WO2001017159A1 - Methode d'encryptage multi-modules - Google Patents
Methode d'encryptage multi-modules Download PDFInfo
- Publication number
- WO2001017159A1 WO2001017159A1 PCT/IB2000/001157 IB0001157W WO0117159A1 WO 2001017159 A1 WO2001017159 A1 WO 2001017159A1 IB 0001157 W IB0001157 W IB 0001157W WO 0117159 A1 WO0117159 A1 WO 0117159A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encryption
- module
- decryption
- key
- modules
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- the present invention relates to the field of encryption, or encryption, and decryption or decryption of data, and particularly of data which must remain inaccessible to unauthorized persons or devices in the context of pay television systems.
- the data is encrypted in a secure environment, housing significant computing powers, and called the encoding subsystem, then sent, by means known per se, to at least one decentralized subsystem where they are decrypted, usually by means of an IRD (Integrated Receiver Decoder) and with the help of a smart card.
- IRD Integrated Receiver Decoder
- Speed is understood in the sense of the time required to decrypt the data received.
- the first criterion is that of physical security, relating to the ease or difficulty of an investigation method by extraction of certain components, followed by their possible replacement by other components. These replacement components, intended to inform the unauthorized person about the nature and operation of the encryption-decryption system, are chosen by him so as not to be detected, or as little as possible, by the rest of the system.
- a second criterion is that of system security, where attacks are not physically intrusive but require mathematical analysis. Typically, these attacks will be carried out by high-powered computers that will attempt to break algorithms and encryption codes.
- Encryption means - symmetric key decryption are for example systems called DES (Data Encryption Standard). These relatively old means offer only relative security and physical security. It is in particular for this reason that more and more, the DES, whose key lengths are too small to satisfy the system security conditions, is replaced by encryption means - new decryption or with longer keys. In general, these symmetrical key means use algorithms comprising encryption rounds.
- Simple Power Analysis we use the fact that a microprocessor responsible for encrypting or decrypting data is connected to a voltage source (generally 5 Volts). When it is at rest, it is traversed by a fixed current of intensity i. When active, the instantaneous intensity i is a function not only of the incoming data, but also of the encryption algorithm. Simple Power Analysis consists in measuring the current i as a function of time. We can therefore deduce the type of algorithm that the microprocessor performs.
- the Timing Analysis method consists of measuring the calculation time according to a sample presented to the decryption module.
- the relationship between the sample presented and the calculation time of the result makes it possible to find the secret parameters of the decryption module such as the key.
- asymmetric key algorithms have been proposed, such as the so-called RSA systems (Rivest, Shamir and Adleman). These systems include the generation of a pair of paired keys, one called public used for encryption, and the other called private used for decryption. These algorithms offer a high level of security, both system and physical. They are however slower than traditional systems, especially at the encryption stage.
- the requirement to have to resist DPA attacks means using so-called "whitening" scrambling systems, either in the information at the input or at the output of an encryption-decryption algorithm.
- the whitening technique is described in ⁇ 3.5 of the same document cited above.
- the object of the present invention is to have an encryption-decryption method which resists modern methods of investigation as described above.
- the object of the present invention is achieved by the method described in the characterizing part of claim 1.
- the particularity of the method lies in the fact that an intermediate module does not start when the result of the previous (or upstream) module has finished but starts as soon as some of the information is already available. Therefore, for an outside observer, it is not possible to establish the entry or exit conditions for this module.
- this chip card containing only relatively limited computing power compared to the encoding subsystem, it is for example advantageous to use a asymmetric public key, relatively quick to operate, during the last stages of decryption. This allows on the one hand to preserve the invulnerability characteristics of the system at the end of the process, and on the other hand to concentrate the computing power, linked essentially to encryption using the private key, in the subsystem encoding.
- the invention makes it possible to protect against the aforementioned attacks by combining various means of encryption-decryption in an encryption-decryption system, and possibly associating a concatenation or partial nesting with the sequence in which these means are followed.
- the encryption-decryption system comprises an encoding subsystem where three algorithms are used sequentially:
- ni is part of the public key of the asymmetric algorithm A1
- modulo represents the well-known mathematical operator of congruences in the set of relative integers
- d1 is the private key of algorithm A.
- the cryptogram c3 starts from the encoding subsystem and reaches the decentralized subsystem by means known per se. In the case of pay-TV systems, it can be both video data and messages.
- the decentralized subsystem uses, in reverse order to the previous one, three algorithms A1 ', S' and A2 '. These three algorithms are part of three encryption-decryption means A1-A1 ', SS' and A2-A2 ', distributed between the encoding subsystem and the decentralized subsystem, and representing the encryption-decryption system.
- Concatenation in the decentralized subsystem, consists in starting the decoding step e) while c2 has not yet been completely restored by the previous step d), and in starting the decoding step f) then that d has not been completely restored by step e.
- the advantage is to thwart an attack which would aim for example first to extract, in the decentralized subsystem, the cryptogram d at the end of step e, to compare it with the data in clear m, then by means of d and m to attack the algorithm A1 ⁇ then to go up the coding chain step by step.
- Concatenation is not required in the encoding subsystem, which is installed in a secure physical environment. On the other hand, it is useful in the decentralized subsystem.
- the IRD In the case of pay television, the IRD is indeed installed at the subscriber's and can be the object of attacks of the pre-described type.
- steps a) and c) that is to say the encryption steps with private keys, are 20 times longer than steps d) and f) of decryption with public keys.
- the algorithms A1 and A2 are identical as are their counterparts AV and A2 '.
- step c) the public key e2, n2 of the asymmetric algorithm A2 is used while in step d) the cryptogram c3 is decrypted with the private key d2 of this algorithm.
- step d) the cryptogram c3 is decrypted with the private key d2 of this algorithm.
- FIG. 2 shows the decryption operations
- FIG. 3 shows an alternative to the encryption method
- a set of data m is introduced into the encryption chain.
- a first element A1 performs an encryption operation using the so-called private key composed of the exponent d1 and the modulo ni.
- the result of this operation is represented by C1.
- the following module begins its operation.
- This next module S performs its encryption operation with a secret key.
- the result C2 as soon as partially available is transmitted to the module A2 for the third encryption operation using the so-called private key composed of the exponent d2 and the modulo n2.
- the final result, called here C3 is ready to be transmitted by known channels such as radio or cable.
- FIG. 2 represents the decryption system composed of the three decryption modules A1 ′, S ′, A2 ′ similar to those used for encryption, but ordered inversely.
- the module A2 which performs its decryption operation on the basis of the so-called public key composed of the exponent e2 and the modulo n2.
- the module A1 performs its operation on the basis of the so-called public key composed of the exponent e1 and the modulo ni.
- the module A2 uses the so-called public key in place of the so-called private key.
- the public key e2, n2 is used by the module A2, (see Figure 3) and during decryption (see Figure 4), the module A2 'uses the private key d2, n2 to operate.
- this configuration presents an overload of work to the decryption unit, the use of a private key reinforces the security offered by the A2 module.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Slot Machines And Peripheral Devices (AREA)
- Coupling Device And Connection With Printed Circuit (AREA)
Abstract
Description
Claims
Priority Applications (21)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
HU0202691A HU224846B1 (en) | 1999-08-30 | 2000-08-24 | Encryption and decryption method |
MXPA02001849A MXPA02001849A (es) | 1999-08-30 | 2000-08-24 | Metodo de encriptacion multi-modulos. |
AU63118/00A AU769437B2 (en) | 1999-08-30 | 2000-08-24 | Multiple module encryption method |
EA200200184A EA003745B1 (ru) | 1999-08-30 | 2000-08-24 | Способ мультимодульного шифрования |
IL14828500A IL148285A0 (en) | 1999-08-30 | 2000-08-24 | Multiple module encryption method |
EP00949864A EP1208666A1 (fr) | 1999-08-30 | 2000-08-24 | Methode d'encryptage multi-modules |
PL00353795A PL353795A1 (en) | 1999-08-30 | 2000-08-24 | Multiple module encryption method |
UA2002021660A UA67860C2 (en) | 1999-08-30 | 2000-08-24 | Method for coding and decoding data |
US10/069,714 US7190790B1 (en) | 1999-08-30 | 2000-08-24 | Multiple module encryption method |
KR1020027002394A KR20020041807A (ko) | 1999-08-30 | 2000-08-24 | 다중-모듈 암호화 방법 |
APAP/P/2002/002433A AP2002002433A0 (en) | 1999-08-30 | 2000-08-24 | Multiple module encryption method. |
BR0013712-0A BR0013712A (pt) | 1999-08-30 | 2000-08-24 | Método de codificação multi-módulos |
DZ003193A DZ3193A1 (fr) | 1999-08-30 | 2000-08-24 | Méthode d'encryptage multi-modules. |
JP2001520986A JP2003508965A (ja) | 1999-08-30 | 2000-08-24 | マルチモジュール暗号化方法 |
CA002383042A CA2383042A1 (fr) | 1999-08-30 | 2000-08-24 | Methode d'encryptage multi-modules |
NZ517438A NZ517438A (en) | 1999-08-30 | 2000-08-24 | Multiple module encryption method |
SK289-2002A SK2892002A3 (en) | 1999-08-30 | 2000-08-24 | Multiple module encryption method |
EEP200200106A EE200200106A (et) | 1999-08-30 | 2000-08-24 | Mitme mooduliga krüptimismeetod |
HR20020179A HRP20020179A2 (en) | 1999-08-30 | 2002-02-27 | Multiple module encryption method |
NO20020951A NO20020951L (no) | 1999-08-30 | 2002-02-27 | Fremgangsmåte for multimodul kryptering |
HK03100573.2A HK1048407B (zh) | 1999-08-30 | 2003-01-23 | 多模塊加密方法 |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CH1573/99 | 1999-08-30 | ||
CH157399 | 1999-08-30 | ||
US19417100P | 2000-04-03 | 2000-04-03 | |
US60/194,171 | 2000-04-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001017159A1 true WO2001017159A1 (fr) | 2001-03-08 |
Family
ID=25688037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2000/001157 WO2001017159A1 (fr) | 1999-08-30 | 2000-08-24 | Methode d'encryptage multi-modules |
Country Status (27)
Country | Link |
---|---|
EP (1) | EP1208666A1 (fr) |
JP (1) | JP2003508965A (fr) |
KR (1) | KR20020041807A (fr) |
CN (1) | CN100448193C (fr) |
AP (1) | AP2002002433A0 (fr) |
AU (1) | AU769437B2 (fr) |
BG (1) | BG64520B1 (fr) |
BR (1) | BR0013712A (fr) |
CA (1) | CA2383042A1 (fr) |
CU (1) | CU22950A3 (fr) |
CZ (1) | CZ2002582A3 (fr) |
DZ (1) | DZ3193A1 (fr) |
EA (1) | EA003745B1 (fr) |
EE (1) | EE200200106A (fr) |
HK (1) | HK1048407B (fr) |
HR (1) | HRP20020179A2 (fr) |
HU (1) | HU224846B1 (fr) |
IL (1) | IL148285A0 (fr) |
MA (1) | MA25431A1 (fr) |
MX (1) | MXPA02001849A (fr) |
NO (1) | NO20020951L (fr) |
NZ (1) | NZ517438A (fr) |
OA (1) | OA12153A (fr) |
PL (1) | PL353795A1 (fr) |
SK (1) | SK2892002A3 (fr) |
TR (1) | TR200200525T2 (fr) |
WO (1) | WO2001017159A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10977631B2 (en) | 2006-05-15 | 2021-04-13 | The Directv Group, Inc. | Secure content transfer systems and methods to operate the same |
US11689549B2 (en) | 2017-01-30 | 2023-06-27 | Microsoft Technology Licensing, Llc | Continuous learning for intrusion detection |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19539700C1 (de) * | 1995-10-25 | 1996-11-28 | Siemens Ag | Sicherheitschip |
US5594797A (en) * | 1995-02-22 | 1997-01-14 | Nokia Mobile Phones | Variable security level encryption |
-
2000
- 2000-08-24 HU HU0202691A patent/HU224846B1/hu not_active IP Right Cessation
- 2000-08-24 EA EA200200184A patent/EA003745B1/ru not_active IP Right Cessation
- 2000-08-24 NZ NZ517438A patent/NZ517438A/en unknown
- 2000-08-24 OA OA1200200070A patent/OA12153A/fr unknown
- 2000-08-24 JP JP2001520986A patent/JP2003508965A/ja not_active Withdrawn
- 2000-08-24 PL PL00353795A patent/PL353795A1/xx not_active Application Discontinuation
- 2000-08-24 SK SK289-2002A patent/SK2892002A3/sk unknown
- 2000-08-24 CA CA002383042A patent/CA2383042A1/fr not_active Abandoned
- 2000-08-24 AU AU63118/00A patent/AU769437B2/en not_active Ceased
- 2000-08-24 TR TR2002/00525T patent/TR200200525T2/xx unknown
- 2000-08-24 EP EP00949864A patent/EP1208666A1/fr not_active Withdrawn
- 2000-08-24 WO PCT/IB2000/001157 patent/WO2001017159A1/fr active IP Right Grant
- 2000-08-24 IL IL14828500A patent/IL148285A0/xx unknown
- 2000-08-24 CZ CZ2002582A patent/CZ2002582A3/cs unknown
- 2000-08-24 AP APAP/P/2002/002433A patent/AP2002002433A0/en unknown
- 2000-08-24 EE EEP200200106A patent/EE200200106A/xx unknown
- 2000-08-24 MX MXPA02001849A patent/MXPA02001849A/es unknown
- 2000-08-24 CN CNB008122938A patent/CN100448193C/zh not_active Expired - Fee Related
- 2000-08-24 DZ DZ003193A patent/DZ3193A1/fr active
- 2000-08-24 KR KR1020027002394A patent/KR20020041807A/ko not_active Application Discontinuation
- 2000-08-24 BR BR0013712-0A patent/BR0013712A/pt not_active IP Right Cessation
-
2002
- 2002-02-26 BG BG106436A patent/BG64520B1/bg unknown
- 2002-02-26 MA MA26528A patent/MA25431A1/fr unknown
- 2002-02-27 NO NO20020951A patent/NO20020951L/no not_active Application Discontinuation
- 2002-02-27 HR HR20020179A patent/HRP20020179A2/hr not_active Application Discontinuation
- 2002-02-28 CU CU20020047A patent/CU22950A3/es unknown
-
2003
- 2003-01-23 HK HK03100573.2A patent/HK1048407B/zh not_active IP Right Cessation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5594797A (en) * | 1995-02-22 | 1997-01-14 | Nokia Mobile Phones | Variable security level encryption |
DE19539700C1 (de) * | 1995-10-25 | 1996-11-28 | Siemens Ag | Sicherheitschip |
Non-Patent Citations (1)
Title |
---|
RENZY M ET AL: "A BLOCK CIPHER METHOD USING COMBINATIONS OF DIFFERENT METHODS UNDERTHE CONTROL OF THE USER KEY", PROCEEDINGS OF THE WORKSHOP ON THE THEORY AND APPLICATION OF CRYPTOGRAPHIC TECHNIQUES,DE,BERLIN, SPRINGER, vol. CONF. 3, pages 531-534, XP000470470, ISBN: 3-540-57220-1 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10977631B2 (en) | 2006-05-15 | 2021-04-13 | The Directv Group, Inc. | Secure content transfer systems and methods to operate the same |
US11689549B2 (en) | 2017-01-30 | 2023-06-27 | Microsoft Technology Licensing, Llc | Continuous learning for intrusion detection |
Also Published As
Publication number | Publication date |
---|---|
MA25431A1 (fr) | 2002-04-01 |
HUP0202691A2 (en) | 2002-12-28 |
MXPA02001849A (es) | 2004-02-26 |
DZ3193A1 (fr) | 2001-03-08 |
CZ2002582A3 (cs) | 2002-07-17 |
HK1048407B (zh) | 2009-09-25 |
PL353795A1 (en) | 2003-12-01 |
CA2383042A1 (fr) | 2001-03-08 |
HRP20020179A2 (en) | 2004-02-29 |
NO20020951D0 (no) | 2002-02-27 |
OA12153A (fr) | 2006-05-08 |
AU6311800A (en) | 2001-03-26 |
BG64520B1 (bg) | 2005-05-31 |
BR0013712A (pt) | 2002-05-07 |
TR200200525T2 (tr) | 2002-07-22 |
AU769437B2 (en) | 2004-01-29 |
EE200200106A (et) | 2003-04-15 |
BG106436A (en) | 2002-10-31 |
KR20020041807A (ko) | 2002-06-03 |
IL148285A0 (en) | 2002-09-12 |
CN1371563A (zh) | 2002-09-25 |
NO20020951L (no) | 2002-04-23 |
NZ517438A (en) | 2003-09-26 |
EP1208666A1 (fr) | 2002-05-29 |
AP2002002433A0 (en) | 2002-03-31 |
HK1048407A1 (en) | 2003-03-28 |
JP2003508965A (ja) | 2003-03-04 |
CN100448193C (zh) | 2008-12-31 |
HU224846B1 (en) | 2006-03-28 |
SK2892002A3 (en) | 2002-07-02 |
CU22950A3 (es) | 2004-04-13 |
EA200200184A1 (ru) | 2002-06-27 |
EA003745B1 (ru) | 2003-08-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2380306B1 (fr) | Circuit de cryptographie protege contre les attaques en observation, notamment d'ordre eleve | |
EP2380305B1 (fr) | Circuit de cryptographie, protégé notamment contre les attaques par observation de fuites d'information par leur chiffrement | |
EP2458776A1 (fr) | Procédé et système de protection d'un dispositif de cryptographie | |
FR2496303A1 (fr) | Systeme de chiffrage/dechiffrement de donnees a cle publique | |
EP2887574A1 (fr) | Procédé de conversion d'un contenu à acces conditionnel | |
EP2415199B1 (fr) | Procede pour effectuer une tache cryptographique dans un composant electronique | |
EP2707989B1 (fr) | Dispositif et procede de generation de cles a securite renforcee pour algorithme de chiffrement pleinement homomorphique | |
CA2816933C (fr) | Protection contre les ecoutes passives | |
EP3300292B1 (fr) | Procédé de chiffrement ou de déchiffrement protégé contre des attaques par canaux cachés | |
EP1904921A1 (fr) | Procede cryptographique pour la mise en oeuvre securisee d'une exponentiation et composant associe | |
EP0756398B1 (fr) | Système et procédé de communication de messages cryptés selon un procédé de type R.S.A. avec réduction modulaire pour obtenir un décryptage rapide | |
EP1538508A1 (fr) | Procédé et dispositif de chiffrement et dechiffrement à la volée | |
EP1208666A1 (fr) | Methode d'encryptage multi-modules | |
EP4096144A1 (fr) | Contremesures par infection améliorées | |
FR2923968A1 (fr) | Procede de partage d'un secret fort entre deux parties dont l'une dispose de peu de puissance de traitement. | |
FR2818846A1 (fr) | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de cryptographie | |
FR3016987A1 (fr) | Echelle de montgomery desequilibree | |
EP3716044B1 (fr) | Protection d'un calcul itératif | |
EP4024753B1 (fr) | Procédé et module électronique de calcul d'une quantité cryptographique avec multiplications sans retenue, procédé et dispositif électronique de traitement d'une donnée et programme d'ordinateur associés | |
EP0962069A1 (fr) | Systeme cryptographique comprenant un systeme de chiffrement et de dechiffrement et un systeme de sequestre de cles, et les appareils et dispositifs associes | |
EP3340096B1 (fr) | Procédé de configuration d'un programme cryptographique destiné à être exécuté par un terminal | |
EP1670172A1 (fr) | Procédé et système d'encryption par un proxy. | |
EP4270855A1 (fr) | Protection contre les attaques par canal auxiliaire a l aide d'un masquage carre | |
FR3145222A1 (fr) | Protection contre les attaques par canal auxiliaire d’un algorithme cryptographique impliquant une table de substitution | |
FR3135854A1 (fr) | Fourniture sécurisée de clefs pour un cryptage totalement homomorphe |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 1200200192 Country of ref document: VN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: PV2002-582 Country of ref document: CZ |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200201394 Country of ref document: ZA |
|
WWE | Wipo information: entry into national phase |
Ref document number: IN/PCT/2002/00206/DE Country of ref document: IN Ref document number: 200200184 Country of ref document: EA |
|
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2002/001849 Country of ref document: MX Ref document number: 148285 Country of ref document: IL Ref document number: 2000949864 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020027002394 Country of ref document: KR Ref document number: 517438 Country of ref document: NZ |
|
ENP | Entry into the national phase |
Ref document number: 2000 106436 Country of ref document: BG Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2383042 Country of ref document: CA Ref document number: 2892002 Country of ref document: SK |
|
WWE | Wipo information: entry into national phase |
Ref document number: P20020179A Country of ref document: HR Ref document number: 2002/00525 Country of ref document: TR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 008122938 Country of ref document: CN Ref document number: 63118/00 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: DZP2002000058 Country of ref document: DZ |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10069714 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2000949864 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020027002394 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: PV2002-582 Country of ref document: CZ |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 517438 Country of ref document: NZ |
|
WWG | Wipo information: grant in national office |
Ref document number: 517438 Country of ref document: NZ |
|
WWG | Wipo information: grant in national office |
Ref document number: 63118/00 Country of ref document: AU |