WO2005098569A1 - 情報処理装置及びそのセキュリティ確保方法 - Google Patents
情報処理装置及びそのセキュリティ確保方法 Download PDFInfo
- Publication number
- WO2005098569A1 WO2005098569A1 PCT/JP2005/005269 JP2005005269W WO2005098569A1 WO 2005098569 A1 WO2005098569 A1 WO 2005098569A1 JP 2005005269 W JP2005005269 W JP 2005005269W WO 2005098569 A1 WO2005098569 A1 WO 2005098569A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- information
- information processing
- unit
- input
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Definitions
- the present invention relates to an information processing apparatus and a security ensuring method thereof, and more particularly, to an information processing apparatus that records and displays an authentication operation failure history and a security ensuring method thereof.
- Networking between information processing apparatuses is also progressing, and, for example, data sharing is being naturally promoted by, for example, a local LAN (Local Area Network).
- LAN Local Area Network
- This password authentication is generally performed at the level of the operating system (hereinafter abbreviated as OS). Furthermore, there is a technology for performing password authentication at the BIOS (Basic I / OS system) level. It has been disclosed (for example, Patent Documents 1 and 2).
- Patent Document 1 JP-A-2003-108256
- Patent Document 2 JP 2001-27911
- Unauthorized access history information such as the power of unauthorized access, the power of unauthorized access, if any, and the identity of the unauthorized accessor are provided by the information processing device. If possible, the effect of deterring unauthorized access that is useful for security management will be great.
- the present invention has been made in view of the above circumstances, and an object of the present invention is to provide an information processing apparatus that provides information useful for security management and has a high deterrent effect against unauthorized access, and a method for securing security thereof.
- an information processing apparatus is configured such that an input unit and authentication information input through the input unit are registered, as described in claim 1.
- An authentication unit for performing an authentication process using the authentication information; a storage unit for storing information related to authentication failure when the authentication by the authentication unit fails; and a storage unit for storing the information when the authentication by the authentication unit succeeds.
- a display unit for displaying information relating to the authentication failure.
- the method for ensuring security of an information processing device is registered with authentication information input through an input unit as described in claim 10. Authentication is performed using the authentication information, and when the authentication fails, information related to the authentication failure is stored in the storage unit. When the authentication is successful, the stored information related to the authentication failure is displayed on the display unit. Is displayed.
- FIG. 1 is a diagram showing an example of an appearance of a first embodiment of an information processing apparatus according to the present invention.
- FIG. 2 is a diagram showing an example of a basic configuration of a first embodiment of the information processing apparatus according to the present invention.
- FIG. 3 is a diagram illustrating a startup sequence of a conventional information processing apparatus.
- FIG. 4 is a diagram illustrating components related to a boot process by a BIOS in the first embodiment of the information processing apparatus according to the present invention.
- FIG. 5 is a diagram illustrating a procedure of a boot process by the BIOS in the first embodiment of the information processing apparatus according to the present invention.
- FIG. 6 is a diagram illustrating a procedure of a boot process by the BIOS in the second embodiment of the information processing apparatus according to the present invention.
- FIG. 7 is a diagram illustrating components related to a boot process by a BIOS in a third embodiment of the information processing apparatus according to the present invention.
- FIG. 1 is a diagram showing an appearance of a first embodiment of an information processing apparatus 1 according to the present invention.
- An information processing apparatus 1 typified by, for example, a personal computer includes an information processing apparatus main body 2 having a thin rectangular shape, and a panel unit 3 connected to the information processing apparatus main body 2 so as to be openable and closable.
- a display unit 4 composed of, for example, an LCD (Liquid Crystal Display) is provided.
- LCD Liquid Crystal Display
- a keyboard 5 for inputting various information, a power switch 6, and the like are provided on the upper surface of the information processing apparatus main body 2.
- a speaker 7 for generating audio information and an alarm for calling attention to an operator is provided.
- the size and shape of the information processing apparatus 1 according to the present invention are not limited to those shown in FIG. 1, but the arrangement, size, and the like of components such as the display unit 4 and the keyboard 5 shown in FIG. Shape limited to Fig. 1 It is not specified. Also, some of the components shown in FIG. 1 may be deleted.
- FIG. 2 is a diagram showing a system configuration of the first embodiment of the information processing apparatus 1 according to the present invention.
- a CPU (Central Processing Unit) 10 is connected to a host hub 11 via a CPU bus 12.
- the host hub 11 is connected to devices that require high-speed processing. Specifically, in addition to being connected to the main storage device 13 via the memory bus 14, it is connected to the graphic controller 15 via, for example, an AGP (Accelerated Graphics Port) bus 16.
- the host hub 11 has a built-in memory controller for controlling access to the main storage device 13.
- the CPU 10 is a processor provided to control the operation of the information processing device 1.
- BIOS Basic Input / Output System
- the graphic controller 15 causes the LCD 4 to display data drawn in the video memory 17 by the OS / application program.
- the host hub 11 is connected to the I / O hub 20 via a bus 19 such as a hub interface.
- the IZO hub 20 is connected to, for example, an HDD (Hard Disk Drive) 21 as an external storage device, a BIOS-ROM 22 as a nonvolatile memory, and the like.
- HDD Hard Disk Drive
- BIOS-ROM 22 a nonvolatile memory
- the IZO hub 20 has a PCI (Peripheral Components Interconnect) bus 2
- AMP amplifier
- LPC Low Pin Count
- ECZKBC embedded Controller / Keyboard Controller
- the ECZKBC28 may be a battery or the like even when the information processing apparatus 1 is in a power-off state. Since power is supplied to the power supply, it is possible to start the startup sequence of the information processing apparatus 1 by detecting that the power switch 6 is pressed.
- the ECZKBC 28 has a built-in RTC (Real Time Clock) 28a, so that the current time can always be updated even when the information processing apparatus 1 is turned off.
- RTC Real Time Clock
- BIOS-ROM 22 stores a program called BIOS 22a.
- the ROM 22 is composed of, for example, a flash memory or the like.
- the BIOS 22a is a program started when the information processing apparatus 1 is powered on.
- FIG. 3 is a flowchart showing a procedure of a conventional startup sequence of the information processing apparatus 1 represented by a personal computer or the like.
- the conventional startup sequence will be briefly described below with reference to FIGS.
- the ECZKBC 28 detects this and supplies power to each part of the information processing apparatus 1 (S1 step S1 in FIG. 3).
- BIOS 22a is started (S2).
- One of the main functions of the BIOS 22a is to control the input / output functions of the information processing device 1. Therefore, when the BIOS 22a is started, a key can be input from an input unit, for example, an input unit such as the keyboard 5. Also, the display unit 4 as an output function becomes operable.
- the BIOS 22a has a function for registering authentication information represented by a password in advance as a means for ensuring security. Authentication information such as a password is stored in the data area 22b of the nonvolatile memory 22 in FIG. 2, for example.
- the BIOS 22a displays a screen S3a for prompting the input of the password on the display unit 4 (S3).
- the operator inputs the password, and if the entered password matches the registered password (yes in S4), the OS starts to be started (S5).
- the operator operates, for example, an application such as document creation software.
- the software can be started appropriately.
- FIG. 4 shows a system configuration related to activation of the information processing device 1 according to the present invention.
- an authentication information comparison unit (authentication unit) 30, a storage control unit 31, an authentication failure information detection unit (detection unit, detection unit) 32, and a sequence control unit are provided.
- authentication information 30a is input.
- the display unit 4 displays the authentication failure information 34b.
- a start command is output from the sequence control unit 33 to the OS 35.
- the date and time information 36 is input to the storage control unit 31.
- the input unit 5 is a keyboard 5 for inputting authentication information 30a, for example, a password.
- the method of authentication for eliminating unauthorized access is not limited to a method using a password, but may be a token authentication such as a USB key or a biometrics authentication such as a fingerprint authentication.
- the input unit 5 is, for example, a USB connector or a fingerprint input unit.
- the authentication information comparison unit 30 compares and determines the authentication information 30a input by the input unit 5 with the registered authentication information 30b previously stored in the storage unit 22b, and outputs a comparison determination result 30c.
- the comparison determination result 30c indicates one of "authentication succeeded” if the authentication information 30a and the registered authentication information 30b match, and "authentication failed” if they do not match. .
- the storage control unit 31 stores the date and time information (year / month / day / hour / minute / second) 36 when the authentication information 30a was input from the input unit 5, and stores it in the storage unit 22b. It is stored in the area where “this authentication failure information” 34a is stored.
- the comparison determination result 30c is "authentication failed”
- the date and time information (year, month, day, hour, minute, second) 36 is, for example, the R provided in ECZKBC28 shown in FIG.
- the “current authentication failure information” 34a is transferred to an area of “past authentication failure information” 34b provided in the storage unit 22b when the power is turned off, for example.
- the authentication failure information detection unit 32 checks whether there is data in an area where the "past authentication failure information" 34b is stored. "
- the sequence control unit 33 outputs a command for activating the OS 35 when the comparison determination result 30c is "authentication successful", and on the other hand, when the comparison determination result 30c is "authentication failure", a power-off process is performed.
- the command is output to the power controller 37.
- FIG. 5 is a flowchart showing a procedure of a startup process of the information processing apparatus 1 according to the present invention.
- the procedure of the processing from S1 to S3 is the same as the procedure of the processing shown in FIG.
- step 4 it is determined whether or not the authentication information 30a such as a password matches the registered authentication information 30b. If they do not match, that is, if the authentication fails (No in S4), the storage unit stores authentication failure information (date and time information of authentication failure (year, month, day, hour, minute, second)) (S10).
- the operator can be considered to be a valid operator. In this case, in order to confirm whether there has been any unauthorized access in the past, it is further determined whether or not the past authentication failure information 34b is stored (S11).
- the case where the past authentication failure information 34b is stored is a case where it is considered that an unauthorized access to the information processing apparatus 1 has not been performed, and in this case (No in S11) Start the OS as usual (S5).
- the past authentication failure information 34b (for example, date and time information when the authentication failed) is displayed on the display unit 4 (S12).
- an alarm sound may be generated by using, for example, a speed force (sound generation unit) 7 provided in the information processing apparatus 1 to call attention to the operator.
- a speed force (sound generation unit) 7 provided in the information processing apparatus 1 to call attention to the operator.
- date and time information such as year, month, day, hour, minute, and second when an unauthorized access occurred can be known.
- the determination as to whether or not the user has the ability to erase the past authentication failure information 34b is made by, for example, causing the operator to input a specific key from the keyboard 5 (S13). If it is determined that the information is to be deleted, the past authentication failure information 34b is deleted (S14).
- the display of the authentication failure information 34b is meaningless and cumbersome if it is meaningless. Therefore, by deleting the past authentication failure information 34b, the operator can skip the display of the authentication failure information 34b from the next time.
- a legitimate operator can recognize that there has been an unauthorized access to the information processing apparatus 1 in the past. Also, unauthorized access
- the date and time information such as the date, month, day, hour, minute, and second when the error occurred can be known.
- the security administrator can review and strengthen the security management method and the security management system.
- FIG. 6 shows a flow of a process according to the second embodiment of the activation process of the information processing device 1 according to the present invention.
- step 20 S2
- step 20 it is determined whether or not the past authentication failure information 34b is copied to the (S20) erasure prohibited area. This determination is made based on specific key information input from the keyboard 5, for example.
- step 20 If it is determined in step 20 that the past authentication failure information 34b is to be copied to the erasure prohibited area, the past authentication failure information 34b is copied to the erasure prohibited area (S21).
- the past authentication failure information 34b can be read out later when it becomes necessary.
- FIG. 7 shows components of the information processing apparatus 1 according to the third embodiment of the present invention.
- the third embodiment has a configuration in which the information processing apparatus 1 includes a video recording unit (imaging unit) 40.
- the image recording unit 40 has a camera lens unit disposed on the upper surface of the information processing apparatus main body 2 or the upper end of the panel unit 3, for example, and can record an image of an operator's face or the like. is there. It is used for recording video information and, for example, videophones via the Internet.
- the video information 40 a is stored as the authentication failure information 34 a together with the date and time information 36 as the authentication failure information 34 a, To memorize.
- the image information 40a such as the face of the unauthorized accessor recorded by the image recording unit 40 is also stored. It is.
- the present invention is not limited to the above-described embodiment as it is, and can be embodied by modifying constituent elements in an implementation stage without departing from the scope of the invention.
- Various inventions can be formed by appropriately combining a plurality of constituent elements disclosed in the above embodiments. For example, some components, such as all components shown in the embodiment, may be deleted. Further, components of different embodiments may be appropriately combined.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/529,238 US20070022478A1 (en) | 2004-03-31 | 2006-09-29 | Information processing apparatus and method of ensuring security thereof |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004108046A JP2005293282A (ja) | 2004-03-31 | 2004-03-31 | 情報処理装置、情報処理装置の起動方法および情報処理装置の起動プログラム |
JP2004-108046 | 2004-03-31 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/529,238 Continuation US20070022478A1 (en) | 2004-03-31 | 2006-09-29 | Information processing apparatus and method of ensuring security thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005098569A1 true WO2005098569A1 (ja) | 2005-10-20 |
Family
ID=35125245
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/005269 WO2005098569A1 (ja) | 2004-03-31 | 2005-03-23 | 情報処理装置及びそのセキュリティ確保方法 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20070022478A1 (ja) |
JP (1) | JP2005293282A (ja) |
CN (1) | CN1950779A (ja) |
WO (1) | WO2005098569A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011004499A1 (ja) * | 2009-07-10 | 2011-01-13 | 富士通株式会社 | 電子機器、そのセキュリティ方法、そのセキュリティプログラム及び記録媒体 |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4254797B2 (ja) | 2006-04-03 | 2009-04-15 | セイコーエプソン株式会社 | データ処理装置 |
JP4929804B2 (ja) * | 2006-04-10 | 2012-05-09 | 富士通株式会社 | 認証方法、認証装置および認証プログラム |
DE102007045772A1 (de) * | 2007-09-25 | 2009-04-02 | Siemens Ag | Verfahren zur Zugriffskontrolle auf eine Automatisierungsanlage |
JP5032539B2 (ja) * | 2009-08-31 | 2012-09-26 | 技嘉科技股▲ふん▼有限公司 | コンピュータ装置の安全性の管理方法 |
KR20140051487A (ko) * | 2012-10-08 | 2014-05-02 | 삼성전자주식회사 | 단말기의 데이터보호 장치 및 방법 |
JP2015194947A (ja) * | 2014-03-31 | 2015-11-05 | ソニー株式会社 | 情報処理装置及びコンピュータプログラム |
GB201818552D0 (en) * | 2018-11-14 | 2018-12-26 | Smith & Nephew | Health care provider autorization of data acquisition by sensor enabled wound dressing and devices |
JP7229185B2 (ja) * | 2020-01-14 | 2023-02-27 | 三菱電機株式会社 | 起動装置、システム制御装置、起動方法および起動プログラム |
JP7176078B1 (ja) | 2021-11-09 | 2022-11-21 | レノボ・シンガポール・プライベート・リミテッド | 情報処理装置、及び制御方法 |
JP7176084B1 (ja) | 2021-11-25 | 2022-11-21 | レノボ・シンガポール・プライベート・リミテッド | 情報処理装置、及び制御方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09218852A (ja) * | 1996-02-13 | 1997-08-19 | Fujitsu F I P Kk | 不正チェックシステム |
JP2002230554A (ja) * | 2001-01-31 | 2002-08-16 | Mitsubishi Electric Corp | 指紋照合装置 |
JP2002334017A (ja) * | 2001-05-10 | 2002-11-22 | Fujitsu Ltd | 処理装置、処理装置の管理方法、プログラム、およびシステム |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4612419A (en) * | 1985-01-02 | 1986-09-16 | Gte Communication Systems Corp. | Toll restriction circuit for an electronic telephone station |
US5091939A (en) * | 1990-06-22 | 1992-02-25 | Tandy Corporation | Method and apparatus for password protection of a computer |
US5475755A (en) * | 1993-05-11 | 1995-12-12 | Nec Corporation | Password processing whereby a foreign password is referred to after fail of several attempts |
US20030074577A1 (en) * | 2001-10-17 | 2003-04-17 | Bean Heather N. | Return-to-owner security lockout for a portable electronic device |
-
2004
- 2004-03-31 JP JP2004108046A patent/JP2005293282A/ja active Pending
-
2005
- 2005-03-23 WO PCT/JP2005/005269 patent/WO2005098569A1/ja active Application Filing
- 2005-03-23 CN CNA2005800146977A patent/CN1950779A/zh active Pending
-
2006
- 2006-09-29 US US11/529,238 patent/US20070022478A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09218852A (ja) * | 1996-02-13 | 1997-08-19 | Fujitsu F I P Kk | 不正チェックシステム |
JP2002230554A (ja) * | 2001-01-31 | 2002-08-16 | Mitsubishi Electric Corp | 指紋照合装置 |
JP2002334017A (ja) * | 2001-05-10 | 2002-11-22 | Fujitsu Ltd | 処理装置、処理装置の管理方法、プログラム、およびシステム |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011004499A1 (ja) * | 2009-07-10 | 2011-01-13 | 富士通株式会社 | 電子機器、そのセキュリティ方法、そのセキュリティプログラム及び記録媒体 |
Also Published As
Publication number | Publication date |
---|---|
JP2005293282A (ja) | 2005-10-20 |
US20070022478A1 (en) | 2007-01-25 |
CN1950779A (zh) | 2007-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005098569A1 (ja) | 情報処理装置及びそのセキュリティ確保方法 | |
US10181041B2 (en) | Methods, systems, and apparatuses for managing a hard drive security system | |
JP4459282B2 (ja) | 情報処理装置およびセキュリティ保護方法 | |
JP3724577B2 (ja) | 情報処理装置、情報処理装置用制御方法、及び情報処理装置用制御プログラム | |
US8464038B2 (en) | Computing device with developer mode | |
US6647498B1 (en) | Method and apparatus for preventing personal computer from being illegally used | |
US8490204B2 (en) | Selective protection of files on portable memory devices | |
US8302209B2 (en) | Data processing methods and devices for reading from and writing to external storage devices | |
JP2007249503A (ja) | 利用者端末における二次記憶装置の管理方法及び利用者端末 | |
JP2005018415A (ja) | 情報処理装置および同装置で使用されるデータ消去方法 | |
JP2007065850A (ja) | 情報処理装置、情報処理方法およびプログラム | |
JP2004234331A (ja) | 情報処理装置および同装置で使用されるユーザ操作制限方法 | |
JP2007066089A (ja) | 情報処理装置、および認証制御方法 | |
JP2008293442A (ja) | 情報処理装置 | |
JP2013078066A (ja) | 情報処理装置、起動制御方法およびプログラム | |
JP2005316856A (ja) | 情報処理装置、その起動方法およびその起動プログラム | |
US6948075B2 (en) | Computer controlling method, information apparatus, computer, and storage medium | |
US20070150750A1 (en) | Information processing apparatus and access control method | |
JPH11272562A (ja) | コンピュータシステムの記憶内容消去方法および記録媒体 | |
JP5023166B2 (ja) | 情報処理装置 | |
JP2000214944A (ja) | コンピュ―タシステム及びそのパスワ―ド管理方法 | |
JP4709778B2 (ja) | 情報処理装置および録画制御方法 | |
KR100578116B1 (ko) | 저장 장치에 저장된 데이터의 보안 기능을 구비한 컴퓨터 시스템 및 방법 | |
JP2000172361A (ja) | コンピュータシステムおよびパスワード管理方法 | |
WO1992009946A1 (en) | Security system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 11529238 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580014697.7 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 11529238 Country of ref document: US |
|
122 | Ep: pct application non-entry in european phase |