08-16 2003-02-27 James Van Der Westhuizen The conducting of electronic transactions
KR20030044260A (en) * 2001-11-29 2003-06-09 엘지전자 주식회사 Wireless SIM card interface system using mobile phone and method thereof
WO2004054297A1 (en) * 2002-12-09 2004-06-24 Stephan Gautschi One-time password generator for mobile telephones

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998031169A2 (en) * 1997-01-07 1998-07-16 Nokia Telecommunications Oy Method and arrangement for handling subscriber data
WO1998033348A2 (en) * 1997-01-28 1998-07-30 Telecom Finland Oy System and procedure for creating a location dependent identity for a mobile terminal in a mobile communication network by using a data adapter
WO1998037663A1 (en) * 1997-02-19 1998-08-27 Telefonaktiebolaget Lm Ericsson Method for authorization check

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998031169A2 (en) * 1997-01-07 1998-07-16 Nokia Telecommunications Oy Method and arrangement for handling subscriber data
WO1998033348A2 (en) * 1997-01-28 1998-07-30 Telecom Finland Oy System and procedure for creating a location dependent identity for a mobile terminal in a mobile communication network by using a data adapter
WO1998037663A1 (en) * 1997-02-19 1998-08-27 Telefonaktiebolaget Lm Ericsson Method for authorization check

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1176844A2 (en) 2000-07-25 2002-01-30 Vodafone Limited Telecommunication systems and methods
EP1176844A3 (en) * 2000-07-25 2002-05-02 Vodafone Limited Telecommunication systems and methods
GB2365264B (en) * 2000-07-25 2004-09-29 Vodafone Ltd Telecommunication systems and methods
WO2002030039A1 (en) * 2000-10-05 2002-04-11 France Telecom Sa Method for authenticating an electronic document
FR2815205A1 (en) * 2000-10-05 2002-04-12 France Telecom ELECTRONIC DOCUMENT AUTHENTICATION PROCESS
WO2003017215A1 (en) * 2001-08-16 2003-02-27 James Van Der Westhuizen The conducting of electronic transactions
KR20030044260A (en) * 2001-11-29 2003-06-09 엘지전자 주식회사 Wireless SIM card interface system using mobile phone and method thereof
WO2004054297A1 (en) * 2002-12-09 2004-06-24 Stephan Gautschi One-time password generator for mobile telephones

Also Published As

Publication number Publication date
AUPP818599A0 (en) 1999-02-11

Similar Documents

Publication Publication Date Title
JP4789092B2 (en) Mobile phone, R badge, receiver
US20070187482A1 (en) Point of Sale Transaction Method and System
EP1282044B1 (en) Authenticating method
CN101467158A (en) System and method for activating telephone-based payment instrument
CN101911584A (en) A transmitter for transmitting a secure access signal
KR20010008131A (en) Method for using internet mobile as credit card, and PDA and method of checking price using by the PDA
GB2372904A (en) Exchanging commercial personal or confidential transaction information between a user equipment and another party
CN102542697A (en) POS (Point of Sale) terminal based on electronic equipment having network access function
EP1784798A2 (en) Short-range authentication
TWI534711B (en) Smart card and access method thereof
KR20000012607A (en) certification system using radio communication device
WO2000042794A1 (en) Apparatus and method relating to authorisation control
US7970653B2 (en) Electronic authorisation
KR100570667B1 (en) Control method of banking transactions system for ATM using mobile phone
CN103430199B (en) Secure payment system using a mobile phone, and payment method using same
US20030097333A1 (en) Electronic money processing method and program and recording medium
KR20010114000A (en) Method and system of authenticating user's identity on atm machine using mobile phone
US20130185568A1 (en) Information processing system
WO2003015043A1 (en) A credit card security system
KR20050017699A (en) Portable terminal control device, specially in connection with conducting a stable and convenient payment process while processing a fund transfer service with one click
JP2002324219A (en) Card authentication system
GB2378294A (en) Credit card security system
JP2003203056A (en) User client server system
JP6845888B2 (en) Authentication method for electronic wallet media
KR200279242Y1 (en) Inquiry terminal for credit card

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase