WO2005103909A1 - セキュリティ保全方法およびデータ蓄積装置、セキュリティ保全サーバ、及びそのプログラムを記録した記録媒体 - Google Patents
セキュリティ保全方法およびデータ蓄積装置、セキュリティ保全サーバ、及びそのプログラムを記録した記録媒体 Download PDFInfo
- Publication number
- WO2005103909A1 WO2005103909A1 PCT/JP2005/007466 JP2005007466W WO2005103909A1 WO 2005103909 A1 WO2005103909 A1 WO 2005103909A1 JP 2005007466 W JP2005007466 W JP 2005007466W WO 2005103909 A1 WO2005103909 A1 WO 2005103909A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security
- data
- storage device
- program
- list
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Definitions
- the present invention records a security preservation method and a data storage device, a security preservation sano, and a program for performing security preservation of a computer that is likely to be infected with a virus or a security status may be reduced.
- a security preservation method and a data storage device a security preservation sano
- a program for performing security preservation of a computer that is likely to be infected with a virus or a security status may be reduced.
- a recorded medium is based on Japanese Patent Application No. 2004-129833, filed on April 26, 2004, Japanese Patent Application No. 2004-201820, filed on July 8, 2004, and Japanese Patent Application No. 2004-201820, filed on March 24, 2005. 2005- Claims priority under 086353, the contents of which are incorporated herein by reference.
- Patent Document 1 is disclosed as a method of checking security of such a notebook PC.
- Patent Document 1 JP-A-9-319574
- the present invention records a security preservation method, a data storage device, a security preservation server, and a program that enables a security check of a notebook PC or the like carried outside efficiently.
- a recording medium Means for solving the problem
- a first aspect of the present invention is a data storage device which is connected to a terminal having a computer and records a program to be executed by a computer of the terminal.
- Security security data described in the security security data list is applied to the predetermined program stored in the terminal, and when it is determined that the security security data is! ⁇ , the security security data is read from the data storage device;
- a data storage device that stores a program that causes a computer to execute the read security maintenance data by applying the read security maintenance data to the predetermined program stored in the terminal; It is.
- the security of a predetermined program in the terminal can be checked only by connecting the data storage device to the terminal.
- the data storage device described above creates a list of the security preservation data determined not to be applied, and applies the security preservation data. Displaying the list of the created unapplied security data on the display unit, and instructing the computer to read only the security data for which the application instruction has been received from the data storage device. You may further consider the programs to be executed.
- the data storage device described above acquires the attribute information of the terminal after applying the security preservation data determined not to be applied, and stores the data.
- a program for causing a computer to execute the process of outputting to the device may be further stored.
- a fourth aspect of the present invention is a security preservation method in a computer of a terminal to which a data storage device is connected, wherein a data storage device power check program is read, and a list reading means reads the check program. Based on the execution, a security protection data list describing the attributes of security protection data to be applied to a predetermined program is read, and the application determining means executes the check program based on the execution of the check program. Security protection data listed in security protection data list Among the programs stored in the terminal, whether or not the power applied to the predetermined program is associated with information of the predetermined program stored in the data storage device. And recorded in the security maintenance data list.
- the security maintenance server includes: information of a list of attributes of security maintenance data to be applied to the predetermined program stored in the terminal for each of the predetermined programs; Connection detection means for detecting a connection of a data storage device for storing security security data corresponding to the attribute; latest information storage means for storing the latest list and the latest security security data; Did The list and the security preservation data stored in the data storage device are recorded in the latest information storage means, and if they do not match the information, they are recorded in the latest information storage means!
- the latest information transmitting means for transmitting the list and the security preservation data to the data storage device may be further provided.
- information such as security preservation data stored in the data storage device can be kept up to date.
- the security preservation server is configured such that the management target information storage means for storing the attribute of the data storage device to be managed, and the attribute read from the data storage device, If the attribute of the data storage device recorded in the management target information storage means is different from that of the data storage device, the management object determination means for stopping transmission of the list and the security protection data may be further provided. As a result, only the data storage device to be managed can be managed.
- the security preservation server may further include attribute storage means for storing an attribute read from the data storage device.
- the security preservation server may further include a deletion unit for deleting predetermined information stored in the data storage device.
- the security maintenance server when the security maintenance server detects the connection of the data storage device, it performs a virus check of each file stored in the data storage device. Means may be further provided.
- a tenth aspect of the present invention is a recording medium for recording a program to be executed by a computer of a security preservation server, wherein the connection detecting means is a security program to be applied to a predetermined program stored in a terminal. Processing for detecting connection of a data storage device that stores information of a list of security data attributes for each of the predetermined programs and security security data corresponding to the attribute; and storing the detected data storage device. If the list and the security data are not the same as the information recorded in the latest information storage means for storing the latest list and the security data, the latest information is stored in the latest information storage means. The list and the security maintenance data are recorded. And a program for causing a computer to execute a process of transmitting the data to the data storage device.
- An eleventh aspect of the present invention is the security preservation method in the security preservation server, wherein the connection detecting means is configured to determine the attribute of the security preservation data to be applied to a predetermined program stored in the terminal.
- a connection of a data storage device that stores information of a list for each program and each security data corresponding to the attribute is detected, and the latest information storage means stores the latest list and the latest security data.
- the latest information sending means stores the list and the security preservation data stored in the detected data storage device in the latest information storage means! If the information does not match the security information, the list and the security data recorded in the latest information storage means are transmitted to the data storage device.
- FIG. 1 is a block diagram showing a configuration of a security maintenance system.
- FIG. 2 is a diagram showing a hardware configuration of a terminal and a management server.
- FIG. 3 is a diagram showing a data configuration of security maintenance data list information.
- FIG. 4 is a diagram showing a processing flow of a terminal security check.
- FIG. 5 is a diagram showing a processing flow of a security check of the data storage device.
- FIG. 6 is a diagram showing a processing flow of updating security preservation data of the data storage device. Explanation of symbols
- FIG. 1 is a block diagram showing the configuration of the security maintenance system according to the embodiment.
- reference numeral 1 denotes a data storage device, which has a function of transferring data stored in the own device according to a data communication standard such as USB (Universal Serial Bus) when the data is transferred to a terminal.
- a data communication standard such as USB (Universal Serial Bus)
- Reference numeral 2 denotes a terminal that reads each program and data recorded in the data storage device 1 and executes the read program to check the security state of the terminal itself.
- Reference numeral 3 denotes a management server that checks the security of the data storage device 1 to maintain security.
- reference numeral 11 denotes a storage unit, and the storage unit 11 stores check programs, security data, security data list, general-purpose data, management identification numbers, and the like.
- the check program is a program that checks the security state of the terminal 2 by being read and executed by the terminal 2.
- the security preservation data is data (for example, an anti-virus program or an OS function upgrade program, etc.) that improves the security of the OS (operating system) and application programs of the terminal 2 to which the data storage device 1 is connected. is there.
- General-purpose data is general data used by the user using application software.
- the management identification number is a number for managing the data storage device 1 by the management server 3.
- reference numeral 21 denotes a control unit for controlling each processing unit in the terminal 2.
- Reference numeral 22 denotes a connection detection unit that detects connection of the data storage device 1.
- the data storage device 1 is, for example, a USB memory
- Perform The data reading unit 23 performs a process of reading various types of information stored in the data storage device 1.
- Reference numeral 24 denotes an application judging unit for judging whether or not the security preservation data is applied to a predetermined program stored in its own device.
- the security preservation data determined to be applied is applied to a predetermined program.
- applying the security maintenance data to a predetermined program means that the security maintenance data is a program (such as a patch) for upgrading the OS version. Means to update the OS program using the security preservation data.
- Reference numeral 26 denotes an information acquisition unit that performs a process of acquiring information stored in the data storage device 1.
- reference numeral 31 denotes a connection detection unit that detects connection of the data storage device 1.
- the data storage device 1 is, for example, a USB memory
- the USB memory is connected to the USB interface provided in the management server 3 or a USB hub connected to the interface
- the connection is established. Is performed.
- Reference numeral 32 denotes a virus check unit that checks whether or not the information stored in the data storage device 1 includes a virus program.
- Reference numeral 33 denotes an update processing unit for updating the security maintenance data, security maintenance data list, and check program stored in the data storage device 1 to the latest information.
- Reference numeral 34 denotes a security data list storage unit for storing a list of security data.
- Reference numeral 35 denotes a security data storage unit for storing security security data.
- An information acquisition / deletion unit 36 acquires and deletes predetermined data of the data storage device 1.
- the security check program stored in the data storage device 1 is subsequently read into the terminal 2, and the data is stored by the processing of the check program.
- the security status of the device 1 is checked. If the security status is not sufficient, the process for improving the security level is performed at the terminal 2.
- the data storage device 1 is connected to the management server 3 so as to prevent the terminal 2 from being infected with a virus or the like due to inadequate security of the data storage device 1 itself, and the security check process of the data storage device 1 itself is performed.
- FIG. 2 is a diagram showing a hardware configuration of the terminal and the management server.
- the terminal 2 and the management server 3 have a hardware configuration as shown in FIG.
- Hardware configuration includes CPU (Central Processing Unit), RAM (Random Access Memory) / ROM (read only Memory), HDD (Hard Disk Drive), I ZF (interface).
- CPU Central Processing Unit
- RAM Random Access Memory
- ROM Read only Memory
- HDD Hard Disk Drive
- I ZF interface
- the CPU expands the program stored in the HDD into the RAMZROM, and performs processing of the functions of the connection detection unit 31, the virus check unit 32, and the update processing unit 33.
- the security maintenance data list storage unit 34 and the maintenance data storage unit 35 of the management server 3 are configured by HDDs.
- FIG. 3 is a diagram showing a data configuration of a security maintenance data list.
- the security data list holds the type of OS (outline of the configuration of the terminal), the type of security data, and the audit item of the data storage device 1 in association with each other.
- the example in Figure 3 shows that security packs and security patches, which are the latest security measures for the OS, exist as security preservation data.
- the information described in this type of security data is security data applied to the terminal 2.
- the security data may include a version upgrade program of virus software installed in the terminal, but in this embodiment, the security data is composed of two programs, a security pack and a security patch. Data.
- the attributes of the security maintenance data refer to the attributes of the security maintenance data, such as the OS type and data storage device monitoring items shown in FIG.
- FIG. 4 is a diagram illustrating a processing flow of a terminal security check.
- the connection detection unit 22 of the terminal 2 detects the connection (step S101), mounts the data storage device 1 on its own device, and The information recorded in the first storage unit 11 is displayed on the display unit.
- the data reading unit 23 reads the check program from the data storage device 1, and the control unit 21 executes the program. (Step S102).
- the application determination unit 24 of the terminal 2 The functions of the application unit 25 and the information acquisition unit 26 are configured in the terminal 2.
- the application determining unit 24 instructs the data reading unit 23 to read the security data list from the storage unit 11 of the data storage device 1, and the data reading unit 23 executes the security The data list is read (step S103). Then, the application determining unit 24 determines the type of OS provided in the terminal 2 and the security preservation data (security pack or security patch) already applied to the OS by using attributes such as version information of the OS program. Detect by reference. Next, the application determining unit 24 compares the type of security data stored in the security data list with the security data already applied to the OS of the terminal 2 and generates the security data list. It is determined whether or not all of the stored security data has been applied (step S104).
- the security protection data of the security pack or the security patch is checked whether it is the security protection data to be applied. It is determined that the security maintenance data that is applicable and has the applicable item power of “nable” is the security maintenance data to be applied to the terminal 2 (step S106).
- the application determining unit 24 creates an application candidate screen showing a list of security protection data determined to be applied, and displays it on the display unit (step S107).
- the application candidate screen displayed on the display unit includes, for example, a list of candidate security data to be applied to the terminal 2, a check box for selecting each security data, and whether to automatically apply or select application. Button to select is displayed.
- the application determination unit 24 displays the application candidate screen. Instructs the data reading unit 23 to read from the data storage device 1 all the security preservation data displayed in.
- the application determination unit 24 reads the selected security data. To the data reading unit 23 to read the data. Then, the data reading unit 23 receives the reading instruction from the application determining unit 24, and The data is read from the data storage device 1 (step SI10). Then, the security application unit 25 performs a process of applying the security preservation data read by the data reading unit 23 to the OS of the terminal 2 (Step Slll). As a result, the latest security preservation data can be applied to the program of the terminal 2 by using the security check program stored in the data storage device 1, so that the terminal can be brought outside the in-house system and connected.
- the security of the terminal 2 and the security of the terminal 2 are maintained, and the effect of preventing the spread of virus programs by connecting the terminal 2 to the in-house system can be obtained. Also, by simply connecting the data storage device 1 to the terminal 2, the security check of the terminal 2 carried and used outside the company can be easily performed, so that the labor required for management can be reduced.
- the application determination unit 24 of the terminal 2 forcibly instructs the data reading unit 23 to read.
- the security application unit 25 may perform the process of applying the applicable security preservation data to the OS of its own device without the user's judgment.
- the application determination unit 24 may display a list of security preservation data after application on the display unit.
- the information acquisition unit 26 applies the host name and IP address of the terminal 2 and the time when the security data was applied, and the security check file that records the applied security data. Then, a process of writing the data to the data storage device 1 is performed. Thus, the security state check of the terminal 2 is completed.
- FIG. 5 is a diagram showing a processing flow of a security check of the data storage device.
- the data storage device 1 for checking the security of the terminal 2 itself must be secure. Therefore, the data storage device 1 is strictly managed by a system administrator or the like. Then, the security of the data storage device 1 is checked by the following processing.
- the administrator connects the data storage device 1 to the management server 3. Then the connection detector 3 1 detects the connection of the data storage device 1 (step S201).
- the virus check unit 32 reads the check program, security preservation data, security preservation list data, general-purpose data, the security check file written from the terminal 2, etc., which are recorded in the storage unit 11 of the data storage device 1.
- the data is compared with the security profile to determine whether or not each data is infected with a virus program (step S203). If the computer is infected with a virus, the virus-infected data is deleted (step S204).
- the information check / delete unit 36 of the management server 3 reads and stores the security check file (step S205).
- the information acquisition / deletion unit 36 deletes the security check file recorded in the data storage device 1 (step S206).
- FIG. 6 is a diagram showing a processing flow of updating the security protection data of the data storage device. Since the data storage device 1 is a device for maintaining the security of the terminal 2, it is necessary that the data storage device 1 be security-preserving data that can always increase the security level for the target program. Therefore, the administrator always keeps the security preservation data of the data storage device 1 up to date by the processing described later.
- the administrator connects the data storage device 1 to the management server 3.
- the connection detecting unit 31 detects the connection of the data storage device 1 (step S301).
- the security data update unit 33 reads the check program, security data, and security data list stored in the data storage device 1 and detects, for example, information on the version of the read information. (Step S302), by comparing the stored information, it is determined whether the force is the latest one (Step S303). Then, the information which is not the latest version is sent to the data storage device 1 and updated (step S304).
- the security level of the target program on terminal 2 is Security data that can be enhanced can be managed and maintained.
- the above-described various devices have a computer system inside.
- the above process is stored in a computer-readable recording medium in the form of a program, and the program is read and executed by the computer to perform the above process.
- the computer-readable recording medium refers to a magnetic disk, a magneto-optical disk, a CD-ROM, a DVD-ROM, a semiconductor memory, or the like.
- the computer program may be distributed to a computer via a communication line, and the computer receiving the distribution may execute the program.
- the program may be for realizing a part of the functions described above.
- the functions described above may be realized in combination with a program already recorded in a computer system, or a so-called difference file (difference program).
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2006512546A JPWO2005103909A1 (ja) | 2004-04-26 | 2005-04-19 | セキュリティ保全方法およびデータ蓄積装置、セキュリティ保全サーバ、及びそのプログラムを記録した記録媒体 |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-129833 | 2004-04-26 | ||
JP2004129833 | 2004-04-26 | ||
JP2004-201820 | 2004-07-08 | ||
JP2004201820 | 2004-07-08 | ||
JP2005086353 | 2005-03-24 | ||
JP2005-086353 | 2005-03-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005103909A1 true WO2005103909A1 (ja) | 2005-11-03 |
Family
ID=35197161
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/007466 WO2005103909A1 (ja) | 2004-04-26 | 2005-04-19 | セキュリティ保全方法およびデータ蓄積装置、セキュリティ保全サーバ、及びそのプログラムを記録した記録媒体 |
Country Status (3)
Country | Link |
---|---|
US (1) | US7574743B2 (ja) |
JP (1) | JPWO2005103909A1 (ja) |
WO (1) | WO2005103909A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007025812A (ja) * | 2005-07-12 | 2007-02-01 | Nec Corp | 端末セキュリティチェックサービス提供方法及びそのシステム |
JP2010079370A (ja) * | 2008-09-24 | 2010-04-08 | Dainippon Printing Co Ltd | コンピュータの環境を測定する機能を備えた外部記憶デバイス |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070154015A1 (en) * | 2005-12-29 | 2007-07-05 | Lucent Technologies | Method for cipher key conversion in wireless communication |
US7975304B2 (en) * | 2006-04-28 | 2011-07-05 | Trend Micro Incorporated | Portable storage device with stand-alone antivirus capability |
US20100179980A1 (en) * | 2009-01-14 | 2010-07-15 | Movidilo S.L. | Cache system for mobile communications devices |
US8769373B2 (en) | 2010-03-22 | 2014-07-01 | Cleon L. Rogers, JR. | Method of identifying and protecting the integrity of a set of source data |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002373144A (ja) * | 2001-06-14 | 2002-12-26 | Nec Corp | デバイスドライバの組込み方式および方法 |
JP2003303028A (ja) * | 2002-04-09 | 2003-10-24 | Matsushita Electric Ind Co Ltd | ナビゲーション装置のバージョンアップシステム |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH03225525A (ja) * | 1990-01-31 | 1991-10-04 | Fujitsu Ltd | ソースプログラム管理処理方式 |
JPH09319574A (ja) | 1996-05-29 | 1997-12-12 | Nec Niigata Ltd | コンピュータウィルスチェックシステム |
JP2001142683A (ja) * | 1999-11-16 | 2001-05-25 | Oki Electric Ind Co Ltd | プログラム更新媒体の作成方法及び更新プログラムのインストール方法 |
JP2002189599A (ja) * | 2000-12-21 | 2002-07-05 | Mitsubishi Heavy Ind Ltd | 遠隔保守システム |
JP2003091420A (ja) * | 2001-09-14 | 2003-03-28 | Toshiba Corp | 更新用プログラム、装置プログラム及びプログラム更新支援方法 |
-
2005
- 2005-04-19 WO PCT/JP2005/007466 patent/WO2005103909A1/ja active Application Filing
- 2005-04-19 JP JP2006512546A patent/JPWO2005103909A1/ja active Pending
- 2005-04-20 US US11/109,825 patent/US7574743B2/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002373144A (ja) * | 2001-06-14 | 2002-12-26 | Nec Corp | デバイスドライバの組込み方式および方法 |
JP2003303028A (ja) * | 2002-04-09 | 2003-10-24 | Matsushita Electric Ind Co Ltd | ナビゲーション装置のバージョンアップシステム |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007025812A (ja) * | 2005-07-12 | 2007-02-01 | Nec Corp | 端末セキュリティチェックサービス提供方法及びそのシステム |
JP2010079370A (ja) * | 2008-09-24 | 2010-04-08 | Dainippon Printing Co Ltd | コンピュータの環境を測定する機能を備えた外部記憶デバイス |
Also Published As
Publication number | Publication date |
---|---|
JPWO2005103909A1 (ja) | 2008-03-13 |
US7574743B2 (en) | 2009-08-11 |
US20060015744A1 (en) | 2006-01-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI430174B (zh) | 使用基本輸入輸出系統來安裝軟體之方法 | |
US10032028B2 (en) | Method for processing UEFI protocols and system therefor | |
US9854131B2 (en) | Image forming apparatus with personal setting synchronization and method for controlling same | |
US9727352B2 (en) | Utilizing history of changes associated with software packages to manage computing systems | |
JP4286798B2 (ja) | ハードドライブにドライバファイルをインストールする方法、コンピュータ及びコンピュータ読取可能な記憶媒体 | |
US20130160126A1 (en) | Malware remediation system and method for modern applications | |
US8607339B2 (en) | Systems and methods for improved identification and analysis of threats to a computing system | |
US20090158400A1 (en) | Wireless communication terminal, method for protecting data in wireless communication terminal, program for having wireless communication terminal protect data, and recording medium storing the program | |
US20100272258A1 (en) | Bidirectional dynamic offloading of tasks between a host and a mobile device | |
US20110154325A1 (en) | Virtual machine system, system for forcing policy, method for forcing policy, and virtual machine control program | |
US8677508B2 (en) | Confidential information leakage prevention system, confidential information leakage prevention method and confidential information leakage prevention program | |
US10956383B2 (en) | Device backup and wipe | |
CN105122260A (zh) | 到安全操作系统环境的基于上下文的切换 | |
JP2010026662A (ja) | 情報漏洩防止システム | |
US20090138969A1 (en) | Device and method for blocking autorun of malicious code | |
US10318272B1 (en) | Systems and methods for managing application updates | |
JP2018041487A (ja) | 接続デバイスでの強制暗号化 | |
WO2005103909A1 (ja) | セキュリティ保全方法およびデータ蓄積装置、セキュリティ保全サーバ、及びそのプログラムを記録した記録媒体 | |
JP6848340B2 (ja) | 情報処理システム、更新方法、情報処理装置及びプログラム | |
EP3018585A1 (en) | Machine provision method, machine provision system, and machine provision program | |
WO2019037521A1 (zh) | 安全检测的方法、装置、系统以及服务器 | |
JP4707748B2 (ja) | 外部記憶デバイス、外部記憶デバイスに記憶されたデータを処理するための方法、プログラムおよび情報処理装置 | |
US20040107357A1 (en) | Apparatus and method for protecting data on computer hard disk and computer readable recording medium having computer readable programs stored therein | |
US20220229666A1 (en) | Managing deployment model migrations for enrolled devices | |
US10819614B2 (en) | Network monitoring apparatus and network monitoring method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006512546 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |