WO2000065442A1 - Sicherung eines rechnerkerns gegen äussere manipulationen - Google Patents

Sicherung eines rechnerkerns gegen äussere manipulationen Download PDF

Info

Publication number
WO2000065442A1
WO2000065442A1 PCT/EP2000/003530 EP0003530W WO0065442A1 WO 2000065442 A1 WO2000065442 A1 WO 2000065442A1 EP 0003530 W EP0003530 W EP 0003530W WO 0065442 A1 WO0065442 A1 WO 0065442A1
Authority
WO
WIPO (PCT)
Prior art keywords
checksum
command
cpu
processing unit
central processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/EP2000/003530
Other languages
German (de)
English (en)
French (fr)
Inventor
Michael Baldischweiler
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giesecke and Devrient GmbH
Original Assignee
Giesecke and Devrient GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke and Devrient GmbH filed Critical Giesecke and Devrient GmbH
Priority to JP2000614120A priority Critical patent/JP4693245B2/ja
Priority to EP00926991A priority patent/EP1190319B1/de
Priority to DE50001510T priority patent/DE50001510D1/de
Priority to AU45526/00A priority patent/AU4552600A/en
Priority to US09/926,376 priority patent/US6959391B1/en
Priority to AT00926991T priority patent/ATE235082T1/de
Publication of WO2000065442A1 publication Critical patent/WO2000065442A1/de
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Definitions

  • the present invention relates to securing a computer against external manipulation, in particular securing the data present in the computer core or central processing unit (CPU).
  • This invention is used in particular with chip cards, since these have to be particularly secured against manipulation from outside.
  • the object of the present invention is to propose a way in which the computer can be better secured against external manipulation.
  • the object is achieved according to the invention by a method, by a central processing unit for carrying out this method and by a computer or a chip card with such a central processing unit in accordance with the features of the independent claims.
  • Advantageous refinements of the invention are specified in the subclaims.
  • the invention is based on the fact that by securing the data present in the computer core, that is to say in the central processing unit (CPU) of the computer, against external manipulation, the security of the computer can be increased, since the data are present in the computer core unencrypted and therefore are easy to manipulate.
  • a check sum is determined after processing a command by the CPU from several register contents of the CPU by mathematical linkage, for example by exclusive-OR linkage (XOR linkage), and is stored in a memory as the final check sum.
  • XOR linkage exclusive-OR linkage
  • a checksum is formed again, that is the initial checksum.
  • processor type 8051 the Accu, B-Accu, Datapointer (DPTR, DPL, DPH), registers (R0 to R7) of the register banks, program status word (PSW), stack pointer (SP), special function register (SPR) and the like.
  • PSW program status word
  • SP stack pointer
  • SPR special function register
  • a counter can also be started when a command is loaded, which counts the clock cycles that are necessary to process the command.
  • the counter is preferably constructed in terms of hardware. Logic takes the number of clock cycles required for processing from the command opcode and converts this into a counter value. The counter then runs in parallel with the executed command. It is checked whether the command to be processed is processed within the specified clock cycles. In the event that the command was not processed within the specified period, the clock supply is set, for example, so that further processing of commands is no longer possible. Alternatively, a reset can also be triggered and the central unit can thus be reset. The same measures can be taken if the command has been processed prematurely, ie if the command counter has not yet reached its limit value and a new operation code has already been recognized.
  • the logical linking of the safety-relevant registers can be implemented by hardware or software.
  • the checksum formation between two successive commands can take place, for example, on the basis of random or defined events or continuously.
  • Fig. 1 shows the structure of a microcontroller using the example of an 8051 processor
  • FIG. 2 shows a logic for linking several areas of the central processing unit.
  • Fig. 1 shows the structure of an 8051 processor, which is an 8-bit processor. While known encryption methods protect the data from manipulation by bus or memory encryption, the data is in the core of the computer, ie in the central processing unit or CPU, unencrypted. With the method according to the invention it is now determined whether one or more registers of the CPU have been manipulated.
  • FIG. 2 shows, by way of example, those security-relevant areas of the CPU that could be manipulated, namely stack pointer SP, battery AC, B battery BAC, register RO to R7, data pointer DPL and DPH to the lower and upper areas of the internal RAM. These registers are logically linked together to form a checksum.
  • two 8-bit registers are linked to one another by an exclusive-OR gate (XOR). The XOR combination results in the register RO and a new 8-bit pattern, which in turn is XOR-linked with the 8-bit pattern resulting from the XOR combination in the registers R1 and R7.
  • XOR exclusive-OR gate
  • an 8-bit pattern is finally obtained, which serves as a checksum and is referred to in FIG. 2 as "initial checksum".
  • XOR combination which in particular is advantageous in terms of effort, of course, other embodiments can be selected to form the checksum.
  • the checksum changes immediately if the content of a register changes. That is, .
  • the checksum may change several times. Only the checksum after processing a command and before processing the next command are decisive for the implementation of the method, since these two checksums (final checksum of one command and initial checksum of the next command) are compared with one another in a comparator. The comparison is carried out as follows: The checksum that arises at the end of the processing of a first command is stored as a final checksum in a memory on the CPU.
  • the initial checksum is formed in parallel with the loading of this second command, as described at the beginning.
  • a first step a. The initial checksum is compared with the final checksum stored in the memory from the previously processed first command by means of a comparator. In the event that the CPU has not been tampered with, the start and end checksums match and the value of the comparison result is zero.
  • the comparator outputs a signal, on the basis of which, in a second step b.) After the second command has been processed, the checksum that is present is stored in the memory as a new final checksum. That is, , the processing of the second command is not interrupted in this case.
  • the CPU can be tampered with.
  • the output signal of the comparator then causes an error message c) instead of the second step b.), which in the case shown in FIG. 2 causes the command processing to be terminated.
  • the processor can be stopped, a security sensor can be activated or, in the case of a chip card, the chip card can be retained by the terminal.
  • the security mechanism described above can also be implemented purely in software, in that the checksums are determined on the one hand at the end of an instruction processing and on the other hand at the beginning of the next instruction processing and compared with one another.
  • the corresponding pro For example, grams can be stored in the ROM or EPROM of the processor and the final checksum can be stored in the bit-addressable RAM of the processor.
  • the described method need not be carried out before every command to be processed.
  • One embodiment of the invention provides that the implementation of the method depends on a random or a defined event. According to a first embodiment, the method can be triggered as a function of time.
  • the method can be triggered in that the content of one or more registers of the CPU corresponds to a predetermined pattern.
  • a still further embodiment of the invention provides that the method is triggered each time a predetermined number of commands have been processed.
  • An embodiment is preferred according to which the method is only triggered if there is a longer, defined period of time between the command, after the execution of which the checksum has been stored in the memory as an end checksum, and the initial checksum at the beginning of the processing of the next command lies. This saves valuable computing capacity when executing a program with many commands. If one assumes that manipulation of the CPU, in particular in the case of chip cards, does not take place while the program is running, but if the chip card is removed from the chip card terminal, manipulation of the CPU can nevertheless be reliably determined by means of this last-described embodiment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mathematical Physics (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Detection And Correction Of Errors (AREA)
  • Executing Machine-Instructions (AREA)
  • Information Transfer Systems (AREA)
  • Hardware Redundancy (AREA)
  • Saccharide Compounds (AREA)
  • Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)
PCT/EP2000/003530 1999-04-23 2000-04-19 Sicherung eines rechnerkerns gegen äussere manipulationen Ceased WO2000065442A1 (de)

Priority Applications (6)

Application Number Priority Date Filing Date Title
JP2000614120A JP4693245B2 (ja) 1999-04-23 2000-04-19 外部からの不正操作に対するコンピュータコアの保護
EP00926991A EP1190319B1 (de) 1999-04-23 2000-04-19 Sicherung eines rechnerkerns gegen äussere manipulationen
DE50001510T DE50001510D1 (de) 1999-04-23 2000-04-19 Sicherung eines rechnerkerns gegen äussere manipulationen
AU45526/00A AU4552600A (en) 1999-04-23 2000-04-19 Protection of the core part of a computer against external manipulation
US09/926,376 US6959391B1 (en) 1999-04-23 2000-04-19 Protection of the core part of computer against external manipulation
AT00926991T ATE235082T1 (de) 1999-04-23 2000-04-19 Sicherung eines rechnerkerns gegen äussere manipulationen

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19918620.0 1999-04-23
DE19918620A DE19918620A1 (de) 1999-04-23 1999-04-23 Sicherung eines Rechnerkerns gegen äußere Manipulationen

Publications (1)

Publication Number Publication Date
WO2000065442A1 true WO2000065442A1 (de) 2000-11-02

Family

ID=7905707

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2000/003530 Ceased WO2000065442A1 (de) 1999-04-23 2000-04-19 Sicherung eines rechnerkerns gegen äussere manipulationen

Country Status (10)

Country Link
US (1) US6959391B1 (https=)
EP (1) EP1190319B1 (https=)
JP (1) JP4693245B2 (https=)
CN (1) CN1173264C (https=)
AT (1) ATE235082T1 (https=)
AU (1) AU4552600A (https=)
DE (2) DE19918620A1 (https=)
ES (1) ES2190966T3 (https=)
RU (1) RU2249247C2 (https=)
WO (1) WO2000065442A1 (https=)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1294480C (zh) * 2001-05-10 2007-01-10 德国捷德有限公司 保护计算机寄存器内容免受操纵的方法及执行其的计算机
US7739520B2 (en) 2001-02-09 2010-06-15 Infineon Technologies Ag Data processing device

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2327048A1 (en) * 2000-11-28 2002-05-28 Olivier Benoit Method for verifying data integrity in electronic device data processing
US7363547B2 (en) * 2003-07-09 2008-04-22 Stmicroeletronics S.A. Error-detection cell for an integrated processor
RU2265241C2 (ru) * 2004-01-20 2005-11-27 Ардашев Дмитрий Васильевич Способ вызова процедуры на основе двойного стека
DE102004021088A1 (de) * 2004-04-29 2005-11-17 Giesecke & Devrient Gmbh Verfahren zum Schützen von Daten eines Datenträgers gegen DFA-Angriffe
KR20060067584A (ko) * 2004-12-15 2006-06-20 삼성전자주식회사 해킹 방지 기능이 있는 스마트 카드
DE102005016801B4 (de) * 2005-04-12 2018-04-26 Robert Bosch Gmbh Verfahren und Rechnereinheit zur Fehlererkennung und Fehlerprotokollierung in einem Speicher
DE102006037810A1 (de) 2006-08-11 2008-02-14 Giesecke & Devrient Gmbh Sichere Programmcodeausführung
US20090187507A1 (en) * 2006-12-20 2009-07-23 Brown Kerry D Secure financial transaction network
US8549260B2 (en) * 2009-01-29 2013-10-01 Infineon Technologies Ag Apparatus for processing data and method for generating manipulated and re-manipulated configuration data for processor
EP2262259A1 (en) * 2009-06-08 2010-12-15 Nagravision S.A. Method for monitoring execution of data processing program instructions in a security module
CN105117298A (zh) * 2015-08-10 2015-12-02 中颖电子股份有限公司 一种用于显屏驱动芯片的静电释放保护系统以及方法
US11386234B2 (en) * 2019-12-17 2022-07-12 Nuvoton Technology Corporation Security systems and methods for integrated circuits

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4727544A (en) * 1986-06-05 1988-02-23 Bally Manufacturing Corporation Memory integrity checking system for a gaming device
WO1997004394A1 (en) * 1995-07-14 1997-02-06 Christopher Nathan Drake Computer software authentication, protection, and security system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3644248A1 (de) * 1986-12-23 1988-07-07 Siemens Ag Verfahren zur ueberwachung des programmlaufs eines mikroprozessors
JPH03124278A (ja) * 1989-10-04 1991-05-27 Fukoku:Kk 超音波モータ
JPH052654A (ja) * 1991-06-25 1993-01-08 Nissan Motor Co Ltd マイクロコンピユータの故障検知方法および回路
JP3013868B2 (ja) * 1992-09-02 2000-02-28 船井電機株式会社 コードレス電話におけるメモリ揮発防止システム
RU2067313C1 (ru) * 1995-03-29 1996-09-27 Акционерное общество закрытого типа "Особое конструкторское бюро систем автоматизированного проектирования" Устройство защиты от несанкционированного доступа к информации, хранимой в персональной эвм
DE19610976A1 (de) * 1995-04-05 1996-10-17 Siemens Ag Verfahren zum Erkennen von Computerviren

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4727544A (en) * 1986-06-05 1988-02-23 Bally Manufacturing Corporation Memory integrity checking system for a gaming device
WO1997004394A1 (en) * 1995-07-14 1997-02-06 Christopher Nathan Drake Computer software authentication, protection, and security system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
RADAI Y: "CHECKSUMMING TECHNIQUES FOR ANTI-VIRAL PURPOSES", VIRUS BULLETIN CONFERENCE,GB,VIRUS BULLETIN LTD., ABINGTON, September 1991 (1991-09-01), pages 39 - 68, XP000700179 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7739520B2 (en) 2001-02-09 2010-06-15 Infineon Technologies Ag Data processing device
CN1294480C (zh) * 2001-05-10 2007-01-10 德国捷德有限公司 保护计算机寄存器内容免受操纵的方法及执行其的计算机
US7647495B2 (en) * 2001-05-10 2010-01-12 Giesecke & Devrient Gmbh Method for protecting a computer from the manipulation of register contents and a corresponding computer for carrying out this method

Also Published As

Publication number Publication date
EP1190319B1 (de) 2003-03-19
DE19918620A1 (de) 2000-10-26
CN1348562A (zh) 2002-05-08
JP2002543492A (ja) 2002-12-17
US6959391B1 (en) 2005-10-25
AU4552600A (en) 2000-11-10
RU2249247C2 (ru) 2005-03-27
JP4693245B2 (ja) 2011-06-01
CN1173264C (zh) 2004-10-27
ES2190966T3 (es) 2003-09-01
EP1190319A1 (de) 2002-03-27
DE50001510D1 (de) 2003-04-24
ATE235082T1 (de) 2003-04-15

Similar Documents

Publication Publication Date Title
EP1190319B1 (de) Sicherung eines rechnerkerns gegen äussere manipulationen
EP0011685B1 (de) Programmierbare Speicherschutzeinrichtung für Mikroprozessorsysteme und Schaltungsanordnung mit einer derartigen Einrichtung
DE2629459C2 (https=)
EP1611510B1 (de) Kontrollierte ausführung eines für eine virtuelle maschine vorgesehenen programms auf einem tragbaren datenträger
EP1618476A2 (de) Programmgesteuerte einheit und verfahren
WO2016206847A1 (de) Verfahren und vorrichtung zum absichern einer programmzählerstruktur eines prozessorsystems und zum überwachen der behandlung einer unterbrechungsanfrage
EP1532508B1 (de) Datenverarbeitungsvorrichtung
EP1543411B1 (de) Prozessor mit expliziter angabe über zu sichernde informationen bei unterprogrammsprüngen
EP1461701B1 (de) Programmgesteuerte einheit mit überwachungseinrichtung
EP0977160B1 (de) Verfahren und Datenverarbeitungsanordnung zum gesicherten Ausführen von Befehlen
DE2954533C2 (https=)
EP1774417B1 (de) Verfahren und vorrichtung zum überwachen des ablaufs eines steuerprogramms auf einem rechengerät
EP1577734A2 (de) Verfahren zum sicheren Betrieb eines tragbaren Datenträgers
DE10110050A1 (de) Verfahren zur Absicherung sicherheitskritischer Programmteile vor versehentlicher Ausführung und eine Speichereinrichtung zur Durchführung dieses Verfahrens
DE102006035662A1 (de) Datenverarbeitungseinrichtung und Verfahren zum Überwachen des korrekten Betriebs einer Datenverarbeitungseinrichtung
EP1031081B1 (de) Programmgesteuerte einheit und verfahren
EP1924914A2 (de) Datenverarbeitungssystem und betriebsverfahren dafür
DE2240432C3 (de) Verfahren und Einrichtung zum Festlegen von Fixpunkten und zur Operationswiederholung ab dem letzten Fixpunkt in Datenverarbeitungsanlagen mit überlappter Arbeitsweise
WO2004070496A2 (de) Schaltung mit schutz vor manipulativen angriffen und verfahren
EP1516245A1 (de) Vorrichtung und verfahren zum verarbeiten einer sequenz von sprungbefehlen
DE60012661T2 (de) Datenprozessor mit fehlerbeseitigungsschaltung
DE102022125619A1 (de) Verfahren zum Starten einer Datenverarbeitungseinrichtung, Datenverarbeitungseinrichtung und Kraftfahrzeug
DE102010031017A1 (de) Verfahren zur Überwachung des Programmablaufs eines Prozessors
DE102005037259A1 (de) Verfahren und Vorrichtung zur Festlegung eines Startzustandes bei einem Rechnersystem mit wenigstens zwei Ausführungseinheiten durch Umschalten von Registersätzen
DD301302A7 (de) Verfahren zum unterbrechen von, aus festwertspeichern betriebenen, anwenderprogrammen

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 00806634.5

Country of ref document: CN

AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase

Ref document number: 2000 614120

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2000926991

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 09926376

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 2000926991

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 2000926991

Country of ref document: EP