WO2000048357A1 - Method and arrangement for enabling encrypted communication - Google Patents

Method and arrangement for enabling encrypted communication Download PDF

Info

Publication number
WO2000048357A1
WO2000048357A1 PCT/SE2000/000233 SE0000233W WO0048357A1 WO 2000048357 A1 WO2000048357 A1 WO 2000048357A1 SE 0000233 W SE0000233 W SE 0000233W WO 0048357 A1 WO0048357 A1 WO 0048357A1
Authority
WO
WIPO (PCT)
Prior art keywords
lul
local
lun
unit
pkl
Prior art date
Application number
PCT/SE2000/000233
Other languages
French (fr)
Inventor
Kristofer Ekbom
Mats Bergman
Ingvar Aaro
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to AU29538/00A priority Critical patent/AU2953800A/en
Publication of WO2000048357A1 publication Critical patent/WO2000048357A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key

Definitions

  • the invention relates generally to encrypted communication and more specifically to a method and an arrangement for key distribution to enable encrypted communication between local units having their own public keys in a communication network that also comprises a central unit having a secret master key.
  • the central unit has to certify the respective local unit, and each local unit of the group should be able to check that the other units in fact belong to the group in question, i.e. that they have been certified by the central unit.
  • a group of local units can be certified e.g. by means of different types of certificates based on so called public key cryptography.
  • the object of the invention is to enable each local unit in a group of local units that are to participate in an encrypted communication, to check that any other local unit in fact belongs to the group, and to enable encrypted communications within arbitrary groups of local units.
  • This is attained in accordance with the invention in that session keys are calculated in each local unit based on the public keys from the other local units and a functional value calculated by the central unit, and that encrypted communication is en- abled only between local units having calculated identical session keys.
  • these session keys are then used to encrypt data to be exchanged between the local units.
  • the calculation work is distributed between the local units instead of being concentrated to the unit initiating the communication.
  • FIG. 1 schematically illustrates a first stage of the method according to the invention in a communication network
  • Fig. 2 illustrates a second stage of the method according to the invention in part of the communication network in Fig. 1.
  • Fig. 1 schematically illustrates a communication network comprising a central unit CU and a plurality of local units LUl, LU2, LU3 ... LUN.
  • Encrypted communication is to be established between any number of local units in the network.
  • the central unit CU has a secret master key MK and each local unit LUl, LU2, LU3 ... LUN has its own open or public key PKl, PK2, PK3 ... PKN as schematically indicated on the drawing.
  • the local units in advance of any communication between any number of the local units LUl, LU2, LU3 ... LUN, the local units transfer their respective public keys PKl, PK2, PK3 ... PKN to the central unit CU, e.g. upon re- quest by the central unit CU, as illustrated by means of arrows from the respective local unit to the central unit CU in Fig. 1.
  • the central unit CU calculates, for each local unit LUl, LU2. LU3 ... LUN, an individual functional value FV1, FV2, FV3 ... FVN from the master key MK and the respective public key PKl, PK2, PK3 ... PKN received from the respective local unit LUl, LU2, LU3 ... LUN.
  • the functional values FV1, FV2, FV3 ... FVN calculated for the local units LUl, LU2, LU3 ... LUN in Fig. 1 will be H(MK, PKl), H(MK, PK2), H(MK, PK3) ... H(MK, PKN).
  • the central unit CU is adapted to transfer the respective individual functional value FV1, FV2, FV3 ... FVN to the respective local unit LUl, LU2, LU3 ... LUN as il- lustrated in Fig. 1 by means of arrows directed from the central unit CU to the respective local unit LUl, LU2, LU3 ... LUN.
  • the local unit LUl in Fig. 1 desires encrypted communications with the local units LU2 and LU3 in Fig. 1, and that also the communication between the local units LU2 and LU3 should be encrypted.
  • each local unit that is to communicate encrypted with any other local unit has to exchange public keys with that other local unit.
  • the local unit LUl sends one message to the local unit LU2 and one message to the local unit LU3 informing them of its desire for an encrypted communication between the three local units, and requesting them to transfer their respective public keys PK2 and PK3.
  • the local unit LU2 requests the local units LUl and LU3 to transfer their public keys PKl and PK3, respectively, and the local unit LU3 requests the local units LUl and LU2 to transfer their respective public keys PKl and PK2.
  • each local unit LUl, LU2, LU3 calculates session keys by applying the above function H(x, y) in sequence.
  • the session key calculated by the local unit LUl will be H(H(FV1 , PK2),
  • the session key calculated by the local unit LUl will be H(H(H(MK, PKl), PK2), PK3).
  • the session key calculated by the local unit LU2 will be H(H(FV2, PKl), PK3) or H(H(H(MK, PK2), PKl), PK3) with FV2 inserted as above, and the session key calculated by the local unit LU3 will be H(H(FV3, PKl), PK2) or H(H(H(MK, PK3), PKl), PK2) with FV3 inserted as above.
  • the session keys calculated by the respective local units are identical which is a prerequisite condition for an encrypted communication to be enabled between the local units in question according to the invention.

Abstract

In a communication network comprising a central unit (CU) having a secret master key (MK), and a number of local units (LU1, LU2, ... LUN) each having its own public key (PK1, PK2, ... PKN), to enable encrypted communication between local units (LU1, LU2, ... LUN), the local units (LU1, LU2, ... LUN) transfer their public keys (PK1, PK2, ... PKN) to the central unit (CU) which calculates functional values (FV1, FV2, ... FVN) from the master key (MK) and the respective public key (PK1, PK2, ... PKN), and which transfers the functional values (FV1, FV2, ... FVN) to the respective local unit (LU1, LU2, ... LUN). Each local unit (LU1, LU2, ... LUN) then transferts its public key (PK1, PK2, ... PKN) to the other local units (LU1, LU2, ... LUN), and each local unit (LU1, LU2, ... LUN) calculates respective session keys from its own individual functional value (FV1, FV2, ... FVN) received from the central unit (CU), and the respective public key (PK1, PK2, ... PKN) received from the other local units (LU1, LU2, ... LUN). Communication being enabled only between local units (LU1, LU2, ... LUN) having calculated identical session keys.

Description

METHOD AND ARRANGEMENT FOR ENABLING ENCRYPTED COMMUNICATION
TECHNICAL FIELD The invention relates generally to encrypted communication and more specifically to a method and an arrangement for key distribution to enable encrypted communication between local units having their own public keys in a communication network that also comprises a central unit having a secret master key.
BACKGROUND OF THE INVENTION
To enable secure communication within arbitrary groups of local units in such a communication network, the central unit has to certify the respective local unit, and each local unit of the group should be able to check that the other units in fact belong to the group in question, i.e. that they have been certified by the central unit.
Today, a group of local units can be certified e.g. by means of different types of certificates based on so called public key cryptography.
To enable secure communication between local units certified by the central unit is complicated in that someone within the group has to generate a secret session key which, then, is to be encrypted with the public keys of the other local units of the group, and, then finally, sent out to the respective group member. Thereafter, the communication can start.
SUMMARY OF THE INVENTION
The object of the invention is to enable each local unit in a group of local units that are to participate in an encrypted communication, to check that any other local unit in fact belongs to the group, and to enable encrypted communications within arbitrary groups of local units. This is attained in accordance with the invention in that session keys are calculated in each local unit based on the public keys from the other local units and a functional value calculated by the central unit, and that encrypted communication is en- abled only between local units having calculated identical session keys.
By means of any known symmetric encryption algorithm, these session keys are then used to encrypt data to be exchanged between the local units.
By means of the invention, the calculation work is distributed between the local units instead of being concentrated to the unit initiating the communication.
BRIEF DESCRIPTION OF THE DRAWING
The invention will be described more in detail below with reference to the appended drawing on which Fig. 1 schematically illustrates a first stage of the method according to the invention in a communication network, and Fig. 2 illustrates a second stage of the method according to the invention in part of the communication network in Fig. 1.
DESCRIPTION OF THE INVENTION
Fig. 1 schematically illustrates a communication network comprising a central unit CU and a plurality of local units LUl, LU2, LU3 ... LUN.
Encrypted communication is to be established between any number of local units in the network.
The central unit CU has a secret master key MK and each local unit LUl, LU2, LU3 ... LUN has its own open or public key PKl, PK2, PK3 ... PKN as schematically indicated on the drawing. In accordance with the invention, in advance of any communication between any number of the local units LUl, LU2, LU3 ... LUN, the local units transfer their respective public keys PKl, PK2, PK3 ... PKN to the central unit CU, e.g. upon re- quest by the central unit CU, as illustrated by means of arrows from the respective local unit to the central unit CU in Fig. 1.
In accordance with the invention, upon receipt of the respective public keys PKl, PK2, PK3 ... PKN from the local units, the central unit CU calculates, for each local unit LUl, LU2. LU3 ... LUN, an individual functional value FV1, FV2, FV3 ... FVN from the master key MK and the respective public key PKl, PK2, PK3 ... PKN received from the respective local unit LUl, LU2, LU3 ... LUN.
According to the invention, the functional values are calculated by means of a func- tion H(x, y) of such a nature that, on the one hand, H(H(x, y), z) = H(H(x, z), y) and, on the other hand, it is computationally infeasible to calculate x with a knowledge of values of y and values of H(x, y).
Using the master key MK as the first argument in the above function, the functional values FV1, FV2, FV3 ... FVN calculated for the local units LUl, LU2, LU3 ... LUN in Fig. 1 will be H(MK, PKl), H(MK, PK2), H(MK, PK3) ... H(MK, PKN).
The central unit CU is adapted to transfer the respective individual functional value FV1, FV2, FV3 ... FVN to the respective local unit LUl, LU2, LU3 ... LUN as il- lustrated in Fig. 1 by means of arrows directed from the central unit CU to the respective local unit LUl, LU2, LU3 ... LUN.
The transfer of the functional values FV1, FV2, FV3 ... FVN to the local units LUl, LU2, LU3 ... LUN takes place in a secure manner, e.g. via secure links (not shown). Hereby, the preparations for enabling encrypted communication between any number of local units are terminated.
With reference to Fig. 2, an embodiment will be described in which it is supposed that the local unit LUl in Fig. 1 desires encrypted communications with the local units LU2 and LU3 in Fig. 1, and that also the communication between the local units LU2 and LU3 should be encrypted.
In accordance with the invention, each local unit that is to communicate encrypted with any other local unit has to exchange public keys with that other local unit.
In the embodiment in Fig. 2, as mentioned above, it is supposed that the encrypted communication is initiated by the local unit LUl.
Thus, the local unit LUl sends one message to the local unit LU2 and one message to the local unit LU3 informing them of its desire for an encrypted communication between the three local units, and requesting them to transfer their respective public keys PK2 and PK3.
Based on these messages, the local unit LU2 requests the local units LUl and LU3 to transfer their public keys PKl and PK3, respectively, and the local unit LU3 requests the local units LUl and LU2 to transfer their respective public keys PKl and PK2.
This is schematically illustrated in Fig. 2 by means of arrows in both directions between the local units LUl, LU2, LU3. In case the local units in question have been involved in a mutual encrypted communication earlier, the respective public keys can already be stored in the respective local unit and do not have to be transferred again.
In accordance with the invention, based on its own individual functional value FV1, FV2, FV3 received from the central unit CU, and the respective public key received from the other local units, each local unit LUl, LU2, LU3 calculates session keys by applying the above function H(x, y) in sequence.
Thus, the session key calculated by the local unit LUl will be H(H(FV1 , PK2),
PK3). Inserting FV1 as calculated above by the central unit CU, the session key calculated by the local unit LUl will be H(H(H(MK, PKl), PK2), PK3). The session key calculated by the local unit LU2 will be H(H(FV2, PKl), PK3) or H(H(H(MK, PK2), PKl), PK3) with FV2 inserted as above, and the session key calculated by the local unit LU3 will be H(H(FV3, PKl), PK2) or H(H(H(MK, PK3), PKl), PK2) with FV3 inserted as above.
As apparent, due to the symmetry of the function H(x, y), the session keys calculated by the respective local units are identical which is a prerequisite condition for an encrypted communication to be enabled between the local units in question according to the invention.
By means of the invention, it will be possible to establish encrypted communications in a simpler manner.

Claims

1. In a communication network comprising a central unit (CU) having a secret master key (MK), and a number of local units (LUl, LU2 ... LUN) each having its own public key (PKl , PK2 ... PKN), a method of enabling encrypted communication between local units (LUl, LU2 ... LUN), characterized in that,
• in advance of any communication between local units (LUl , LU2 ... LUN),
- each local unit (LUl, LU2 ... LUN) transfers its public key (PKl, PK2 ... PKN) to the central unit (CU), - the central unit (CU) calculates, for each local unit (LUl, LU2 ... LUN), an individual functional value (FVl, FV2 ... FVN) from the master key (MK) and the respective public key (PKl, PK2 ... PKN) transferred from the respective local unit (LUl, LU2 ... LUN), the functional values (FVl, FV2 ... FVN) being calculated by means of a function H(x, y) of such a nature that H(H(x, y), z) = H(H(x, z), y), and that it is computationally infeasible to calculate x with a knowledge of values of y and values of H(x, y), and
- the central unit transfers the respective individual functional value (FVl, FV2 ... FVN) in a secure manner to the respective local unit (LUl, LU2 ... LUN), and
• to enable communication between any number of the local units (LUl, LU2 ... LUN),
- each local unit (LUl, LU2, LU3) which is to participate in the communication, transfers its public key (PKl, PK2, PK3) to the other local units (LUl, LU2, LU3) that are to participate in the communication, and
- each local unit (LUl, LU2, LU3) calculates respective session keys from its own individual functional value (FVl, FV2, FV3) received from the central unit (CU), and the respective public key (PKl, PK2, PK3) received from the other local units (LUl, LU2, LU3) that are to participate in the communication by applying the function H(x, y) in sequence to the respective public key (PKl, PK2, PK3) received from the other local units (LUl, LU2, LU3), communication being enabled only between local units (LUl, LU2, LU3) having calculated identical session keys.
2. The method as claimed in claim 1, characterized in that the central unit (CU) requests each local unit (LUl, LU2 ... LUN) to transfer its public key (PKl, PK2 ... PKN) to the central unit (CU).
3. The method as claimed in claim 1, characterized in that the local units (LUl, LU2, LU3) store the public keys (PKl, PK2, PK3) transferred by the other local units (LUl, LU2, LU3).
4. In a communication network comprising a central unit (CU) having a secret master key (MK), and a number of local units (LUl, LU2 ... LUN) each having its own public key (PKl, PK2 ... PKN), an arrangement for enabling encrypted communication between local units (LUl, LU2 ... LUN), characterized in that,
• in advance of any communication between local units (LUl, LU2 ... LUN), - each local unit (LUl, LU2 ... LUN) is adapted to transfer its public key (PKl,
PK2 ... PKN) to the central unit (CU),
- the central unit (CU) is adapted to calculates, for each local unit (LUl, LU2 ... LUN), an individual functional value (FVl, FV2 ... FVN) from the master key (MK) and the respective public key (PKl, PK2 ... PKN) transferred from the re- spective local unit (LUl , LU2 ... LUN), the functional values (FVl , FV2 ... FVN) being calculated by means of a function H(x, y) of such a nature that H(H(x, y), z) = H(H(x, z), y), and that it is computationally infeasible to calculate x with a knowledge of values of y and values of H(x, y), and
- the central unit is adapted to transfer the respective individual functional value (FVl, FV2 ... FVN) in a secure manner to the respective local unit (LUl, LU2 ...
LUN), and
• to enable communication between any number of the local units (LUl, LU2 ... LUN), - each local unit (LUl, LU2, LU3) which is to participate in the communication, is adapted to transfer its public key (PKl, PK2, PK3) to the other local units (LUl, LU2, LU3) that are to participate in the communication, and
- each local unit (LUl, LU2, LU3) is adapted to calculate respective session keys from its own individual functional value (FVl, FV2, FV3) received from the central unit (CU), and the respective public key (PKl, PK2, PK3) received from the other local units (LUl, LU2, LU3) that are to participate in the communication by applying the function H(x, y) in sequence to the respective public key (PKl, PK2, PK3) received from the other local units (LUl, LU2, LU3), communication being enabled only between local units (LUl, LU2, LU3) having calculated identical session keys.
5. The arrangement as claimed in claim 4, characterized in that the central unit (CU) is adapted to request each local unit (LUl, LU2 ... LUN) to transfer its public key (PKl, PK2 ... PKN) to the central unit (CU).
6. The arrangement as claimed in claim 4, characterized in that the local units (LUl, LU2, LU3) are adapted to store the public keys (PKl, PK2, PK3) transferred by the other local units (LUl, LU2, LU3).
PCT/SE2000/000233 1999-02-12 2000-02-07 Method and arrangement for enabling encrypted communication WO2000048357A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU29538/00A AU2953800A (en) 1999-02-12 2000-02-07 Method and arrangement for enabling encrypted communication

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE9900472A SE9900472L (en) 1999-02-12 1999-02-12 Procedure and arrangement for enabling encrypted communication
SE9900472-3 1999-02-12

Publications (1)

Publication Number Publication Date
WO2000048357A1 true WO2000048357A1 (en) 2000-08-17

Family

ID=20414445

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2000/000233 WO2000048357A1 (en) 1999-02-12 2000-02-07 Method and arrangement for enabling encrypted communication

Country Status (3)

Country Link
AU (1) AU2953800A (en)
SE (1) SE9900472L (en)
WO (1) WO2000048357A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009047325A1 (en) * 2007-10-12 2009-04-16 Thales Device and method for directing exchange flows for public or non sensitive values for creating common secret keys between several areas
WO2009118606A2 (en) * 2008-03-25 2009-10-01 Ericsson Ab Efficient multiparty key exchange
US8630414B2 (en) 2002-06-20 2014-01-14 Qualcomm Incorporated Inter-working function for a communication system
CN109684860A (en) * 2018-12-29 2019-04-26 杭州宏杉科技股份有限公司 A kind of data ciphering method and device based on business relations
CN109711207A (en) * 2018-12-29 2019-05-03 杭州宏杉科技股份有限公司 A kind of data ciphering method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0739105A1 (en) * 1995-04-21 1996-10-23 Certicom Corp. Method for signature and session key generation
US5588061A (en) * 1994-07-20 1996-12-24 Bell Atlantic Network Services, Inc. System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
US5812669A (en) * 1995-07-19 1998-09-22 Jenkins; Lew Method and system for providing secure EDI over an open network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5588061A (en) * 1994-07-20 1996-12-24 Bell Atlantic Network Services, Inc. System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
EP0739105A1 (en) * 1995-04-21 1996-10-23 Certicom Corp. Method for signature and session key generation
US5812669A (en) * 1995-07-19 1998-09-22 Jenkins; Lew Method and system for providing secure EDI over an open network

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8630414B2 (en) 2002-06-20 2014-01-14 Qualcomm Incorporated Inter-working function for a communication system
WO2009047325A1 (en) * 2007-10-12 2009-04-16 Thales Device and method for directing exchange flows for public or non sensitive values for creating common secret keys between several areas
FR2922392A1 (en) * 2007-10-12 2009-04-17 Thales Sa DEVICE AND METHOD FOR HANDLING EXCHANGE FLOWS OF PUBLIC (OR NON-SENSITIVE) VALUES FOR CREATING SECRET KEYS COMMON BETWEEN SEVERAL ZONES.
WO2009118606A2 (en) * 2008-03-25 2009-10-01 Ericsson Ab Efficient multiparty key exchange
WO2009118606A3 (en) * 2008-03-25 2009-11-19 Ericsson Ab Efficient multiparty key exchange
CN109684860A (en) * 2018-12-29 2019-04-26 杭州宏杉科技股份有限公司 A kind of data ciphering method and device based on business relations
CN109711207A (en) * 2018-12-29 2019-05-03 杭州宏杉科技股份有限公司 A kind of data ciphering method and device
CN109684860B (en) * 2018-12-29 2020-08-14 杭州宏杉科技股份有限公司 Data encryption method and device based on business relation
CN109711207B (en) * 2018-12-29 2020-10-30 杭州宏杉科技股份有限公司 Data encryption method and device

Also Published As

Publication number Publication date
SE9900472D0 (en) 1999-02-12
SE9900472L (en) 2000-08-13
AU2953800A (en) 2000-08-29

Similar Documents

Publication Publication Date Title
CN106357649B (en) User identity authentication system and method
US7386726B2 (en) Personal certification authority device
CN110581763B (en) Quantum key service block chain network system
CN101631113B (en) Security access control method of wired LAN and system thereof
CN103918219B (en) Based on the method and apparatus of the electronic content distribution of privacy share
CN101483866B (en) WAPI terminal certificate managing method, apparatus and system
CN100563150C (en) A kind of distributed identity-card signature method
US20070214357A1 (en) System And Methods For Efficient Authentication Of Medical Wireless Ad Hoc Network Nodes
CN106411525A (en) Message authentication method and system
EP3813298B1 (en) Method and apparatus for establishing trusted channel between user and trusted computing cluster
CN102447679B (en) Method and system for ensuring safety of peer-to-peer (P2P) network data
CN108282327A (en) A kind of OPC UA secret key exchange methods based on chaos rsa encryption
CN113037499B (en) Block chain encryption communication method and system
CN108650028B (en) Multiple identity authentication system and method based on quantum communication network and true random number
CN108964897B (en) Identity authentication system and method based on group communication
CN100512312C (en) Ternary structural coordinate access control method
US20210105136A1 (en) Method for securing a data exchange in a distributed infrastructure
CN113162949A (en) Cross-domain identity authentication scheme of industrial Internet of things equipment based on block chain
CN100463462C (en) Coordinate access control system of ternary structure
Balachandran et al. CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks
CN108880799B (en) Multi-time identity authentication system and method based on group key pool
CN101562519B (en) Digital certificate management method of user packet communication network and user terminal for accessing into user packet communication network
WO2000048357A1 (en) Method and arrangement for enabling encrypted communication
CN101364866B (en) Entity secret talk establishing system based on multiple key distribution centers and method therefor
CN101431409B (en) Method for implementing secret communication in different wireless local area network

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase