WO2000052570A2 - Systeme principal integre en reseau client/serveur comprenant l'amorce a distance du systeme d'exploitation, le chargement d'un logiciel d'application et un logiciel de communication a commande centralisee - Google Patents

Systeme principal integre en reseau client/serveur comprenant l'amorce a distance du systeme d'exploitation, le chargement d'un logiciel d'application et un logiciel de communication a commande centralisee Download PDF

Info

Publication number
WO2000052570A2
WO2000052570A2 PCT/US2000/005674 US0005674W WO0052570A2 WO 2000052570 A2 WO2000052570 A2 WO 2000052570A2 US 0005674 W US0005674 W US 0005674W WO 0052570 A2 WO0052570 A2 WO 0052570A2
Authority
WO
WIPO (PCT)
Prior art keywords
embedded
motion
index
central server
embedded systems
Prior art date
Application number
PCT/US2000/005674
Other languages
English (en)
Other versions
WO2000052570A3 (fr
Inventor
Joseph Pang
Peter Teng
Original Assignee
Civon Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Civon Corporation filed Critical Civon Corporation
Priority to AU37226/00A priority Critical patent/AU3722600A/en
Publication of WO2000052570A2 publication Critical patent/WO2000052570A2/fr
Publication of WO2000052570A3 publication Critical patent/WO2000052570A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4416Network booting; Remote initial program loading [RIPL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Definitions

  • This application relates to a network of embedded systems that are controlled by a central server.
  • Optional encryption and motion detection in H.263 compressed video stream systems are also disclosed.
  • This application relates to motion detection in video surveillance equipment. More particularly, it relates to a more efficient method of motion detection in H.263 compressed video stream.
  • a traditional computer embedded system is a standalone computer system with its operating system and application software implemented in a PROM (Programmable- Read-Only-Memory).
  • Embedded systems are devices with small computerized controllers which work in the everyday world such as thermostats, video surveillance cameras, automotive self diagnostics, robotic control for automated manufacturing, traffic lights and other household, industrial and other applications.
  • To change or update the function or behavior of the embedded system requires its PROM be replaced with a new one manually.
  • Standalone embedded systems are not easily controlled by a central server, and generally provide little or no flexibility and scalability of the system without complete replacement.
  • the new networked embedded system has several benefits.
  • the first benefit is financial savings.
  • Each embedded system boots its Operating System (OS) into its RAM (Random- Access-Memory) from the central server instead of running from its PROM. It's application software is also pushed from the central server into the RAM after the OS is booted. There is a great cost saving because a RAM device is much lower in cost than the corresponding PROM device.
  • OS Operating System
  • RAM Random- Access-Memory
  • the networked embedded system is also easy to use. Both the OS and application software are transferred from the central server when the embedded system is powered up. There is no need to manually change the PROM. Function modification and updating can be easily managed from the central server, thereby alleviating the need to update each embedded system manually.
  • the networked embedded system is flexible to allow the user to utilize a wide variety of options. For example, a RAM device's larger capacity makes the selection of OS more flexible and application software easier to implement. A traditional standalone embedded system requires a small footprint of the OS, so the choices of OS are very limited. With the new design, a larger size OS such as Linux or Windows can be used.
  • the networked embedded system is scalable. Traditional standalone embedded systems are severely limited by their PROM size.
  • the application software pushing in the new design requires only a larger size of RAM so it is much easier to implement more complicated application software.
  • the networked embedded system is reliable. Diskless OS remote booting and software pushing do not require any mechanical parts on the embedded system. It is as reliable as the traditional standalone embedded system.
  • the networked embedded system is easily managed by the user. In addition to transferring OS and application software from the central server to the embedded systems, a central control communication software layer is provided to make a large number of embedded systems possible and more manageable.
  • the present invention takes the form of a networked embedded backbone system that integrates three techniques to make the system better than traditional standalone EPROM-based embedded systems.
  • the first technique is remote booting of the operating system onto the embedded systems from a central server. Once the operating system is booted, the application software for the embedded systems may then be pushed from a central server.
  • a generic central control communication software layer is provided for application software on each embedded system to communicate with the central server or other embedded modules on the network.
  • Figure 1 shows the components of the present invention used a digital video surveillance system.
  • Figure 2 shows an overview of the full system.
  • the first technique is remote booting of operating system onto the embedded systems from a central server.
  • a small footprint of the boot ROM is programmed and installed on the embedded system motherboard or Network Interface Card (NIC).
  • This small boot ROM program will use the BOOTP and TFTP (Trivial File Transfer Protocol) protocols to locate a boot server or central server on the network and request the loading of the boot image file from that server.
  • BOOTP and TFTP Trivial File Transfer Protocol
  • the boot server transfers a designed boot image file based on each requester's unique MAC (Media Access Control) address on the network interface card. After the boot image file is transferred onto the embedded system and executed, the final footprint of the targeted OS is then transferred and executed from the boot server to the embedded system.
  • MAC Media Access Control
  • a different OS can be booted to different embedded systems based on requester's MAC address. This process is different for different types of OS and can go through a number of phases before the fully functional OS is booted onto the embedded system.
  • the application software on the embedded systems may then be pushed from a central server. Since different OS image files can be booted to the embedded systems depending on requester's unique MAC address, the image of the targeted OS can be setup with a special initialization process so during its execution phase, a different pre-packaged application software can be loaded.
  • An embedded system usually handles some unique devices on that system; specially packaged application software for that system can be loaded and run after the OS is booted.
  • a generic central control communication software layer is provided in the packaged application software for application software on each embedded system to communicate with the central server or other embedded modules on the network. It provides communication and control mechanisms among the central server application software and the embedded system application software, and thereby provides several services.
  • the first service is advertisement, which allows an individual embedded system to advertise its existence after its power-up.
  • a method of periodical multicast of data gram packets is used to allow each embedded system to advertise its existence and search for a central controlling device.
  • a capability information exchange service allows the central server to know the capability information of every embedded system on the network.
  • a RPC (Remote Procedure Call) service allows the central server to communicate and control every individual embedded system on the network. It also allows each embedded system to communicate and control other embedded systems on the network.
  • FIG. 1 shows the components of the present invention used as a digital video surveillance system 10.
  • Figure 2 shows an overview of the full system.
  • the V-Hubs 12, recorders 14 and displays 16 are "Networked Embedded Systems".
  • the server 18 is the central server, which, in this case, serves as the remote-boot server as well as the central controller. Hundreds of cameras 20 may be connected to the V-Hub 12, devices that in turn are connected to the Ethernet network 22.
  • the Linux OS and the V-Hub application are remote booted from the central server 18 and the V-Hub application will capture each camera's video streams and multicast them onto the network 22.
  • the V-Hub 12 embedded system has a communication/ control software layer implemented so that it will report its existence to the central controller 18 and accept capturing commands from the central controller 18 for execution.
  • the Linux OS and the recorder application are remote-booted from the central server 18 and the recorder application will record video streams according to the pre-programmed schedule.
  • the recorder 14 embedded system has a communication/ control software layer implemented so that it will report its existence to the central controller 18 and accept recording schedule or commands from the central controller 18 for execution.
  • the Linux OS and the display application are remote-booted from the central server 18 and the display application will display any pre-programmed video streams.
  • the display embedded system has a communication/ control software layer implemented so that it will report its existence to the central controller 18and accept displaying schedule or commands from the central controller 18 for execution.
  • the whole "Networked Embedded System” forms a complete digital video surveillance system 10.
  • an encryption system may be utilized to secure the transmission.
  • An example of such an encyption system relies on the correct delivery of a secret key triple to all recipients.
  • a centralized key distribution server is suitable for this purpose. Secure transfer of the key triple can be accomplished by any one of the standard mechanisms as described by Steiner et al. (J. G. Steiner, B. Clifford Neuman, and J. I.
  • the key triple is determined by the multimedia data source and registered in a secure way to the key server. At any time, the key triple can be updated by the data source. A recipient can request the key triple from the server at any time and use the key triple to decode any multimedia data messages. The key triple is therefore time-variant.
  • the present method also relies on a pseudo random number generator (e.g. see
  • the relative positional index of G n (k) with respect to k is n.
  • the key triple is defined by (a,b,p) where a is the fixed index key, b is a random number within the pseudo random number sequence, and p is the relative index of b with respect to the initial random number.
  • the initial selection of the triple is done at the data source, a is chosen according to the selected strong cipher mechanism (e.g., see Minde) and kept fixed throughout the session, b can be generated randomly as long as it belongs to the pseudo random sequence defined by G( ⁇ ).
  • the initial value for p is zero.
  • the multicast multimedia data is grouped into variable length messages, each encrypted by a variable key.
  • XOR(v,u) the encryption of a message (i.e., a byte sequence) ⁇ using a key u is done by laying out the bytes of u periodically into an infinite sequence of bytes and applying it against v using the XOR operation. Decryption is done easily by the same operation.
  • Each message is preceded by an encrypted index.
  • the index must be encrypted by a strong cipher mechanism such as that described in Minde.
  • the multicast source encrypts the message by first selecting an initial random number and setting the initial index to zero. Then an incremental index D is selected randomly from the integer set [0J,...MaxIndex] according to a uniform distribution. The previous random number is passed through G( ⁇ ) for D number of times to yield the current random number. This current random number will be the key used to encode the current message.
  • the absolute index that is, the accumulation of all the incremental indices, will be encrypted using the strong cipher Z( ⁇ ). For transmission, the encrypted index and the encrypted message is concatenated and transmitted.
  • the absolute index is first decrypted using the inverse of Z(VJ, and then the random number used to encrypt the message is calculated. This calculation can be done quickly from the last known index and random key pair. This applies even when there is message loss.
  • the receiver can compute the current random key by passing the initial random key through G( ⁇ ) according to the absolute index.
  • the absolute index can be very large and require a lot of computations. To reduce this computation, it is recommended that the multicast source update the current index and random key pair on the key distribution server periodically. Thus, receivers that have lost the encryption key can always obtain the last registered key triple from the server and limit the computations needed to obtain the current key.
  • a motion detection system may be utilized to determine whether an alarm, a recording or other action is necessary.
  • An example of a motion detection system used for H.263 bitstream syntax is based on the Discrete Cosine Transform (DCT) compression with motion estimation and prediction.
  • DCT Discrete Cosine Transform
  • Pictures are partitioned into a number of macro-blocks (MB). Some pictures are encoded in the INTRA mode but the majority in INTER mode. In INTRA mode, a picture is encoded without prediction and motion estimation. This serves as an anchor for decoding subsequent INTER coded frames.
  • INTER coded pictures motion estimation and prediction are used. For motion estimation, each MB is compared against the previous picture within a search range centered around the current MB to find the best match.
  • the difference between the current MB and the best match is computed. This difference is transformed into the frequency domain using DCT.
  • the spectral components of the DCT output are quantized and encoded using Huffman or Arithmetic encoding.
  • the resulting bits from each MB compression are packed and wrapped with header information to form the data stream of one compressed picture. Multiple compressed picture streams are concatenated to form a typical H.263 encoded bit stream.
  • the method utilizes the H.263 bitstream syntax as described in "Video Coding for Low Bitrate Communication.” For an INTRA coded picture, no motion detection is performed. For an INTER coded picture, the bit stream is parsed to obtain the following values:
  • M number of INTER coded MB with non-zero motion vector
  • M' number of INTER coded MB with zero motion vector
  • a declaration of non-motion is given because there are not enough representation of motion estimated MBs.
  • a is preferably a small positive number. The smaller the number, the lower the tolerance for motion.
  • M/(M+M'+K) > b then a declaration of motion is given because there is sufficient non-zero motion vectors to indicate motion, b should be a fairly small positive number.
  • the second criterion is not met, then the average bits used to encode a macro-block in this picture is computed, and if this value exceeds 1+g, then a declaration of motion is given.
  • the last criterion is designed to cope with encoders that are not very good at motion estimation. For these encoders, it is possible to have many MB coded with zero Motion Vector, but the total number of bits used to encode each MB must be correspondingly high if there is indeed motion, g can be any positive value.
  • the uniqueness of the Networked Client/ Server Embedded Backbone System is a combination of its networking feature, operating system remote booting feature, application software pushing feature, central control and communication software feature, central manageability, flexibility, ease of use and scalability.
  • the networked embedded Backbone System is different from other embedded system by its integration of three methods: remote booting of a highly sophisticated operating system from a central server instead of utilizing an EPROM-based f unction- limited OS, application software for the embedded system is pushed from a central server onto the RAM device of this system instead of being programmed on an EPROM device and a common layer of communication and control software is provide on each networked embedded system allowing inter-module controls from the central server to each individual embedded system.
  • the examples given include many specificities, they are intended as illustrative of only a few possible embodiments of the invention. Other embodiments and modifications will, no doubt, occur to those skilled in the art. Thus, the examples given should only be interpreted as illustrations of some of the preferred embodiments of the invention, and the full scope of the invention should be determined by the appended claims and their legal equivalents.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention concerne un système principal intégré en réseau comprenant trois techniques pour optimiser le système par rapport aux systèmes intégrés autonomes classiques fonctionnant avec une mémoire EPROM. La première technique consistant à télécharger l'amorce du système d'exploitation sur des systèmes intégrés depuis un serveur central. Une fois le système d'exploitation amorcé, le logiciel d'application peut être chargé sur les systèmes intégrés depuis un serveur central. L'invention concerne une couche générique d'un logiciel de communication à commande centralisée destinée au logiciel d'application placé dans chaque système intégré afin de communiquer avec le serveur central ou les autres modules intégrés qui se trouvent sur le réseau.
PCT/US2000/005674 1999-03-03 2000-03-02 Systeme principal integre en reseau client/serveur comprenant l'amorce a distance du systeme d'exploitation, le chargement d'un logiciel d'application et un logiciel de communication a commande centralisee WO2000052570A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU37226/00A AU3722600A (en) 1999-03-03 2000-03-02 A networked client/server embedded backbone system integrating operating system remote-booting, application software pushing, and central control communication software

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US12259499P 1999-03-03 1999-03-03
US12259599P 1999-03-03 1999-03-03
US12259199P 1999-03-03 1999-03-03
US60/122,591 1999-03-03
US60/122,594 1999-03-03
US60/122,595 1999-03-03

Publications (2)

Publication Number Publication Date
WO2000052570A2 true WO2000052570A2 (fr) 2000-09-08
WO2000052570A3 WO2000052570A3 (fr) 2001-01-18

Family

ID=27382827

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/005674 WO2000052570A2 (fr) 1999-03-03 2000-03-02 Systeme principal integre en reseau client/serveur comprenant l'amorce a distance du systeme d'exploitation, le chargement d'un logiciel d'application et un logiciel de communication a commande centralisee

Country Status (2)

Country Link
AU (1) AU3722600A (fr)
WO (1) WO2000052570A2 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2397146A (en) * 2003-01-07 2004-07-14 Sun Microsystems Inc Updating boot code using a system controller
EP1640858A1 (fr) * 2004-09-28 2006-03-29 Aruze Corp. Terminal de réseau, serveur de distribution et système client-serveur pour fournir des données de système d'exploitation et des données d'application
FR2913122A1 (fr) * 2007-02-22 2008-08-29 Airbus France Sa Systeme d'information embarque a restauration automatique
US9582262B2 (en) 2014-06-16 2017-02-28 Wipro Limited Systems and methods for installing upgraded software on electronic devices

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5666293A (en) * 1994-05-27 1997-09-09 Bell Atlantic Network Services, Inc. Downloading operating system software through a broadcast channel
US6049830A (en) * 1997-05-13 2000-04-11 Sony Corporation Peripheral software download of a broadcast receiver
US6058434A (en) * 1997-11-26 2000-05-02 Acuity Imaging, Llc Apparent network interface for and between embedded and host processors
US6094679A (en) * 1998-01-16 2000-07-25 Microsoft Corporation Distribution of software in a computer network environment
US6112235A (en) * 1995-06-07 2000-08-29 Spofford; Jason J. Method and apparatus for remotely managing a network hardware device having an embedded server with a client computer across a network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5666293A (en) * 1994-05-27 1997-09-09 Bell Atlantic Network Services, Inc. Downloading operating system software through a broadcast channel
US6112235A (en) * 1995-06-07 2000-08-29 Spofford; Jason J. Method and apparatus for remotely managing a network hardware device having an embedded server with a client computer across a network
US6049830A (en) * 1997-05-13 2000-04-11 Sony Corporation Peripheral software download of a broadcast receiver
US6058434A (en) * 1997-11-26 2000-05-02 Acuity Imaging, Llc Apparent network interface for and between embedded and host processors
US6094679A (en) * 1998-01-16 2000-07-25 Microsoft Corporation Distribution of software in a computer network environment

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2397146A (en) * 2003-01-07 2004-07-14 Sun Microsystems Inc Updating boot code using a system controller
GB2397146B (en) * 2003-01-07 2005-03-30 Sun Microsystems Inc Method and apparatus for updating boot code using a system controller
US7024551B2 (en) 2003-01-07 2006-04-04 Sun Microsystems, Inc. Method and apparatus for updating boot code using a system controller
EP1640858A1 (fr) * 2004-09-28 2006-03-29 Aruze Corp. Terminal de réseau, serveur de distribution et système client-serveur pour fournir des données de système d'exploitation et des données d'application
US7634646B2 (en) 2004-09-28 2009-12-15 Aruze Corporation Network terminal device, delivery server and client/server system
FR2913122A1 (fr) * 2007-02-22 2008-08-29 Airbus France Sa Systeme d'information embarque a restauration automatique
US8549270B2 (en) 2007-02-22 2013-10-01 Airbus Operations Sas Self-restoring on-board information system
US9582262B2 (en) 2014-06-16 2017-02-28 Wipro Limited Systems and methods for installing upgraded software on electronic devices

Also Published As

Publication number Publication date
AU3722600A (en) 2000-09-21
WO2000052570A3 (fr) 2001-01-18

Similar Documents

Publication Publication Date Title
KR101760092B1 (ko) 하드웨어 보안모듈을 이용한 cctv 보안강화 장치 및 그 방법
KR101760095B1 (ko) 암호키 기반의 하드웨어 보안모듈을 이용한 cctv 보안 감시 장치 및 그 방법
JP4987965B2 (ja) メディアデータの分散記憶
US6185737B1 (en) Method and apparatus for providing multi media network interface
JP4188958B2 (ja) 暗号化方法及びデータ配信システム及び暗号化装置及びデータ蓄積配信装置
KR100734577B1 (ko) 암호화방법, 암호화장치, 데이터축적 전송장치 및 데이터 전송시스템
TWI285854B (en) System for encoding video data and system for decoding video data
JP4907518B2 (ja) トランスコード可能暗号化コンテンツを生成するための方法及びシステム
CN101163228B (zh) 网络视频监控的视频数据加密的系统和方法
US20090254960A1 (en) Method for a clustered centralized streaming system
US20020129243A1 (en) System for selective encryption of data packets
KR101964229B1 (ko) 감시 서버, 감시 서버의 데이터 처리 방법, 및 감시 시스템
KR20050021468A (ko) 안전한 데이터 전송 프로세스 및 전자 모듈
AU2009265724A1 (en) Methods and apparatuses for selective data encryption
CN106254382B (zh) 媒体数据的处理方法及装置
JP2009303211A (ja) スライスベースの優先度付きセキュアビデオストリーミング
EP2090102A1 (fr) Procédé et dispositif pour gérer une transmission de clés
Van Droogenbroeck Partial encryption of images for real-time applications
KR101738334B1 (ko) 클라우드 컴퓨팅 환경을 이용한 cctv 보안 감시 장치 및 그 방법
KR101687115B1 (ko) 통신 시스템의 암호화 패킷 전송 방법
CN1578457B (zh) 个人视频加密系统和方法
KR101815467B1 (ko) 보안 에이전트를 이용한 보안 감시 강화 시스템
WO2000052570A2 (fr) Systeme principal integre en reseau client/serveur comprenant l'amorce a distance du systeme d'exploitation, le chargement d'un logiciel d'application et un logiciel de communication a commande centralisee
JP4499631B2 (ja) 画像受信装置及びプログラム
KR102423036B1 (ko) Kcmvp가 적용된 카메라 보안 감시 시스템 및 그 방법

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase