WO2000067096A2 - Systeme d'interconnexion de reseaux assurant un acces sur et securise a des groupes prives - Google Patents
Systeme d'interconnexion de reseaux assurant un acces sur et securise a des groupes prives Download PDFInfo
- Publication number
- WO2000067096A2 WO2000067096A2 PCT/US2000/011997 US0011997W WO0067096A2 WO 2000067096 A2 WO2000067096 A2 WO 2000067096A2 US 0011997 W US0011997 W US 0011997W WO 0067096 A2 WO0067096 A2 WO 0067096A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- recited
- internetworking
- children
- child
- members
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- the present invention relates to an internetworking system in general and, in particular, to an internetworking system characterized by a safe and secure access for select groups of individuals.
- Some Web sites e.g. Headbone Zone, kids Club, Child.net, Free Zone, among others
- These sites host, by and large, material and content that is suitable for children.
- some of these sites provide chat rooms in which kids may converse in a monitored, safe environment, (c.f. "Keeping the Internet Safe for Young Chatters", New York Times, November 5, 1998). Monitoring of these sites are typically accomplished in one of two fashions - automatic language filters or human monitors.
- Monitors either human or automatic, review the language of the posts of the children in the chat rooms; and, if any child posts inappropriate or obscene language, that child is subject to a variety of potential sanctions.
- Such sanctions may be anywhere within the range of a warning to being logged-out or having their accounts canceled.
- Other rules that are typically enforced in these monitored chat rooms include forbidding the exchange of last names, non-site email address, names of schools or hometowns, ZIP codes, phone numbers, or any other information between chatters that might facilitate an off-line meeting.
- FIG. 1 depicts the typical such environment as encountered by children who access the World Wide Web through an internet service provider's (ISP) account.
- World Wide Web 100 comprises numerous sites accessible to those children 102 and adults 104 who have accounts on ISPs 106.
- Child 102 typically logins into ISP 106 via his or her parent's account. From the ISP, it is the parent's fervent hope that their child will head to a designated child friendly site 108 -with all of its appropriately targeted content for young viewers — and not to the multitude of adults-only sites 110 that pervade the Web.
- the child may browse freely through its materials, or enter one or more chat rooms 112 that are hosted by the child friendly site. There, the child might converse with other children, possibly in a monitored chat room where an adult (not shown) checks the appropriateness of the language of the children and metes out the appropriate sanctions for breaches.
- the present invention meets the aforementioned needs by providing a secure and safe internetworking system that is a completely self-contained internet exclusively for children or other private groups.
- the system comprises a server system, a plurality of dial-up ports connected to said server system, and a plurality of web pages comprising content that is suitable for children or other private groups.
- parents of children would initially subscribe their child to the system and each child, in turn, would be issued a login account.
- the child would dial into the system via its dedicated dial-up ports and would engage in a login procedure. After proper authorization, the child would be free to browse around inside the presently claimed system, accessing pre- approved web pages that have been installed on the server system.
- the web pages might preferably comprise copies of web pages that are actually found on World Wild Web and, thus, may contain hypertext links to other web sites embedded within the web page.
- the child would be able to make requests to jump to any hypertext link found in any web page. Whether the child receives the requested page depends upon whether the requested page has been loaded onto the server system. If the requested page is installed, then the child's browser would download and exhibit the page in question. Otherwise, the child's browser might inform the child that the requested page has not yet been authorized for access on the system.
- the system might engage in a search for approved sites already loaded onto the server that are similar in content to the unapproved requested site.
- the web pages loaded onto the server may have its embedded links pre-screened and edited out, if it is deemed that the site being linked to is inappropriate for the target audience.
- the system would provide hardware and/or means for authorizing the addition of requested web pages onto the system. For example, if the requested pages contain content that is deemed suitable for older teenagers; but not necessarily for young children, then the system might inform the parents of the child of the child's request for additional web pages. The parents might then review the requested pages and decide whether their child should have access to the requested pages.
- Authentication hardware and/or means is supplied by the present invention whereby parental consent could be given to the system to upload and link the additionally requested pages onto the system for their child to view.
- the presently claimed system could either make these added pages either globally accessible to all account on the kids-internet; or, it might maintain a registry of allowable web pages for each individual child or subsets of children.
- web pages could be classified according to the age group each is suited for — "under 6 years old", "6 to 8 years old", etc. Each child's account could contain information about the highest age group the child's parents want the child to see.
- chat among children is monitored either by humans or automatic language filters whereby the number of children in a given chat room does not exceed ten children.
- chat rooms are monitored by humans where chat room enrollment is limited to no more than four children.
- the above aspects of the present invention are applicable to not only children; but to groups of private individual who share a common set of goals or sense of community.
- Content on such a private internet may be pre-approved and mechanisms in place for the requesting and porting of other content onto the system are germane aspects of the present invention.
- chat rooms, private email, and other means of communication fosters a sense of community among members of the private internet.
- One advantage of the present invention is enhanced safety and security.
- the child by virtue having his or her own account, is allowed to browse in a relatively self-contained virtual environment.
- the presently claimed system does not connect, in general, to the greater World Wide Web; and, as such, children are not able to retrieve web pages of questionable content.
- Chat rooms in the presently claimed system has an imposed upper limit of children; making the task of monitoring and refereeing chat effective to check the natural tendency of children to test the limits of the imposed rules in the system.
- Another advantage of the present invention is that subscribers always stay on the self- contained network, rather than going from the network to sites on the public Internet that are owned and operated by other companies. This enables the designer of the self-contained network to provide a consistent interface to the user, making the network easier to use and helping to build a sense of community among subscribers. It also means that the self- contained network is a "sticky" site, to use a term applied to websites on the public Internet. In evaluating the popularity of websites on the public Internet, two key factors are how many "hits" the site receives (i.e., how many users visit the site), and how long users stay at that site before they go elsewhere on the Internet. A "sticky" site is one that users tends to stay at for a relatively long period of time. The present invention is directed at an extremely “sticky” site, since subscribers always remain within the self-contained network when using the network, even when it appears that they are visiting other sites on the public Internet.
- Yet another advantage of the present invention is speed and ease-of-use. Because the private network contains a vast amount of content that has already been downloaded from the Internet, subscribers are able to access this information more quickly and with greater ease than if they had to separately find and connect all of this information on the public Internet.
- the claimed system is especially suitable for providing a self-contained, secure networking environment for children, it can be advantageously used in other contexts as well.
- Security is a significant concern for any individual or company that uses the Internet.
- the user When a user accesses the Internet, the user is vulnerable to unscrupulous individuals who may try to use the user's link to the Internet to gain access to the user's individual computer files.
- harmful computer viruses may be rapidly spread across the Internet, as evidenced by the recent "Melissa" virus.
- a self-contained, private network is less susceptible to these threats, since access is limited to subscribers, and the network consists of private servers that are not connected to the public Internet.
- a self-contained network is not immune to such threats, it is easier to implement security measures on a private network than on the public Internet.
- the present invention can be used to bring together content that is of particular interest to children on a single, self-contained network directed at children.
- the present invention can likewise be used to bring together content of particular interest to other target audiences, such as health-care providers, scientists, or persons working within a particular business sector. Bringing together this content on a self-contained network not only makes it easier to access this information, it also helps to build a sense of community among subscribers, who are likely to have similar interests.
- Figure 1 depicts the typical environment presented to children who login to the World Wide Web.
- FIG. 2 depicts one embodiment of a secure and safe internetworking system, as made in accordance with the principles with the present invention.
- Figure 3 depicts one embodiment of a system for obtaining parental consent for allowing children to view certain material or any other situation requiring such consent.
- Figure 4 depicts a chat room environment hosted on the presently claimed internetworking system, monitored in accordance with the principles of the present invention.
- Figure 5 is a flowchart that implements one embodiment of a link monitor that oversees the request of content within the system.
- Figure 6 is yet another embodiment of the link monitor that gives notification to parents that a child has requested unavailable material and gives an opportunity for parental -o- consent for loading the requested content onto the system.
- Figure 7 is one embodiment of an address space for members that may be partitioned in a number of ways, including by age or parental consent.
- System 200 broadly comprises a stand-alone server 202 that connects with the outside world through ports 204.
- Child subscribers 206 would connect to server 200 in any number of ways known to those skilled in the art, including dial up modems to reach ports 204.
- server 202 Once connected to ports 204, server 202 would initiate logon procedure 208 to verify logon and account status.
- logon is complete, child 206 has access to a whole host of content that has been preselected for viewing by children and young adults.
- content might be in form of web pages (212, 216).
- Web pages themselves might be duplicates of web pages that already reside on the World Wide Web 100 that have been selected for their appropriateness for viewing by young people. All such web pages loaded onto server 202 is recorded in page registry 2 10, which comprises the addressable space of the system 200. Any request for a web page may be checked first in page registry 210 to see if the requested page has been loaded onto to server.
- web page 212 might comprise a hypertext link to another page 216.
- the request for page 216 would be checked in the page registry and its contents would be retrieved for download to the child's browser.
- Page 216 might contain a link to another page (Page X) which is currently not loaded onto the server 202; and, thus, any request for Page X would have to be denied.
- Link monitor 220 would monitor the status of all requests for web pages or content in general. If a request is denied, link monitor 220 might perform a number of particular tasks. For example, link monitor 220 would inform the child that the requested page is not found on server 202. Additionally, link monitor 220 might inform the system administrator that a request has been denied. In our example, the system administrator might then look on the World Wide Web at Page X 222 and determine its appropriateness for viewing. If Page X is appropriate for all audiences, then the system administrator may load Page X onto server 202 for general viewing. If Page X is not appropriate for any audience on system 200, then the system administrator may choose to do nothing about Page X.
- Page X is appropriate for viewing by young adults; but not by young children, then the system administrator may decide to make Page X available on server 202 to a selected subset of young viewers and not generally available. Alternatively, the system administrator might seek parental permission from the requesting child to load on Page X to server 202 and make available to the requesting child.
- FIG. 3 shows one embodiment of a system 300 for obtaining such parental consent.
- System 300 comprises a home computer 302 that is connected to system 200 as described above.
- Computer 302 at the time that system 200 is requesting the consent from parents, is running a parental consent form 304 that may describe the terms and condition of consent.
- This consent form is running concurrently with a finger print capture device 306 that captures the image of the parent's thumb print at the time the form is entered on screen. If the image data matches the thumb print information, possibly maintained on file with system 200 at the time the form is entered, then parental consent will be deemed given.
- other means of obtaining parental consent are possible, such as digital signatures, passwords, or voice recognition, and that the scope of the present invention should not be limited to any particular means.
- System 200 may, in addition to hosting suitable content for young viewers, host a plurality of chat rooms 402 on the system.
- chat monitor 404 views all the posts placed by the children in chat room 402.
- any inappropriate post will invite with it a host of potential sanctions against the progenitor of the post.
- Chat monitor 404 is preferably accomplished by a human viewing the posts as they occur.
- automatic language filters may suffice as chat monitor either as a stand-alone facility, or in concert with a human overseeing the posts.
- the upper bound on the number of children in a chat room is ten; however, preferentially, the upper bound of children in any chat room is four. This upper bound provides a manageable level of children to monitor, as it has been known in the art that children tend to push the limits of chat rooms monitors in an effort to thwart built-in protections.
- Figure 5 depicts one embodiment of the link monitor of the present invention that starts at step 502 monitoring the requests made by children (or members of the private internet) for content via a link in a pre-approved web page.
- Link monitor 500 would determine whether that particular link is within the existing address space of the system (i.e. whether the content has been loaded onto the server). This determination might be made by a search with the registry to see if the link is currently there. It will be appreciated to those skilled in the art that the registry could be easily implemented in a data base or table format (or any other suitable data structure) for easy look-up. Thus, the scope of the present invention should not be limited to any particular implementation to the registry.
- the registry might comprise a compilations of verified child friendly sites, most up to date, and best (PG) sites available. This list might be categorized by age groups and subjects. Parents would have the option to select all of the material available or some of the content available depending upon what they deem suitable for their child.
- the system would link would be provided to the child or member at 506 and displayed to the child/member's browser and the system would continue at 502.
- the link monitor may, as previously mentioned, might simply inform the child/member of the unavailability of the link.
- the link monitor might produce a work search within the current page at step 508 to provide a list of related links 510 to the child/member's browser at step 512 for possible selection. It will be appreciated that the system might already have, readily available, a list of alternative sites for a given link. Thus, the word search at step 508 might instead be a presentation of these pre-approved related sites.
- Figure 6 is another embodiment of link monitor in which monitor 600 notes a child/members request for a link at step 602 and determines whether the requested link or content is within the registry (or otherwise available to the system) at step 604. If so, the requested page/link/content is sent to the child/member at step 606.
- the child's parent or member's system administrator could be notified at step 608 of the unfulfilled request at step 608. If the parent or system administrator does not consent for that content to be viewed by the child or member, then the page/] ink/content is not loaded on the system for viewing by the child or member's browser at step 612.
- consent is granted by the parent or system administrator then such consent might be verified at step 614.
- Such verification might be garnered in any manner previously disclosed. For example, a request form might be presented ⁇ describing the nature of the child or member's request ⁇ to the parent or system administrator. At the same time, some form of verification might be requested simultaneously as the request is either granted or denied.
- the system depicted in Figure 3 whereby verification might be simultaneously requested via a fingerprint capturing system would suffice for the purposes of the present invention. Other verification as previously discussed might also suffice.
- the page/content/link is made available to the child or member at step 618.
- the individual child or member's allowable address space might be updated to reflect the increased available content at step 620.
- Figure 7 depicts one embodiment of a partitioning of allowable address space of either individual children/members or groups of children/members.
- the allowable content loaded onto the system might be more fine grained partitioned for access according to any number of parameter, including age as depicted in Figure 7.
- Age groups 702 shown here as ages 0-5 (704), ages 6-10 (706), or ages 11-18 (708) - might be allowable address spaces for children as they initiate access to materials.
- the children might ask either parents or system administrator for increased levels of access at 712. This process might proceed as previously described for access to content.
- Parents might ask the system administrator at step 714 to either add material specific to the child or to increase the age grouping for that particular child.
- age is just one of many possible metrics for the partitioning of the content address space for its children or members of a private internet.
- Other suitable metrics might include allowable interests, need-to-know status, or any other appropriate partitioning metric.
- the scope of the present invention encompasses the various possible metrics and that the scope should not be limited to those shown in the figures.
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU49817/00A AU4981700A (en) | 1999-05-03 | 2000-05-03 | Internetworking system for providing safe and secure access for private groups |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US30424599A | 1999-05-03 | 1999-05-03 | |
US09/304,245 | 1999-05-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2000067096A2 true WO2000067096A2 (fr) | 2000-11-09 |
WO2000067096A3 WO2000067096A3 (fr) | 2001-05-31 |
Family
ID=23175685
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/011997 WO2000067096A2 (fr) | 1999-05-03 | 2000-05-03 | Systeme d'interconnexion de reseaux assurant un acces sur et securise a des groupes prives |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU4981700A (fr) |
WO (1) | WO2000067096A2 (fr) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1225743A1 (fr) * | 2001-01-22 | 2002-07-24 | Gestweb S.p.A. | Procédé et appareil permettant de contrôler le temps, qu'un usager dépense connecté à un réseau de communication de données |
WO2002093346A2 (fr) * | 2001-05-14 | 2002-11-21 | Comfy Net Ltd. | Systeme et procede de navigation a l'aide d'un clavier special |
EP1376981A2 (fr) * | 2002-06-28 | 2004-01-02 | Microsoft Corporation | Personnalisation et notification de contrôle parental |
EP1394698A3 (fr) * | 2002-08-27 | 2004-03-24 | Microsoft Corporation | Procédé et système pour appliquer des politiques de consentement sur les identités en ligne |
WO2004059942A1 (fr) * | 2002-12-30 | 2004-07-15 | Koninklijke Philips Electronics N.V. | Restriction de l'acces a un contenu a partir d'un lecteur de support d'information |
US7996890B2 (en) | 2007-02-27 | 2011-08-09 | Mattel, Inc. | System and method for trusted communication |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5696898A (en) * | 1995-06-06 | 1997-12-09 | Lucent Technologies Inc. | System and method for database access control |
US5706507A (en) * | 1995-07-05 | 1998-01-06 | International Business Machines Corporation | System and method for controlling access to data located on a content server |
-
2000
- 2000-05-03 AU AU49817/00A patent/AU4981700A/en not_active Abandoned
- 2000-05-03 WO PCT/US2000/011997 patent/WO2000067096A2/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5696898A (en) * | 1995-06-06 | 1997-12-09 | Lucent Technologies Inc. | System and method for database access control |
US5706507A (en) * | 1995-07-05 | 1998-01-06 | International Business Machines Corporation | System and method for controlling access to data located on a content server |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1225743A1 (fr) * | 2001-01-22 | 2002-07-24 | Gestweb S.p.A. | Procédé et appareil permettant de contrôler le temps, qu'un usager dépense connecté à un réseau de communication de données |
US7039945B2 (en) | 2001-01-22 | 2006-05-02 | Gestweb S.P.A. | Method and device for controlling the time which a user spends connected to a data communication network |
WO2002093346A2 (fr) * | 2001-05-14 | 2002-11-21 | Comfy Net Ltd. | Systeme et procede de navigation a l'aide d'un clavier special |
WO2002093346A3 (fr) * | 2001-05-14 | 2003-12-31 | Comfy Net Ltd | Systeme et procede de navigation a l'aide d'un clavier special |
US7170486B2 (en) | 2001-05-14 | 2007-01-30 | Comfyware Ltd. | Dedicated keyboard navigation system and method |
EP1376981A2 (fr) * | 2002-06-28 | 2004-01-02 | Microsoft Corporation | Personnalisation et notification de contrôle parental |
EP1376981A3 (fr) * | 2002-06-28 | 2004-06-30 | Microsoft Corporation | Personnalisation et notification de contrôle parental |
US7302488B2 (en) | 2002-06-28 | 2007-11-27 | Microsoft Corporation | Parental controls customization and notification |
EP1394698A3 (fr) * | 2002-08-27 | 2004-03-24 | Microsoft Corporation | Procédé et système pour appliquer des politiques de consentement sur les identités en ligne |
WO2004059942A1 (fr) * | 2002-12-30 | 2004-07-15 | Koninklijke Philips Electronics N.V. | Restriction de l'acces a un contenu a partir d'un lecteur de support d'information |
US7996890B2 (en) | 2007-02-27 | 2011-08-09 | Mattel, Inc. | System and method for trusted communication |
Also Published As
Publication number | Publication date |
---|---|
WO2000067096A3 (fr) | 2001-05-31 |
AU4981700A (en) | 2000-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10587601B2 (en) | Automated identity assessment method and system | |
Grampp et al. | The UNIX system: UNIX operating system security | |
EP1376981B1 (fr) | Personnalisation et notification de contrôle parental | |
Zittrain et al. | Internet filtering: The politics and mechanisms of control | |
US10348720B2 (en) | Cloud authentication | |
US20060173793A1 (en) | System and method for verifying the age and identity of individuals and limiting their access to appropriate material and situations | |
Choi | The Anonymous Internet | |
JP4327441B2 (ja) | 画像を用いた個人認証システム | |
US20080168548A1 (en) | Method For Automatically Controlling Access To Internet Chat Rooms | |
Selin | Governing Cyberspace: The Need for an International Solution | |
WO2000067096A2 (fr) | Systeme d'interconnexion de reseaux assurant un acces sur et securise a des groupes prives | |
Medlin et al. | Analyzing the vulnerability of US hospitals to social engineering attacks: how many of your employees would share their password? | |
JP2002007345A (ja) | ユーザ認証方法 | |
McLaurin | Making cyberspace safe for democracy: the challenge posed by denial-of-service attacks | |
Fokes et al. | A survey of security vulnerabilities in social networking media: the case of Facebook | |
Ndubueze | Generation Y and online victimization in Nigeria: How vulnerable are younger internet users? | |
McMullan | Cyber fraud, online poker, and order-maintenance in virtual worlds | |
Sardá | An onion with layers of hope and fear: A cross‐case analysis of the media representation of Tor Network reflecting theoretical perspectives of new technologies | |
Simpson | New labor, new censorship? Politics, religion and internet filtering in Australia | |
Muchonjo et al. | An Investigation into Ipredation in Cyberspace towards Developing a Framework for Preventing Ipredators’ Attacks | |
Conner | Why Don't You Take a Seat away from That Computer: Why Louisiana Revised Statute 14: 91.5 is Unconstitutional | |
Medlin et al. | Obtaining patient’s information from hospital employees through social engineering techniques: an investigative study | |
Chandel et al. | Cyber manhunt: evaluation of technologies and practices for effective community development and maintenance | |
Nisbett | Checkmate: How Sexual Predators in (Your) Space Have Strategically Employed Existing Cyber-Laws to Outflank Their Prey | |
Kraus et al. | Seven deadliest Microsoft attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC DATED 19-12-2002 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase in: |
Ref country code: JP |