WO2005104422A1 - Electronic message authentication process - Google Patents
Electronic message authentication process Download PDFInfo
- Publication number
- WO2005104422A1 WO2005104422A1 PCT/AU2005/000560 AU2005000560W WO2005104422A1 WO 2005104422 A1 WO2005104422 A1 WO 2005104422A1 AU 2005000560 W AU2005000560 W AU 2005000560W WO 2005104422 A1 WO2005104422 A1 WO 2005104422A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- party
- message
- certificate
- limited
- valid
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Definitions
- the present invention relates to an electronic message authentication process, and a system for enabling authentication of received messages, such as emails.
- the filters may be installed on a client machine, a receiving mail server (which may be maintained by an Internet service provider (ISP) or within a local area network) or major mail serving nodes within the communications backbone of the Internet. Whilst the Spam filters are successful to a certain degree, and are able to eliminate a relatively high percentage of Spam, a filter is yet to be produced that is able to eliminate all unsolicited email without also filtering valid messages.
- ISP Internet service provider
- a personal email digital certificate can be obtained from Thawte Technologies Inc (http ://www.thawte . con ⁇ ) using a relatively simple procedure without any offline verification.
- the manner in which the current email clients indicate that an email has been digitally signed is by the display of a seal logo that most users either neglect, ignore or are unaware of what it represents.
- the seal logo needs to be clicked on by the recipient of an email to display information on the owner of the digital signature that sent the email and any certificate used when signing the email.
- an electronic message authentication process including: providing authenticating data for a first party; authenticating a transport session with said first party on the basis of said authenticating data; receiving at least one electronic message for at least one second party from said first party during said transport session; digitally signing said electronic message using a party certificate; and sending the signed message to said second party.
- the present invention also provides an electronic message authentication process, including: generating a limited digital certificate for a first party, said limited certificate being valid for a limited purpose; and digitally signing an electronic message for a second party from said first party with said limited certificate and sending the signed message to said second party.
- the present invention also provides a message server for performing the steps of the authentication process.
- the present invention also provides a message server system for performing an electronic message authentication process, including: a message transfer module for receiving and sending electronic messages using a transport layer protocol; and an authentication module for providing authenticating data for a first party, authenticating a transport session with said first party on the basis of said authenticating data, processing at least one electronic message for at least one second party from said first party during said transport session, digitally signing said electronic message using a party certificate, and allowing the signed message to be sent to said second party.
- a message server system for performing an electronic message authentication process, including: a message transfer module for receiving and sending electronic messages using a transport layer protocol; and an authentication module for providing authenticating data for a first party, authenticating a transport session with said first party on the basis of said authenticating data, processing at least one electronic message for at least one second party from said first party during said transport session, digitally signing said electronic message using a party certificate, and allowing the signed message to be sent to said second party.
- the present invention also provides a client process, executed by a client device, including: receiving a digitally signed electronic message; and generating a certificate notification on determining said message as being signed with at least one digital certificate, said notification providing information on authenticity of the message based on data of said certificate.
- the present invention also provides computer program instructions for performing said client process which can be integrated into email client or web mail software.
- the present invention also provides a message provider process, including: receiving a digitally signed electronic message; and generating a certificate notification on determining said message as being signed with at least one digital certificate, said notification providing information on authenticity of the message based on data of said certificate.
- Figure 1 is a block diagram of a preferred embodiment of an email authentication system
- Figure 2 is a flow diagram of an authentication process performed by a relay server of the system
- FIG. 3 is a flow diagram of a TLS session authentication process performed by the relay server
- Figure 4 is a flow diagram of a username and password generation process performed by the relay server
- Figure 5 is a flow diagram of a SMTP AUTH session authentication process performed by the relay server
- Figure 6 is a flow diagram of a token generation process performed by the relay server
- Figure 7 is a flow diagram of a session token authentication process performed by the relay server
- Figure 8 is a flow diagram of a limited certificate generation process performed by the relay server
- Figure 9 is a flow diagram of a certificate interface generation process performed by an email client of the system
- Figure 10 is a certificate notification generation process performed by a server of a web mail provider of the system
- Figure 11 is a screen display showing a window produced by an email client plugin of the system
- Figure 12 is another screen display produced by an email client plugin of the system.
- Figure 13 is a screen display produced using a web mail authentication module of the system. Detailed Description of the Preferred Embodiments
- An electronic message authentication system includes a relay server 100 that communicates with other electronic messaging servers 102 to 110 over a public communications network.
- the relay server 100 is able to receive messages from the servers 102 to 106 and once the messages are authenticated, digitally sign the messages and forward them onto other servers 108 to 110, so that the messages can be collected using a client device 120.
- the servers 100 to 110 are all described as being SMTP (Simple Mail Transfer Protocol) servers, and the client device, a personal computer running an email client 182, such as Microsoft Outlook or Apple Mail email software.
- the servers could be other messaging servers, such as SMS servers
- the client device 120 could be another computer device, such as a mobile phone or PDA.
- the communications network is therefore described as being the Internet and as using the various Internet protocols, such as SMTP, POP and IMAP and S/MEvIE.
- the SMTP servers 100 to 110 each include a mail transfer application 121, such as Sendmail or Microsoft Exchange, to implement SMTP.
- a web mail server 110 also includes web server and associated code 168 to allow the client machine 120 to access messages using an Internet browser 186.
- Web mail servers are used by mail providers such as Microsoft Corporation (http://www.hotmail.com and Yahoo Inc. (http://mail.yahoo.com) to offer users an email service accessible via a web browser.
- the relay server 100 also includes a web server 122, such as Apache (http://www.apache.org).
- an authentication module 140 provided by computer program instructions in languages, such as Java (http ://www.j ava. sun. com) and Perl (http://www.perl.org), and a database server 142 provided using software, such as MySQL4 (http://www.mvsql.org). which are all run on an operating system, such as the Linux OS (http ://www. linux. org), on a standard computer 150, such as a PC server (http://www.ibm.com).
- the components 121 to 142 of the server 100 can also be placed on a number of distributed computers connected by the communications network, and the processes executed by the components can also be executed at least in part by dedicated hardware circuits, eg ASICs.
- the SMTP server 102 of a bank and the SMTP server 104 of an airline can be used to send an email message to customers using the customer email addresses maintained in their databases.
- a customer is able to use the email client 182 of the computer 120 to access the email using POP or IMAP from the mail server 108 of an Internet service provider (ISP).
- ISP Internet service provider
- the customer can use a web browser 186, such as Internet Explorer, of the computer 120 to access the email, using the hypertext transfer protocol (secure: HTTPS or standard: HTTP), from the web server 110 of a web mail provider.
- a service bureau is also able to use an SMTP server 106 to send an email to customers on behalf of, for example, a second bank or an auction site, such as eBay (http ://www. ebay.
- the email messages originate from the service bureau mail server 106 which sends out emails on behalf of the second bank or auction site. These messages typically contain the "from" address of the bank or auction site, however it could also contain the "from” address of the service bureau.
- the text of the message to be bulk emailed may be sent to the service bureau server 106 from servers 112 and 114 of the second bank and the auction site.
- the email addresses to be used may also be sent from the servers 112 and 114 to the service bureau server 106.
- the second bank and the auction site cannot be so discriminated, as email originating from the service bureau server 106 would have the IP address assigned to the server 106 in the SMTP messages transmitted.
- it is undesirable to rely solely on an IP address as a person launching a phishing attack can fake the IP addresses of the originating SMTP servers if they are known and fraudulently represent themselves as another sending party, eg a bank, airline or auction site provider.
- the relay server 100 under the control of the authentication module 140 executes a message authentication process generally as shown in Figure 2.
- a sending party wishes to use the email relay service provided by the relay server 100
- the party initially needs to be authenticated and a party digital certificate and private key obtained for the party at step 202.
- the party can be authenticated using an online process, normally the party would be authenticated offline using a rigorous identification validation process. This involves the sending party, such as the first and second bank, the airline or the auction site provider, establishing to the satisfaction of the operator of the relay service that they have the identity that they claim to possess.
- the relay server 100 needs to receive a digital certificate with the private key for the sending party.
- This party certificate can be provided by the operator of the relay service after the party is authenticated, or the sending party may already have had the certificate issued by a CA.
- the certificate needs to include the party's name and email address corresponding to those authenticated during the sending party authentication process 202.
- the digital certificate complies with the ITU-Standard X.509 for public key infrastructure and can be as specified in RFC 2459 (http ://www.ietf . or /rfc/rfc2459.txt) .
- a sending mail server 102, 104 or 106 needs to establish an authenticated transport session with the relay server 100 (step 206). This is achieved by the relay server 100 executing processes of the authentication module 140 that rely on one or more of the following:
- a transport certificate provided to the sending server 102, 104 or 106 is an X.509 digital certificate used when connecting the SMTP server 102, 104, 106 to the relay server 100 using the Transport Layer Security (TLS) protocol.
- the transport certificate may be the party certificate or another X.509 certificate issued to the message transport party controlling the sending server 102, 104, 106 using an identification verification process similar to that (step 202) described above for the sending party obtaining the party certificate.
- a separate transport certificate is advantageous in situations where it is to be stored on a machine that is not as secure as what is required by the sending party for storage of the party certificate.
- variable content such as first names and last names
- the received emails for the campaign are each digitally signed at step 208.
- the emails are each signed with at least the party certificate.
- the emails may be signed by the party certificate and a limited digital certificate, as discussed below. When two certificates are used, the received email is separately signed by each certificate.
- the message is then sent using SMTP to the destination address at step 210. If the transport session for the emails is not authenticated at step 206, then the SMTP session with the server 104 to 106 is disconnected, and the relay server 100 does not accept any emails from the disconnected server.
- the sending server 102 to 106 When a messaging campaign commences that uses the transport certificate and TLS to authenticate the session, the sending server 102 to 106 first initiates an SMTP session with the relay server 100, as shown in Figure 3 at step 310.
- the TLS protocol used is as specified in RFC 2246 (http://www.ietf.org/rfc/rfc2246.txt).
- the SMTP connections established during the session use TLS to send messages for the campaign to the relay server with the transport certificate.
- the authentication module 140 of the relay server 100 controls the TLS session (step 310) and on receipt of a request to establish a TLS session from the sending server 102 to 106 seeks to confirm the IP address of the sending SMTP server, at step 320.
- the transport certificate used to establish the TLS session is extracted (step 330) and checked to determine if it is valid (step 332).
- the TLS session will be determined authentic or valid if it originates from the expected sender IP address issued for the transport certificate. Also it may be necessary for the session to be established within a restricted time period. If the TLS session is considered to be valid, then all email messages received during the session are considered to be authenticated and as having actually been sent by an authenticated transport party.
- the authentication module then proceeds to step 340 where every message is signed using the party certificate for the sending party. The signed messages are sent by the relay server 100 to a mail server 108 or 110 for collection by customers using their client computers 120.
- the authentication module 140 of the relay server 100 can use the SMTP AUTH extension to the SMTP protocol, as specified in RFC2554 SMTP Service Extension for Authentication (http://www.ietf.org/rfc/rfc2554.txt). to authenticate the transport session.
- the SMTP AUTH process initially involves receiving a request (step 410) for a username and password corresponding to a "from" email address of an organisation, such as support( ⁇ ),westpac.com.
- the request can be received from a transport party by an administrator logging onto a HTTPS web site provided by the web server 122 of the relay server 100.
- the site provides forms which can be submitted with the email address and organisation details in order to be provided with the username and password.
- the username and password is generated at step 412 and then transmitted back to the transport party over the secure HTTPS link.
- the transport party then configures the SMTP mail server 106 to 110 to relay messages from the particular "from" email address of the said organisation via the relay server 100 using the username and password generated at step 12.
- the server 106 to 110 is then able to send the username and password combination so the relay server 100 can authenticate a transport session with the server 106 to 110.
- Encrypted methods of SMTP AUTH such as CRAM-MD5
- the session commences at step 510, as shown in Figure 5.
- the username and password for the SMTP server is processed at step 550.
- the SMTP AUTH username and password will only be determined authentic or valid if the connection originates from the expected sender IP address issued for the username and password combination. The combination may also need to be used within a restricted time period. If the SMTP AUTH username and password and the IP address is determined to be valid (step 552), the relay authentication module 140 proceeds (step 554) to sign the email messages using at least the party certificate and then send them to the destination address.
- the token process involves receiving a request (step 610) for a time limited token corresponding to a "from" email address of an organisation, such as support@westpac.com.
- the request can be received from a transport party by an administrator logging onto a web site provided by the web server 122 of the relay server 100.
- the site provides forms which can be submitted with the email address and organisation details in order to be provided with the limited token.
- the token is generated at step 612 and then transmitted back to the server 106 to 110 identified by the "from" address.
- the server 106 to 110 is then able to embed the token in the header of any email sent to the relay server 100.
- the relay authentication module 140 detects the token at step 750 as being embedded in the header field of the email sent by the server 106 to 110. A check is then made to determine (step 752) whether the embedded token is valid such as comparing the expected IP address of the SMTP server against the actual IP address, and the existence of other expected header fields, and the message being received within the restricted time period, and then the token is deleted from the email message. If the token is valid, the relay authentication module 140 proceeds (step 754) to sign the message using at least the party certificate, which is then sent to the customer.
- VPN virtual private network
- the VPN ensures that the IP address information of the sending server is correct and can only be used exclusively by the authentication module 140 of the relay server 100.
- the authentication of the VPN requires the exchange of certificates and/or username and password information and the coordination of IP address and firewall configurations in order that the authenticity of the IP addresses of received messages can be guaranteed.
- the relay authentication module 140 proceeds (step 208) to sign the messages using at least the party certificate.
- the VPN uses dedicated switches and/or routers to essentially provide a hardware component based process used between the sender server 102 to 106 and the relay server 100 to authenticate the transport session (206)
- the emails can be additionally signed with a limited certificate.
- a sending party To obtain a limited certificate for an email campaign, a sending party first connects to the relay server 100 by using HTTPS and presents the party certificate, if not already received, or their username and password, as shown in Figure 8 (at step 802). They then undergo a verification process at step 804 where the certificate or username and password are compared to information stored for them in the authentication module 140. If this information is correct they are then authorised to create a campaign. The sending party then enters the information about the email campaign they wish to include in the limited certificate.
- the limited certificate corresponds to a "from" email address of a party, such as support@westpac.com. Other parts of a "from" header in a valid email from the party can also be used and validated against the limited certificate, such as the pretty name part of the "from” header.
- the sending or transport party logs onto a web site provided by the web server 122 of the relay server 100, and the site provides forms which can be submitted with the email address, organisation details and email campaign information in order to generate the limited certificate. Based on this information the authentication module 140 generates a limited certificate at step 806.
- This limited certificate is limited by conditions such as being valid for a particular sending and/or transport party, for a restricted time period, and for a specific purpose, ie a particular messaging campaign.
- the limited certificate complies with the ITU-T Standard X.509 for public key infrastructure and is as specified in RFC 2459 (http://www.ietf.org/rfc/rfc2459.txt).
- a customer is able to use the email client 182 on the computer 20 to access the message from the mail server 108, as shown in Figure 9 (step 902).
- the retrieved message has the standard email headers, message body, a digital signature using the party certificate and may be another digital signature using the limited certificate.
- the email client is able to process the message according to S/MIME standards so as to generate the standard interface notifications, eg the seal icon, indicating that the message has been digitally signed using the party certificate.
- the plugin 184 is able to detect and process the signature derived from the limited certificate (if it exists).
- the plugin retains information about certain known certificates and is also able to query, in real-time, certificate databases.
- the program instruction code of the plugin 184 causes generation (step 906) of a new window 1100, as shown in Figure 11, providing a certificate interface.
- the certificate interface displays information contained in the signature of the limited certificate that identifies the sender name, purpose of the email, and other authenticating information that the transport and/or sending party desires to be communicated to the recipient.
- the plugin 184 can alternatively include program instruction code to cause the email client to render an inline display 1200 containing the same information provided by the limited and party certificates when the message is opened, as shown in Figure 12.
- the plugin 184 can be made available to users using a number of distribution mechanisms, such as by download from particular sites, distributed disks or as an attachment to an email.
- the server 110 executes a web mail certificate process, as shown in Figure 10.
- the web mail server 110 receives a message sent by the relay server 100, and uses a web mail authentication module 170 provided by the operator of the relay server 100 to detect and interpret the signature(s) (step 1004).
- the web mail server 100 uses the authentication module 170 to extract party information from the signing certificate(s) and add it to the body of the email, at step 1006.
- the email is then placed in a location and format where it can be accessed and presented to the client using the browser 186 (step 1008).
- the web mail authentication module 170 authenticates emails on the basis of the certificate(s) and then presents the email in HTML format as having been verified. This may be done (step 1008) by displaying a unique sender verification explanation code in the subject line for the email when the summary web page for a recipient's inbox is accessed by the client 120 or by displaying information from the signing certificate(s) in a frame 1300 surrounding the message once the message has been selected to be opened by the client 20, as shown in Figure 13.
- the authentication system described ensures the electronic messages for a user of a client machine 120 provide identity information in a manner that cannot be fabricated by a party other than the sending and/or transport party, and allows the user receiving the messages to authenticate that those messages are from the sending party.
- relay server 100 or operations of the authentication module 140 could be incorporated into the mail servers 102 to 106 and the operations undertaken on the relay server 100 could be distributed across a number of servers and/or a number of locations in order to provide better performance or redundancy.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2005236499A AU2005236499B2 (en) | 2004-04-23 | 2005-04-21 | Electronic message authentication process |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US56459304P | 2004-04-23 | 2004-04-23 | |
AU2004902238A AU2004902238A0 (en) | 2004-04-23 | Electronic message authentication process | |
AU2004902238 | 2004-04-23 | ||
US60/564,593 | 2004-04-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005104422A1 true WO2005104422A1 (en) | 2005-11-03 |
Family
ID=35197339
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2005/000560 WO2005104422A1 (en) | 2004-04-23 | 2005-04-21 | Electronic message authentication process |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2005104422A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120002810A1 (en) * | 2010-06-01 | 2012-01-05 | GreatCall, Inc. | Short message service cipher |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001024437A2 (en) * | 1999-09-30 | 2001-04-05 | United States Postal Service | Systems and methods for authenticating an electronic message |
US20030126085A1 (en) * | 2001-12-27 | 2003-07-03 | Slamdunk Networks, Inc. | Dynamic authentication of electronic messages using a reference to a certificate |
US20040133774A1 (en) * | 2003-01-07 | 2004-07-08 | Callas Jonathan D. | System and method for dynamic data security operations |
US20050021969A1 (en) * | 2003-07-01 | 2005-01-27 | Microsoft Corporation | Delegating certificate validation |
-
2005
- 2005-04-21 WO PCT/AU2005/000560 patent/WO2005104422A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001024437A2 (en) * | 1999-09-30 | 2001-04-05 | United States Postal Service | Systems and methods for authenticating an electronic message |
US20030126085A1 (en) * | 2001-12-27 | 2003-07-03 | Slamdunk Networks, Inc. | Dynamic authentication of electronic messages using a reference to a certificate |
US20040133774A1 (en) * | 2003-01-07 | 2004-07-08 | Callas Jonathan D. | System and method for dynamic data security operations |
US20050021969A1 (en) * | 2003-07-01 | 2005-01-27 | Microsoft Corporation | Delegating certificate validation |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120002810A1 (en) * | 2010-06-01 | 2012-01-05 | GreatCall, Inc. | Short message service cipher |
US8571218B2 (en) * | 2010-06-01 | 2013-10-29 | GreatCall, Inc. | Short message service cipher |
US8600059B2 (en) | 2010-06-01 | 2013-12-03 | GreatCall, Inc. | Short message service cipher |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240031357A1 (en) | Method for authorizing a secure access from a local device to a remote server computer | |
US8484456B2 (en) | Trusted electronic messaging system | |
US7877784B2 (en) | Verifying authenticity of webpages | |
US7917757B2 (en) | Method and system for authentication of electronic communications | |
US8266421B2 (en) | Private electronic information exchange | |
US8756289B1 (en) | Message authentication using signatures | |
US7975290B2 (en) | Verifying authenticity of instant messaging messages | |
US8166299B2 (en) | Secure messaging | |
US20080307226A1 (en) | Verifying authenticity of e-mail messages | |
JP2006520112A (en) | Security key server, implementation of processes with non-repudiation and auditing | |
US20120158877A1 (en) | E-mail authentication | |
EP1575228B1 (en) | Method and apparatus for reducing e-mail spam and virus distribution in a communications network by authenticating the origin of e-mail messages | |
CA2457478A1 (en) | System and method for warranting electronic mail using a hybrid public key encryption scheme | |
Banday | Technology Corner: Analysing e-mail headers for forensic investigation | |
US20100180121A1 (en) | Method and apparatus for enhancing security in network-based data communication | |
Nightingale | Email authentication mechanisms: DMARC, SPF and DKIM | |
US20090210713A1 (en) | Method and a system for securing and authenticating a message | |
AU2005236499B2 (en) | Electronic message authentication process | |
WO2005104422A1 (en) | Electronic message authentication process | |
Wu et al. | Blocking foxy phishing emails with historical information | |
Zhao et al. | An add-on end-to-end secure email solution in mobile communications | |
Sheikh et al. | A cryptocurrency-based E-mail system for SPAM control | |
AU2005242194A1 (en) | A trusted electronic messaging system | |
Herzberg | Cryptographic Protocols to Prevent Spam | |
Sakamuri | Design and evaluation of a new authentication mechanism for validating the sender of an email |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005236499 Country of ref document: AU |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
ENP | Entry into the national phase |
Ref document number: 2005236499 Country of ref document: AU Date of ref document: 20050421 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2005236499 Country of ref document: AU |
|
122 | Ep: pct application non-entry in european phase |