WO2001015379A1 - Appareil et procede destines a recevoir une identification d'information via des premier et second reseaux de communications - Google Patents

Appareil et procede destines a recevoir une identification d'information via des premier et second reseaux de communications Download PDF

Info

Publication number
WO2001015379A1
WO2001015379A1 PCT/IL2000/000450 IL0000450W WO0115379A1 WO 2001015379 A1 WO2001015379 A1 WO 2001015379A1 IL 0000450 W IL0000450 W IL 0000450W WO 0115379 A1 WO0115379 A1 WO 0115379A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
identification information
mebuffer
name
user
Prior art date
Application number
PCT/IL2000/000450
Other languages
English (en)
Inventor
Guy Edelist
Original Assignee
Secucell Ltd.
Kirichenko, Oleg
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Secucell Ltd., Kirichenko, Oleg filed Critical Secucell Ltd.
Priority to AU61793/00A priority Critical patent/AU6179300A/en
Publication of WO2001015379A1 publication Critical patent/WO2001015379A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the present invention relates to apparatus and methods for authentication. 5
  • servers are secured by providing two blank fields, "user name” and "secret password", in interfaced software. Each user selects or is assigned a secret password which is known only to him or her. The server stores this password in 0 association with the user's name. Only if the user succeeds in entering both user name and secret password is he allowed access to the server.
  • hackers sometimes enter another person's name and then scan rapidly through all possible passwords until the person's password is identified.
  • GSM global system for mobile communications
  • cellular telephone networks 5 are described at an Internet site entitled http://www/gsmworld.com. 133 countries are currently covered by a GSM network.
  • GSM has a two-way messaging feature which allows subscribers to send non-verbal messages to one another.
  • the present invention seeks to provide an improved method for remote verification.
  • a dual network verification method comprising accepting first identification information identifying an individual user via a computer network; accepting second identification information identifying the individual user via a telephone network; and, if said first identification information matches said second identification information, authorizing said user to perform a restricted activity.
  • the restricted activity preferably comprises gaining access to a restricted computerized system.
  • the telephone network supports a caller identification function transmitting a name of a caller over the telephone network to a recipient of a call initiated by the caller
  • the method also comprises a set-up step including storing a name 5 of the individual user, in association with first and second passwords, wherein said name is identical to the name employed by said caller identification function
  • the first identification information accepting step comprises accepting, via the computer network, said name and said first password
  • the second identification information accepting step comprises: accepting, via the telephone network, said second password
  • the if-authorizing step comprises determining, for each incoming call whose name matches a name entered over the computer network, whether the first and second passwords received via the computer network and telephone network respectively correspond to one another.
  • said telephone network comprises a GSM cellular telephone network.
  • a dual network verification method including accepting first identification information identifying an individual user via a first network, accepting second ident'fication information identifying the individual user via a second network and, if the first identification information matches the second identification information, authorizing the user to perform a restricted activity.
  • the restricted activity comprises gaining access to a restricted computerized system.
  • the second network supports a caller identification function transmitting a name of a caller over the second network to a recipient of a call initiated by the caller
  • the method also including a set-up step including storing a name of the individual user, in association with first and second passwords, wherein said name is identical to the name employed by said caller identification function
  • the first identification information accepting step comprises accepting, via the first network, the name and the first password
  • the second identification information accepting step includes accepting, via the second network, the second password, and receiving, via the caller identification function of the second network, the name of the individual user
  • the if-authorizing step comprises determining, for each incoming call whose name matches a name entered over the first network, whether the first and second passwords received via the first network and the second network respectively correspond to one another.
  • a dual network verification system operative in conjunction with first and second networks, the system including a first identifier operative to accept first identification information identifying an individual user via the first network, a second identifier operative to accept second identification information identifying the individual user via the second network and a user authorization unit operative to authorize the user to perform a restricted activity if said first identification information matches said second identification information.
  • the first network comprises a computer network.
  • the second network includes a telephone network.
  • the telephone network comprises a cellular telephone network.
  • the telephone network includes a messaging telephone network.
  • the messaging telephone network includes a two-way messaging telephone network.
  • the two-way messaging cellular telephone network includes a GSM network.
  • the restricted activity includes accessing a restricted network node via the first network.
  • the method also includes the step of sending a warning to the user, if said first identification information does not match said second identification information.
  • Fig. 1 A is a simplified flowchart illustration of set-up by a gateway preparatory to a GSM-Internet based dual network verification working session provided in accordance with a preferred embodiment of the present invention
  • Fig. 1 B is a simplified flowchart illustration of set-up by a user's workstation preparatory to a GSM-Internet based dual network verification working session provided in accordance with a preferred embodiment of the present invention
  • Fig. 2A is a simplified flowchart illustration of operations performed by the gateway in the course of a GSM-Internet based dual network verification working session provided in accordance with a preferred embodiment of the present invention
  • Fig. 2B is a simplified flowchart illustration of operations performed by the user's workstation in the course of a GSM-Internet based dual network verification working session provided in accordance with a preferred embodiment of the present invention
  • Fig. 3 is a simplified block diagram of a GSM-Internet based dual network verification system constructed and operative in accordance with a preferred embodiment of the present invention and suitable for implementing the dual network verification method of Figs. 1A - 2B;
  • Fig. 4 is a simplified self-explanatory diagram of a first protocol for a general dual network verification system, in which thin lines denote password routes provided by the protocol and heavy lines denote networks;
  • Fig. 5 is a simplified self-explanatory diagram of a second protocol for a general dual network verification system, in which thin lines denote password routes provided by the protocol and heavy lines denote networks;
  • Fig. 6 is a simplified self-explanatory diagram of a preferred system for remote-access registration of a first time user
  • Fig. 7 is a simplified self-explanatory flowchart of a preferred mode of operation of the apparatus of Fig. 6.
  • Appendix A is a computer listing of a preferred software embodiment of a client constructed and operative in accordance with a preferred embodiment of the present invention
  • Appendix B is a computer listing of a preferred software embodiment of a server constructed and operative in accordance with a preferred embodiment of the present invention and useful in conjunction with the computer listing of Appendix B.
  • Fig. 1 A is a simplified generally self-explanatory flowchart illustration of set-up by a gateway preparatory to a GSM-Internet based dual network verification working session provided in accordance with a preferred embodiment of the present invention.
  • Fig. IB is a simplified generally self-explanatory flowchart illustration of set-up by a user's workstation preparatory to a GSM-Internet based dual network verification working session provided in accordance with a preferred embodiment of the present invention.
  • the terms "password” and "username” are used generally interchangeably.
  • Fig. 2A is a simplified flowchart illustration of operations performed by the gateway in the course of a GSM-Internet based dual network verification working session provided in accordance with a preferred embodiment of the present invention.
  • Fig. 2B is a simplified generally self-explanatory flowchart illustration of operations performed by the user's workstation in the course of a GSM-Internet based dual network verification working session provided in accordance with a preferred embodiment of the present invention.
  • the terms "user's workstation”, “user's PC 'client'", “user” and “workstation” are used generally interchangeably.
  • Fig. 3 is a simplified block diagram of a GSM-Internet based dual network verification system constructed and operative in accordance with a preferred embodiment of the present invention and suitable for implementing the dual network verification method of Figs. 1A - 2B.
  • Wired network 20 also termed herein "fixed network" 20 connects a multiplicity of computers thereby allowing users to access data in remote servers. Any suitable network implementation and protocol may be employed, such as Internet, to connect the computers together and allow them access to the servers.
  • Server 30 is a gate to other computers or to sensitive stored data and therefore it is important to prevent sabotage to server 30 by users.
  • Server 30, also termed herein
  • gateway 30 may comprise a large system such as an IBM mainframe or a small system such as an IBM PC.
  • the server 30 is a subscriber to a cellular network 60 to which the user also subscribes.
  • step 360 the gateway 30 sends a code to the user via the GSM device which the gateway's database indicates to correspond to that user. If the user is illegitimate, i.e. is not the holder of the GSM device indicated in the gateway's database, then the illegitimate user will not be capable of returning the code to the gateway and will be denied access to the protected computer system 70 because the "if statement of step 370 will not be fulfilled.
  • the newcode is generated for each individual verification session and is stored temporarily only for that session, since it will be replaced for the next verification session.
  • the newcode confirmation of step 370 comprises accessing a newcode from the database, using the telephone number of the sending GSM device as the accessing key, and verifying that the accessed newcode is the same as the newcode received.
  • Fig. 4 is a simplified self-explanatory diagram of a first protocol for a general dual network verification system, in which thin lines denote password routes provided by the protocol and heavy lines denote networks.
  • Fig. 5 is a simplified self-explanatory diagram of a second protocol for a general dual network verification system, in which thin lines denote password routes provided by the protocol and heavy lines denote networks.
  • Fig. 6 is a simplified self-explanatory diagram of a preferred system for remote-access registration of a first time user.
  • Fig. 7 is a simplified self-explanatory flowchart of a preferred mode of operation 5 of the apparatus of Fig. 6.
  • a particular advantage of a preferred embodiment of the present invention is that one of the user's passwords is entered not via the user's client computer but rather by manually keying in the password on the keypad of the cellular phone. This prevents a would-be hacker from rapidly scanning through all possible passwords as is possible
  • the illustrated embodiment is suitable for computer network subscribers who are also GSM subscribers. However, it is appreciated that, more generally, the present invention is suitable for subscribers of any two networks each of which is not completely secure.
  • the role of the GSM network may be replaced even by 15 a conventional telephone network and more preferably, by any other messaging cellular or "stationary" (non-cellular) telephone network.
  • the GSM module associated with the protected site contacts the subscriber over the GSM network, sends him or her a password which the subscriber's computer then sends back through the Internet.
  • the 0 subscriber may contact the site-associated GSM module in which case the site-associated GSM module must typically receive a large volume of messages per unit time.
  • each of 5 the two (or more) passwords which are being used to authenticate the user are communicated between the user and the gateway over different routes, as seen by comparing Figs. 4 and 5.
  • These routes, taken together, typically utilize both networks, as seen in each of Figs. 4 and 5.
  • the routes are as shown in the illustrated embodiments. 0
  • the first password is sent, during set-up. over the first (e.g.
  • the gateway-subscriber contact over the network 5 may be initiated by the subscriber rather than by the gateway.
  • the passwords may be sent from the gateway to the subscriber, during set-up or during an authentication session, over different routes than those described.
  • the passwords may be sent from the subscriber to the gateway, during an authentication session, over different routes than those described.
  • any other suitable protocol may be employed which uses both networks in order to provide two different routes for transferring passwords between the user and the gateway.
  • the term "gateway" is used herein to refer to any functionality that provides any type of selective access, based on authentication, to any type of restricted commodity such as a body of information or a service.
  • Appendix A is a computer listing of a preferred software embodiment of a client constructed and operative in accordance with a preferred embodiment of the present invention
  • Appendix B is a computer listing of a preferred software embodiment of a server constructed and operative in accordance with a preferred embodiment of the present invention and useful in conjunction with the computer listing of Appendix B.
  • Run Visual Basic in the client workstation create a new project, termed "client” inside the Visual Basic environment, and insert the three files of Appendix A into the project, using the following three commands respectively: “add form”, “add module” and “add resource”.
  • In the "file” menu select the "make.exe file” option in order to generate executable files for the client and for the server.
  • the user via external means, and the telephone number of the user's GSM module, and keys this information into a "username" field and an associated "GSM phone number” field.
  • the server the "secret data” field, in the present embodiment
  • s/he enters his username in response to a suitable prompt and confirms by clicking or pressing ENTER.
  • the system then automatically transfers the username for verification by the server which then either provides or refuses to provide access to the "secret data” field.
  • the content of the "secret data” field appears on the screen of the user's workstation, if and only if the user is verified by the server.
  • the three wire cable typically comprises two female DB9 connectors.
  • the first wire connects pin 5 of the two DB9 connectors.
  • the second wire connects pin 2 of the first DB9 connector to pin 3 of the second DB9 connector.
  • the third wire connects pin 3 of the first DB9 connected to pin 2 of the second DB9 connector.
  • the software components of the present invention may, if desired, be implemented in ROM (read-only memory) form.
  • the software components may, generally, be implemented in hardware, if desired, using conventional techniques.
  • CCCS Left (MEBuffer, 2) ' Central Service address len.
  • CCCS Mi ⁇ (MEBuffer, 3, FS * 2 )
  • Msg. type is not SMS-DELIVER. 5379 frmClient - 3 End If
  • MEBuffer R_gnt (MEBuffer, Len (MEBuf er) - 2)
  • CCCS Lef 'MEBuffer, 2)
  • bCnc Val t "Sri" + CCCS) ' originating address len. in semi-octets
  • MEBuffer Rign (MEBu er, Len (MEBuffer) - 1)
  • SSSS Lef (MEBuffer, 1)
  • MEEuffer Rignt (MEBuffer, Len (MEBuffer) - 1)
  • DDDS DDDS & SSSS & CCCS Next
  • MEBuffer Righ (MEBuf er, Len (MEBuf er) - 1)
  • DDDS DDDS 4 SSSS 4 CCCS S ' read Mounth
  • CCCS Left (MEBu fer, 1)
  • MEBuffer Rignt (MEBu fer, Len (MEBuf er) - 1)
  • SSSS Left (ME3uffer, 1)
  • MEBuffer Rign (MEBuffer, Len (MEBuf er) - 1)
  • DDDS DDD$ 4 SSSS 4 CCCS 4 " " ' read Hour
  • MEBuffer Right (MEBu fer, Len (MEBuffer) - 1)
  • SSSS Left (MEBuffer, 1)
  • MEBuffer Rignt (MEBuffer, Len (MEBuffer) - 1)
  • SSSS Lef (MEBuffer, 1)
  • MEBuffer Rignt (MEBuffer, Len (MEBuffer) - 1)
  • DDDS DDDS 4 SSSS 4 CCCS 4 " : " ' read Sec
  • MEBuffer Right (MEBuffer, Len (MEBuffer) - 1)
  • SSSS Left (ME3uffer, 1)
  • MEBuffer Rignt (MEBuf er, Len (MEBuffer) - 1)
  • DDDS DDDS 4 SSSS 4 CCCS ' eat T me Zone
  • MEBuffer MEBuffer 4 SSSS End If
  • MEBuffer MEBuffer S SSSS Loop Until InStr (MEBuffer, vbCrLf)
  • NOC Val ("4H" S CCCS)
  • CN2 - CN2 ⁇ [2 - (8 - CharNmb))
  • ChPo t ChPomt + 2
  • StrmgOut ⁇ trmgOut 4 SSSS
  • CCCS Mid (Strmgln, ChPoint, 1)
  • ChPoint ChPoint + 1 Loop
  • SSSS SSSS 4 M ⁇ d(Addr ⁇ tr, ⁇ %, 1)
  • SSSS SSSS 4 Mid (AddrStr, ⁇ % - 1, 1)
  • strPDU strPDU 4 "A7"
  • CCCS Chr(13) 4 Chr(lO) & Chr(62) s hr(32)
  • MEBuffer MEBuffer 4 SSSS End If Loop Until InStr (MEBuffer, CCCS)
  • MEBuffer MEBuffer 4 SSSS End If If InStr (MEBuffer, "CMS ERROR") Then
  • Width 2535 379 frmServer - 3
  • Public strDate As String Public strFromAddr As String Public strToA ⁇ cr As String Public strMsg As String
  • CCCS M ⁇ d ( StrmgIn, ChPomt, 2 )
  • NOC Val ( "4H” 4 CCCS )
  • StrmgOut StrmgOut s SSSS
  • CN2 CN2 ⁇ (2 ⁇ (8 - CharNmb))
  • ChPoint ChPoint -t 2
  • BBuff ( ⁇ *) BBuff( ⁇ ) ⁇ 2
  • CCCS Mid(StringIn, ChPoint, 1)
  • ChPoint ChPoint + 1 Loop

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé de double vérification réseau qui consiste à accepter une information de première identification permettant d'identifier un usager via un premier réseau, à accepter une seconde information d'identification permettant d'identifier l'usager via un second réseau, et, si la première identification correspond à la seconde, à autoriser l'usager à réaliser une activité limitée.
PCT/IL2000/000450 1999-08-25 2000-07-27 Appareil et procede destines a recevoir une identification d'information via des premier et second reseaux de communications WO2001015379A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU61793/00A AU6179300A (en) 1999-08-25 2000-07-27 Apparatus and method for receiving identification information via a first and a second communication network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US38254699A 1999-08-25 1999-08-25
US09/382,546 1999-08-25

Publications (1)

Publication Number Publication Date
WO2001015379A1 true WO2001015379A1 (fr) 2001-03-01

Family

ID=23509445

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2000/000450 WO2001015379A1 (fr) 1999-08-25 2000-07-27 Appareil et procede destines a recevoir une identification d'information via des premier et second reseaux de communications

Country Status (2)

Country Link
AU (1) AU6179300A (fr)
WO (1) WO2001015379A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2419067A (en) * 2004-10-06 2006-04-12 Sharp Kk Deciding whether to permit a transaction, based on the value of an identifier sent over a communications channel and returned over a secure connection
US8650103B2 (en) 2001-10-17 2014-02-11 Ebay, Inc. Verification of a person identifier received online
US9455954B2 (en) 2004-05-04 2016-09-27 Heidelberger Druckmaschinen Ag Remote diagnosis system and method and printing machine having the system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2733068A1 (fr) * 1995-04-14 1996-10-18 G C Tech Procede de paiement electronique permettant d'effectuer des transactions liees a l'achat de biens sur un reseau informatique
WO1998002991A1 (fr) * 1996-07-12 1998-01-22 Ulrich Seng Procede de repartition d'une cle entre deux unites qui participent a une liaison par rnis/internet
US5729594A (en) * 1996-06-07 1998-03-17 Klingman; Edwin E. On-line secured financial transaction system through electronic media
WO1999037103A1 (fr) * 1998-01-14 1999-07-22 Nokia Networks Oy Procede de commande d'acces pour systeme de telephonie mobile

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2733068A1 (fr) * 1995-04-14 1996-10-18 G C Tech Procede de paiement electronique permettant d'effectuer des transactions liees a l'achat de biens sur un reseau informatique
US5729594A (en) * 1996-06-07 1998-03-17 Klingman; Edwin E. On-line secured financial transaction system through electronic media
WO1998002991A1 (fr) * 1996-07-12 1998-01-22 Ulrich Seng Procede de repartition d'une cle entre deux unites qui participent a une liaison par rnis/internet
WO1999037103A1 (fr) * 1998-01-14 1999-07-22 Nokia Networks Oy Procede de commande d'acces pour systeme de telephonie mobile

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8650103B2 (en) 2001-10-17 2014-02-11 Ebay, Inc. Verification of a person identifier received online
US9455954B2 (en) 2004-05-04 2016-09-27 Heidelberger Druckmaschinen Ag Remote diagnosis system and method and printing machine having the system
GB2419067A (en) * 2004-10-06 2006-04-12 Sharp Kk Deciding whether to permit a transaction, based on the value of an identifier sent over a communications channel and returned over a secure connection

Also Published As

Publication number Publication date
AU6179300A (en) 2001-03-19

Similar Documents

Publication Publication Date Title
US6145084A (en) Adaptive communication system enabling dissimilar devices to exchange information over a network
US6334056B1 (en) Secure gateway processing for handheld device markup language (HDML)
EP3008935B1 (fr) Authentification de dispositif mobile dans un scénario à réseaux de communication hétérogène
KR100683976B1 (ko) 인증방법 및 장치
US6078908A (en) Method for authorizing in data transmission systems
CA2200508C (fr) Dispositif de securite pour systemes a acces controle
US6515575B1 (en) Method of authenticating user and system for authenticating user
EP1189398B1 (fr) Dispositif de communication avec une fonction de relais et méthode de relais
TW532024B (en) System for distributed network authentication and access control
US20030131082A1 (en) Wireless lan system, an access point apparatus and a managing method of a wireless lan system, which can determine the system manager without making the process for the authentication troublesome
US20030050918A1 (en) Provision of secure access for telecommunications system
KR20090036562A (ko) 네트워크에 대한 접근을 제어하기 위한 방법 및 시스템
KR20000016949A (ko) 이동성장치의국소서비스에대한액세스제어를제공하기위한방법및장치
WO2001080525A1 (fr) Securite acces reseau
JP2006318489A (ja) サービスユーザのidの認証を確認する方法および装置
JP2002523973A (ja) コンピュータ・ネットワークにおけるサービスへの安全なアクセスを可能にするシステムおよび方法
US20050081066A1 (en) Providing credentials
US6795924B1 (en) Sat back channel security solution
US5978478A (en) Terminal adapter
EP0645688A1 (fr) Méthode d'identification d'utiliseurs de serveurs télématiques
KR100353207B1 (ko) 전화번호를 인스턴트 메신저 주소로서 사용한 인스턴트메신저 시스템 및 인스턴트 메시지 전송방법
WO2001015379A1 (fr) Appareil et procede destines a recevoir une identification d'information via des premier et second reseaux de communications
US20130337773A1 (en) Method and device for transmitting a verification request to an identification module
JPH1127750A (ja) アクセス認証方法、接続制御装置、及び通信システム
JP2002007355A (ja) パスワードを用いた通信方法

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP