WO2000067096A2 - Systeme d'interconnexion de reseaux assurant un acces sur et securise a des groupes prives - Google Patents

Systeme d'interconnexion de reseaux assurant un acces sur et securise a des groupes prives Download PDF

Info

Publication number
WO2000067096A2
WO2000067096A2 PCT/US2000/011997 US0011997W WO0067096A2 WO 2000067096 A2 WO2000067096 A2 WO 2000067096A2 US 0011997 W US0011997 W US 0011997W WO 0067096 A2 WO0067096 A2 WO 0067096A2
Authority
WO
WIPO (PCT)
Prior art keywords
recited
internetworking
children
child
members
Prior art date
Application number
PCT/US2000/011997
Other languages
English (en)
Other versions
WO2000067096A3 (fr
Inventor
Eleanor Calamari-Lindquist (Aka St. John, El)
Original Assignee
Calamari Lindquist Eleanor Aka
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Calamari Lindquist Eleanor Aka filed Critical Calamari Lindquist Eleanor Aka
Priority to AU49817/00A priority Critical patent/AU4981700A/en
Publication of WO2000067096A2 publication Critical patent/WO2000067096A2/fr
Publication of WO2000067096A3 publication Critical patent/WO2000067096A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the present invention relates to an internetworking system in general and, in particular, to an internetworking system characterized by a safe and secure access for select groups of individuals.
  • Some Web sites e.g. Headbone Zone, kids Club, Child.net, Free Zone, among others
  • These sites host, by and large, material and content that is suitable for children.
  • some of these sites provide chat rooms in which kids may converse in a monitored, safe environment, (c.f. "Keeping the Internet Safe for Young Chatters", New York Times, November 5, 1998). Monitoring of these sites are typically accomplished in one of two fashions - automatic language filters or human monitors.
  • Monitors either human or automatic, review the language of the posts of the children in the chat rooms; and, if any child posts inappropriate or obscene language, that child is subject to a variety of potential sanctions.
  • Such sanctions may be anywhere within the range of a warning to being logged-out or having their accounts canceled.
  • Other rules that are typically enforced in these monitored chat rooms include forbidding the exchange of last names, non-site email address, names of schools or hometowns, ZIP codes, phone numbers, or any other information between chatters that might facilitate an off-line meeting.
  • FIG. 1 depicts the typical such environment as encountered by children who access the World Wide Web through an internet service provider's (ISP) account.
  • World Wide Web 100 comprises numerous sites accessible to those children 102 and adults 104 who have accounts on ISPs 106.
  • Child 102 typically logins into ISP 106 via his or her parent's account. From the ISP, it is the parent's fervent hope that their child will head to a designated child friendly site 108 -with all of its appropriately targeted content for young viewers — and not to the multitude of adults-only sites 110 that pervade the Web.
  • the child may browse freely through its materials, or enter one or more chat rooms 112 that are hosted by the child friendly site. There, the child might converse with other children, possibly in a monitored chat room where an adult (not shown) checks the appropriateness of the language of the children and metes out the appropriate sanctions for breaches.
  • the present invention meets the aforementioned needs by providing a secure and safe internetworking system that is a completely self-contained internet exclusively for children or other private groups.
  • the system comprises a server system, a plurality of dial-up ports connected to said server system, and a plurality of web pages comprising content that is suitable for children or other private groups.
  • parents of children would initially subscribe their child to the system and each child, in turn, would be issued a login account.
  • the child would dial into the system via its dedicated dial-up ports and would engage in a login procedure. After proper authorization, the child would be free to browse around inside the presently claimed system, accessing pre- approved web pages that have been installed on the server system.
  • the web pages might preferably comprise copies of web pages that are actually found on World Wild Web and, thus, may contain hypertext links to other web sites embedded within the web page.
  • the child would be able to make requests to jump to any hypertext link found in any web page. Whether the child receives the requested page depends upon whether the requested page has been loaded onto the server system. If the requested page is installed, then the child's browser would download and exhibit the page in question. Otherwise, the child's browser might inform the child that the requested page has not yet been authorized for access on the system.
  • the system might engage in a search for approved sites already loaded onto the server that are similar in content to the unapproved requested site.
  • the web pages loaded onto the server may have its embedded links pre-screened and edited out, if it is deemed that the site being linked to is inappropriate for the target audience.
  • the system would provide hardware and/or means for authorizing the addition of requested web pages onto the system. For example, if the requested pages contain content that is deemed suitable for older teenagers; but not necessarily for young children, then the system might inform the parents of the child of the child's request for additional web pages. The parents might then review the requested pages and decide whether their child should have access to the requested pages.
  • Authentication hardware and/or means is supplied by the present invention whereby parental consent could be given to the system to upload and link the additionally requested pages onto the system for their child to view.
  • the presently claimed system could either make these added pages either globally accessible to all account on the kids-internet; or, it might maintain a registry of allowable web pages for each individual child or subsets of children.
  • web pages could be classified according to the age group each is suited for — "under 6 years old", "6 to 8 years old", etc. Each child's account could contain information about the highest age group the child's parents want the child to see.
  • chat among children is monitored either by humans or automatic language filters whereby the number of children in a given chat room does not exceed ten children.
  • chat rooms are monitored by humans where chat room enrollment is limited to no more than four children.
  • the above aspects of the present invention are applicable to not only children; but to groups of private individual who share a common set of goals or sense of community.
  • Content on such a private internet may be pre-approved and mechanisms in place for the requesting and porting of other content onto the system are germane aspects of the present invention.
  • chat rooms, private email, and other means of communication fosters a sense of community among members of the private internet.
  • One advantage of the present invention is enhanced safety and security.
  • the child by virtue having his or her own account, is allowed to browse in a relatively self-contained virtual environment.
  • the presently claimed system does not connect, in general, to the greater World Wide Web; and, as such, children are not able to retrieve web pages of questionable content.
  • Chat rooms in the presently claimed system has an imposed upper limit of children; making the task of monitoring and refereeing chat effective to check the natural tendency of children to test the limits of the imposed rules in the system.
  • Another advantage of the present invention is that subscribers always stay on the self- contained network, rather than going from the network to sites on the public Internet that are owned and operated by other companies. This enables the designer of the self-contained network to provide a consistent interface to the user, making the network easier to use and helping to build a sense of community among subscribers. It also means that the self- contained network is a "sticky" site, to use a term applied to websites on the public Internet. In evaluating the popularity of websites on the public Internet, two key factors are how many "hits" the site receives (i.e., how many users visit the site), and how long users stay at that site before they go elsewhere on the Internet. A "sticky" site is one that users tends to stay at for a relatively long period of time. The present invention is directed at an extremely “sticky” site, since subscribers always remain within the self-contained network when using the network, even when it appears that they are visiting other sites on the public Internet.
  • Yet another advantage of the present invention is speed and ease-of-use. Because the private network contains a vast amount of content that has already been downloaded from the Internet, subscribers are able to access this information more quickly and with greater ease than if they had to separately find and connect all of this information on the public Internet.
  • the claimed system is especially suitable for providing a self-contained, secure networking environment for children, it can be advantageously used in other contexts as well.
  • Security is a significant concern for any individual or company that uses the Internet.
  • the user When a user accesses the Internet, the user is vulnerable to unscrupulous individuals who may try to use the user's link to the Internet to gain access to the user's individual computer files.
  • harmful computer viruses may be rapidly spread across the Internet, as evidenced by the recent "Melissa" virus.
  • a self-contained, private network is less susceptible to these threats, since access is limited to subscribers, and the network consists of private servers that are not connected to the public Internet.
  • a self-contained network is not immune to such threats, it is easier to implement security measures on a private network than on the public Internet.
  • the present invention can be used to bring together content that is of particular interest to children on a single, self-contained network directed at children.
  • the present invention can likewise be used to bring together content of particular interest to other target audiences, such as health-care providers, scientists, or persons working within a particular business sector. Bringing together this content on a self-contained network not only makes it easier to access this information, it also helps to build a sense of community among subscribers, who are likely to have similar interests.
  • Figure 1 depicts the typical environment presented to children who login to the World Wide Web.
  • FIG. 2 depicts one embodiment of a secure and safe internetworking system, as made in accordance with the principles with the present invention.
  • Figure 3 depicts one embodiment of a system for obtaining parental consent for allowing children to view certain material or any other situation requiring such consent.
  • Figure 4 depicts a chat room environment hosted on the presently claimed internetworking system, monitored in accordance with the principles of the present invention.
  • Figure 5 is a flowchart that implements one embodiment of a link monitor that oversees the request of content within the system.
  • Figure 6 is yet another embodiment of the link monitor that gives notification to parents that a child has requested unavailable material and gives an opportunity for parental -o- consent for loading the requested content onto the system.
  • Figure 7 is one embodiment of an address space for members that may be partitioned in a number of ways, including by age or parental consent.
  • System 200 broadly comprises a stand-alone server 202 that connects with the outside world through ports 204.
  • Child subscribers 206 would connect to server 200 in any number of ways known to those skilled in the art, including dial up modems to reach ports 204.
  • server 202 Once connected to ports 204, server 202 would initiate logon procedure 208 to verify logon and account status.
  • logon is complete, child 206 has access to a whole host of content that has been preselected for viewing by children and young adults.
  • content might be in form of web pages (212, 216).
  • Web pages themselves might be duplicates of web pages that already reside on the World Wide Web 100 that have been selected for their appropriateness for viewing by young people. All such web pages loaded onto server 202 is recorded in page registry 2 10, which comprises the addressable space of the system 200. Any request for a web page may be checked first in page registry 210 to see if the requested page has been loaded onto to server.
  • web page 212 might comprise a hypertext link to another page 216.
  • the request for page 216 would be checked in the page registry and its contents would be retrieved for download to the child's browser.
  • Page 216 might contain a link to another page (Page X) which is currently not loaded onto the server 202; and, thus, any request for Page X would have to be denied.
  • Link monitor 220 would monitor the status of all requests for web pages or content in general. If a request is denied, link monitor 220 might perform a number of particular tasks. For example, link monitor 220 would inform the child that the requested page is not found on server 202. Additionally, link monitor 220 might inform the system administrator that a request has been denied. In our example, the system administrator might then look on the World Wide Web at Page X 222 and determine its appropriateness for viewing. If Page X is appropriate for all audiences, then the system administrator may load Page X onto server 202 for general viewing. If Page X is not appropriate for any audience on system 200, then the system administrator may choose to do nothing about Page X.
  • Page X is appropriate for viewing by young adults; but not by young children, then the system administrator may decide to make Page X available on server 202 to a selected subset of young viewers and not generally available. Alternatively, the system administrator might seek parental permission from the requesting child to load on Page X to server 202 and make available to the requesting child.
  • FIG. 3 shows one embodiment of a system 300 for obtaining such parental consent.
  • System 300 comprises a home computer 302 that is connected to system 200 as described above.
  • Computer 302 at the time that system 200 is requesting the consent from parents, is running a parental consent form 304 that may describe the terms and condition of consent.
  • This consent form is running concurrently with a finger print capture device 306 that captures the image of the parent's thumb print at the time the form is entered on screen. If the image data matches the thumb print information, possibly maintained on file with system 200 at the time the form is entered, then parental consent will be deemed given.
  • other means of obtaining parental consent are possible, such as digital signatures, passwords, or voice recognition, and that the scope of the present invention should not be limited to any particular means.
  • System 200 may, in addition to hosting suitable content for young viewers, host a plurality of chat rooms 402 on the system.
  • chat monitor 404 views all the posts placed by the children in chat room 402.
  • any inappropriate post will invite with it a host of potential sanctions against the progenitor of the post.
  • Chat monitor 404 is preferably accomplished by a human viewing the posts as they occur.
  • automatic language filters may suffice as chat monitor either as a stand-alone facility, or in concert with a human overseeing the posts.
  • the upper bound on the number of children in a chat room is ten; however, preferentially, the upper bound of children in any chat room is four. This upper bound provides a manageable level of children to monitor, as it has been known in the art that children tend to push the limits of chat rooms monitors in an effort to thwart built-in protections.
  • Figure 5 depicts one embodiment of the link monitor of the present invention that starts at step 502 monitoring the requests made by children (or members of the private internet) for content via a link in a pre-approved web page.
  • Link monitor 500 would determine whether that particular link is within the existing address space of the system (i.e. whether the content has been loaded onto the server). This determination might be made by a search with the registry to see if the link is currently there. It will be appreciated to those skilled in the art that the registry could be easily implemented in a data base or table format (or any other suitable data structure) for easy look-up. Thus, the scope of the present invention should not be limited to any particular implementation to the registry.
  • the registry might comprise a compilations of verified child friendly sites, most up to date, and best (PG) sites available. This list might be categorized by age groups and subjects. Parents would have the option to select all of the material available or some of the content available depending upon what they deem suitable for their child.
  • the system would link would be provided to the child or member at 506 and displayed to the child/member's browser and the system would continue at 502.
  • the link monitor may, as previously mentioned, might simply inform the child/member of the unavailability of the link.
  • the link monitor might produce a work search within the current page at step 508 to provide a list of related links 510 to the child/member's browser at step 512 for possible selection. It will be appreciated that the system might already have, readily available, a list of alternative sites for a given link. Thus, the word search at step 508 might instead be a presentation of these pre-approved related sites.
  • Figure 6 is another embodiment of link monitor in which monitor 600 notes a child/members request for a link at step 602 and determines whether the requested link or content is within the registry (or otherwise available to the system) at step 604. If so, the requested page/link/content is sent to the child/member at step 606.
  • the child's parent or member's system administrator could be notified at step 608 of the unfulfilled request at step 608. If the parent or system administrator does not consent for that content to be viewed by the child or member, then the page/] ink/content is not loaded on the system for viewing by the child or member's browser at step 612.
  • consent is granted by the parent or system administrator then such consent might be verified at step 614.
  • Such verification might be garnered in any manner previously disclosed. For example, a request form might be presented ⁇ describing the nature of the child or member's request ⁇ to the parent or system administrator. At the same time, some form of verification might be requested simultaneously as the request is either granted or denied.
  • the system depicted in Figure 3 whereby verification might be simultaneously requested via a fingerprint capturing system would suffice for the purposes of the present invention. Other verification as previously discussed might also suffice.
  • the page/content/link is made available to the child or member at step 618.
  • the individual child or member's allowable address space might be updated to reflect the increased available content at step 620.
  • Figure 7 depicts one embodiment of a partitioning of allowable address space of either individual children/members or groups of children/members.
  • the allowable content loaded onto the system might be more fine grained partitioned for access according to any number of parameter, including age as depicted in Figure 7.
  • Age groups 702 shown here as ages 0-5 (704), ages 6-10 (706), or ages 11-18 (708) - might be allowable address spaces for children as they initiate access to materials.
  • the children might ask either parents or system administrator for increased levels of access at 712. This process might proceed as previously described for access to content.
  • Parents might ask the system administrator at step 714 to either add material specific to the child or to increase the age grouping for that particular child.
  • age is just one of many possible metrics for the partitioning of the content address space for its children or members of a private internet.
  • Other suitable metrics might include allowable interests, need-to-know status, or any other appropriate partitioning metric.
  • the scope of the present invention encompasses the various possible metrics and that the scope should not be limited to those shown in the figures.

Abstract

La présente invention concerne un système assurant une interconnexion de réseaux sûre et sécurisée et fournissant un interréseau complètement autonome réservé exclusivement aux enfants ou à d'autres groupes privés. Le système de l'invention comprend un système serveur, une pluralité de ports de commutation reliés au système serveur précité, et une pluralité de pages Web dont le contenu est adapté aux enfants ou à d'autres groupes privés. L'espace adressable du contenu chargé dans le système peut être divisé à l'intention d'enfants ou de membres individuels et il peut être augmenté sur l'autorisation authentifiée et vérifiée des parents ou des administrateurs du système. Le système de l'invention fournit du matériel et/ou des moyens permettant d'autoriser l'ajout de pages Web demandées dans le système. Dans un autre de ses aspects, la présente invention permet de limiter le nombre d'enfants participant à un forum particulier. La discussion entre les enfants est surveillée par des personnes ou par des filtres de langage automatiques qui garantissent que le nombre d'enfants participant à un forum particulier ne dépasse pas une limite supérieure pré-établie.
PCT/US2000/011997 1999-05-03 2000-05-03 Systeme d'interconnexion de reseaux assurant un acces sur et securise a des groupes prives WO2000067096A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU49817/00A AU4981700A (en) 1999-05-03 2000-05-03 Internetworking system for providing safe and secure access for private groups

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US30424599A 1999-05-03 1999-05-03
US09/304,245 1999-05-03

Publications (2)

Publication Number Publication Date
WO2000067096A2 true WO2000067096A2 (fr) 2000-11-09
WO2000067096A3 WO2000067096A3 (fr) 2001-05-31

Family

ID=23175685

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/011997 WO2000067096A2 (fr) 1999-05-03 2000-05-03 Systeme d'interconnexion de reseaux assurant un acces sur et securise a des groupes prives

Country Status (2)

Country Link
AU (1) AU4981700A (fr)
WO (1) WO2000067096A2 (fr)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1225743A1 (fr) * 2001-01-22 2002-07-24 Gestweb S.p.A. Procédé et appareil permettant de contrôler le temps, qu'un usager dépense connecté à un réseau de communication de données
WO2002093346A2 (fr) * 2001-05-14 2002-11-21 Comfy Net Ltd. Systeme et procede de navigation a l'aide d'un clavier special
EP1376981A2 (fr) * 2002-06-28 2004-01-02 Microsoft Corporation Personnalisation et notification de contrôle parental
EP1394698A3 (fr) * 2002-08-27 2004-03-24 Microsoft Corporation Procédé et système pour appliquer des politiques de consentement sur les identités en ligne
WO2004059942A1 (fr) * 2002-12-30 2004-07-15 Koninklijke Philips Electronics N.V. Restriction de l'acces a un contenu a partir d'un lecteur de support d'information
US7996890B2 (en) 2007-02-27 2011-08-09 Mattel, Inc. System and method for trusted communication

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5696898A (en) * 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
US5706507A (en) * 1995-07-05 1998-01-06 International Business Machines Corporation System and method for controlling access to data located on a content server

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5696898A (en) * 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
US5706507A (en) * 1995-07-05 1998-01-06 International Business Machines Corporation System and method for controlling access to data located on a content server

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1225743A1 (fr) * 2001-01-22 2002-07-24 Gestweb S.p.A. Procédé et appareil permettant de contrôler le temps, qu'un usager dépense connecté à un réseau de communication de données
US7039945B2 (en) 2001-01-22 2006-05-02 Gestweb S.P.A. Method and device for controlling the time which a user spends connected to a data communication network
WO2002093346A2 (fr) * 2001-05-14 2002-11-21 Comfy Net Ltd. Systeme et procede de navigation a l'aide d'un clavier special
WO2002093346A3 (fr) * 2001-05-14 2003-12-31 Comfy Net Ltd Systeme et procede de navigation a l'aide d'un clavier special
US7170486B2 (en) 2001-05-14 2007-01-30 Comfyware Ltd. Dedicated keyboard navigation system and method
EP1376981A2 (fr) * 2002-06-28 2004-01-02 Microsoft Corporation Personnalisation et notification de contrôle parental
EP1376981A3 (fr) * 2002-06-28 2004-06-30 Microsoft Corporation Personnalisation et notification de contrôle parental
US7302488B2 (en) 2002-06-28 2007-11-27 Microsoft Corporation Parental controls customization and notification
EP1394698A3 (fr) * 2002-08-27 2004-03-24 Microsoft Corporation Procédé et système pour appliquer des politiques de consentement sur les identités en ligne
WO2004059942A1 (fr) * 2002-12-30 2004-07-15 Koninklijke Philips Electronics N.V. Restriction de l'acces a un contenu a partir d'un lecteur de support d'information
US7996890B2 (en) 2007-02-27 2011-08-09 Mattel, Inc. System and method for trusted communication

Also Published As

Publication number Publication date
WO2000067096A3 (fr) 2001-05-31
AU4981700A (en) 2000-11-17

Similar Documents

Publication Publication Date Title
US10587601B2 (en) Automated identity assessment method and system
Grampp et al. The UNIX system: UNIX operating system security
EP1376981B1 (fr) Personnalisation et notification de contrôle parental
Zittrain et al. Internet filtering: The politics and mechanisms of control
US10348720B2 (en) Cloud authentication
US20060173793A1 (en) System and method for verifying the age and identity of individuals and limiting their access to appropriate material and situations
Choi The Anonymous Internet
JP4327441B2 (ja) 画像を用いた個人認証システム
US20080168548A1 (en) Method For Automatically Controlling Access To Internet Chat Rooms
Selin Governing Cyberspace: The Need for an International Solution
WO2000067096A2 (fr) Systeme d'interconnexion de reseaux assurant un acces sur et securise a des groupes prives
Medlin et al. Analyzing the vulnerability of US hospitals to social engineering attacks: how many of your employees would share their password?
JP2002007345A (ja) ユーザ認証方法
McLaurin Making cyberspace safe for democracy: the challenge posed by denial-of-service attacks
Fokes et al. A survey of security vulnerabilities in social networking media: the case of Facebook
Ndubueze Generation Y and online victimization in Nigeria: How vulnerable are younger internet users?
McMullan Cyber fraud, online poker, and order-maintenance in virtual worlds
Sardá An onion with layers of hope and fear: A cross‐case analysis of the media representation of Tor Network reflecting theoretical perspectives of new technologies
Simpson New labor, new censorship? Politics, religion and internet filtering in Australia
Muchonjo et al. An Investigation into Ipredation in Cyberspace towards Developing a Framework for Preventing Ipredators’ Attacks
Conner Why Don't You Take a Seat away from That Computer: Why Louisiana Revised Statute 14: 91.5 is Unconstitutional
Medlin et al. Obtaining patient’s information from hospital employees through social engineering techniques: an investigative study
Chandel et al. Cyber manhunt: evaluation of technologies and practices for effective community development and maintenance
Nisbett Checkmate: How Sexual Predators in (Your) Space Have Strategically Employed Existing Cyber-Laws to Outflank Their Prey
Kraus et al. Seven deadliest Microsoft attacks

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC DATED 19-12-2002

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP