WO2005010753A1 - Verfahren zum steuern eines datenaustauschs - Google Patents
Verfahren zum steuern eines datenaustauschs Download PDFInfo
- Publication number
- WO2005010753A1 WO2005010753A1 PCT/DE2004/001341 DE2004001341W WO2005010753A1 WO 2005010753 A1 WO2005010753 A1 WO 2005010753A1 DE 2004001341 W DE2004001341 W DE 2004001341W WO 2005010753 A1 WO2005010753 A1 WO 2005010753A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- routine
- processing
- user
- runtime system
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/543—User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
Definitions
- the invention relates to a method for exchanging data between a communication unit and a data source, in which a runtime system consisting of hardware and software components transmits data between the data source and a communication unit and a processing chain controls and / or monitors the exchange of data.
- control center systems are usually used to monitor and control large-scale networks such as energy supply networks, water supply lines and rail systems. Larger properties can also be equipped with control center systems to control air conditioning systems, elevators, lighting systems or the like.
- the components required to control such branched systems are therefore also generally distributed or, in other words, distributed over a large area and connected to one another via a runtime system which has at least one expedient communication network and programmable computer units on which expedient runtime programs enable the exchange of information .
- hardware interfaces are used for data exchange between the components that supply process values, for example, on the one hand, and the decentrally installed software components of the runtime system, on the other hand.
- a communication unit such as an input computer connected to the hardware interface via the communication network, is provided to query these process values.
- Thieves- Work chain is used to control the data exchange between the components and the communication unit.
- the processing chain checks the user name entered in the runtime system for logging in, as well as the relevant password for the authorization to receive the process values of the selected component. In this way, sensitive process values can be shielded from the knowledge of certain users.
- machining chains are known which are equipped with a so-called error analysis, by means of which the processing chain, the presence of Inco incompatibili- ty between components used or software modules indicating and, if appropriate solutions to remedy 'exhibits such shortcomings.
- the known method has the disadvantage that the processing chain is monolithically embedded in the source code of the runtime programs that run during normal operation of the control center system. In this way, such processing steps for controlling the data exchange can only be changed by changing the source code of these software components. After the change, the entire runtime programs must be recompiled and installed on the hardware components.
- the object of the invention is to provide a method of the type mentioned at the outset which can be changed or expanded easily and without interrupting the runtime system.
- the invention achieves this object in that the processing chain is composed of processing routines, each of which has a uniform input interface, the processing routines being called up in succession and the data of a called processing routine of the input interface are fed to a processing routine immediately following it, and that the runtime system manages a dynamic memory area and accesses it in order to determine the order in which the processing routines are called.
- the control and monitoring of the exchange of data is designed to be flexible and can be changed as desired even after the runtime system has been started up.
- the data is processed in sequence, for example a user-entered request for process values of the component, in order of processing routines.
- the processing routines monitor the queries, for example by storing them in access files, or control them by adding additional data, for example.
- Each machining routine has a software-defined input interface that is identical for all machining routines.
- the data processed by the respective processing routine are then fed to the input interface of the immediately following processing routine.
- each processing routine is compatible or interchangeable with the other processing routines due to its uniform input interface.
- the processing routines can therefore be called in any order without the data exchange between the processing routines causing error messages or worse damage.
- the runtime system comprises runtime programs and hardware components that consist of computers, physical
- Control center networks interfaces or the like are composed.
- the physical control center networks include also wireless network connections.
- the runtime programs can be distributed over the hardware components.
- the software of the runtime system manages a dynamic memory area, the memory size of which can thus also be changed during the operation of the runtime system.
- the runtime system accesses processing data stored in the memory area to determine the sequence in which the processing routines are called.
- the processing data can be, for example, a configuration file in which the addresses of the desired processing routines are listed line by line, the runtime system processing the lines one after the other and thereby calling the processing routine listed in each line by their address.
- the runtime system processes the lines of configuration data sequentially until the end of the configuration file is displayed to the runtime system.
- any number of lines can be provided and any number of processing routines can be called up.
- This can advantageously be used as early as the development of the software components of the runtime system by integrating error diagnosis or, in other words, error analysis routines into the processing chain. After the runtime programs run largely error-free, the number of error diagnosis routines can be greatly reduced in order to use them
- the data source can be a component of a control center system, the runtime system being connected to the component via appropriate interfaces.
- the data source can also be a software module, for example a software driver, or a database with information data that correspond to a specific state or the version of a system.
- the dynamically managed memory area is a memory area of the so-called RAM memory of a computer.
- the data are advantageously provided with a user ID, at least one authorization routine checking the user ID for a match with entries in predefined user lists and, if it is found that there is no match between the user ID and the user lists, the forwarding of the data is terminated. In this way, only those process values are displayed for which the user is authorized to receive. Sensitive data can thus be displayed user-specifically.
- the user ID does not necessarily have to have an individualization character.
- the user ID can have a role-specific character in that the user as such has a particular character Group or role is assigned.
- the user can be characterized as a developer or parameterizer by the user ID.
- the data is provided with a data source-specific source data identifier, one or more of the processing routines controlling the exchange of the data as a function of the source data identifier.
- the source data is identified by adding so-called metadata to the data to be exchanged.
- At least one processing routine is a buffering routine in which buffering data, each with a buffering data identifier, are buffered, the buffering routine displaying the buffering data identifier assigned to the buffering data identifier and the exchange of the data if the source data identifier matches one of the buffering data identifier - breaks.
- the source data identifier is, for example, a component identifier
- the temporarily stored process values are, for example, process values that change only slowly or not at all in comparison with the polling frequency, or parameters that were entered by an authorized third party.
- the processing routine which is also called the buffering or caching routine, for example, makes the requested process value available without the corresponding component being accessed by the runtime system. Access by the runtime system to the Component has become superfluous, which speeds up the process.
- a so-called enrichment routine can convert coded data from the runtime system into user-understandable data.
- the enrichment routine also adds additional control or, in other words, metadata to the data to be exchanged between the communication unit and the data source.
- One of the processing routines is advantageously an error analysis routine which checks the data for the presence of errors.
- This can be any fault analysis tool.
- the data can be checked to determine whether letters or the like have been entered instead of a natural number or an integer.
- the error analysis routine can also monitor the compatibility of protocols or hardware components of the runtime system.
- At least one processing routine is advantageously a monitoring routine which stores the data and / or monitoring data derived from the data in a monitoring file.
- a monitoring file for example, all accesses to the runtime system are stored in one month, so that it can be documented who accessed which data source, for example a component of a control center system, when.
- the runtime system has a network server with a server program and at least one client computer with a browser program, each browser program accessing the server program via the Internet.
- data exchange is not only made possible, for example, not only via a control center communication network which is closed to the outside, but also via existing connections to the Internet which have already been physically implemented.
- At least one processing routine is a tracing routine, which checks the path of the data in the runtime system and generates security parameters as a function of the check. Based on these security parameters, the display or forwarding of the data can now be controlled, for example. If, for example, a user of the method is connected to the runtime system via a so-called intranet, fewer concerns about data sensitivity or security are generally required, since access to the intranet is generally made more difficult by unauthorized persons. In local applications, security concerns can be almost completely eliminated, while only insensitive data or process values are displayed when accessed via the Internet.
- a configuration file is expediently loaded into the dynamic memory area, the configuration file determining the structure and the sequence of the processing routines.
- the configuration file is, for example, at Initialization of the runtime system called. In addition, however, it is also possible for the user to trigger the call of the configuration file by the runtime system.
- the configuration file can also be called up after the implementation by the runtime system without the user, for example at certain times.
- FIG. 1 shows a flow diagram for the schematic representation of the method according to the invention.
- FIG. 1 shows a flow chart to illustrate the method according to the invention.
- a control center system 1 is schematically shown, which consists of local protection devices 2 and 3 and a central control center 4 for controlling and monitoring the protection devices 2, 3.
- the protective devices 2 and 3 are connected to voltage converters, not shown in the figures, which are coupled on the primary side to a network branch of an energy distribution network, likewise not shown.
- the transformer current on the secondary side which is proportional to the current in the network branch, is sampled by a measured value acquisition unit of the protective device 2 to obtain sampled values, and the sampled values are then digitized to digital current values.
- the protective devices 2 or 3 can trigger appropriate switches or circuit breakers that interrupt the current flow in the network branch, for example if the digital current values exceed a threshold value in the event of a short circuit, for example.
- the protective devices 2 or 3 are arranged in the immediate vicinity of the network branch, ie the primary conductor.
- the control center 4 is provided for monitoring and controlling the protective devices 2 or 3. For this purpose, it is connected to the protective devices 2 and 3 via an expedient communication network, not shown in the figures.
- a continuously running runtime program 5 is provided, which is distributed over the hardware components of the runtime system.
- the runtime program 5 accesses via hardware driver 6
- communication units such as, for example, a stationary single-user computer 7, a laptop 8 or a so-called PDA are provided connected to the internet via a modem connection, ISDN, DSL or a wireless local network connection.
- the runtime system comprises an Internet computer on which a server program of the runtime program 5 runs.
- the communication units use their browser programs 14 to access the server program via the lines of the Internet. It is therefore possible for a user to query and / or control process values of the control center system 1 via the Internet.
- a processing chain 10 is provided, which is composed of processing routines 11 running one after the other.
- the software each have a uniform output interface and a uniform input interface, the data to be controlled and monitored from the output interface of one of the processing routines to the input interface of the subsequent processing routine subsequently called reach.
- a user To query the current value digitized by the protective device 2, a user establishes, for example, the physical connection of his PDA to the Internet using the PDA 9 via a wireless, so-called Bluetooth connection. The user then logs on to the runtime program 5 via his PDA 9, stating his user name and password. Then, for example, he selects protective device 2 and the process value required by protective device 2 from a protective device tree displayed to him. Depending on the selection on the PDA 9, the runtime program 5 generates a component identifier as source data identifier that is specific to the protective device 2. In other words, a component address is generated depending on the selection made by the user. Furthermore, a register address for the selection of the desired current value is generated. The runtime program 5 also generates control data, in this case a so-called “read signal, with which the addressed hardware interface is informed that the addressed register is to be read out. Before running through the processing chain 10 Data still includes a user ID depending on the user name.
- the first processing routine is a security routine 11a, which accepts the data at its input interface from the runtime program 5.
- the security routine 11a determines whether the user is authorized to query the data. For this purpose, the security routine 11a compares the user ID of the query data with lists embedded in the security routine and only forwards the data to the output interface of the authorization routine 11a if the user ID matches an entry in this list.
- the buffer routine 11b checks whether the requested process values are specific process parameters that were defined by the software when the buffer routine was created. Such process values are, for example, only slowly or not at all changing process values compared to the time interval between two successive queries.
- the buffer routine 11b determines that such a specific process parameter stored in it by a previous query is queried, it makes this previously queried process parameter available and aborts the further query. Otherwise, it passes the data directly to a user routine 11c via its output interface.
- the user routine 11c passes the data in the request direction 12 to a so-called person without processing the data Tracing routine lld continues, from which the runtime program 5 takes over the processed data again. In the request direction 12, the data is not processed by the tracing routine lld either.
- the runtime program 5 then accesses the process values of the selected component 2 via the assigned hardware interface 6 and adds a current value as a process value to the data.
- the runtime program 5 then transfers the data with the current value of the input interface
- Tracing routine lld The data now runs through the processing chain 10 in the direction 13.
- the tracing routine lld uses the query data to check from which point the user accesses the runtime program 5. If the user has logged on to the runtime program 5, for example via a local network which is very difficult to access from the outside, the display options of the runtime program are not restricted by the tracing routine lld. In the present example, however, the user of the PDA 9 is logged on to the runtime program 5 via the Internet, so that for security reasons only limited information should be displayed. For this purpose, the tracing routine lld adds further security data to the queried current value and the remaining query data, with which a specific display format of the runtime program 5 is generated.
- the data then arrives at the user routine 11c, which adds display parameters to the data depending on the role of the user.
- the user is a parameterizer for whom even highly specialized display data, for example for the determination of errors, could be helpful, which, on the other hand, are confusing for the normal user.
- the user routine 11c submits the request data forth such display parameters that cause the runtime program 5 to display all data.
- the data then passes from the user routine 11c to the buffering routine 11b.
- the buffering routine 11b and the security routine 11a do not process the data.
- the security routine 11a finally sends this to the runtime program 5, which displays the data on the PDA 9 in accordance with the processing parameters.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/565,413 US20060176891A1 (en) | 2003-07-22 | 2004-06-23 | Method for controlling data interchange |
EP04738790A EP1646943A1 (de) | 2003-07-22 | 2004-06-23 | Verfahren zum steuern eines datenaustauschs |
HK06112407A HK1091917A1 (en) | 2003-07-22 | 2006-11-10 | Method for controlling an exchange of data |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10333888.8 | 2003-07-22 | ||
DE10333888A DE10333888B3 (de) | 2003-07-22 | 2003-07-22 | Verfahren zum Steuern eines Datenaustauschs |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005010753A1 true WO2005010753A1 (de) | 2005-02-03 |
Family
ID=34088820
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/DE2004/001341 WO2005010753A1 (de) | 2003-07-22 | 2004-06-23 | Verfahren zum steuern eines datenaustauschs |
Country Status (6)
Country | Link |
---|---|
US (1) | US20060176891A1 (de) |
EP (1) | EP1646943A1 (de) |
CN (1) | CN100367215C (de) |
DE (1) | DE10333888B3 (de) |
HK (1) | HK1091917A1 (de) |
WO (1) | WO2005010753A1 (de) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104753686A (zh) * | 2013-12-26 | 2015-07-01 | 北京信威通信技术股份有限公司 | 终端状态控制方法及系统 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060205449A1 (en) * | 2005-03-08 | 2006-09-14 | Broadcom Corporation | Mechanism for improved interoperability when content protection is used with an audio stream |
FR3024869B1 (fr) * | 2014-08-14 | 2016-08-26 | Zodiac Aero Electric | Systeme de distribution electrique pour un aeronef et procede de commande correspondant |
JP6839267B2 (ja) | 2016-09-09 | 2021-03-03 | マイクロソフト テクノロジー ライセンシング,エルエルシー | 異なるパーティーにまたがるオブジェクトのトレース |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0825506A2 (de) | 1996-08-20 | 1998-02-25 | Foxboro Corporation | Verfahren und Gerät zur Fernprozesssteuerung |
US6201996B1 (en) * | 1998-05-29 | 2001-03-13 | Control Technology Corporationa | Object-oriented programmable industrial controller with distributed interface architecture |
US20010056458A1 (en) * | 1995-04-11 | 2001-12-27 | Tuneo Iida | Method and system for controlling parallel execution of jobs |
US20030014500A1 (en) | 2001-07-10 | 2003-01-16 | Schleiss Trevor D. | Transactional data communications for process control systems |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2584113B2 (ja) * | 1989-07-21 | 1997-02-19 | 松下電器産業株式会社 | データ転送方法及びデータ転送装置 |
IL111154A0 (en) * | 1993-10-21 | 1994-12-29 | Martino Ii John A | Systems and methods for electronic messaging |
US5611059A (en) * | 1994-09-02 | 1997-03-11 | Square D Company | Prelinked parameter configuration, automatic graphical linking, and distributed database configuration for devices within an automated monitoring/control system |
US5805442A (en) * | 1996-05-30 | 1998-09-08 | Control Technology Corporation | Distributed interface architecture for programmable industrial control systems |
FR2770665B1 (fr) * | 1997-11-06 | 2002-12-20 | Alsthom Cge Alkatel | Dispositif d'echange entre unites de traitement d'informations a processeurs interconnectes par un bus commun |
FI106687B (fi) * | 1998-11-20 | 2001-03-15 | Sonera Oyj | Menetelmä ja järjestelmä tietoliikennejärjestelmässä ja tilaajaidentiteettimoduuli |
EP1172977A1 (de) * | 2000-07-14 | 2002-01-16 | Koninklijke KPN N.V. | Verfahren und Vorrichtung zum Datenaustausch über eine Datennetz wie das öffentliche Internet |
CA2346762A1 (en) * | 2001-05-07 | 2002-11-07 | Ibm Canada Limited-Ibm Canada Limitee | Compiler generation of instruction sequences for unresolved storage devices |
DE10144336A1 (de) * | 2001-09-10 | 2003-04-03 | Siemens Ag | Anlagen-Server-Computer und Verfahren zur Überprüfung der Rechte für eine Eingabe eines Benutzers |
US7146231B2 (en) * | 2002-10-22 | 2006-12-05 | Fisher-Rosemount Systems, Inc.. | Smart process modules and objects in process plants |
-
2003
- 2003-07-22 DE DE10333888A patent/DE10333888B3/de not_active Expired - Fee Related
-
2004
- 2004-06-23 CN CNB2004800211401A patent/CN100367215C/zh not_active Expired - Fee Related
- 2004-06-23 EP EP04738790A patent/EP1646943A1/de not_active Ceased
- 2004-06-23 US US10/565,413 patent/US20060176891A1/en not_active Abandoned
- 2004-06-23 WO PCT/DE2004/001341 patent/WO2005010753A1/de active Application Filing
-
2006
- 2006-11-10 HK HK06112407A patent/HK1091917A1/xx not_active IP Right Cessation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010056458A1 (en) * | 1995-04-11 | 2001-12-27 | Tuneo Iida | Method and system for controlling parallel execution of jobs |
EP0825506A2 (de) | 1996-08-20 | 1998-02-25 | Foxboro Corporation | Verfahren und Gerät zur Fernprozesssteuerung |
US6201996B1 (en) * | 1998-05-29 | 2001-03-13 | Control Technology Corporationa | Object-oriented programmable industrial controller with distributed interface architecture |
US20030014500A1 (en) | 2001-07-10 | 2003-01-16 | Schleiss Trevor D. | Transactional data communications for process control systems |
Non-Patent Citations (3)
Title |
---|
FRANK BUSCHMANN ET AL.: "Pattern-Oriented Software Architecture - A System of Pattern", JOHN WILEY & SONS LTD |
GERD NUSSER ET AL.: "Telematics Applications in Automation and Robotics", 24 July 2001, ELSEVIER SCI, article "REALITY-DRIVEN VISUA-LIZATION OF AUTOMATION SYSTEMS VIA THE INTERNET BASED ON JAVA AND XML" |
See also references of EP1646943A1 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104753686A (zh) * | 2013-12-26 | 2015-07-01 | 北京信威通信技术股份有限公司 | 终端状态控制方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
EP1646943A1 (de) | 2006-04-19 |
US20060176891A1 (en) | 2006-08-10 |
CN100367215C (zh) | 2008-02-06 |
DE10333888B3 (de) | 2005-04-07 |
HK1091917A1 (en) | 2007-01-26 |
CN1826587A (zh) | 2006-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60006018T2 (de) | Drahtlose Steuerung eines Feldgerätes in einem industriellen Prozess | |
DE10211939A1 (de) | Kopplungsvorrichtung zum Ankoppeln von Geräten an ein Bussystem | |
EP1430369B1 (de) | Dynamischer zugriff auf automatisierungsressourcen | |
DE112014004208T5 (de) | Integrationsverfahren und -System | |
EP1199846A1 (de) | Verfahren zur automatischen Gerätekonfiguration in einem Feldbus-System | |
WO2002067141A2 (de) | System und verfahren zum speicherplatzoptimierten abspeichern und generieren von webseiten | |
DE10333888B3 (de) | Verfahren zum Steuern eines Datenaustauschs | |
EP1653308B1 (de) | System und Verfahren zur Speicherung und Bereitstellung von Informationen | |
WO2005104055A2 (de) | Verfahren und system zur fernüberwachung, fernsteuerung und/oder ferndiagnose eines gerätes | |
EP1798620A1 (de) | System und Verfahren zur Fernanalyse, Fernwartung und/oder Fehlerbehebung eines technischen Gerätes | |
DE10118125A1 (de) | Automatisches Auskunftssystem | |
EP1737194B1 (de) | Tragbarer Datenträger | |
DE19940149A1 (de) | Online-Diagnose für ein Diagnose-Gerät und Diagnose-Gerät | |
EP3669501A1 (de) | Verfahren zum bereitstellen von datenpaketen aus einem can-bus; steuergerät sowie system mit einem can-bus | |
DE102018000361A1 (de) | Vorrichtung und Verfahren zur Bereitstellung von Maschinendaten | |
WO2005010752A1 (de) | Verfahren zur schichtorientierten und kopierfreien bearbeitung von daten | |
DE10252109B4 (de) | Verfahren zur Parametrierung | |
DE202018000385U1 (de) | Vorrichtung zur Bereitstellung von Maschinendaten | |
EP1618494B1 (de) | Verfahren zum angleichen eines auf einer client-datenverarbeitungseinrichtung angezeigten datenbestandes an einen auf einer server-datenverarbeitungseinrichtung gespeicherten quelldatenbestand | |
DE10142343B4 (de) | Kommunikationsverfahren für Werkzeug- bzw. Produktionsmaschinen | |
EP3339989A1 (de) | Verfahren zum überprüfen einer mandantenzuordnung, computerprogrammprodukt und automatisierungssystem mit feldgeräten | |
WO2005010755A2 (de) | Verfahren und system zum überprüfen einer leitstellenanlage | |
DE10208959B4 (de) | Verfahren und Vorrichtung zur Erfassung und Auswertung von in einem Rechnernetzwerk abgelegten Informationen | |
EP1240770B1 (de) | Verfahren und anordnung zur dezentralen steuerung eines prüfprozesses in einem telekommunikationsnetz | |
EP1880352B1 (de) | Vorrichtung und verfahren zur kommunikation zwischen einem mobilen endgerät und dem internet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200480021140.1 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004738790 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 00086/KOLNP/2006 Country of ref document: IN Ref document number: 86/KOLNP/2006 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2006176891 Country of ref document: US Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10565413 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2004738790 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10565413 Country of ref document: US |