WO2002045336A1 - Certification des transactions - Google Patents
Certification des transactions Download PDFInfo
- Publication number
- WO2002045336A1 WO2002045336A1 PCT/IB2001/002269 IB0102269W WO0245336A1 WO 2002045336 A1 WO2002045336 A1 WO 2002045336A1 IB 0102269 W IB0102269 W IB 0102269W WO 0245336 A1 WO0245336 A1 WO 0245336A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- user
- security module
- certificate
- unit
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
- H04N21/25816—Management of client data involving client authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
- H04N21/4181—External card to be used in combination with the client device, e.g. for conditional access for conditional access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- the present invention relates to the field of secure transactions, in particular in the field of pay television.
- the processing center sends a certificate to the user, this certificate containing the public key of the center. Once this certificate is received, the data sent by the user is encrypted by the public key and sent to the center. It is therefore only possible to decrypt this data using the centre's private key, a key kept secretly in the center.
- this certificate contains the private key and the public key.
- the user presents himself in person to the body managing the certificates and presents an identity document. He receives a diskette containing the certificate to install it on his computer.
- the first method has the advantage of simplicity, it does not guarantee a high level of security.
- the second method presents all the security guarantees but discourages a number of users in view of the necessary steps.
- the present invention aims to generate and distribute certificates in a secure manner, without constraint for the user and by guaranteeing the identity data of the recipient.
- This object is achieved by a method of distributing asymmetric public and private keys between a key generation center and at least one user unit, said unit comprising a security module, said method consisting in generating certificates comprising a public key and a private key, encrypting these certificates with a transport key, and transmitting them to the security module of a known user, said module comprising the transport key for decrypting the certificate.
- the various keys are generally stored in the mass memory of the computer, which constitutes a risk of piracy.
- the system of the invention also extends to the secure generation of certificates.
- the goal of this system is to avoid having clear keys in the generation process, while keeping short delivery times to meet a large demand.
- the various modules in charge of the generation of certificates and keys are represented in block diagram the various modules in charge of the generation of certificates and keys.
- the actual generation of the private key and public key pair is carried out in the KPG module according to a technique known per se.
- Such a module is described in application PCT / IB00 / 01589 and is based on the use of a large number of security units operating in parallel.
- the keys are directly encrypted in this same module by a system service key and transmitted in this form to the KPS key database. This service key is used to encrypt or decrypt locally stored data as soon as this confidential data leaves the security module.
- This step is important because the generation of a pair of keys takes several seconds and the generation online (on demand) is then too slow to satisfy users. This is why the key pairs are generated and stored in the KPS database for future availability.
- the part on the left of the OFFL line concerns the generation of keys in offline mode.
- the encrypted keys are sent to the CG certificate generation module, a certificate which contains the public key.
- the private key always in encrypted form, as well as the certificate are stored in the C&K DB database.
- This key can either be a symmetric secret key, or it can be the public key of the security module. This step is done inside a high-speed cryptographic security module according to the architecture described in PCT / IB00 / 01589.
- the certificate from the management center can also be transmitted.
- the encrypted private key and its certificate are transmitted to the end user by usual means via the N-INT network interface on the Net network.
- the transmission of such a certificate can be done either on the initiative of the center, or on the initiative of the user unit.
- the DEC user unit is not considered to be secure enough to contain the private key. This is why the latter is sent, always in encrypted form, to the security module SM which alone can decrypt this message.
- the private key is then stored in the protected memory of this module, which generally has the form of a smart card.
- the larger certificate is generally stored in the decoder since it does not contain confidential data.
- the signature is prepared in the security module using the private key. This key is never accessible outside the security module.
- the certificate and the signature are sent to the management center.
- This accesses the C&K DB certificate database to verify the authenticity of the certificate and use the user's public key to decrypt the signature.
- the center sends its certificate with its signature.
- the center uses its private key stored in the same C&K DB database in encrypted form.
- the key is transmitted to the EME signature module which is of the secure type.
- the key is then decrypted in this module to compose the signature.
- the signature and certificate are then sent to the user's unit.
- the center certificate transmitted during the establishment of the user's private key is then used to decrypt and verify the signature.
- the public key of the center is kept in the user's security module so that it is not possible to modify this important identification criterion.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Graphics (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002427705A CA2427705A1 (fr) | 2000-11-28 | 2001-11-27 | Certification des transactions |
JP2002546353A JP2004538670A (ja) | 2000-11-28 | 2001-11-27 | トランザクションの証明書 |
AT01999075T ATE289720T1 (de) | 2000-11-28 | 2001-11-27 | Transaktionszertifizierung |
BR0115737-0A BR0115737A (pt) | 2000-11-28 | 2001-11-27 | Certificação de transações |
DE60109061T DE60109061T2 (de) | 2000-11-28 | 2001-11-27 | Transaktionszertifizierung |
KR10-2003-7007045A KR20040007417A (ko) | 2000-11-28 | 2001-11-27 | 거래 인증 |
EP01999075A EP1348279B1 (fr) | 2000-11-28 | 2001-11-27 | Certification des transactions |
AU2002223963A AU2002223963A1 (en) | 2000-11-28 | 2001-11-27 | Transaction certification |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CH23082000 | 2000-11-28 | ||
CH2308/00 | 2000-11-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002045336A1 true WO2002045336A1 (fr) | 2002-06-06 |
Family
ID=4568496
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2001/002269 WO2002045336A1 (fr) | 2000-11-28 | 2001-11-27 | Certification des transactions |
Country Status (15)
Country | Link |
---|---|
EP (1) | EP1348279B1 (fr) |
JP (1) | JP2004538670A (fr) |
KR (1) | KR20040007417A (fr) |
CN (1) | CN1270469C (fr) |
AR (1) | AR031413A1 (fr) |
AT (1) | ATE289720T1 (fr) |
AU (1) | AU2002223963A1 (fr) |
BR (1) | BR0115737A (fr) |
CA (1) | CA2427705A1 (fr) |
DE (1) | DE60109061T2 (fr) |
ES (1) | ES2237622T3 (fr) |
MY (1) | MY136236A (fr) |
PT (1) | PT1348279E (fr) |
TW (1) | TW561755B (fr) |
WO (1) | WO2002045336A1 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004054208A1 (fr) * | 2002-12-06 | 2004-06-24 | Australia And New Zealand Banking Group Limited | Transfert d'informations secretes |
WO2006027379A1 (fr) * | 2004-09-10 | 2006-03-16 | Nagracard S.A. | Méthode de transmission de données entre un centre de diffusion et une unité multimédia |
WO2008034719A1 (fr) | 2006-09-18 | 2008-03-27 | Bundesdruckerei Gmbh | Procédé de personnalisation de documents, système cryptographique, système de personnalisation et document |
US11546176B2 (en) * | 2020-08-26 | 2023-01-03 | Rockwell Collins, Inc. | System and method for authentication and cryptographic ignition of remote devices |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006064359A1 (fr) * | 2004-12-17 | 2006-06-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Authentification mutuelle resistant au clone dans un reseau de radio communication |
KR100704627B1 (ko) * | 2005-04-25 | 2007-04-09 | 삼성전자주식회사 | 보안 서비스 제공 장치 및 방법 |
JP5053032B2 (ja) * | 2007-10-16 | 2012-10-17 | 株式会社バッファロー | データ管理装置、データ管理方法およびデータ管理プログラム |
CN101282211B (zh) * | 2008-05-09 | 2011-07-06 | 西安西电捷通无线网络通信股份有限公司 | 一种密钥分配方法 |
CN103269326A (zh) * | 2012-12-22 | 2013-08-28 | 潘铁军 | 一种面向泛在网的安全设备、多应用系统和安全方法 |
CN108701308B (zh) * | 2016-03-30 | 2022-03-25 | 科因普拉格株式会社 | 用于基于区块链发布公共证书的系统、及使用该系统的用于基于区块链发布公共证书的方法 |
CN112075051A (zh) * | 2018-03-02 | 2020-12-11 | 日东电工株式会社 | 用于保护计算机之间的数据通信的系统和方法 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0735721A2 (fr) * | 1995-03-31 | 1996-10-02 | Pitney Bowes Inc. | Procédé pour la génération et l'enregistrement de clés de base |
WO2000069113A1 (fr) * | 1999-05-07 | 2000-11-16 | Telefonaktiebolaget Lm Ericsson | Distribution et protection securisees des informations d'une cle de cryptage |
-
2001
- 2001-11-27 KR KR10-2003-7007045A patent/KR20040007417A/ko not_active Application Discontinuation
- 2001-11-27 EP EP01999075A patent/EP1348279B1/fr not_active Expired - Lifetime
- 2001-11-27 CA CA002427705A patent/CA2427705A1/fr not_active Abandoned
- 2001-11-27 WO PCT/IB2001/002269 patent/WO2002045336A1/fr active IP Right Grant
- 2001-11-27 AU AU2002223963A patent/AU2002223963A1/en not_active Abandoned
- 2001-11-27 PT PT01999075T patent/PT1348279E/pt unknown
- 2001-11-27 AR ARP010105497A patent/AR031413A1/es active IP Right Grant
- 2001-11-27 DE DE60109061T patent/DE60109061T2/de not_active Expired - Lifetime
- 2001-11-27 JP JP2002546353A patent/JP2004538670A/ja active Pending
- 2001-11-27 BR BR0115737-0A patent/BR0115737A/pt not_active IP Right Cessation
- 2001-11-27 AT AT01999075T patent/ATE289720T1/de not_active IP Right Cessation
- 2001-11-27 CN CNB018195989A patent/CN1270469C/zh not_active Expired - Lifetime
- 2001-11-27 ES ES01999075T patent/ES2237622T3/es not_active Expired - Lifetime
- 2001-11-27 TW TW090129338A patent/TW561755B/zh active
- 2001-11-28 MY MYPI20015434A patent/MY136236A/en unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0735721A2 (fr) * | 1995-03-31 | 1996-10-02 | Pitney Bowes Inc. | Procédé pour la génération et l'enregistrement de clés de base |
WO2000069113A1 (fr) * | 1999-05-07 | 2000-11-16 | Telefonaktiebolaget Lm Ericsson | Distribution et protection securisees des informations d'une cle de cryptage |
Non-Patent Citations (2)
Title |
---|
GEHRKE M ET AL: "Management of a public key certification infrastructure -- Experiences from the DeTeBerkom project BMSec", COMPUTER NETWORKS AND ISDN SYSTEMS,NL,NORTH HOLLAND PUBLISHING. AMSTERDAM, vol. 28, no. 14, 1 November 1996 (1996-11-01), pages 1901 - 1914, XP004014501, ISSN: 0169-7552 * |
KENT S: "Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management (URL)", XP002058728 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004054208A1 (fr) * | 2002-12-06 | 2004-06-24 | Australia And New Zealand Banking Group Limited | Transfert d'informations secretes |
WO2006027379A1 (fr) * | 2004-09-10 | 2006-03-16 | Nagracard S.A. | Méthode de transmission de données entre un centre de diffusion et une unité multimédia |
US7433473B2 (en) | 2004-09-10 | 2008-10-07 | Nagracard S.A. | Data transmission method between a broadcasting center and a multimedia unit |
WO2008034719A1 (fr) | 2006-09-18 | 2008-03-27 | Bundesdruckerei Gmbh | Procédé de personnalisation de documents, système cryptographique, système de personnalisation et document |
CN101517958B (zh) * | 2006-09-18 | 2014-05-07 | 联邦印刷有限公司 | 证件的个性化方法、密码系统、个性化系统和证件 |
US11546176B2 (en) * | 2020-08-26 | 2023-01-03 | Rockwell Collins, Inc. | System and method for authentication and cryptographic ignition of remote devices |
Also Published As
Publication number | Publication date |
---|---|
TW561755B (en) | 2003-11-11 |
PT1348279E (pt) | 2005-06-30 |
EP1348279A1 (fr) | 2003-10-01 |
DE60109061D1 (de) | 2005-03-31 |
ES2237622T3 (es) | 2005-08-01 |
AR031413A1 (es) | 2003-09-24 |
CN1478342A (zh) | 2004-02-25 |
ATE289720T1 (de) | 2005-03-15 |
DE60109061T2 (de) | 2006-01-12 |
MY136236A (en) | 2008-08-29 |
AU2002223963A1 (en) | 2002-06-11 |
CN1270469C (zh) | 2006-08-16 |
EP1348279B1 (fr) | 2005-02-23 |
CA2427705A1 (fr) | 2002-06-06 |
KR20040007417A (ko) | 2004-01-24 |
BR0115737A (pt) | 2004-01-13 |
JP2004538670A (ja) | 2004-12-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2720199B1 (fr) | Procédé sécurisé de commande d'ouverture de dispositifs de serrure à partir de messages mettant en oeuvre un cryptage symétrique | |
CN101989984A (zh) | 电子文件安全共享系统及方法 | |
FR2834403A1 (fr) | Systeme cryptographique de signature de groupe | |
EP1348279B1 (fr) | Certification des transactions | |
EP1946552A2 (fr) | Méthode de sécurisation de données échangées entre un dispositif de traitement multimédia et un module de sécurité | |
EP1400056B1 (fr) | Procede d'authentification cryptographique | |
US8930703B2 (en) | Methods, systems and computer program products for controlling the disclosure time of information | |
EP1949590A1 (fr) | Procede de depot securise de donnees numeriques, procede associe de recuperation de donnees numeriques, dispositifs associes pour la mise en uvre des procedes, et systeme comprenant les dits dispositifs | |
WO2010069624A1 (fr) | Procédé de fourniture de données basé sur un système ibpe | |
WO2006035159A1 (fr) | Systeme et procede cryptographique a cle publique et serveur de certification, memoires adaptees pour ce systeme | |
EP1413088B1 (fr) | Methode pour creer un reseau virtuel prive utilisant un reseau public | |
EP3568964B1 (fr) | Procédé de transmission d'une information numérique chiffrée de bout en bout et système mettant en oeuvre ce procédé | |
KR20060078768A (ko) | 사용자 개인키의 분산 등록을 이용한 키 복구 시스템 및그 방법 | |
EP1513319A2 (fr) | Procédé de protection d'un contenu numérique | |
EP4012972A1 (fr) | Méthode de divulgation sélective de données via une chaine de blocs | |
EP1829277A1 (fr) | Procédé et système d'encryption par un proxy. | |
EP1723791B1 (fr) | Methode de securisation d'un evenement telediffuse | |
FR2899750A1 (fr) | Procede et terminal pour securiser la generation d'une cle de chiffrement | |
FR2786049A1 (fr) | Procede de cryptographie a cle dynamique | |
FR2846819A1 (fr) | Procede d'echange securise entre deux unites de communication, systeme de controle et serveur pour la mise en oeuvre du procede | |
EP1992104B1 (fr) | Authentification d'un dispositif informatique au niveau utilisateur | |
FR3118811A1 (fr) | Procédé et système de contrôle d’accès. | |
FR3029667A1 (fr) | Procede d'encapsulation d'une cle de session |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2002546353 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 457/MUMNP/2003 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2427705 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001999075 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 018195989 Country of ref document: CN Ref document number: 1020037007045 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2001999075 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWP | Wipo information: published in national office |
Ref document number: 1020037007045 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 2001999075 Country of ref document: EP |