WO2005076737A2 - Procede et systeme de gestion d'une base de donnees informatisee d'utilisateur - Google Patents

Procede et systeme de gestion d'une base de donnees informatisee d'utilisateur Download PDF

Info

Publication number
WO2005076737A2
WO2005076737A2 PCT/IL2005/000181 IL2005000181W WO2005076737A2 WO 2005076737 A2 WO2005076737 A2 WO 2005076737A2 IL 2005000181 W IL2005000181 W IL 2005000181W WO 2005076737 A2 WO2005076737 A2 WO 2005076737A2
Authority
WO
WIPO (PCT)
Prior art keywords
contact
message
target
computer
data
Prior art date
Application number
PCT/IL2005/000181
Other languages
English (en)
Other versions
WO2005076737A3 (fr
Inventor
Tomer Dror
Neriel Paglin
Original Assignee
Share-Manage Data Actualization Technologies Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from IL16032604A external-priority patent/IL160326A0/xx
Application filed by Share-Manage Data Actualization Technologies Ltd. filed Critical Share-Manage Data Actualization Technologies Ltd.
Publication of WO2005076737A2 publication Critical patent/WO2005076737A2/fr
Publication of WO2005076737A3 publication Critical patent/WO2005076737A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating

Definitions

  • This invention is generally in the field of communication techniques and relates to a method and system for managing a user's computerized database, for example, an address book.
  • a business card usually contains data pertaining to the following: name, occupation, company, position and addresses relative to communication systems such as mail, phone, fax, e-mail and the like. As time passes, it is usual for changes to occur in at least some of the data contained in a business card. Although names tend to remain the same, positions, occupations and many kinds of addresses are modified quite often. For example, a person may be promoted to a higher position in another division, may leave for another company or, as frequently occurs, his telephone number, facsimile or e- mail address can be modified. These are all "dynamic" changes that take place in everyday life.
  • a user A is the owner of contact information.
  • A can update this information in the contact book of user B by means of a return e-mail message thereto.
  • user A has to manually update all the data fields in the message, and do so each time he receives such an e-mail message.
  • WO 02/052436 disclosing a method for automatically updating and maintaining contact information for various contacts stored in a contact database without requiring an individual to manually update their contacts.
  • an automated reply process is used for the maintaining of contact information, requiring one individual to be a member of the service.
  • the reply process utilizes access to a respective WebSite where the user receives an HTML dynamic page, including the user's contact information and allowing the user to store the updated information in a server, while the latter is responsible for updating this contact information in a database of another user, who has requested for updated information.
  • This technique suffers from a need for a third party (server manager) involvement in a process of exchanging users' personal data, thus affecting the privacy of the process.
  • 6,393,421 of one of the inventors of the present application, discloses a communication system and method for enabling keep in touch technique between users utilizing a manager utility and user's related communication codes.
  • the owner of the code or any other authorized person, creates a data record containing information belonging to the code owner, and feeds this data record to the manager utility.
  • the manager utility upon receiving the data record, stores it in a database and assigns the communication code, associated with at least a part of the stored information, to the data record owner.
  • the manager utility Upon receiving the communication code from the code receiver, the manager utility provides him with the respective information of the code owner.
  • the manager utility Upon detecting that changes have been made to the data record of the code owner, the manager utility operates to update the code receiver.
  • the communication code may be e-mal address associated with the manager utility, and the process of requesting and updating the information may be conducted via e-mail messages.
  • the present invention provides a new software tool (utility) for managing the user's computerized database, such as contacts-related database or address book.
  • the owner of a database e.g., an address book owner, henceforth: "the source contact” who is interested in validating or receiving certain information (e.g. contact information) from another user (henceforth: “the target contact”) will, by using this new software tool, be able to send target contact validation/update requests (and receive the updated/validated information).
  • the present invention utilizes either a direct communication between the source and target computers or a communication between a source computer and another side that communicates with the target on behalf of the source, as per source request.
  • the present invention provides a user for replying to such requests in a semi-automatic manner, with no need for reentering updated/validated information per each new request and without exposing his data to an intermediary. Moreover, the present invention provides a solution for the above- described problem, when a source contact either has no e-mail of the target contact or e-mail stored in the database of the source contact is not updated.
  • the method of the present invention utilizes automatically searching in the database for a phone number associated with the target contact, contacting the target phone system and instructing the target, by a pre-recorder message, to feed his fax number or other contact information by using tone dialing and/or recording a voice message with the requested details.
  • a computer-implemented method for updating data relating to a target contact in a database accessible to a source contact comprising: conveying to the target contact a pre-designed message prompting the target contact to provide current data and configured for activating a predetermined script on the target contact computer to generate a reply message, to enable sending an updated version of said data from the target contact computer to an address specified in the message and enable storing the updated version of said data to a local storage repository of the target contact to enable automatic generation of similar reply messages in the future; receiving the current data from the target contact; and adding or replacing the current data in the database.
  • Said conveying of the message to the target contact may include conveying a first message to a certain contact thereby allowing said certain contact to generate the second message to be conveyed to the target contact.
  • the method includes decoding the current data received from the target contact in order to extract discrete fields of the data for updating corresponding fields in the database.
  • the current data is preferably a delimited text string
  • the decoding includes parsing the delimited text string to extract concatenated discrete fields therein.
  • the message may include existing data for displaying to the target the contact data as currently stored in the database.
  • the message may be an e-mail message, and may include an (HyperText Markup Language) HTML attachment or a link to a site where the target can get an empty HTML form.
  • the HTML file/form may include multiple fields each relating to an item in the database and includes the script for storing the data to the local storage repository associated with the target and automatically generating a reply message.
  • a computer-implemented method for use in updating data relating to a target contact in a database accessible to a source contact comprising: conveying to the target contact a pre-designed message configured to provide access at the target contact to an (HyperText Markup Language) HTML form prompting the target contact to provide current data and configured for activating a predetermined script on the target contact computer, said script being configured to automatically generate a reply message to enable sending an updated version of said data from the target contact computer to an address specified in the message and enable storing the updated version of said data to a local storage repository of the target contact to enable automatic generation of similar reply messages in the future.
  • an HTML form Markup Language
  • a computer-implemented method for updating data relating to a target contact in a database accessible to a source contact comprising: receiving, via a communication network, a message associated with the source contact prompting the target contact to provide current data, said message containing a predetermined script to enable storing the current data to a local storage repository of the target contact, and to enable automatically conveying the current data from the local storage repository to at least one address contained in the message for allowing respective recipients thereat to add or replace the current data in a respective database; searching said local storage repository to locate said current data; and if said current data is located on said local storage repository, generating a reply message directed to said at least one address specified in the message for conveying the current data to said at least one address for allowing a recipient thereat to add or replace the current data in the database.
  • the method provides for saving this data on the local repository.
  • This can be implemented using the script which calls to an internal object of Internet Explorer known as USERDATA Behavior, which when actuated, operates to save the data from the HTML file/form to the local storage repository in XML format.
  • the method preferably provides for encoding the data for conveying discrete fields thereof to said one or more predetermined destinations.
  • the encoding includes concatenating said discrete fields a delimited text string.
  • the message structure from the source to the target, requesting updating the target related record utilizes transmission of an attachment (such as HTML).
  • the attachments includes a script, which when activated by the recipient (target) by clicking a "Save” key (button), stores the data to a pre-defined location.
  • the script is of the kind capable of operating the USERDATA Behavior function, which is part of Internet Explorer, to save the data in a local storage repository.
  • the data is saved as XML document which is identified using a unique name (rather than a path to a file).
  • a link to a certain Internet server is transmitted, for example because of security problems (Firewalls etc.). Activation of this link by the target contact, queries an
  • Internet server to request for an empty HTML form which includes a similar script that functions as the HTML attachment.
  • This button activates a respective script (Java script), which is either the same script or another script that was in the HTML form to generate the reply message (from the target to the source), that uses the MAILTO protocol of the target e-mail program to generate an email message and insert the data from the saved XML document into the message or as an attachment to the message and insert the e-mail address of the source into the "To" field of the e- mail message.
  • a respective script Java script
  • opening of the HTML form displays the user the details which he saved previously. Now, the user can again update and save the data to the same destination and then push the "Send” button, or just push the "Send” button if the data is updated.
  • the script can be configured to cause automatic transmission of the email reply message or to provide a message form and wait for the user pushing the "Send" button of the message form (so the user can review the message before the message is sent).
  • a computer-implemented method for updating data relating to a target contact in a database accessible to a source contact comprising: obtaining at least one address of a source contact to which updated target contact data is to be sent; searching for a file containing current data; upon locating said file, automatically generating a message conveying, via a communication network, the current data to said at least one address for allowing a recipient thereat to add or replace the current data in the database.
  • the present invention in its yet another aspect, provides a computer- implemented program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform method steps for updating data relating to a target contact in a database accessible to a source contact, said method comprising: obtaining at least one address of a source contact to which updated target contact data is to be sent; searching for a file containing current data; upon locating said file, automatically generating a message conveying the current data to at least one address for allowing a recipient thereat to add or replace the current data in the database.
  • a computer-implemented computer program product comprising a computer useable medium having computer readable program code embodied therein for updating data relating to a target contact in a database accessible to a source contact, said computer program product comprising: computer readable program code for causing the computer to obtain at least one address of a source contact to which updated target contact data is to be sent; computer readable program code for causing the computer to search for a file containing current data; computer readable program code responsive to locating said file for causing the computer to automatically generate a message conveying the current data to at least one address for allowing a recipient thereat to add or replace the current data in the database.
  • Instructions to the program can be executed either by entering the target contact's e-mail address on the appropriate screen or by selecting a contact from the source contact's address book (it is possible to select multiple target contacts at one time).
  • the program sends an update/validation request to the target contact that includes: 1. Free text (sample) "the following are your details as they appear in my address book. Please assist me in validating/updating these details... " 2.
  • a table for example in the form of a business card, containing the fields, which the target is asked to fill.
  • a Script to save the data to a local storage repository and to generate a return message, such as e-mail message, from the target contact to the source contact that will contain all the details saved in the table.
  • 2.5 A Script execution key Pressing this key will activate the script to call a system request to save the data from the file to the address on the target contact's computer that was pre-defined in the message (or using a unique name as described above) and will generate a reply message to the address specified in the message request.
  • the program will either respond to the source contact automatically, or alternatively ask permission from the target contact to respond automatically, all according to the preferences defined by the target contact in the program's user preference screen.
  • This technique is described in U.S. patent No. 6,393,421 of one of the inventors of the present application.
  • the following prompts are displayed if the target contact does not have the program of the present invention installed: 1. Open the Attachment that comes with the e-mail message or clicking the link to get the HTML file from an Internet site. 2. Fill the fields in the attached table. 3. Save the data to the pre-defined address by pressing the Save button on the message. 4.
  • Pressing the Activate Script key will once again compose a new e-mail message addressed to the new sender (source contact) that contains all the previously entered details.
  • the target contact has the ability to update any details that might have changed and save the new changes by pressing the Save key on the HTML page. If the target contact chooses to download the program by clicking the appropriate link, this will lead to an Internet site from which to download the identical program employed by the sender/source contact. Running the program the first time instructs the target contact how to set up his personal business card, and will automatically respond to the source contact's request, as described in the above-indicated U.S. patent No. 6,393,421 of one of the inventors of the present application.
  • a computer-implemented method for managing users related databases via a communication network comprising providing, in computer systems of at least some of the users, similar manager utilities configured to communicate with each other by using the users' unique communication codes, respectively, the manager utility of one user being capable of communicating with the manager utility of another user to update the database of said one user with information stored in the database of said another user, and capable of actuating the manager utility of said another user to contact yet another user on behalf of said one user to request for information relating to or stored in the database of said yet another user.
  • Fig. 1 is a pictorial representation of a system for maintaining a source contact's address book, according to one embodiment of the invention
  • Fig. 2A is a flowchart illustrating a method for managing a source contact's address book, according to one embodiment of the invention
  • Fig. 2B is a flowchart illustrating operations that can occur in a target contact's computer, after receiving an update request, according to one embodiment of the invention
  • Fig. 2C illustrates a target contact's business card, according to an embodiment of the invention
  • Fig. 3 is a flowchart of constructing an update request message in an agent program, according to an embodiment of the invention.
  • Fig. 4 is a flowchart of the method according to the invention, from the perspective of the target, for updating data relating to a target contact in a contact database accessible to a source contact;
  • Fig. 5 is a pictorial representation of a secured system used for managing a source contact's address book, according to the principles of the present invention
  • Fig. 6 is a flowchart illustrating secure update of contact data in a target contact's computer, according to an embodiment of the invention
  • Fig. 7 is an illustration of a list form including information, according to one embodiment of the invention
  • Figs. 8A and 8B exemplify the principles of one more aspect of the invention.
  • Fig. 1 is a pictorial representation of a system 100 for maintaining a source contact's address book, according to one embodiment of the invention.
  • the system 100 is formed by communication devices or computers connectable to each other via a communication network.
  • An address book owner 105, or "source contact”, shown seated at a computer/GUI 110, is interested in validating or receiving contact information from a target contact, whose computer 120 is shown.
  • the source contact will send to the target contact validation/update requests via the Internet 130, or other communication network, and receive the updated/validated information.
  • Computer/GUI 110 has been provided with an agent program 140.
  • the agent program is sometimes referred to also shortly as an "agent", a “micro- server” or a “plug-in agent” and it can be any computer program such as a stand alone program or a plug-in.
  • the target contact's computer may also have a copy of a target program 150 in his/ er computer 120. It is noted that the target program 150 can be similar to the agent 140.
  • the system 100 illustrated in Fig. 1 is by no way binding.
  • the present invention could utilize communication between telephone devices (sometimes referred to, shortly, as “phones” or “phone devices”), between computers, PDAs (Personal Digital Assistant), a combination thereof (e.g., communication between computers and telephones and/or PDAs) etc.
  • the communicating devices are telephones, for example, they can communicate via a switching system.
  • the target contact's computer 120 should not necessarily include a target program 150, as will be described with detail below.
  • the two programs can be similar and perform tasks adapted to the source contact's computer as well as to the target contact's computer.
  • the agent program 140 can perform tasks adapted to the source contact's computer as well as to the target contact's computer, while the target program 150 performs only tasks adapted to the target contact's computer.
  • the agent program 140 can perform tasks adapted to the source contact's computer while the target program 150 performs tasks adapted to the source contact's computer as well as to the target contact's computer.
  • the agent program 140 can perform tasks adapted to the source contact's computer while the target program 150 perform tasks adapted to the target contact's computer.
  • the source contact's computer and/or the target contact's computer can install the agent program 140 and the target program 150, instead of installing only one of them, as illustrated in the figure.
  • the source contact 105 in the figure is illustrated as a person, this is non-limiting too, and the source contact 105 can be any entity that owns a contacts' database. Examples to source contacts are a bank (wherein the contacts database includes, for example, information about the bank's customers), a man power company (wherein the contacts database includes, e.g., information about employees), a fast food supplier (wherein the contacts database includes information such as suppliers information) etc.
  • the source contact operates the source contact's computer (communication device), when he operates in accordance with the invention, it should be appreciated that he uses the source contact's computer (or telephone or PDA etc.).
  • the source contact operates in a certain way it should be appreciated that the source contact computer operates the same way.
  • the source contact's computer can be referred to as the source contact.
  • the target contact's computer is sometimes referred to as the target contact.
  • the present invention provides for a computer-implemented product (computer program) for updating data relating to a target contact in a contact database accessible to a source contact.
  • the computer readable program code causes the target contact's computer to obtain at least one address of a source contact to which updated target contact data (referred to also as target contact information) is to be sent; causes the computer to search for a file containing current contact data; and is responsive to locating the file for causing the computer to automatically generate a message conveying the current contact data, or part of it, to the at least one address for allowing a recipient thereat to add or replace the current contact data in the contact database.
  • Fig. 2A is a flowchart illustrating a method for managing a source contact's address book, according to one embodiment of the invention.
  • the process begins with 210 when an agent program is loaded, or installed in the source contact's computer.
  • the source contact may convey to the target contact a request message for the purpose of validating/updating the selected information of the target contact.
  • the message is conveyed by sending it to the target contact by e-mail.
  • uploading the request message to the target contact's computer when he downloads a web page wherein a link to an HTML page exist (such as a link having the text "Do we know you?"), wherein the HTML page is the request message.
  • the request message prompts the target contact to confirm that his current data saved in the source contact's database are correct, or to provide currently contact data.
  • the request message includes an update form.
  • the update form can be included in the request as an HTML file attachment and/or as a link to an Internet server where the HTML form could be imported from.
  • the update form (the file attachment and/or the linked HTML form) contains a script for automatically generating a reply message to an address specified in the message.
  • the script can collect information included in the form, construct a pre-formatted message including the collected information and convey the pre-formatted message to the source contact.
  • the target contact can have information stored in his computer.
  • the script can retrieve the stored information and fill it into the update form, reducing source contact's typing efforts thereby.
  • the request message may for example include the following free text: "Please take a moment to update your contact information in my address-book via direct e-mail, without any intermediary. Once done, you can answer similar messages with one click".
  • the request message may include, as an option, the target contact data that is currently stored in the source contact's address book.
  • the agent program can be pre-installed in the system, such as being part of the operating system or being associated with the installation thereof.
  • the agent program can be installed in a server, wherein the source contact's computer has access thereto, e.g., by using a browser or using a LAN (Local Area Network).
  • the source contact's computer can send update requests in 220 on a periodical basis, e.g., once in a year.
  • sending update requests can be based on different basis.
  • Fig. 2B is a flowchart illustrating operations that can occur in a target contact's computer, after receiving an update request message, according to one embodiment of the invention.
  • the target contact's computer receives an update request message.
  • the target contact receives such a message, then he is instructed in 240 to open the file attached to the request message, or to follow the link included therein in order to import an update form and follow further instructions as will be explained below. This is indicated, for example, by the following exemplary text that can be included in the update request message: "Open the attached file and follow the instructions " or "Activate the link to import a form ". IT should be understood the file attachment includes a copy of the update form.
  • the file attachment or linked update form can include HyperText Markup Language (HTML) data.
  • HTML HyperText Markup Language
  • the update form can include free text with explanation; one or more tables, or a form, containing fields that the target contact is asked to fill or confirm their content; a script capable of generating a return message from the target contact to the source contact containing the target contact's information; and "buttons" such as a Save button and/or a script execution key. It is noted that in order to find out whether this is the first time the target contact receives an update request message, a question can be displayed on his screen, prompting him to respond to a question. However, alternative methods can be used as well. For example, in an automated method, after the target contact's computer terminates handling an update request message (or sometimes after handling the first update request message), a flag is marked in therein, wherein in 230 this flag is checked. In 270 the update form is displayed. An example of a displayed form is illustrated in Fig. 2C, described in detail below.
  • the information included in the form is conveyed to the source contact's computer in response to the update request message.
  • the target contact had received an update request message in the past, then it is assumed that there is a file stored in the target contact's computer or accessible thereto, wherein this file includes target contact's information. It is possible to consider the file as the target contact's business card. Therefore, in 250 the target has to choose whether he wants to send stored information as response to the update request message, and if so, in 260, the target contact can indicate whether he wants to send his currently stored business card or view (and optionally update) the information stored therein before sending.
  • buttons can be presented, one indicating "View my updated Business Card” and the other "send my currently stored business card”. If the target contact opts to view the information, in 270 his business card is displayed (see Fig. 2C), where he can type additional or replacing information. In 275 the information included in the form is conveyed to the source contact's computer in response to the update request message. In addition, it is possible to offer the target contact to download and install a target program in his computer. If the target contact agrees, the target program is downloaded and installed. It is mentioned, though, that this is non-obligatory.
  • Fig. 2C illustrates a target contact's business card 2100, according to an embodiment of the invention.
  • the business card includes free test, such as "Your business card" 2110.
  • the business card includes also indication of different fields
  • pressing on the save button 2140 stores the information in a file accessible to the target contact's computer
  • pressing on the send button 2150 conveys the information to the source contact's computer, as indicated for example, in 275 (see Fig. 2B).
  • a system request to save the data to a local storage repository in or accessible to the target contact's computer is activated.
  • the data can be save in a file, for example. Alternatively, it can be stored in a database or in any other available way and format.
  • the file name (if required) may be either predetermined (e.g., by the script) or pre-defined by the target contact when he receives the first such request; Any other applicable way for determining the file name is allowed, such as generating a random name during installation or during the first request reception.
  • the local target contact storage repository can be, for example, a disk, non volatile memory or any other long term storage device such as flash memory card etc.
  • the business card illustrated in Fig. 2C is illustrated as an example, and is by no way binding.
  • the business card can include additional information such as an email address, while currently illustrated information (such as "FAMILY NAME") can be missing.
  • the target contact had filled such a form and saved, or stored the data in the past, the form can be automatically filled up with the stored data from his disk (those versed in the art will appreciated that a cookie, for example, can be utilized).
  • a cookie for example, can be utilized.
  • the request message can include data, such as textual data.
  • the data can be later filled into the downloaded HTML form, thus presenting to the target contact the data that is currently stored in the source contact's address book.
  • the request message it should be appreciated that it includes also an e-mail address of the source contact, or any indication thereto, so that the script can formulate an automatic reply to the source contact.
  • the message can include, for example, an index indication to the source contact's address, in order to locate this address in a database of addresses. It was noted before, following the description of Fig. 2A, that an update request message can include an update form.
  • the update form can be included in the request as an HTML file attachment, and/or as a link to an HTML form at the Internet server. It should be appreciated that by including a link it is possible to avoid a known problem associated with receipt of HTML file attachments that are attached to e-mail messages, which are blocked in some cases by security tools such as Firewalls. Thus, by selecting or clicking the link in the message, the target contact can receive an empty HTML form (such as the form of Fig. 2C when not including information), fill his details into the form and save his contact data to his disk by clicking a button on the HTML form.
  • an empty HTML form such as the form of Fig. 2C when not including information
  • the program in the source contact computer is capable of converting the mail message into corresponding text fields.
  • the message generated at the source contact computer is an acoustic data stream, such as a voice message or tones' stream, and is conveyed via a telephone network to the target contact telephone device 120.
  • an acoustic data stream can be stored, for example, in a known per se MP3 file, WAVE file etc.
  • an acoustic stream can be broadcasted to the target contact phone by a switch or by a server associated therewith.
  • This embodiment is effective, for example, when the source contact's database has no e-mail address of the target contact or when it appears that the e-mail address stored therein is incorrect (i.e., is not updated).
  • the voice message will include a request for the target contact to provide his/her e-mail or fax number, in order to be able to convey there the request message with the target contact information to be verified updated.
  • the source contact's computer 110 in Fig.
  • the acoustic data stream can represent the source contact's data that are kept in the target contact's database.
  • a message can include, for example, indication of different fields and information associated therewith (such as "FIRST NAME" and "Neri", respectively, as illustrated in Fig. 2C).
  • the target contact receives the message, he can listen to it, and then he can record new information (by using his voice or by pressing the telephone keys) to replace the previously stored information. Then, a message including the target contact's recorded information is conveyed to the source contact's computer, where the data is processed to update the contacts database. If the target contact only confirms that the received information is correct, it is unnecessary to record and convey the information to the source contact.
  • an indication is enough, indicating that the data included in the request is correct.
  • the target contact can have a program installed (the target program).
  • the target program can allocate a location (such as a pre- allocated location) in the local storage device or any other storage device that the target program's computer has access to (e.g., disk or local network), store target contact's information thereto, retrieve the information and/or send the information to the source contact.
  • Fig. 3 is a flowchart of constructing an update request message (shortly referred to as a "request message") in an agent program 140, according to an embodiment of the invention.
  • an update form is attached to the request message, together with a link to an HTML update form.
  • the attached update form (and/or the HTML update form) can be any form applicable for updating contact's information, such as the business card of Fig. 2C. It should be appreciated that after conveying the request message to a target contact, he will open the message and then he can open the attached update form or select the link to load the update form from the Internet. It is noted that according to several embodiments the agent program can be aware whether a certain target contact's computer has a target program installed therein or not (For example, while loading and/or installing the target program a target contacts' computer can notify the agent program thereof).
  • the agent program inserts into the request instructions to open the file attachment that comes with the request message or to request an update form from an Internet server by selecting the link included in the request. Then in 350 the agent program inserts into the request instructions for updating or validating displayed information. In 360 it inserts into the request instructions for saving changes to the information to a storage device that is local or accessible to the target contact's computer. In 370 the agent program inserts into the request instructions for authorizing sending the updated/validated details to the source contact (e.g., by pressing the "Send" button 2150 of Fig.
  • the agent in 380 the request is conveyed to the target contact.
  • the agent is aware that a target program is installed in the target contac's computer than instructions are not required (the target program will automatically respond to the request message or at least will ask the target contacts' permission to do so) and therefore the request message can be sent without including instructions therein.
  • the update form downloaded from a server can be an empty form.
  • the update form includes a script. Therefore, if the target contact had already saved his contact information in the past (see, e.g., 2150 in Fig. 2C), the script will fill the form with the details from the disk (local network).
  • the agent can include in the request also information that is currently stored in its accessible contacts database.
  • the target contact's computer can insert the information into the empty form for display.
  • the script included in the request message composes a pre-formatted network message (e.g., by activating a "mail to" system function).
  • the target contact's updated/validated data are included in the network message.
  • the target contact's computer conveys the network message to the source contact for updating the contacts database thereof.
  • the network message can include only an indication thereto, instead of validated information.
  • Fig. 4 is a method for updating contact information in a target contact's computer, according to one embodiment of the invention.
  • the target contact receives a message from the source contact prompting the target contact to provide current contact data.
  • the message contains an HTML attachment (an update form) with a script or a link to an HTML form (also an update form) containing the script
  • the script when activated causes automatic conveying of the current contact data from a local storage repository to one or more addresses contained in the message for allowing the source contact (respective recipients) to add or replace the current contact information in their respective contact database 410.
  • the local storage repository is searched to locate the current contact data 420. If the current contact data is located on the local storage repository 430, a response message is generated and directed to the one or more addresses specified in the script or in the request message for conveying the current contact data to the one or more addresses for allowing a recipient thereat to add or replace the current contact data in their contact database 440.
  • the target may use the update form to create more than one personal data containing card (Business Card, Private Card) and use a proper button (key) to actuate transmission of one of these cards or all of them to the source.
  • the message addressed to the target may arrive from a Web directory and include the address of a host site and password. So, the user at the target computer can publish a few fields (even from his Business card) on the Internet white paper guide: e.g., while not willing to publish his e-mail address and mobile phone, the user might agree to publish some other data which will not expose him to "junk" mail.
  • a visitor to the Web directory site may find the published details of the user of his interest and contact this user in the above- described manner to request for the updated contact information of this user.
  • the site visitor actuates a respective key (pushes a bottom), and is then invited to enter his e-mail address and send a request for the updated contact information of the target (user).
  • the Web-site automatically generates an e-mail message (the same as the first request) asking the target to send his updated contact information to the visitor as per his entered e-mail address.
  • the target opens the HTML form, he views the details he have saved before to his local storage and can send a reply to the visitor by just pushing the "Update" button.
  • the target contact's computer can store the source contact's email address in a list stored locally, or accessible thereto.
  • the list referred to as a "contacts list”
  • the script contained in the HTML form when activated, can automatically convey the current contact data to all or part of the address in the contacts list.
  • his data can be conveyed to all or part of the address in the contacts list, and not just to the source contact that sent the request.
  • the target program can retrieve an HTML form accessible thereto, such as from a local repository or from a networked server, sending the data to all or part of the address in the contacts list.
  • an HTML form accessible thereto such as from a local repository or from a networked server, sending the data to all or part of the address in the contacts list.
  • the contacts list can store also supplementary information, apart from source contacts' email addresses.
  • supplementary information are circumstances for updating the target contact's data in the listed source contact's database, such as 'update on telephone number change', or 'update on address change'.
  • this is non-limiting and other types of supplementary information may exist.
  • supplementary information can also allow periodically updating one or more source contacts listed in the contacts list, for example, by including a tag indicative of the last update time and another tag indicative of the period's cycle length (once in a week, one a day etc.).
  • addresses can be listed in the contacts list when new requests arrive at the target contact's computer.
  • addresses can be listed therein manually, i.e., the target contact can manually add addresses of source contacts he want to keep updated with his contact data.
  • addresses can be listed from web pages.
  • HTML includes, for example, 'mailto' tags, for specifying email address.
  • the target program when the target contact selects a mailto tag, the target program, for example, can ask whether he wants to send an email to the specified address, or whether he wants to add it to the contacts list.
  • a new tag such as 'contactto', wherein selecting an address associated with this tag in an HTML page automatically inserts the address to the contacts list.
  • a program such as the target program, can scan the contacts list and automatically convey contact data to addresses stored therein, if their associate supplementary information indicates so.
  • the program can display listed information, wherein the target contact can indicate zero or more addresses therefrom, for conveying contact data thereto.
  • HTML forms can reside on different web servers, for example, several source contacts can have their own web servers, while others can host their HTML forms in public web servers providing hosting services for such forms.
  • an HTML form can also display part or all of the information listed in the contacts list (a list form). Listed information that is displayed in an HTML form is referred to as "displayed listed information”.
  • the contacts list is in a format that is displayable in a web page, such as XML, it is possible to retrieve information therefrom, displaying it in a list form. Even further, it is possible to include target contact's information in the contacts list. Thus, it is possible to store on a web server an empty HTML list form that is filled with information stored in the list, including target contact's information and/or contact information and/or supplementary information. It can be appreciated now that instead of storing or displaying one HTML form per each source contact, there can be at least one HTML form, filled with the target contact's data and with a list of source contacts to whom the data should be conveyed ("displayed source contacts list"). Further to the previously provided explanation is appreciated that the displayed source contacts list can include one contact directly associated with a request, or all the contacts listed in the target contact's contacts list, or part of the listed contacts (for example, in accordance with supplementary data).
  • the target contact can select zero or more contact out of the displayed source contacts list wherein updates will be sent only to selected contact.
  • updates can be sent to all the source contacts in the displayed source contacts list.
  • Other embodiments are allowed as well, such as an embodiment that hides the displayed source contacts list, thus the target contact would notice only his data that is filled in the HTML form, but not the displayed source contacts list.
  • domains are established. An HTML form stored in a web server might be able to access only information associated with the same domain. For example, in order for an HTML form to access information listed in a contacts list, the HTML form and the contacts list should be generated by entities belonging to the same domain.
  • FIG. 5 is a pictorial representation of a secured system 510 used for managing a source contact's address book, according to the principles of the present invention.
  • 110 represents a source contact and/or his and his computer/GUI
  • 120 represents a target contact and/or his computer
  • 130 represents a communication network
  • 140 is an agent program.
  • the target contact 110 has access to a forms server 520.
  • the forms server 520 can be accessible to several target contacts, wherein it is unnecessary that the several target contacts have any connection or relation between them. That is, the several target contacts can be foreigners, and/or they can work for different companies, and/or operate behind different firewalls, and/or connect to different LANs (Local Area Networks) etc.
  • the target contacts 120 and the forms server 520 can communicate, for example, via the internet. However, this is non-limiting and it is possible, for example, that a large corporate would allow that a forms server 520 be installed in its local network.
  • Fig. 6 is a flowchart illustrating secure update of contact data in a target contact's computer, according to an embodiment of the invention.
  • the target contact receives an update request from the source contact via email.
  • the target contact selects the link included in the request, thus connecting to the forms server, from which an empty list form is downloaded in 630.
  • information included in the contact list is filled into the empty list form, information that can include target contact's information, and/or contacts list information and/or supplementary information. It is noted that on the first time that the target contact receives a request message his contacts list will be initially empty, and thus no information apart from the request message's source contact information will be filled into the empty list form.
  • the target contact validates the filled information or updates at least part thereof, in 660 a response network message is generated, to include at least modified target contact's information or indication that previously stored information is valid.
  • the response network message is conveyed to the source contact, and in 680 modified information is stored in the target contact's computer. It is noted that the modified information can be stored in any available form and format, as was previously noted. In addition it is possible to store the modified information in the contacts list. It should be noted that in 680, if the request message's source contact was not previously stored in the contacts list, its contact would be appended thereto, for example by the script included in the update form or by the target program (if installed).
  • Fig. 7 is an illustration of a list form 710 including information, according to one embodiment of the invention.
  • a target contact whose first name is “Neri” and his family name is “Paglin” has a contact list in his computer, wherein his first and family names are listed, together with three listed contacts (his bank, a man power company and a fast food supplier).
  • the target contact receives a request message form a daily news provider, requesting him to update his contact data in their contacts database.
  • the list form 710 is displayed on the target contacts' screen. Apart from including the target contact's information (as was in the business card illustrated in Fig. 2C, for example), the list form 710 allows the target contact to select amongst the source contacts 720 those to which information will be conveyed.
  • the target contact decided to convey his information to the daily news provider, as well as to the bank, although the bank did not request him to update his information at this stage. It is further noted that the target contact select to convey the information to zero or more source contacts, then he can change his selection and press the Save button. Thus, if the target contact will deselect the daily news provider before pressing the Save button, the daily news provider's contact information will not be listed in the contacts list. In an alternative embodiment there may be only one button, performing Save and Select, however, in this case the target contact will not be able to save one instance of the information while conveying a second instance thereof as a response. Similarly, the target contact will not be able to convey the response to a first portion of the listed contacts, while saving a second portion of the listed contacts in the contacts list.
  • Fig. 7 is a non-limiting simplified example. It should be appreciated that the list form can include any number of listed contacts, it can use different ways in order to display information (such as selection boxes instead of the illustrated radio buttons etc.) and it can display any set of available information (unlike the first and family names illustrated in the figure).
  • the contacts list is updated (and initially generated) by a script that is included in the request message or in the empty form.
  • a script that is included in the request message or in the empty form.
  • the request can include target contact's information as stored in the source contact's database.
  • the forms server can load an already filled (or at least partly filled) list form from the forms server.
  • the forms server can get access to the target contact's information in any available way. For example, it can have access to the source contact's database or it can receive the target contact's information in the link that the target contact accesses.
  • the forms server does not necessarily belongs to the source contact it is appreciated that such an embodiment harms the target contact's privacy, while revealing his contact information to a forms server,.
  • the source contact's privacy can be harmed as well, as the forms server becomes aware to contacts information stored thereby.
  • the target contact can encrypt the contact information in any known per se method.
  • the encrypted information can be revealed to the forms server without harming the privacy of the source and/or the target contacts.
  • a known per se key including a password
  • the source contact can include the key in the request message, thus allowing the target contact to decrypt the encrypted information.
  • the target contact When the at least partly filled list form is initially displayed on the target contact's computer, the information included therein is encrypted and therefore it is unreadable.
  • the target contact By inserting the password or key that he received in the request message (referred to as the "decryption key"), the target contact can decrypt the information in order to view it.
  • the decryption key can be stored in or in association with the contacts list, for returning usage, and is valid as long as the source contact does not replaces the decryption key.
  • a script that is associated with the at least partly filled list form can parse it and insert it into the corresponding fields in any method known per se. For example, if the target contact information is represented by a single string, wherein a punctuation character (such as ';' or',') marks the end of a field, the script can read the string and parse it in accordance with the punctuation character, giving rise to field- contents. Then the script can fill the form's field with their respective field- content. It is noted that some of the field-contents can include 'blanks', therefore leaving their respective form's fields empty. Furthermore, it was previously mentioned (for example, with reference to
  • the target contact can also generate a key ("encryption key"), and provide it to the source target. Then, when updating information, the information can be encrypted using this encryption key, allowing only the source contact to decrypt and view the content thereof. Similarly to the decryption key, the target contact can store the encryption key in or in association with the contacts list.
  • the encryption and decryption keys can not be displayed in the list form, as the list form can be associated with a different domain than the source and target contacts. Therefore, in order to encrypt and decrypt information, the target contact need to brows the contacts list with a different tool than the forms list, or alternatively, switch between the list form and the request message that includes at least one of the keys. This is uncomfortable.
  • another embodiment of the invention allows the source contact to include in the request message a link to a web page on a web server privately owned. When the target contact selects the link he is led to this privately owned web server that can provide the decryption key to the target contact.
  • the privately owned server can provide a fractioned form, for example by using known per se frames.
  • a first fraction thereof e.g., a first frame
  • the target contact can use this first fraction also in order to update the source contact with his encryption key.
  • the source contact's web server can access the forms server and retrieve therefrom an empty list form or a list form that is at least partly filled with encrypted information. The accessed list form is then displayed in a second fraction (e.g., a second frame) of the fractioned form.
  • a fractioned form is displayed on his computer's screen, including both fractions: a first fraction for the encryption and decryption keys, and a second fraction with the list form. This allows an easy and comfortable encryption and decryption of information displayed in the list form.
  • the technique of the present invention provides for obtaining target-related information at the source computer using not only a direct communication between the source and target computers, but also a communication via a third party.
  • the case may be such that user A (constituting a source) utilizes his manager utility (e.g., a software product) installed at his computer to obtain information relating to user B (constituting a target) by contacting another user C with a message requesting user C to provide user A with contact information of user B.
  • a request-message may include two options: 1. Contact information of user B is known to user A, and user A requests user C to communicate with user B to advise that user A wishes to communicate to him; 2.
  • Contact information of user B is unknown to user A, and user A requests that user C contact another user (e.g., user D) that can help in obtaining this information.
  • User C upon receiving such a message, selects the suitable one of the above two options (i.e., actuates the respective link), and thus receives an appropriate HTML form, previously designed to enable automatic reply. More specifically, the so-linked forms for the two options are designed as follows: - Form enabling user C to enter the contact information (e.g., email address) of user B, to thus automatically transmit from user's C computer to user B a message indicative of that user A wishes to communicate with user B or obtain his related information, and including user's A contact data.
  • the present invention provides for managing user's database by communicating with other users via a communication network, while eliminating a need for installing specific software products on the user's communication system (computer). This is due to the using of a message pre-designed to include a predetermined link to at least one HTML form.
  • a receiver of the message can thus choose the appropriate link and obtain at his computer the appropriate HTML form that includes a script and alternative options to proceed per user's choice, such that when the user makes his selection, the respective script is actuated to transmit a pre-designed message to an address that appeared in the first message or that has been collected by the message receiver.
  • the technique of the present invention allows for automatically storing the data formatted as defined by the script in a local data depository such that this data will fill the HTML in an automatic manner. Hence, if in the future a similar message is received with a link to the same HTML form, the message receiver will be able to provide an automatic reply on the basis of the data entered in reply to the first such message.
  • the technique of the present invention utilizes the software typically provided in a computer or phone device connectable to the communication network, and allows for managing the database by exchanging messages that either includes a specific script within the message body or includes a link to the network server from which this script can be obtained.
  • the script is configured (i.e., presents a computer readable program code) for causing the computer to obtain the address of one user to which updated data of the other user is to be sent, for causing the computer to search for a file containing the current version of this data, and for locating this file to cause the computer to automatically generate a reply message conveying the current data to said address to thereby allow the recipient thereat to add or replace the current data in the database.
  • the 8A exemplifies yet another aspect of the present invention allowing for managing users' databases for updating them and leveraging data stored therein, by means of communication (via a communication network) between manager utilities using users' related (unique) communication codes.
  • the general principles of communication between the manager utilities using users' communication codes are described in the above-indicated US Patent No. 6,393,421.
  • the communication code may be an e-mail address associated with the manager utility.
  • the manager utility is a software product, the so-called "software agent” or "micro-server", installed on the user's computer for acting on his/her behalf. These agents are preprogrammed to communicate with each other via a predetermined protocol by exchanging preset messages.
  • r-agent, s-agent and t-agent are associated with three users, respectively, each for managing the database of the respective user.
  • user may and may not be referred to a central computer system, for example a network server utility where a central database is maintained.
  • each of these agents operates as a source contact utility as described above to manage the existing database of the respective user termed "Knowledge of User” (in the present example - knowledge of user r, knowledge of user s, and knowledge of user t). This is actually the database created via direct communication between the respective user (his/her agent) and others from his/her sources and or distribution/mailing list.
  • his/her agent operates to communicate with agent r of user r, to update user s database with data that is currently unknown to him her (termed "Knowledge Gap of User s) but existing in the databases of users r.
  • each user defines his/her own agent as to whether to obtain his/her permission prior to forwarding any data from his/her database to other users.
  • the user s database in addition to his/her own knowledge (directly obtained from specific users), also contains information from the database of user r.
  • user t might update user s with his/her "knowledge”.
  • agent s while communicating with agent r gets from agent r data regarding the "knowledge gap" of user r.
  • Agent s upon communicating with agent r, identifies that agent r is capable of communicating with user t directly or via agent t (e.g., the user t associated data record appears in the distribution/mailing list of user r).
  • agent s may request that agent r, on behalf of agent s, communicate with user/agent t to obtain the updated information of user t, or provide agent t with the communication code of user/agent s, so that agent t will be able to communicate directly to agent s.
  • r-, s- and t-agents communicate with each other to exchange information relating to users r, s, t, p and.u.
  • a computer system of this user need not be installed with the micro-server, and the information can be requested and obtained in the manner described above using a message including attached or linked to HTML form that includes a script enabling automatic data storage and generation of reply messages. If, however, the user's computer system is installed with the micro-server, the user can enjoy benefit of communication between the micro-servers. It is noted that the description above illustrated embodiments of the invention wherein HTML files (or links thereto) are used. However, it should be appreciated that the invention is not limited to HTML.
  • XML extensible Markup Language
  • XSL extensible Style Language
  • Java applets flash files
  • executable programs etc.
  • the term 'script' used above is not limited to known per se scripts. This term can also describe any other set of instructions in any available format and type, such as executable code. The invention was described in association with a contacts database.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Data Mining & Analysis (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

L'invention concerne un procédé informatique utilisé dans la mise à jour de données associées à un contact cible dans une base de données accessible à un contact source. Un message est transmis du contact source à un contact cible, destiné à inviter le contact cible à fournir des données courantes et configuré pour être activé par le contact cible sur un ordinateur accessible à la cible pour générer un message de réponse, afin de permettre l'envoi d'une version mise à jour desdites données du contact cible à une adresse spécifiée dans le message. Lors de la réception des données courantes du contact cible, les données courantes sont ajoutées ou remplacées dans la base de données du contact source.
PCT/IL2005/000181 2004-02-11 2005-02-13 Procede et systeme de gestion d'une base de donnees informatisee d'utilisateur WO2005076737A2 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
IL160326 2004-02-11
IL16032604A IL160326A0 (en) 2004-02-11 2004-02-11 Method and system for managing user's electronic address book
IL16053004A IL160530A0 (en) 2004-02-11 2004-02-23 Method and system for managing user's electronic address book
IL160530 2004-02-23

Publications (2)

Publication Number Publication Date
WO2005076737A2 true WO2005076737A2 (fr) 2005-08-25
WO2005076737A3 WO2005076737A3 (fr) 2006-05-04

Family

ID=34082155

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2005/000181 WO2005076737A2 (fr) 2004-02-11 2005-02-13 Procede et systeme de gestion d'une base de donnees informatisee d'utilisateur

Country Status (2)

Country Link
IL (1) IL160530A0 (fr)
WO (1) WO2005076737A2 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109872197A (zh) * 2019-03-12 2019-06-11 众安在线财产保险股份有限公司 处理用户信息的方法及其装置
CN110109897A (zh) * 2019-04-15 2019-08-09 深圳壹账通智能科技有限公司 数据库脚本生成方法、装置、计算机设备和存储介质

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020095413A1 (en) * 2001-01-16 2002-07-18 Uwe Meding Remote database update method and apparatus

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020095413A1 (en) * 2001-01-16 2002-07-18 Uwe Meding Remote database update method and apparatus
US6684224B2 (en) * 2001-01-16 2004-01-27 Chipdata, Inc. Remote database update method and apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109872197A (zh) * 2019-03-12 2019-06-11 众安在线财产保险股份有限公司 处理用户信息的方法及其装置
CN109872197B (zh) * 2019-03-12 2023-04-28 众安在线财产保险股份有限公司 处理用户信息的方法及其装置
CN110109897A (zh) * 2019-04-15 2019-08-09 深圳壹账通智能科技有限公司 数据库脚本生成方法、装置、计算机设备和存储介质

Also Published As

Publication number Publication date
WO2005076737A3 (fr) 2006-05-04
IL160530A0 (en) 2004-07-25

Similar Documents

Publication Publication Date Title
RU2190876C2 (ru) Агент визитной карточки и ее применения
US7506030B2 (en) System and method for providing wireless device access to e-mail applications
EP1146701B1 (fr) Procédé de transfert de données stockées dans une base de données
US8122097B2 (en) System, method and computer program for recipient controlled communications
US8112544B2 (en) System and method for providing customizable options on a wireless device
US6983310B2 (en) System and method for providing search capabilties on a wireless device
US6757530B2 (en) System and method for providing wireless device access to scheduling applications
US7616971B2 (en) System and method for providing access to forms for displaying information on a wireless access device
US20050159136A1 (en) System and method for providing wireless device access
US20020087627A1 (en) System and method for providing search capabilities and storing functions on a wireless access device
WO2005076737A2 (fr) Procede et systeme de gestion d'une base de donnees informatisee d'utilisateur
KR20010016370A (ko) 전자 명함 서비스 시스템 및 방법
JP3979005B2 (ja) 情報配信方法、情報配信システム、配信管理装置、情報管理装置
JP4892163B2 (ja) 電子私書箱システム
JP2003256344A (ja) 情報提供システムと、携帯用通信端末と、情報提供人のWebサーバ
KR20030040252A (ko) 컨텐츠 전송 방법 및 이를 위한 시스템
JP2002049569A (ja) 電子メールシステム
MXPA00002992A (es) Agente de tarjeta de negocios y aplicaciones
KR20060005614A (ko) 전자우편을 이용한 개인명함정보 등록 시스템 및 그방법과 그 방법에 의한 컴퓨터 프로그램을 저장한 기록매체

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase