WO2000052570A2 - Systeme principal integre en reseau client/serveur comprenant l'amorce a distance du systeme d'exploitation, le chargement d'un logiciel d'application et un logiciel de communication a commande centralisee - Google Patents
Systeme principal integre en reseau client/serveur comprenant l'amorce a distance du systeme d'exploitation, le chargement d'un logiciel d'application et un logiciel de communication a commande centralisee Download PDFInfo
- Publication number
- WO2000052570A2 WO2000052570A2 PCT/US2000/005674 US0005674W WO0052570A2 WO 2000052570 A2 WO2000052570 A2 WO 2000052570A2 US 0005674 W US0005674 W US 0005674W WO 0052570 A2 WO0052570 A2 WO 0052570A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- embedded
- motion
- index
- central server
- embedded systems
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4416—Network booting; Remote initial program loading [RIPL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Definitions
- This application relates to a network of embedded systems that are controlled by a central server.
- Optional encryption and motion detection in H.263 compressed video stream systems are also disclosed.
- This application relates to motion detection in video surveillance equipment. More particularly, it relates to a more efficient method of motion detection in H.263 compressed video stream.
- a traditional computer embedded system is a standalone computer system with its operating system and application software implemented in a PROM (Programmable- Read-Only-Memory).
- Embedded systems are devices with small computerized controllers which work in the everyday world such as thermostats, video surveillance cameras, automotive self diagnostics, robotic control for automated manufacturing, traffic lights and other household, industrial and other applications.
- To change or update the function or behavior of the embedded system requires its PROM be replaced with a new one manually.
- Standalone embedded systems are not easily controlled by a central server, and generally provide little or no flexibility and scalability of the system without complete replacement.
- the new networked embedded system has several benefits.
- the first benefit is financial savings.
- Each embedded system boots its Operating System (OS) into its RAM (Random- Access-Memory) from the central server instead of running from its PROM. It's application software is also pushed from the central server into the RAM after the OS is booted. There is a great cost saving because a RAM device is much lower in cost than the corresponding PROM device.
- OS Operating System
- RAM Random- Access-Memory
- the networked embedded system is also easy to use. Both the OS and application software are transferred from the central server when the embedded system is powered up. There is no need to manually change the PROM. Function modification and updating can be easily managed from the central server, thereby alleviating the need to update each embedded system manually.
- the networked embedded system is flexible to allow the user to utilize a wide variety of options. For example, a RAM device's larger capacity makes the selection of OS more flexible and application software easier to implement. A traditional standalone embedded system requires a small footprint of the OS, so the choices of OS are very limited. With the new design, a larger size OS such as Linux or Windows can be used.
- the networked embedded system is scalable. Traditional standalone embedded systems are severely limited by their PROM size.
- the application software pushing in the new design requires only a larger size of RAM so it is much easier to implement more complicated application software.
- the networked embedded system is reliable. Diskless OS remote booting and software pushing do not require any mechanical parts on the embedded system. It is as reliable as the traditional standalone embedded system.
- the networked embedded system is easily managed by the user. In addition to transferring OS and application software from the central server to the embedded systems, a central control communication software layer is provided to make a large number of embedded systems possible and more manageable.
- the present invention takes the form of a networked embedded backbone system that integrates three techniques to make the system better than traditional standalone EPROM-based embedded systems.
- the first technique is remote booting of the operating system onto the embedded systems from a central server. Once the operating system is booted, the application software for the embedded systems may then be pushed from a central server.
- a generic central control communication software layer is provided for application software on each embedded system to communicate with the central server or other embedded modules on the network.
- Figure 1 shows the components of the present invention used a digital video surveillance system.
- Figure 2 shows an overview of the full system.
- the first technique is remote booting of operating system onto the embedded systems from a central server.
- a small footprint of the boot ROM is programmed and installed on the embedded system motherboard or Network Interface Card (NIC).
- This small boot ROM program will use the BOOTP and TFTP (Trivial File Transfer Protocol) protocols to locate a boot server or central server on the network and request the loading of the boot image file from that server.
- BOOTP and TFTP Trivial File Transfer Protocol
- the boot server transfers a designed boot image file based on each requester's unique MAC (Media Access Control) address on the network interface card. After the boot image file is transferred onto the embedded system and executed, the final footprint of the targeted OS is then transferred and executed from the boot server to the embedded system.
- MAC Media Access Control
- a different OS can be booted to different embedded systems based on requester's MAC address. This process is different for different types of OS and can go through a number of phases before the fully functional OS is booted onto the embedded system.
- the application software on the embedded systems may then be pushed from a central server. Since different OS image files can be booted to the embedded systems depending on requester's unique MAC address, the image of the targeted OS can be setup with a special initialization process so during its execution phase, a different pre-packaged application software can be loaded.
- An embedded system usually handles some unique devices on that system; specially packaged application software for that system can be loaded and run after the OS is booted.
- a generic central control communication software layer is provided in the packaged application software for application software on each embedded system to communicate with the central server or other embedded modules on the network. It provides communication and control mechanisms among the central server application software and the embedded system application software, and thereby provides several services.
- the first service is advertisement, which allows an individual embedded system to advertise its existence after its power-up.
- a method of periodical multicast of data gram packets is used to allow each embedded system to advertise its existence and search for a central controlling device.
- a capability information exchange service allows the central server to know the capability information of every embedded system on the network.
- a RPC (Remote Procedure Call) service allows the central server to communicate and control every individual embedded system on the network. It also allows each embedded system to communicate and control other embedded systems on the network.
- FIG. 1 shows the components of the present invention used as a digital video surveillance system 10.
- Figure 2 shows an overview of the full system.
- the V-Hubs 12, recorders 14 and displays 16 are "Networked Embedded Systems".
- the server 18 is the central server, which, in this case, serves as the remote-boot server as well as the central controller. Hundreds of cameras 20 may be connected to the V-Hub 12, devices that in turn are connected to the Ethernet network 22.
- the Linux OS and the V-Hub application are remote booted from the central server 18 and the V-Hub application will capture each camera's video streams and multicast them onto the network 22.
- the V-Hub 12 embedded system has a communication/ control software layer implemented so that it will report its existence to the central controller 18 and accept capturing commands from the central controller 18 for execution.
- the Linux OS and the recorder application are remote-booted from the central server 18 and the recorder application will record video streams according to the pre-programmed schedule.
- the recorder 14 embedded system has a communication/ control software layer implemented so that it will report its existence to the central controller 18 and accept recording schedule or commands from the central controller 18 for execution.
- the Linux OS and the display application are remote-booted from the central server 18 and the display application will display any pre-programmed video streams.
- the display embedded system has a communication/ control software layer implemented so that it will report its existence to the central controller 18and accept displaying schedule or commands from the central controller 18 for execution.
- the whole "Networked Embedded System” forms a complete digital video surveillance system 10.
- an encryption system may be utilized to secure the transmission.
- An example of such an encyption system relies on the correct delivery of a secret key triple to all recipients.
- a centralized key distribution server is suitable for this purpose. Secure transfer of the key triple can be accomplished by any one of the standard mechanisms as described by Steiner et al. (J. G. Steiner, B. Clifford Neuman, and J. I.
- the key triple is determined by the multimedia data source and registered in a secure way to the key server. At any time, the key triple can be updated by the data source. A recipient can request the key triple from the server at any time and use the key triple to decode any multimedia data messages. The key triple is therefore time-variant.
- the present method also relies on a pseudo random number generator (e.g. see
- the relative positional index of G n (k) with respect to k is n.
- the key triple is defined by (a,b,p) where a is the fixed index key, b is a random number within the pseudo random number sequence, and p is the relative index of b with respect to the initial random number.
- the initial selection of the triple is done at the data source, a is chosen according to the selected strong cipher mechanism (e.g., see Minde) and kept fixed throughout the session, b can be generated randomly as long as it belongs to the pseudo random sequence defined by G( ⁇ ).
- the initial value for p is zero.
- the multicast multimedia data is grouped into variable length messages, each encrypted by a variable key.
- XOR(v,u) the encryption of a message (i.e., a byte sequence) ⁇ using a key u is done by laying out the bytes of u periodically into an infinite sequence of bytes and applying it against v using the XOR operation. Decryption is done easily by the same operation.
- Each message is preceded by an encrypted index.
- the index must be encrypted by a strong cipher mechanism such as that described in Minde.
- the multicast source encrypts the message by first selecting an initial random number and setting the initial index to zero. Then an incremental index D is selected randomly from the integer set [0J,...MaxIndex] according to a uniform distribution. The previous random number is passed through G( ⁇ ) for D number of times to yield the current random number. This current random number will be the key used to encode the current message.
- the absolute index that is, the accumulation of all the incremental indices, will be encrypted using the strong cipher Z( ⁇ ). For transmission, the encrypted index and the encrypted message is concatenated and transmitted.
- the absolute index is first decrypted using the inverse of Z(VJ, and then the random number used to encrypt the message is calculated. This calculation can be done quickly from the last known index and random key pair. This applies even when there is message loss.
- the receiver can compute the current random key by passing the initial random key through G( ⁇ ) according to the absolute index.
- the absolute index can be very large and require a lot of computations. To reduce this computation, it is recommended that the multicast source update the current index and random key pair on the key distribution server periodically. Thus, receivers that have lost the encryption key can always obtain the last registered key triple from the server and limit the computations needed to obtain the current key.
- a motion detection system may be utilized to determine whether an alarm, a recording or other action is necessary.
- An example of a motion detection system used for H.263 bitstream syntax is based on the Discrete Cosine Transform (DCT) compression with motion estimation and prediction.
- DCT Discrete Cosine Transform
- Pictures are partitioned into a number of macro-blocks (MB). Some pictures are encoded in the INTRA mode but the majority in INTER mode. In INTRA mode, a picture is encoded without prediction and motion estimation. This serves as an anchor for decoding subsequent INTER coded frames.
- INTER coded pictures motion estimation and prediction are used. For motion estimation, each MB is compared against the previous picture within a search range centered around the current MB to find the best match.
- the difference between the current MB and the best match is computed. This difference is transformed into the frequency domain using DCT.
- the spectral components of the DCT output are quantized and encoded using Huffman or Arithmetic encoding.
- the resulting bits from each MB compression are packed and wrapped with header information to form the data stream of one compressed picture. Multiple compressed picture streams are concatenated to form a typical H.263 encoded bit stream.
- the method utilizes the H.263 bitstream syntax as described in "Video Coding for Low Bitrate Communication.” For an INTRA coded picture, no motion detection is performed. For an INTER coded picture, the bit stream is parsed to obtain the following values:
- M number of INTER coded MB with non-zero motion vector
- M' number of INTER coded MB with zero motion vector
- a declaration of non-motion is given because there are not enough representation of motion estimated MBs.
- a is preferably a small positive number. The smaller the number, the lower the tolerance for motion.
- M/(M+M'+K) > b then a declaration of motion is given because there is sufficient non-zero motion vectors to indicate motion, b should be a fairly small positive number.
- the second criterion is not met, then the average bits used to encode a macro-block in this picture is computed, and if this value exceeds 1+g, then a declaration of motion is given.
- the last criterion is designed to cope with encoders that are not very good at motion estimation. For these encoders, it is possible to have many MB coded with zero Motion Vector, but the total number of bits used to encode each MB must be correspondingly high if there is indeed motion, g can be any positive value.
- the uniqueness of the Networked Client/ Server Embedded Backbone System is a combination of its networking feature, operating system remote booting feature, application software pushing feature, central control and communication software feature, central manageability, flexibility, ease of use and scalability.
- the networked embedded Backbone System is different from other embedded system by its integration of three methods: remote booting of a highly sophisticated operating system from a central server instead of utilizing an EPROM-based f unction- limited OS, application software for the embedded system is pushed from a central server onto the RAM device of this system instead of being programmed on an EPROM device and a common layer of communication and control software is provide on each networked embedded system allowing inter-module controls from the central server to each individual embedded system.
- the examples given include many specificities, they are intended as illustrative of only a few possible embodiments of the invention. Other embodiments and modifications will, no doubt, occur to those skilled in the art. Thus, the examples given should only be interpreted as illustrations of some of the preferred embodiments of the invention, and the full scope of the invention should be determined by the appended claims and their legal equivalents.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU37226/00A AU3722600A (en) | 1999-03-03 | 2000-03-02 | A networked client/server embedded backbone system integrating operating system remote-booting, application software pushing, and central control communication software |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12259499P | 1999-03-03 | 1999-03-03 | |
US12259599P | 1999-03-03 | 1999-03-03 | |
US12259199P | 1999-03-03 | 1999-03-03 | |
US60/122,591 | 1999-03-03 | ||
US60/122,594 | 1999-03-03 | ||
US60/122,595 | 1999-03-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2000052570A2 true WO2000052570A2 (fr) | 2000-09-08 |
WO2000052570A3 WO2000052570A3 (fr) | 2001-01-18 |
Family
ID=27382827
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/005674 WO2000052570A2 (fr) | 1999-03-03 | 2000-03-02 | Systeme principal integre en reseau client/serveur comprenant l'amorce a distance du systeme d'exploitation, le chargement d'un logiciel d'application et un logiciel de communication a commande centralisee |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU3722600A (fr) |
WO (1) | WO2000052570A2 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2397146A (en) * | 2003-01-07 | 2004-07-14 | Sun Microsystems Inc | Updating boot code using a system controller |
EP1640858A1 (fr) * | 2004-09-28 | 2006-03-29 | Aruze Corp. | Terminal de réseau, serveur de distribution et système client-serveur pour fournir des données de système d'exploitation et des données d'application |
FR2913122A1 (fr) * | 2007-02-22 | 2008-08-29 | Airbus France Sa | Systeme d'information embarque a restauration automatique |
US9582262B2 (en) | 2014-06-16 | 2017-02-28 | Wipro Limited | Systems and methods for installing upgraded software on electronic devices |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5666293A (en) * | 1994-05-27 | 1997-09-09 | Bell Atlantic Network Services, Inc. | Downloading operating system software through a broadcast channel |
US6049830A (en) * | 1997-05-13 | 2000-04-11 | Sony Corporation | Peripheral software download of a broadcast receiver |
US6058434A (en) * | 1997-11-26 | 2000-05-02 | Acuity Imaging, Llc | Apparent network interface for and between embedded and host processors |
US6094679A (en) * | 1998-01-16 | 2000-07-25 | Microsoft Corporation | Distribution of software in a computer network environment |
US6112235A (en) * | 1995-06-07 | 2000-08-29 | Spofford; Jason J. | Method and apparatus for remotely managing a network hardware device having an embedded server with a client computer across a network |
-
2000
- 2000-03-02 AU AU37226/00A patent/AU3722600A/en not_active Abandoned
- 2000-03-02 WO PCT/US2000/005674 patent/WO2000052570A2/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5666293A (en) * | 1994-05-27 | 1997-09-09 | Bell Atlantic Network Services, Inc. | Downloading operating system software through a broadcast channel |
US6112235A (en) * | 1995-06-07 | 2000-08-29 | Spofford; Jason J. | Method and apparatus for remotely managing a network hardware device having an embedded server with a client computer across a network |
US6049830A (en) * | 1997-05-13 | 2000-04-11 | Sony Corporation | Peripheral software download of a broadcast receiver |
US6058434A (en) * | 1997-11-26 | 2000-05-02 | Acuity Imaging, Llc | Apparent network interface for and between embedded and host processors |
US6094679A (en) * | 1998-01-16 | 2000-07-25 | Microsoft Corporation | Distribution of software in a computer network environment |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2397146A (en) * | 2003-01-07 | 2004-07-14 | Sun Microsystems Inc | Updating boot code using a system controller |
GB2397146B (en) * | 2003-01-07 | 2005-03-30 | Sun Microsystems Inc | Method and apparatus for updating boot code using a system controller |
US7024551B2 (en) | 2003-01-07 | 2006-04-04 | Sun Microsystems, Inc. | Method and apparatus for updating boot code using a system controller |
EP1640858A1 (fr) * | 2004-09-28 | 2006-03-29 | Aruze Corp. | Terminal de réseau, serveur de distribution et système client-serveur pour fournir des données de système d'exploitation et des données d'application |
US7634646B2 (en) | 2004-09-28 | 2009-12-15 | Aruze Corporation | Network terminal device, delivery server and client/server system |
FR2913122A1 (fr) * | 2007-02-22 | 2008-08-29 | Airbus France Sa | Systeme d'information embarque a restauration automatique |
US8549270B2 (en) | 2007-02-22 | 2013-10-01 | Airbus Operations Sas | Self-restoring on-board information system |
US9582262B2 (en) | 2014-06-16 | 2017-02-28 | Wipro Limited | Systems and methods for installing upgraded software on electronic devices |
Also Published As
Publication number | Publication date |
---|---|
AU3722600A (en) | 2000-09-21 |
WO2000052570A3 (fr) | 2001-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101760092B1 (ko) | 하드웨어 보안모듈을 이용한 cctv 보안강화 장치 및 그 방법 | |
KR101760095B1 (ko) | 암호키 기반의 하드웨어 보안모듈을 이용한 cctv 보안 감시 장치 및 그 방법 | |
JP4987965B2 (ja) | メディアデータの分散記憶 | |
US6185737B1 (en) | Method and apparatus for providing multi media network interface | |
JP4188958B2 (ja) | 暗号化方法及びデータ配信システム及び暗号化装置及びデータ蓄積配信装置 | |
KR100734577B1 (ko) | 암호화방법, 암호화장치, 데이터축적 전송장치 및 데이터 전송시스템 | |
TWI285854B (en) | System for encoding video data and system for decoding video data | |
JP4907518B2 (ja) | トランスコード可能暗号化コンテンツを生成するための方法及びシステム | |
CN101163228B (zh) | 网络视频监控的视频数据加密的系统和方法 | |
US20090254960A1 (en) | Method for a clustered centralized streaming system | |
US20020129243A1 (en) | System for selective encryption of data packets | |
KR101964229B1 (ko) | 감시 서버, 감시 서버의 데이터 처리 방법, 및 감시 시스템 | |
KR20050021468A (ko) | 안전한 데이터 전송 프로세스 및 전자 모듈 | |
AU2009265724A1 (en) | Methods and apparatuses for selective data encryption | |
CN106254382B (zh) | 媒体数据的处理方法及装置 | |
JP2009303211A (ja) | スライスベースの優先度付きセキュアビデオストリーミング | |
EP2090102A1 (fr) | Procédé et dispositif pour gérer une transmission de clés | |
Van Droogenbroeck | Partial encryption of images for real-time applications | |
KR101738334B1 (ko) | 클라우드 컴퓨팅 환경을 이용한 cctv 보안 감시 장치 및 그 방법 | |
KR101687115B1 (ko) | 통신 시스템의 암호화 패킷 전송 방법 | |
CN1578457B (zh) | 个人视频加密系统和方法 | |
KR101815467B1 (ko) | 보안 에이전트를 이용한 보안 감시 강화 시스템 | |
WO2000052570A2 (fr) | Systeme principal integre en reseau client/serveur comprenant l'amorce a distance du systeme d'exploitation, le chargement d'un logiciel d'application et un logiciel de communication a commande centralisee | |
JP4499631B2 (ja) | 画像受信装置及びプログラム | |
KR102423036B1 (ko) | Kcmvp가 적용된 카메라 보안 감시 시스템 및 그 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase |