WO2002044995A2 - Installation de programmes dans un microcircuit - Google Patents

Installation de programmes dans un microcircuit Download PDF

Info

Publication number
WO2002044995A2
WO2002044995A2 PCT/FI2001/001033 FI0101033W WO0244995A2 WO 2002044995 A2 WO2002044995 A2 WO 2002044995A2 FI 0101033 W FI0101033 W FI 0101033W WO 0244995 A2 WO0244995 A2 WO 0244995A2
Authority
WO
WIPO (PCT)
Prior art keywords
program
microcircuit
installation
secret
key
Prior art date
Application number
PCT/FI2001/001033
Other languages
English (en)
Other versions
WO2002044995A3 (fr
WO2002044995A8 (fr
Inventor
Lauri Paatero
Original Assignee
Setec Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Setec Oy filed Critical Setec Oy
Priority to AU2002218339A priority Critical patent/AU2002218339A1/en
Publication of WO2002044995A2 publication Critical patent/WO2002044995A2/fr
Publication of WO2002044995A3 publication Critical patent/WO2002044995A3/fr
Publication of WO2002044995A8 publication Critical patent/WO2002044995A8/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data

Definitions

  • the invention relates to installing programs into a microcircuit such that the microcircuit will be provided with only the programs the commissioner desires to be installed therein.
  • the invention is well suited for applications where data security in installing the programs is of primary importance. In the following the invention will be described, by way of example, with reference to smart card manufacturing, even though it should be noted that the present invention can also be utilized in other applications.
  • Smart card manufacturing can roughly be divided into two different phases, the first of which is the fabrication of a microcircuit and the second is the installation of necessary programs.
  • the first of which is the fabrication of a microcircuit
  • the second is the installation of necessary programs.
  • the smart card manufacturer is fully aware of the programs that are installed in the microcircuit of the finished smart card. This is important, because if an outside aggressor has succeeded in loading a pro- gram of his own into the microcircuit of the smart card, the smart card serving as a pay card or an electronic identity card, for instance, may function in an unpredictable manner in certain situations, which causes considerable damage.
  • the aim is to fabricate the smart card microcircuits such that only the correct programs can be installed into the microcircuit.
  • the microcircuit manufacturing process is divided into two phases, so that a microcircuit, in a memory of which a secret installation key and an installation program are stored, is manufactured in the first phase.
  • a microcircuit in a memory of which a secret installation key and an installation program are stored, is manufactured in the first phase.
  • the fabrication of microcircuits is often commissioned to outside subcontractors, and the commissioner of the card hands over the installation key and installation program to be employed in the micro- circuit fabrication to the subcontractor.
  • the same secret installation key and installation program are used in a large number of microcircuits.
  • the actual programs and microcircuit-specific secret keys are installed in the microcircuits.
  • the installation of the programs requires an installation key stored in the memory of the microcircuit during fabrication.
  • a check value on the basis of which the installation program of the microcircuit can check that an authentic program is in question, is generated for each program to be installed by means of the installation key.
  • the installation program of the microcircuit will install into the microcircuit only the programs that it is able to authenticate by means of the installation key. If the installation program finds that the program to be installed is authentic, it allows the installation of the program into the microcircuit.
  • the secret installation key by which the correct check value of the program can be generated, is at the disposal of only few persons. So, only these few selected persons can accept the installation of a specific program into a microcircuit by generating a program-specific check value for said pro- gram by means of the secret installation key at their disposal.
  • a drawback with the above-described prior art solution is that a person belonging to the manufacturer's own personnel may have created a program, intentionally or unintentionally, by means of which the secret installation key of the microcircuit can be read from the microcircuit, said program having started up on the microcircuit. Because the person concerned is an employee in the manufacturing organization, a program created by this person may obtain an authentic program check value from a person who has access to the necessary secret installation key. In this manner, the program gets a check value on the basis of which the installation program of the microcircuit will iden- tify it as an authentic program, and hence, allow the installation and start up thereof in the microcircuit.
  • a microcircuit of this kind may cause considerable trouble, because an outsider, having received the secret installation key by reading it from the microcircuit, can create any suitable programs and generate correct check values for them with the secret installation key.
  • the installation programs of new microcircuits to be fabricated will thus identify these programs as authentic and consequently allow the installation thereof into the microcircuits.
  • the object of the present invention is to solve the drawback associated with the above-described prior art solution and to provide a solution that improves data security in the fabrication of microcircuits.
  • This is achieved with a method according to the invention for installing programs into a microcircuit, the method comprising storing a secret installation key in a microcircuit memory during fabrication, generating a program-specific check value for the programs to be installed with the secret installation key, checking the authenticity of each program to be installed in connection with program installation by means of the secret installation key stored in the microcircuit memory and the program-specific check value, and allowing the program installation only if said program is found authentic on the basis of the check.
  • the method according to the invention is characterized by deleting the secret installation key, stored in the microcircuit memory, upon completion of the program installation, and starting the installed programs in the microcircuit after deletion of the secret installation key.
  • the invention also relates to a microcircuit, which comprises a memory, where a secret installation key is stored, means for receiving a program to be installed and a program-specific check value from external equip- ment, and a processor for executing a predetermined installation program which checks on the basis of the secret key stored in the memory and the program-specific check value, whether the program to be installed is authentic and which installs said program if it is found authentic on the basis of the check value.
  • the microcircuit according to the invention is characterized by be- ing arranged to delete the secret installation key from the memory prior to starting the program installed by the installation program.
  • the invention is based on the idea that manufacturing of microcircuits and installation of programs become much more secure, when the secret installation key needed for the program installation is deleted from the micro- circuit memory prior to the start up of the installed program(s).
  • the secret installation key of the microcircuit cannot fall in the hands of an outsider, even though the microcircuit would be provided with a program that enables reading of the secret installation key from the microcircuit memory.
  • the most considerable advantage of the solution according to the invention is thus the improved data security, because not even a person within the organization of the commissioner can create a situation where the secret key of the microcircuit would be readable from the microcircuit.
  • the programs to be installed into the microcircuit are classified in predetermined classes, whereby a class code is defined for each program to be installed, which class code is checked in connection with installation when the authenticity of the program is to be verified and which is utilized in the installation of the program.
  • This em- bodiment according to the invention helps to pre-empt such intentional or unintentional errors that may arise from the wrong program classification. For in- stance, if a program designed for testing purposes is incorrectly classified as a production program and it is thereafter transferred to a microcircuit for installation, the installation program of the microcircuit attempts to install it the way the production programs should. Because the program actually is a test program, the installation fails.
  • Figure 1 is a flow chart of a first preferred embodiment of a method according to the invention
  • Figure 2 illustrates a first preferred embodiment of a microcircuit according to the invention
  • Figure 3 illustrates a second preferred embodiment of the microcircuit according to the invention
  • Figure 4 illustrates how secret keys are stored in a memory of the microcircuit.
  • Figure 1 is a flow chart of a first preferred embodiment of a method according to the invention.
  • the flow chart of Figure 1 can be utilized in installing programs into a microcircuit of a smart card, for instance.
  • an installation key is stored in the microcircuit in connection with fabrication.
  • the same installation key is stored in the memory of a plurality of microcircuits in connection with fabrication.
  • a program-specific check value is generated for each program intended for installation into the microcircuit.
  • the program-specific check value can be generated by an algorithm that computes a specific check value on the basis a program code and a secret installation key. Thus, the check value and the program code will form a pair, whose authenticity can be verified by means of the installation key.
  • the produced program and its check value are fed to the microcircuit.
  • the memory of the microcircuit contains the same algorithm (part of the installation program) and the same secret installation key, by which the check value is generated in block B.
  • the installation program of the mi- crocircuit is able to check the authenticity of the program to be installed, i.e. the program is authentic if the result of the computational operation carried out on the basis the secret key of the installation program and the program code matches with the check value.
  • the installation program of the microcircuit interrupts the program installation by proceeding to block F. But if the program is authentic, the processor of the microcircuit executes the installation in accordance with installation program.
  • the microcircuit checks if there still are other programs to be installed. If not, it deletes the secret installation key from its memory in block G. Thereafter, the microcircuit starts the installed programs in block H. Because the starting of the installed programs does not take place until in block H, after deletion of the secret installation key in block G, it is possible to pre-empt a situation where any one of the installed programs would enable reading the secret installation key from the microcircuit memory. This is not possible in the method according to the flow chart of Figure 1 , because the secret installation key will no longer be in the microcircuit memory when the installed program starts up.
  • Figure 2 illustrates a first preferred embodiment of a microcircuit according to the invention.
  • Figure 2 shows three separate production phases 1 to 3 of the microcircuit 4.
  • This division can be utilized in the production of micro- circuits intended for smart cards, when it is extremely important that only the correct programs will be installed into the microcircuit so that its operation would be fully predictable at all times. For instance, when smart cards are manufactured, the division can be such that a subcontractor manufactures the microcircuits, the commissioner of the microcircuits produces the necessary programs and secret keys, and the programs and the secret keys are installed into the microcircuits either by the commissioner or a third party.
  • the program production takes place in phase 1.
  • programs PROG1 and PROG2 are to be installed into the microcircuits to be produced.
  • these pro- grams be handed over to production phase 2, where the actual fabrication of the microcircuit takes place.
  • the programs to be installed were handed over to the production phase 2, very high attention should be paid to the security in the production phase 2 so as to make sure that no outsider would have a chance to tamper the programs to be installed.
  • an installation program INST and a secret installation key K1 are stored in the memory M of the microcircuits in connection with the mechanical microcircuit fabrication.
  • the microcircuit 4 leaves the production phase 2, it comprises at least a processor P and one or more memories M, where the necessary program ⁇ ) is/are stored in order to make it possible for the microcircuit to receive other data later on, such as programs and secret keys.
  • the microcircuit 4 fabrication is completed and the installation program INST and the secret installation key K1 are stored in its memory M, the microcircuit is transferred to the production phase 3 where the programs PROG1 and PROG2 will be installed.
  • the microcircuit is attached with pins (not shown in the figure) therein to external equipment, such as a computer peripheral.
  • the installation program INST delivered from the program production to the microcircuit fabrica- tion is selected such that it installs into the microcircuit only programs that are authentic on the basis of the authentication carried out with the secret installation key K1.
  • the authentication is made possible, when a check value T1 is computed for the program PROG1 in the program production by utilizing a predetermined algorithm, the program code PROG1 and the secret installation key K1.
  • a check value T2 is computed for the program code PROG2 by utilizing the secret installation key K1.
  • the algorithm by which the check values are computed forms part of the installation program INST, and consequently it also exists in the memory of the microcircuit 4, for the microcir- cuit to be able to make the corresponding computational operation.
  • the check values T1 and T2 are thus forwarded from the production phase 1 to the production phase 3, i.e. to the program installation.
  • the check values T1 and T2 are applied with the programs PROG1 and PROG2 into the microcircuit through its input.
  • the processor of the micro- circuit 4 then carries out authentication by means of the algorithm included in the installation program INST, in which authentication it checks with the secret installation key K1 if the check values are correct. If the check values are correct, the installation program INST of the microcircuit installs the programs PROG1 and PROG2 into the microcircuit. When the installation is completed, the installation program deletes the secret installation key K1 from the memory M of the microcircuit. Thereafter, the installation program starts the installed programs and ceases to function.
  • Figure 3 illustrates a second preferred embodiment of the microcircuit according to the invention.
  • the embodiment of Figure 3 corresponds to great extent with that of Figure 2, and therefore the embodiment of Figure 3 will be described in the following primarily in so far as it differs from the embodiment of Figure 2.
  • the embodiment of Figure 3 employs program classification into different levels. For instance, three different levels can be employed: 1) production level programs, which have to be protected in such a manner that an outside aggressor is not able to get any data from the programs or the microcircuit in any way whatsoever,
  • clients' test level programs which permit the clients to test their own programs and codes.
  • a typical client could be a bank whose data processing department should be able to test how the programs of their own production function in the microcircuit.
  • the clients' test level programs are such that provide limited access to the information stored in the memory of the microcircuit.
  • manufacturer's test level programs which permit the manufac- turer to test how the microcircuits function.
  • the manufacturer's test level programs thus provide unlimited access to the information stored in the memory of the microcircuit.
  • a class code LEVEL which indicates the level of the program in question, is defined for the programs provided by the program production.
  • an algorithm is used which also utilizes the class code, in addition to the program code and the installation key.
  • the installation program INST utilizes the same algorithm which takes into account the class code when checking the authenticity of the program prior to installation.
  • the programs PROG1 and PROG2 to be installed, their class codes LEVEL1 and LEVEL2 and the check values T1 and T2 of the programs are thus forwarded from the production phase 1 to the production phase 3.
  • the installation program INST stored into the microcircuit 4 during fabrication is made such that it processes programs of different levels differently. In other words, if for some reason a test level program is classified as a production level program on the basis of the class code, the installation of this program fails, because the installation program INST' subjects it to operations during installation, which lead in a successful installation if a test program is concerned, but in a failure if a production level program is concerned.
  • This can be implemented, for instance, such that the installation program performs class-code-dependent computational operations in connection with the installation, whereby the computational operations proceed to a correct final result (successful installation) for the program to be installed, only, if said program is given a correct class code.
  • Figure 4 illustrates the storing of secret keys in the memory of the microcircuit.
  • the storing of the secret keys as described in Figure 4 can be utilized in the embodiments of both Figure 2 and Figure 3. In other words, in addition to what is described as stored in the memory of the microcircuit in connection with Figures 2 and 3, it is also possible to store secret keys as indicated in Figure 4.
  • the storing of secret keys is described assuming that the storing of programs takes place according to the embodiment of Figure 2. Hence, this example does not employ class codes of the programs.
  • the keys are encoded, whereby they can be transferred to the production phase 3 without that any outsider finds out the secret keys.
  • the secret keys are encoded with a code key K2 which is computed by a predetermined coding algorithm by utilizing a random number RND and the secret installation key K1.
  • the keys A1 and A2 are encoded such that the encoded keys A1' and A2' are obtained.
  • These encoded keys A1' and A2' and the random number RND are forwarded to the production phase 3, where they will be applied to the micro- circuit in connection with the program installation.
  • the microcircuit installation program INST is employed, which includes the above-mentioned coding algorithm, whereby the processor of the microcircuit can compute the code key K2 by means of the secret installation key K1 and the random number RND received in the production phase 3.
  • the installation program of the micro- circuit can decode the encoded keys A1' and A2' such that the secret keys A1 and A2 are stored in the memory of the microcircuit.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un microcircuit comprenant une mémoire (M) dans laquelle est stockée une clé d'installation secrète (K1), un système pour recevoir un programme à être installé et une valeur de vérification spécifique au programme provenant d'un équipement externe ainsi qu'un processeur (P) pour exécuter un programme d'installation prédéterminé (INST) qui effectue la vérification sur la base de la clé d'installation secrète (K1) stockée dans la mémoire (M) et une valeur de vérification spécifique au programme (T1, T2), le programme à installer (PROG1, PROG2) étant authentique; ce programme est installé uniquement si la vérification montre qu'il est authentique. Pour s'assurer que la clé d'installation secrète ne tombe entre les mains des personnes non autorisées même après l'installation, le microcircuit (4) est aménagé pour effacer la clé d'installation secrète (K1) de la mémoire (M) avant le lancement du programme installé par le programme d'installation (INST).
PCT/FI2001/001033 2000-11-28 2001-11-27 Installation de programmes dans un microcircuit WO2002044995A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2002218339A AU2002218339A1 (en) 2000-11-28 2001-11-27 Installation of programs into microcircuit

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI20002609A FI116172B (fi) 2000-11-28 2000-11-28 Ohjelmien asennus mikropiirille
FI20002609 2000-11-28

Publications (3)

Publication Number Publication Date
WO2002044995A2 true WO2002044995A2 (fr) 2002-06-06
WO2002044995A3 WO2002044995A3 (fr) 2002-07-25
WO2002044995A8 WO2002044995A8 (fr) 2003-11-27

Family

ID=8559598

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI2001/001033 WO2002044995A2 (fr) 2000-11-28 2001-11-27 Installation de programmes dans un microcircuit

Country Status (3)

Country Link
AU (1) AU2002218339A1 (fr)
FI (1) FI116172B (fr)
WO (1) WO2002044995A2 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004070587A1 (fr) * 2003-02-03 2004-08-19 Nokia Corporation Architecture pour installation d'application cryptee
US7930537B2 (en) 2002-08-13 2011-04-19 Nokia Corporation Architecture for encrypted application installation

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0138386A2 (fr) * 1983-09-16 1985-04-24 Kabushiki Kaisha Toshiba Carte d'identification
US4734569A (en) * 1985-08-22 1988-03-29 Casio Computer Co., Ltd. IC card
GB2206431A (en) * 1987-06-30 1989-01-05 Motorola Inc Debit card circuits
US5014312A (en) * 1988-01-20 1991-05-07 Sgs-Thomson Microelectronics Sa Security system for the protection of programming zones of a chip card
US5039850A (en) * 1990-06-15 1991-08-13 Mitsubishi Denki Kabushiki Kaisha IC card
US5412717A (en) * 1992-05-15 1995-05-02 Fischer; Addison M. Computer system security method and apparatus having program authorization information data structures
WO1998052161A2 (fr) * 1997-05-15 1998-11-19 Mondex International Limited Unite de transformation de cle destinee a une carte a circuit integre

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0138386A2 (fr) * 1983-09-16 1985-04-24 Kabushiki Kaisha Toshiba Carte d'identification
US4734569A (en) * 1985-08-22 1988-03-29 Casio Computer Co., Ltd. IC card
GB2206431A (en) * 1987-06-30 1989-01-05 Motorola Inc Debit card circuits
US5014312A (en) * 1988-01-20 1991-05-07 Sgs-Thomson Microelectronics Sa Security system for the protection of programming zones of a chip card
US5039850A (en) * 1990-06-15 1991-08-13 Mitsubishi Denki Kabushiki Kaisha IC card
US5412717A (en) * 1992-05-15 1995-05-02 Fischer; Addison M. Computer system security method and apparatus having program authorization information data structures
WO1998052161A2 (fr) * 1997-05-15 1998-11-19 Mondex International Limited Unite de transformation de cle destinee a une carte a circuit integre

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7930537B2 (en) 2002-08-13 2011-04-19 Nokia Corporation Architecture for encrypted application installation
WO2004070587A1 (fr) * 2003-02-03 2004-08-19 Nokia Corporation Architecture pour installation d'application cryptee
CN100367144C (zh) * 2003-02-03 2008-02-06 诺基亚有限公司 用于加密的应用程序安装的结构

Also Published As

Publication number Publication date
FI20002609A0 (fi) 2000-11-28
WO2002044995A3 (fr) 2002-07-25
FI20002609A (fi) 2002-05-29
AU2002218339A1 (en) 2002-06-11
FI116172B (fi) 2005-09-30
WO2002044995A8 (fr) 2003-11-27

Similar Documents

Publication Publication Date Title
US4734568A (en) IC card which can set security level for every memory area
US6073238A (en) Method of securely loading commands in a smart card
Jurgensen et al. Smart cards: the developer's toolkit
US6957338B1 (en) Individual authentication system performing authentication in multiple steps
EP0636998B1 (fr) Carte avec circuit intégré avec sécurité élevée
EP0984404A2 (fr) Stockage des objets de données dans une mémoire de carte à puce
JPH0296872A (ja) 取引の正当性確認方式
CN109753837B (zh) 一种ic卡的防复制及防篡改方法
JP2935613B2 (ja) Icカードおよびicカードシステム
EP0855815A2 (fr) Certification de clés cryptographiques pour cartes à puce
JP2003501758A (ja) カードメモリ装置
JPH1115900A (ja) パスワード認証システムおよびその処理手順を記録した記録媒体
US7725942B2 (en) Method for loading and customizing data and programmes loaded in a smart card
US20110067104A1 (en) Method of securing execution of a program
CN100399738C (zh) 采用密钥的数据处理方法
WO2002044995A2 (fr) Installation de programmes dans un microcircuit
US10853476B2 (en) Method for the security of an electronic operation
WO1991003011A1 (fr) Memoires electroniques
JP2007141113A (ja) バイオメトリクス認証機能を備えたicカード、および、icカードプログラム
US7434070B2 (en) Secret code security access to data processing means
EP3699790B1 (fr) Procédé d'activation d'un modèle biométrique
AU723007B2 (en) Method of dynamically interpreting data by a chip card
Sanchez-Reillo Achieving security in Integrated Circuit Card applications: reality or desire?
CN110766840A (zh) 一种门禁密码设置方法及设备
CN100395771C (zh) 定制后能修改其性能的微电路卡

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ CZ DE DE DK DK DM DZ EC EE EE ES FI FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

CFP Corrected version of a pamphlet front page
CR1 Correction of entry in section i

Free format text: IN PCT GAZETTE 23/2002 DUE TO A TECHNICAL PROBLEM AT THE TIME OF INTERNATIONAL PUBLICATION, SOME INFORMATION WAS MISSING (81). THE MISSING INFORMATION NOW APPEARS IN THE CORRECTED VERSION.

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP