WO2000055805A2 - Datenträger mit einem sicherheitsmerkmal - Google Patents
Datenträger mit einem sicherheitsmerkmal Download PDFInfo
- Publication number
- WO2000055805A2 WO2000055805A2 PCT/DE2000/000824 DE0000824W WO0055805A2 WO 2000055805 A2 WO2000055805 A2 WO 2000055805A2 DE 0000824 W DE0000824 W DE 0000824W WO 0055805 A2 WO0055805 A2 WO 0055805A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data carrier
- security
- security feature
- security element
- coding
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06018—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking one-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06187—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with magnetically detectable marking
- G06K19/06196—Constructional details
Definitions
- the invention relates to a data carrier with at least one security feature and at least one storage device, a method for determining the association of a storage device and a data carrier that is provided with a storage device and a security feature, a device for producing a data carrier, a device for carrying out the method and a security element for data carriers according to the preamble of the relevant independent claim.
- MM is therefore derived from the term "modulated characteristic" and can be interpreted as a reference to a machine-readable substance that is inserted inside the Eurocheque card.
- the purpose of this feature is to prevent unauthorized copying and tampering with the magnetic stripe on the Eurocheque card.
- the so-called MM code is read by a special sensor from the
- MM-Box a security module
- MM-Box a security module
- a one-way function based on DES runs during card verification, which calculates a value from magnetic stripe data and the MM code. If this result is identical to the MM test value, then it is decided that the magnetic stripe and the card belong together.
- the object of the invention is to improve and / or alternative and / or additional measures for checking the togetherness of a data carrier and one
- the object is achieved by a data carrier, a method, a device for producing the data carrier, a device for carrying out the method and a security element for data carriers according to the relevant independent claim.
- Advantageous embodiments of the invention are specified in the associated dependent claims.
- An essential aspect of the invention is a security feature or security element in a data carrier to be provided from or using a ferromagnetic substance or material which can be obtained at low cost, e.g. B. in a card terminal or in a card swipe reader, can always be detected safely.
- the security feature or the security element has a ferromagnetic substance or material with a high permeability or consists of such a substance or material.
- the security feature or the security element has an iron-nickel government or consists of such a material.
- the security feature or the security element has a negative permeability.
- the security feature or the security element has or consists of a permalloy.
- Another essential aspect of the invention is to provide a security feature or a security element in a data carrier, which is provided with a coding.
- the security feature or the security element has a coding at one end, which is different from the coding at its other end is different. This enables the direction of travel of the security feature or the security element to be determined during a reading process by means of a device for detecting the coding, such as a card terminal and / or a swipe card reader.
- a magnetic strip is provided on the data carrier, on which data are stored which show that the security feature or security element according to the invention is present in the data carrier.
- the coding or a part of the coding of the security feature according to the invention or of the security element according to the invention, preferably encrypted, is stored on the magnetic strip.
- Another essential aspect of the invention is to provide the magnetic stripe with data, which are preferably encrypted, from which at least the bank details of the authorized owner of the data carrier and / or the coding or part of the coding of the security feature according to the invention or of the security element according to the invention , e.g. B. by decryption
- the coding or a part of the coding of the security feature according to the invention or of the security element according to the invention is compared with reference data a reading device such.
- a reading device such as a card terminal, a POS terminal or a card swipe reader.
- the data carrier is a Eurocheque, a bank, a credit, a money, a GSM, a UMTS, an ID card, a health insurance and / or a telephone card and / or another authorization card for the use of services or for the purchase of goods.
- the memory device is formed by an integrated circuit and / or by a magnetic strip and / or by a hologram, the integrated circuit preferably being provided in a chip card module which preferably has a processor.
- the security feature is wholly or partly formed by a security element which has or consists of a ferromagnetic substance or a ferromagnetic material.
- the ferromagnetic material has a high permeability ⁇ , such as. B. an absolute amount of the permeability ⁇ r in the range of approx. 20,000 to 120,000 on and / or is an iron-nickel alloy.
- the ferromagnetic substance has a negative permeability ⁇ r .
- the ferromagnetic material is a permalloy which, for. B. has a negative permeability ⁇ ⁇ of approximately - 100,000.
- the permalloy has a composition without iron content of approx. 78.5% nickel and approx. 3% molybdenum.
- the security element and / or the ferromagnetic material has a strip-like shape.
- the security element and / or the ferromagnetic material has a width in the range from approximately 1 mm to 10 mm, preferably approximately 3 mm, and / or a thickness in the range from approximately 0.5 ⁇ m to 50 ⁇ m, preferably about 5 ⁇ m to 20 ⁇ m.
- Security element arranged next to the magnetic stripe and / or under the magnetic stripe.
- the security element is at a distance from an outer edge of the data carrier in the range from 5 mm to 20 mm, preferably in the range from 12.5 mm to 15.5 mm.
- the security feature and / or the security element has a coding (101 to 105).
- the coding is carried out by breaking down the security feature and / or the security element into partial sections.
- the coding is generated by a mechanical or laser-optical action on the security feature and / or the security element.
- the security feature and / or the security element has a coding at one end which differs from the coding at its other end, as a result of which the direction of travel of the security feature and / or the security element is recognized by a reading device for reading the Coding is possible.
- the coding of the security feature and / or the security element is stored in whole or in part in the storage device, such as in particular on the magnetic stripe and / or in the integrated circuit of a chip card module, preferably in encrypted form.
- the coding preferably consists of sections, each of which represents a number.
- at least one bank routing number and one account number are stored in the storage device.
- the coding and / or the digits of the bank routing number and / or the digits of the account number form all or part of the input values of an encryption algorithm, preferably a one-way function known from cryptography using a prime number multiplication, which is preferably such that the result of the encryption is a four-digit number, preferably in the range from 1001 to 9776, which is preferably stored in the so-called vested benefits field from position 94 to position 97 on the magnetic stripe.
- an encryption algorithm preferably a one-way function known from cryptography using a prime number multiplication, which is preferably such that the result of the encryption is a four-digit number, preferably in the range from 1001 to 9776, which is preferably stored in the so-called vested benefits field from position 94 to position 97 on the magnetic stripe.
- the security feature has preferably been varied predominantly from data carrier to data carrier, e.g. B. by continuous coding.
- the properties of the security feature are at least partially recorded and the result of the recording is compared with at least one reference value, the comparison preferably being carried out in a card terminal and / or at an authorization point, e.g. B. for transactions.
- the data carrier and / or the storage device and / or the security feature and / or the security element is a data carrier or Storage device or a security feature or a security element with one or more of the aforementioned properties or features.
- At least one detection device such as in particular a card terminal and / or a card swipe reader, detects at least one magnetic and / or optical property of the security feature or security element.
- the detection device is provided with two spaced-apart inductors, such as in particular coils, and the data carrier or the
- Security feature or the security element is carried out between the two spaced inductances hm.
- the first is offset
- Oscillator circuit sets one of the two spaced-apart inductors in vibrations, in particular high-frequency vibrations, and the second of the two spaced-apart inductors forms part of a receiver for this frequency, a measured variable, such as in particular an electrical voltage, emitted by the receiver being present in the presence of the security feature or Security elements between the two spaced inductances changes in a manner characteristic of the material and / or for the material strength of the security feature or security elements.
- Detection device on a second oscillator circuit by means of which a change in frequency caused by coding of the security feature or security element on the second oscillator circuit is detected.
- the second oscillator circuit is provided with a measuring head, which preferably has an air gap and is set in vibration by the oscillator circuit.
- a data carrier guided past the measuring head or a security feature or security element guided past this calls the
- Frequency change and the frequency change for reading the coding is demodulated.
- the detection device illuminates the data carrier or the security feature or the security element, preferably with infrared light, and a coding located on the security feature or the security element is detected by an optical receiver.
- Security feature or security elements derived measured quantity compared with a reference size and / or from the Detection of the coding of the security feature or security element-derived data are compared with reference data which have been derived from data stored in the storage device of the data carrier or at an authorization point.
- the comparison of the measured variable with the reference variable is carried out by a card terminal, such as an automated teller machine, a card swipe reader or a POS terminal.
- a card terminal such as an automated teller machine, a card swipe reader or a POS terminal.
- the data derived from the detection of the coding are compared with reference data by a card terminal, such as an automated teller machine, a card swipe reader or a POS terminal, and / or by an authorization point to which the derived data have been transmitted .
- a card terminal such as an automated teller machine, a card swipe reader or a POS terminal
- FIG. 1 shows a security feature or security element according to the invention
- FIG. 2 shows a material testing device for checking whether the security feature or security element shown in FIG. 1 is present in a data carrier; and 3 shows a code reading device for determining the code of the security feature or security element shown in FIG. 1.
- the security element 100 shown in Fig. 1, the z. B. is formed by a narrow metallic band, has a strip-like shape and consists of four sections 101, 102, 103, 104 and 105.
- the first section 101 forms the beginning of the security element 100 and consists of an uncoded area 110 and a coded area with the bit code 1 0.
- the first section 101 is followed by the second section 102 with the code 1 0 0 1 1, to the second section 102 the third section 103 with the code 1 0 1 0 1, to the third section 103 the fourth section 104 with the code 0 0 1 1 1 and finally the fourth and section 104 are followed by the fifth and last section 105.
- the section 105 forms the end of the security element 100 and consists of an area coded with 10 and an uncoded area 110.
- the bit code consisting of 0 and 1 is represented in the exemplary embodiment shown in FIG. 1 by bars of different widths, similar to a barcode.
- the narrow bars represent a digital 0 and the wide bars represent a digital 1.
- the middle bar of each section represents a parity bit for checking the relevant section for correct reading.
- the twelve bars in sections 102 to 104 form a 12-bit code, which allows a series of 4096 data carriers or cards to be coded differently. It goes without saying that, in particular, a bit code can also be used which has more than twelve bits if each data carrier of a larger series is to be individualized or provided with a different code.
- the security element 100 is on a data carrier ⁇ ⁇ t a magnetic strip (not shown), for. B. a rake on or introduced.
- the security element 100 is preferably arranged next to or below the magnetic stripe.
- the strip-shaped security element 100 can, for example, be arranged as long as the magnetic strip and / or between the magnetic strip and the longer edge of the card adjacent to it. If the security element 100 is arranged next to the magnetic strip, it is preferably embedded in the card or the data carrier in a manner that is not visible.
- the security element 100 embedded in the card can be provided with a cover which has an optically detectable security feature for recognizing whether the security element 100 has been tampered with.
- the cover can be covered with a cover film, which can be colored, for example, with a light transformer based on diazo-style or with another dye.
- Em diazostilbene dye lights up when illuminated with UV light, so that the cover film can be easily checked with a suitable device.
- the security element 101 preferably has a width of approximately 3 mm and a thickness in the range of approximately 5 ⁇ m to 20 ⁇ m.
- the security element 100 is preferably arranged at a distance m in a range from approximately 12.5 mm to 15.5 mm to an outer edge of the data carrier or the card.
- the security element 100 preferably consists of a ferromagnetic material with a high permeability, such as, in particular, an iron Nickel alloy or so-called permalloy, which has a negative permeability.
- the coding of the security element 100 is preferably carried out by a laser beam or mechanically, e.g. B. created by milling, the security element, which is preferably already connected to the card body, is broken down into 100 pieces to create the bit code shown in FIG. 1.
- the coding provided on the security element 100 (FIG. 1 only shows an example of a possible coding) largely varies from data carrier to data carrier, each of which is provided with a security element 100 and individualizes the data carrier or the card.
- the coding provided on the security element 100 is on the
- Magnetic strips of the data carrier or the card preferably encrypted and / or stored with further encrypted data, which preferably specify at least the bank details of the authorized holder of the card.
- at least those data are stored on the magnetic stripe that indicate whether there should be a security element 100 m from the relevant data carrier that can be analyzed.
- a security element according to the invention is located in or on a card body.
- a card 206 with a security element 100 is inserted into a material testing device 200 shown in FIG. 2.
- the Materialprufvoriques 200 may b eispielmik m an ATM, a POS, or Termmal can also be provided in a card reader.
- the material testing device 200 consists of a high-frequency oscillator 201 and a rectifier circuit 202, the high-frequency oscillator 201 being provided with an inductor 203 and the rectifier circuit 202 having an inductor 205 m in the manner shown in FIG. 2.
- the high-frequency oscillator 201 sets the inductance 203 in a high-frequency oscillation and a magnetic field is generated. Now the card 206, which with the
- Security element 100 is provided, carried out between the closely adjacent inductors 202 and 205 or manually pulled through in the case of a card swipe reader, the magnetic field or the high-frequency oscillation is changed in a manner which is characteristic of the material and the material thickness of the security element 100 according to the invention.
- the security element 100 preferably has an uncoded, longer area 110 at both ends.
- a suitable length of the uncoded area 110 ensures that the security element 100 remains in the material testing device 200 or between the inductors 203 and 205 for a sufficient length of time for reliable material testing.
- the change in the magnetic field or the high-frequency oscillation is registered by the inductance 205, which forms a receiver together with the rectifier circuit 202, and an electrical voltage, which is characteristic, is present at the output 207 of the material testing device 200 for the invention according to ⁇ cher ⁇ e ⁇ tse ement 100.
- This is performed by a not shown, z. B. by means of an operational amplifier, mt a reference voltage or the like. If the / is positive, it is assumed that the card has a real security element or security feature.
- the security element 100 or the card 206 which has the security element 100, is attached to a measuring head 301 of a code reading device or
- the oscillator circuit which has an inverter 204, excites an inductor or coil 303 to oscillate, the frequency of the oscillations being present at the output 302.
- the frequency changes as a function of the coding of the security element 100, which is present at the output 302 of the oscillator circuit 300.
- the change caused by the coding is demodulated by a device, not shown, and subsequently the coding of the security element is 100 m in binary form.
- FIGS. 2 and 3 are only examples of a large number of possible suitable devices.
- the data stored on the magnetic stripe (not shown) of the card in question are read in a conventional manner and a check is preferably first carried out to determine whether the data indicate what is required by the invention Security element should be or is 100 m of the card in question. This can be done, for example, by checking the data in the named free movement area of the magnetic strip and / or by the material test described. It is understood that for
- further data can be provided elsewhere on the magnetic strip, which indicate that a security element according to the invention should be present. If the data read from the magnetic stripe indicate that no security element according to the invention is present in the card, then the association of the card and magnetic stripe can e.g. B. can be checked in a conventional manner using the MM method.
- the data read from the magnetic stripe is preferably first determined or decoded and subsequently the coding of the security element indicated on the magnetic stripe of the card 206 is determined.
- a comparison device not shown, compares the coding of the code determined by the code reading device 300
- Security elements 100 with the coding indicated on the magnetic stripe in order to determine whether the card or the magnetic stripe and the security element 100 belong together or whether manipulation has been carried out.
- the comparison device is preferably also arranged in an automated teller machine, POS terminal or card swipe reader according to the invention. If the comparison is positive, it is assumed that the card body 206 and the security element 100 belong together.
- the security element according to the invention alternatively or in addition to the known MM feature m one Can be evaluated be vorgesenen data carrier ä ger or a card body and a corresponding terminal.
- the security element or security feature according to the invention can be produced inexpensively and can be provided in or on a data carrier or on a card with little effort.
- the Figures 2 and 3 specified circuits for evaluating the safety information maize can also be produced cost-ü cheap swiss and can be retrofitted with little expense in existing devices in an ATM, a POS Termmal or a card swipe or be provided.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Credit Cards Or The Like (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU53876/00A AU5387600A (en) | 1999-03-17 | 2000-03-17 | Data carrier with a security feature |
DE10080653T DE10080653D2 (de) | 1999-03-17 | 2000-03-17 | Datenträger mit einem Sicherheitsmerkmal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE1999111874 DE19911874A1 (de) | 1999-03-17 | 1999-03-17 | Kreditkartenabsicherung |
DE19911874.4 | 1999-03-17 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2000055805A2 true WO2000055805A2 (de) | 2000-09-21 |
WO2000055805A3 WO2000055805A3 (de) | 2001-03-15 |
Family
ID=7901291
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/DE2000/000824 WO2000055805A2 (de) | 1999-03-17 | 2000-03-17 | Datenträger mit einem sicherheitsmerkmal |
Country Status (3)
Country | Link |
---|---|
AU (1) | AU5387600A (de) |
DE (2) | DE19911874A1 (de) |
WO (1) | WO2000055805A2 (de) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10328134A1 (de) * | 2003-06-23 | 2005-01-20 | Giesecke & Devrient Gmbh | Datenträger |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3676644A (en) * | 1970-03-05 | 1972-07-11 | Columbia Controls Research Cor | Coded document and system for automatically reading same |
US4855584A (en) * | 1986-03-13 | 1989-08-08 | Glory Kogyo Kabushiki Kaisha | Method for identifying certification identifying media |
US4863196A (en) * | 1986-05-23 | 1989-09-05 | Glory Kogyo Kabushiki Kaisha | Certification identifying medium |
US4883949A (en) * | 1987-04-27 | 1989-11-28 | Tokyu Car Corporation | Data reader |
-
1999
- 1999-03-17 DE DE1999111874 patent/DE19911874A1/de not_active Withdrawn
-
2000
- 2000-03-17 AU AU53876/00A patent/AU5387600A/en not_active Abandoned
- 2000-03-17 DE DE10080653T patent/DE10080653D2/de not_active Expired - Lifetime
- 2000-03-17 WO PCT/DE2000/000824 patent/WO2000055805A2/de active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3676644A (en) * | 1970-03-05 | 1972-07-11 | Columbia Controls Research Cor | Coded document and system for automatically reading same |
US4855584A (en) * | 1986-03-13 | 1989-08-08 | Glory Kogyo Kabushiki Kaisha | Method for identifying certification identifying media |
US4863196A (en) * | 1986-05-23 | 1989-09-05 | Glory Kogyo Kabushiki Kaisha | Certification identifying medium |
US4883949A (en) * | 1987-04-27 | 1989-11-28 | Tokyu Car Corporation | Data reader |
Non-Patent Citations (3)
Title |
---|
[Online] XP002151055 Gefunden im Internet: <URL: http://www.heise.de/ct/ftp/projekte/streif enweise/nur_peanuts/pic03.htm, http://www.heise.de/ct/ftp/projekte/streif enweise/nur_peanuts/art.shtml> [gefunden am 2000-10-24] das ganze Dokument * |
JUERGEN DETHLOFF: "Handbuch der Chipkarten" , HANSER VERLAG , MUENCHEN WIEN XP002151053 Seite 30-37 -Seite 56-67 * |
VOLPE/VOLPE: "Magnetkarten" , HEINZ HEISE , HANNOVER XP002151054 Seite 19-24 -Seite 41-51 * |
Also Published As
Publication number | Publication date |
---|---|
DE19911874A1 (de) | 2000-10-05 |
AU5387600A (en) | 2000-10-04 |
WO2000055805A3 (de) | 2001-03-15 |
DE10080653D2 (de) | 2002-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE2041853C3 (de) | Vorrichtung zum Ermitteln der Gültigkeit von Identifizierungskarten | |
DE10027178B4 (de) | Magnetstreifen-Authentifizierungs-Verifizierungssystem | |
DE69736701T2 (de) | Verfahren und vorrichtung zum sichern und authentifizieren von kodierten daten und von dokumenten welche derartige daten enthalten | |
DE69535480T2 (de) | Verfahren und vorrichtung zur identifizierung und authentifizierung von verschiedenen magnetischen medien | |
DE19881919B4 (de) | Verfahren und Vorrichtung zum Erstellen von Fingerabdrücken und zum Authentifizieren verschiedener magnetischer Medien | |
DE69034216T2 (de) | Verfahren und Vorrichtung zur Echtheitsprüfung von Geld | |
DE3038614C2 (de) | ||
DE19734507C2 (de) | Verfahren zur Echtheitsprüfung eines Datenträgers | |
DE19934228A1 (de) | Magnetstreifenkarten-Prüfsystem | |
DE2924325A1 (de) | Verfahren und vorrichtung zur geheimen kennzeichnung und auswertung maschinenlesbarer datentraeger | |
WO1982001778A1 (en) | Method and device for the marking and/or identification of a data medium | |
DE10204870A1 (de) | Verfahren zur Fälschungssicherung eines Wertträgers, Wertträger und Verfahren zur Überprüfung seiner Echtheit | |
CH627513A5 (de) | Schliesszylinder mit schluessel. | |
EP1188151A1 (de) | Einrichtungen und verfahren zur biometrischen authentisierung | |
WO2001039108A2 (de) | Individualisierungssystem für einen gegenstand | |
US4228348A (en) | Security document and system | |
DE102006049284B4 (de) | Verfahren zur Erstellung und Überprüfung eines sicheren Klartextdruckes sowie Vorrichtung und Informationsträger hierfür | |
DE3408086A1 (de) | Verfahren und einrichtung zum pruefen der echtheit von dokumenten | |
DE19608757A1 (de) | Verfahren und Vorrichtung zur Echtheitskontrolle von Dokumenten in Form von Chipkarten | |
EP1016042A1 (de) | Herstellungs- und verifizierungsverfahren für ein zugangsberechtigungsmittel sowie zugangsberechtigungsmittel | |
DE3013211A1 (de) | Verfahren zur handhabung einer persoenlichen indentifikationsnummer (pin) im zusammenhang mit einer ausweiskarte | |
EP1185960B1 (de) | Verfahren und vorrichtung zum abspeichern und wiederauffinden von pin-codes | |
WO2000055805A2 (de) | Datenträger mit einem sicherheitsmerkmal | |
DE19901379A1 (de) | Vorrichtung zum Authentifizieren von Waren und Autorisierungsverfahren unter Verwendung der magnetischen Eigenschaften eines Markierers | |
WO2001069526A2 (de) | Datenträger |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
REF | Corresponds to |
Ref document number: 10080653 Country of ref document: DE Date of ref document: 20020321 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10080653 Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |