WO2002019068A2 - Procede d'identification fonde sur un reseau de donnees - Google Patents

Procede d'identification fonde sur un reseau de donnees Download PDF

Info

Publication number
WO2002019068A2
WO2002019068A2 PCT/EP2001/009939 EP0109939W WO0219068A2 WO 2002019068 A2 WO2002019068 A2 WO 2002019068A2 EP 0109939 W EP0109939 W EP 0109939W WO 0219068 A2 WO0219068 A2 WO 0219068A2
Authority
WO
WIPO (PCT)
Prior art keywords
user
personal
database
identification
party
Prior art date
Application number
PCT/EP2001/009939
Other languages
German (de)
English (en)
Other versions
WO2002019068A3 (fr
Inventor
Otfried Rumberg
Rüdiger BREDENDIEK
Original Assignee
Otfried Rumberg
Bredendiek Ruediger
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Otfried Rumberg, Bredendiek Ruediger filed Critical Otfried Rumberg
Priority to AU2001291807A priority Critical patent/AU2001291807A1/en
Publication of WO2002019068A2 publication Critical patent/WO2002019068A2/fr
Publication of WO2002019068A3 publication Critical patent/WO2002019068A3/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor

Definitions

  • the invention relates to a method for personal identification of a user in a data network by a third party, in which the user is assigned a personal identification number and his personal data are registered in a database.
  • BESTATIGUNGSKOPIE Identify business relationships securely once and provide them with options that facilitate subsequent identification. For example, before a financial institution does business with a customer over the Internet, it is currently customary to clearly identify the customer using the Postident procedure or similar procedures and to provide them with a personal identification number and a list of transaction numbers that can be used once. As a rule, institutions that offer business over the Internet have to identify each individual customer in such a complex manner and provide them with the appropriate authorization options.
  • the invention is therefore based on the object of creating a method which reduces the effort of reliably identifying a user in a data network both for the third party requesting the identification and for the user significantly reduced without having to accept any loss of security in identification.
  • the invention proposes a method for personally identifying a user in a data network of the type mentioned at the outset, in which the user notifies the third party, in addition to the personal identification number, of a one-time use personal authentication number provided for each identification process, and that the Third parties on the basis of a combination of the communicated personal Identification number and the personal authentication number from the database receives an identification of the user.
  • the particular advantage of the method according to the invention lies in the security gain in the identification of the user by the third party requesting the identification.
  • the user is able to provide the business partner with the necessary information in a secure manner as part of the initiation of a long-term business relationship or only for a one-off business by specifying his personal identification number with a one-time personal authentication number.
  • the effort involved in identifying a user also decreases.
  • the method according to the invention is based on identification with a personal, multiple-use identification number and a one-time authentication number.
  • identification information for example the data of a credit card
  • the information provided becomes worthless after use and no longer poses a risk to the user.
  • the requesting institution is also secured according to the invention with regard to the information about the user without an independent database which is always kept up-to-date and reliably identified To entertain users.
  • the user is no longer forced to establish a secure business connection, including secure identification, with each business partner, but can, according to the method according to the invention, preferably carry out a secure identification via the database for each individual business or business partner.
  • a secure identification via the database for each individual business or business partner.
  • the database can also reduce the frequency of errors due to incorrect information transmission, in particular by the user. Writing and reading errors in forms filled in under time pressure lose importance due to the inventive method.
  • Authentication number transmitted over a public data network for example the Internet.
  • This procedure is particularly useful for offers via the Internet because the user is able to use an identical platform both for taking notice of and evaluating the offer and for any acceptance of the offer. This procedure reduces the time required and minimizes the probability of an error.
  • Previous security disadvantages, in particular in the transmission of personal information via public data networks, are eliminated by the method according to the invention.
  • the third party For the third party who wants to gain security with regard to the identity of the user, it makes sense if the third party receives the personal identification number and the personal one received from the user
  • Authentication number transmitted to the database via a public data network The use of a public data network, for example the Internet, for this data transfer has the decisive advantage that the third party can check the user with the appropriate data Information is no longer tied to a specific location. The necessary infrastructure, access to the public data network, is available almost everywhere. This omnipresenting makes the use of the database particularly cost-effective. Since the identical platform can also be used here for the transmission of the information from the user to the third party, as well as for checking the identity of the user, the time expenditure and the frequency of errors are also significantly reduced here. It is also possible to automatically archive such processes and reproduce them exactly at any time with regard to the time sequence and content. The information regarding the validity of the personal identification number and the personal authentication number gives the third party, for example a mail-order company, a reliable guarantee of the trustworthiness of the user and shows whether the identity of the third party can be checked using the database.
  • Identification number and its own personal authentication number are transmitted to the database together with the user's personal identification number and the user's personal authentication number. This procedure additionally increases the security of the method according to the invention. Furthermore, all processes are clearly reproducible due to the uniqueness of the personal authentication numbers.
  • connection between the third party and the database is preferably also via a public data network, it makes sense if the data transmitted to the database and the data made available by the database are encrypted. The effort of encryption is no longer on the user, but security is still guaranteed in this way.
  • the third party receives the personal identification number received from the user, the personal authentication number and others Data to be checked by the user is transmitted via the data network to a server via which the information contained in the database is queried, the server compares the data to be checked with the data in the database and the result of this check is communicated to the third party seeking information.
  • access to the personal data of this user is excluded upon presentation of the personal identification number and a personal authentication number of a user. Only the result of a review is available, reducing the risk of data misuse. For the user, this means a particularly high level of security with regard to their personal data in the database, which are not disclosed.
  • the third party for example a mail order company, the result of an identity check is often sufficient to counter criminal activity, for example an order to the wrong address. The user remains in full control of his personal data and the third party is given the opportunity to verify the information provided.
  • an advantageous development of the method according to the invention provides that the third party has read access to part of the personal data stored in the database by specifying the combination of personal identification number and personal authentication number User.
  • the effort of a business relationship with the third party is reduced in such a way that, for example, when concluding a purchase contract for the acceptance of an offer, the user only has to specify the accepted offer and his personal identification number with a personal one
  • Authentication number must transmit to the third party.
  • the information can be reduced to an order number, personal identification number and personal authentication number.
  • the previously required complex filling out of forms, for example for the initial entry or updating of customer data, is no longer necessary, since all data are kept in the database.
  • the effort is also considerably reduced since all essential points are regulated with a minimum of data flow.
  • the third party can refrain from sustainably storing information for users of the database, which must be brought up to date on a regular basis, since all relevant data is provided by the database in the course of any business contact.
  • a mail-order company for example, could completely do without updating a customer directory for ordering processes.
  • a further advantageous variant of the method according to the invention provides that the user receives confirmation of this identification from the database after the identification has taken place. Such confirmation gives the user additional security regarding the intended use of his data. A process that was not authorized by him would be uncovered in this way and any security gaps in the user or in the system would be subsequently recognized via this information return. With the help of extremely timely communication in the form of SMS messages, electronic mail and similar processes, the user can even cancel goods, for example, in the event of an error or misuse.
  • the personal identification number and / or the personal authentication number contains a coding which determines which data of the user can be checked or which parts of the personal data registered in the database are accessible to the third party. For example, if the service is free of charge, but which requires knowledge of the user's address, the user can, for example, provide the third party with the personal identification number with a personal authentication number, which precludes the provision of information or verification of information, for example regarding the bank details. It is particularly important to encode the personal identification number and / or personal authentication number, which defines the possible payment methods from the outset in the context of a purchase contract.
  • the address and the name of the user is data that must be given frequently in daily traffic, it makes sense to register the name and / or address of the user in the database.
  • ID card data can be particularly useful when dealing with public authorities. It may also be important to state the tax number, social security number and other identification numbers.
  • biometric data of the user are registered in the database. This opens up the possibility, for example, of having a biometric identification of a user checked, or of having to set up a biometric identification system to save the institution from having to record the biometric data and authorize it to access the database by means of a personal identification number and a personal authentication number.
  • the third party and the database may be required.
  • the database also contains contact information for the respective user. This information can be, for example, telephone numbers, addresses of electronic mail, fax numbers and the like.
  • a frequently occurring problem is the secure transmission of bank details and / or credit card data of the user to a third party.
  • a security deficiency can have unfavorable economic consequences, in particular when transmitting credit card data. It therefore makes sense if the database also contains information about bank details and / or credit card Contains user data.
  • the necessary up-to-dateness of this information can always be ensured with little effort due to the storage of this information in the centrally or decentrally organized database.
  • security can always be guaranteed due to the access restriction due to the personal identification number in combination with the personal authentication number.
  • the user is no longer forced to remember a large number of different identifiers and personal identification numbers, since these are stored securely in the database and, if necessary, access is always made according to the invention by specifying the personal identification number in combination with a personal identification number.
  • Fig. 4 An example of a coded personal
  • the Internet is provided with the reference number 1 as a platform for the method according to the invention.
  • Some elements of this public data network, which play a special role for the method according to the invention, are shown separately. Specifically, these are users 2 or customers, the third party 3 requesting the identification, or a mail-order company and a central database 4 in which the personal data of the users 2 are stored.
  • the user 2 causes his personal data 5 to be registered once in the central database 4.
  • the user 2 receives confirmation of this registration together with a personal identification number (IDNR) 6 and a list 7 of unique personal authentication numbers (PAN) 8 using a postident procedure ,
  • IDNR personal identification number
  • PAN unique personal authentication numbers
  • the department store After the identity of the user 2 has been established with certainty, the department store presents the user 2 with offers 9 for the conclusion of a purchase contract for a product 10.
  • the user 2 decides to buy the goods 10 which have the specifications 11.
  • the user 2 sends his personal identification number (IDNR) 6 a personal authentication number (PAN) 8 together with the specifications 11 of the goods 10 to the goods mail order company.
  • the personal authentication number (PAN) 8 here contains a code which authorizes the department store for read access to the data of the user 2 in the central database 4.
  • the department store sends the received personal identification number (IDNR) 6 together with the personal authentication number (PAN) 8 to the central database 4 which, after checking the identity of the user 2, transmits the data 12 to the department store.
  • the coding in the personal authentication number (PAN) 8 authorizes the department store to debit the invoice amount for the ordered goods shipment using the bank details of the user 2, which is also registered in the central database 4.
  • the user 2 receives his goods 10 on the conventional goods shipping route 13.
  • FIG. 3 shows another example of the method according to the invention.
  • the user 2 decides on an offer 9 to buy the goods 10 and selects the credit card as the payment mode. Since the transaction is carried out over the Internet, the user 2 cannot provide a manual signature, but has made an agreement with his financial institution that a personal authentication number (PAN) 8 must be transmitted for such cases.
  • PAN personal authentication number
  • the User transmits the personal identification number (IDNR) 6, the personal, to the sales institute 16
  • PAN Authentication number
  • IDNR personal identification number
  • PAN personal authentication number
  • the third party 3 sends the transmitted personal identification number (IDNR) 6 of the user 2 and the personal authentication number (PAN) 8 of the user 2 and their own personal identification number (IDNR) 14 with their own personal authentication number (PAN) 15 to the via a secure connection
  • Central database 4 which checks the validity of the combination of the personal identification number (IDNR) 6 of the user 2 with the personal authentication number (PAN) 8 of the user 2. If the result of this check is positive, the central database 4 transmits the confirmation to the third party 3 requesting the identification and the payment is initiated.
  • FIG. 4 shows a structure of a coded personal authentication number (PAN) 8.
  • PAN personal authentication number
  • Authentication number (PAN) 8 here consists of nine numbers 20 and three letters 21, which are only given if the requesting third party is to receive 3 information relating to the bank details of user 2.

Abstract

L'invention concerne un procédé d'identification personnelle d'un utilisateur (2) dans un réseau de données. Les procédés d'identification habituels présentent des risques considérables pour tous les intervenants. L'invention vise à réduire les moyens nécessaires à l'identification sûre d'un utilisateur (2) dans un réseau de données pour le tiers demandant l'identification (3) et pour l'utilisateur (2), sans perte au niveau de la sécurité de l'identification. Selon ledit procédé d'identification dans un réseau de données, on fait intervenir un numéro d'identification personnel (6) ainsi qu'un numéro d'authentification personnel (8) à usage unique, et on met en oeuvre une identification sur la base d'une combinaison du numéro d'identification personnel (6) et du numéro d'authentification personnel (8) au moyen d'une base de données (4). De manière avantageuse, le procédé selon l'invention permet d'augmenter le niveau de sécurité de l'identification de l'utilisateur (2) par le tiers (3) demandant l'identification, les moyens nécessaires à l'identification d'un utilisateur (2) pouvant être réduits en plus de l'augmentation de sécurité.
PCT/EP2001/009939 2000-09-01 2001-08-29 Procede d'identification fonde sur un reseau de donnees WO2002019068A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001291807A AU2001291807A1 (en) 2000-09-01 2001-08-29 Data network based identification method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10043554.8 2000-09-01
DE2000143554 DE10043554C2 (de) 2000-09-01 2000-09-01 Datennetzbasiertes Identifizierungsverfahren

Publications (2)

Publication Number Publication Date
WO2002019068A2 true WO2002019068A2 (fr) 2002-03-07
WO2002019068A3 WO2002019068A3 (fr) 2002-11-07

Family

ID=7654943

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2001/009939 WO2002019068A2 (fr) 2000-09-01 2001-08-29 Procede d'identification fonde sur un reseau de donnees

Country Status (3)

Country Link
AU (1) AU2001291807A1 (fr)
DE (1) DE10043554C2 (fr)
WO (1) WO2002019068A2 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2842319A1 (fr) * 2002-07-15 2004-01-16 France Telecom Systeme pour operer un transfert d'informations, simplifie par l'utilisation d'une relation pre-etablie et applications
US7707626B2 (en) 2005-06-01 2010-04-27 At&T Corp. Authentication management platform for managed security service providers

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5606614A (en) * 1993-10-15 1997-02-25 British Telecommunications Public Limited Company Personal identification systems
US5864829A (en) * 1995-09-14 1999-01-26 Hitachi Software Engineering Co., Ltd. Network charge method and system
WO1999049424A1 (fr) * 1998-03-25 1999-09-30 Orbis Patents Limited Systeme et procede de carte de credit
US6014650A (en) * 1997-08-19 2000-01-11 Zampese; David Purchase management system and method
WO2000002150A1 (fr) * 1998-07-01 2000-01-13 Webcard Inc. Procede d'autorisation de transaction

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2102464A1 (fr) * 1992-12-16 1994-06-17 Charles Arthur Witschorik Methode d'authentification visuelle au moyen d'images transmises par un systeme de telecommunication
JP2531354B2 (ja) * 1993-06-29 1996-09-04 日本電気株式会社 認証方式
US5953399A (en) * 1997-03-13 1999-09-14 Bell Atlantic Network Services, Inc. PBX selective caller identification authentication
CA2201994A1 (fr) * 1997-04-07 1998-10-07 Singh Sikand Parminder Controle de systemes de telecommunications

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5606614A (en) * 1993-10-15 1997-02-25 British Telecommunications Public Limited Company Personal identification systems
US5864829A (en) * 1995-09-14 1999-01-26 Hitachi Software Engineering Co., Ltd. Network charge method and system
US6014650A (en) * 1997-08-19 2000-01-11 Zampese; David Purchase management system and method
WO1999049424A1 (fr) * 1998-03-25 1999-09-30 Orbis Patents Limited Systeme et procede de carte de credit
WO2000002150A1 (fr) * 1998-07-01 2000-01-13 Webcard Inc. Procede d'autorisation de transaction

Also Published As

Publication number Publication date
DE10043554A1 (de) 2002-03-14
DE10043554C2 (de) 2002-10-24
AU2001291807A1 (en) 2002-03-13
WO2002019068A3 (fr) 2002-11-07

Similar Documents

Publication Publication Date Title
DE60121135T2 (de) Dienstaktiverung mittels einer virtuellen vorausbezahlten karte
DE19652294C2 (de) Elektronisches Übertragungssystem und Verfahren
EP1309957B1 (fr) Procede et systeme pour le transfert d'une somme d'argent electronique a partir d'une memoire d'avoir
WO2003042938A2 (fr) Protocole de paiement et procede et dispositif de transmission de donnees pour executer des transactions de paiement
EP2174281A2 (fr) Carte prépayée ou de crédit virtuelle et procédé ainsi que système de fourniture de celle-ci et de gestion de paiement électronique
WO2002011082A9 (fr) Operations de paiement electroniques a l'aide de services d'envoi de messages courts
DE102008035391A1 (de) Verfahren zur Authentifizierung
WO1998028900A1 (fr) Procede et systeme de transmission de commandes par un reseau de telecommunications
EP1180750A1 (fr) Procédé et dispositif pour la transmission d'une somme d'argent électronique depuis une mémoire de crédit
EP1180756A1 (fr) Procédé et dispositif pour le transfert d'argent électronique d'un compte à prépaiement
DE69908382T2 (de) Verfahren zum elektronischen bezahlen
DE10154410A1 (de) Informationsmanagementvorrichtung und Informationsmanagementsystem
EP1180751A1 (fr) Procédé et dispositif pour la transmission d'une somme d'argent électronique depuis une mémoire de crédit
WO2006108831A1 (fr) Procede de confirmation d'une demande de prestation de service
EP1306789A2 (fr) Serveur pour bloquer des cartes bancaires
DE102019217738A1 (de) Computerimplementiertes Verfahren zur Steuerung und Kontrolle der Verteilung von verifizierten personenbezogenen Nutzer-Daten eines Nutzers auf einer Vielzahl von Anbieter-Servern
DE112019006109T5 (de) Einkaufsmanagementsystem und -verfahren
WO2002019068A2 (fr) Procede d'identification fonde sur un reseau de donnees
EP1213689A2 (fr) Méthode pour le traitement automatique d'opérations de paiement en commerce électronique ainsi qu'un dispositif à cet effet
EP1193658A1 (fr) Procédé et dispositif pour la transmission d'une somme d'argent électronique depuis une mémoire de crédit
DE19641776A1 (de) Computerprogrammgesteuertes Verfahren zum gesicherten Aufbau einer Wähl-Leitungsverbindung und zur gesicherten Datenübertragung zwischen einem Chipkarten-Terminal und einer zentralen Datenverarbeitungsanlage
EP1915729A1 (fr) Dispositif, procede et systeme pour assurer une interaction avec un utilisateur et procede pour accueillir un utilisateur dans un groupe ferme d'utilisateurs
EP1277185B1 (fr) Procede pour reduire les risques dans des transactions de commerce electronique
DE102020119512A1 (de) Verfahren zur Speicherung von verifizierten Identitätsdaten eines Endnutzers, Verfahren zur Bereitstellung von verifizierten Identitätsdaten an eine Akzeptanzstelle, Computerprogrammprodukt
DE69907949T2 (de) Verfahren und system zur zugangserteilung

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP