WO2006131729A1 - Itso fvc2 application monitor - Google Patents
Itso fvc2 application monitor Download PDFInfo
- Publication number
- WO2006131729A1 WO2006131729A1 PCT/GB2006/002078 GB2006002078W WO2006131729A1 WO 2006131729 A1 WO2006131729 A1 WO 2006131729A1 GB 2006002078 W GB2006002078 W GB 2006002078W WO 2006131729 A1 WO2006131729 A1 WO 2006131729A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- itso
- data
- sequence
- smartcard
- operations
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
Definitions
- the present invention relates to an improvement to existing ITSO technology, that is, the electronic ticketing scheme proposed by the Interoperable Ticketing Smartcard Organisation standards developed by UK Government and incorporated in European Standard EN 1545, in any of the versions currently available or which become available in future, in particular, Customer Media Definitions - ITSO part 10. CD10 ITSO TS1000-10 2003-11.
- the term 'ticketing scheme' does not only encompass traditional transportation ticketing operations but any secure scheme in which a ticket, token, voucher, or prescription is validated for redemption against the provision of goods or services.
- the present invention relates to a programmable smartcard device for use in an ITSO scheme and carrying a file system and operating software enabling the on-device file system to interface with at least one off-device ITSO application to permit the off-device application to access and/or modify data in the on-device file system.
- the ITSO schemes use cryptographically generated seals on data which might, for example, represent access to a service of some kind, or some other commodity of value.
- the integrity of the data is protected by means of these seals with all processing being done by a Secure Access Module ( 1 SAM') in the POST.
- 1 SAM' Secure Access Module
- ITSO Value products can be used as an "electronic purse” to hold a balance which can be incremented or decremented by an ITSO POST.
- This is implemented as a Fixed Data Group (FRDG) and, normally, 2 value data groups (VRDGs), one holding the current balance and the other holding the previous copy of the balance.
- FRDG Fixed Data Group
- VRDGs 2 value data groups
- Two VRDGs are used for anti-tear purposes to ensure that at least one copy of the VRDG is without errors if the card is "torn" during updating of the VRDG.
- the POST when modifying the IPE ("ITSO Product Entity' - the ITSO term for a " ticket" data set on the Customer media or smartcard) balance, will alternately update the VRDGs in order that one VRDG contains the current copy of the balance and the other the previous copy of the balance.
- IPE ITSO Product Entity' - the ITSO term for a " ticket” data set on the Customer media or smartcard
- the existing FVC2 Secure Messaging scheme proposed by the standard referred to above supports mutual authentication between the Customer Media (the smartcard) and ISAM (ITSO Secure Application Module - a trusted computer inserted in the POST) to generate a session key.
- the session key is used to create a Message Authentication Certificate ('MAC') (a cryptographically protected HASH of a set of data the integrity of which the MAC ensures) over data read from the smartcard and over the data updated to the smartcard.
- 'MAC' a cryptographically protected HASH of a set of data the integrity of which the MAC ensures
- the session key does not change during the course of the session.
- the smartcard Customer Media
- the MAC is calculated over the data of the command only by the ISAM and verified by the Customer Media before internally updating the Customer Media file.
- each file has a unique password which must be sent to the Customer Media before the UPDATE command completes. As the password is static, the same password is applied in each session.
- This scheme allows the POST to determine when the data was read from the Customer Media (smartcard), but it cannot determine whether it was read from the correct file. By starting a new session, and thus generating a new session key the POST can determine whether an update to the Customer Media was successful, but still it cannot verify that it was to the correct file.
- the Customer Media does not test that the data being written is correct, other than verifying the MAC is correct, or that the correct sequence of updates has occurred.
- the programmable smartcard device described above is characterised in that it comprises monitoring means operable to monitor the sequence of operations carried out by the off-line application in accessing and/or modifying data in the on-device files and to restrict or prevent further access or modifications to such data if that sequence of operations does not meet predetermined criteria.
- the monitoring means includes a state engine capable of being set to one of a plurality of states, at least one of which is an error state, in which further modification to the data in some or all of the on- device files is prevented until the sequence of operations is restarted.
- the invention may also provide a smartcard scheme including at least one programmable smartcard device carrying a file system and operating software enabling the on-device file system to interface with at least one off-device application at an interface device to permit the off-device application to access and/or modify data in the on-device file system; the system being such that inter- engagement of the smartcard device with the interface device causes the interface device to generate a session key used in the encryption/decryption of data and/or commands during a sequence of operations carried out to access and/or modify data carried by the programmable smartcard device, the scheme being characterised in that completion of a sequence of operations to modify data on the programmable smartcard device causes the interface device to open a new session and to generate a second session key and to use that second session key to verify that the required data has been modified in accordance with the intended sequence of operations.
- the threats to the security of the ITSO scheme referred to above can be countered, in accordance with preferred embodiments of the invention, by monitoring updates to the FVC2 Customer Media (the smartcard), to ensure data written to the Customer Media has correct content and destination. It is also proposed that the FVC2 Customer Media, rather than simply allowing data to be written to any file if the correct password and MAC are provided, enforces the relevant ITSO application processing rules preventing the attacks detailed above.
- the invention may enable implementations of ITSO compatible cards and terminals enhanced such that they are secure enough to be used as a nationally deployable electronic purse.
- the invention only concerns modification of ITSO Value products. It is based on the processing rules specified in Customer Media Definitions - ITSO part 10. CD10 ITSO TS1000-10 2003-11.
- the FVC2 Customer Media which may, for example, be a smartcard or the like, will implement the following processing and data monitoring checks during normal processing.
- the FVC2 Customer Media will monitor the incoming update commands and change state to Error if any of the following tests fail.
- a POST By reading back the data after an UPDATE command a POST can use the ISAM to verify the data was read from the FVC2 Customer Media.
- the both the READ and UPDATE commands only calculate the MAC over the command data, the MAC returned from a read of the same offset will be the same MAC contained within the corresponding UPDATE command, therefore the POST cannot determine if the data was updated or it simply received the MAC it generated.
- a second secure session is started after updating of the FVC2 Customer Media within the session.
- This second Secure Messaging session will generate a new Secure Messaging session key.
- the POST can perform a read of the data it requested to be updated on the FVC2 Customer Media to verify the data was written to the correct offset with the correct file. Where the POST has not updated the entire Data Group it must ensure that read verification contains a sufficient data range of the Data Group to ensure that an attacker has not changed the offset in the update of the Data Group to corrupt or modify the Data Group.
- the invention provides techniques which can be implemented to allow
- FVC2 Customer Media, conventionally operating in a less secure environment, to be utilised in a manner sufficiently secure to function as a nationally deployable electronic purse scheme.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/916,750 US20080275917A1 (en) | 2005-06-07 | 2006-06-06 | Itso Fvc2 Application Monitor |
BRPI0611797-0A BRPI0611797A2 (en) | 2005-06-07 | 2006-06-06 | itso pvc2 application monitor |
JP2008515283A JP2008542941A (en) | 2005-06-07 | 2006-06-06 | ITSOVC2 application monitor |
EP06744132A EP1891611A1 (en) | 2005-06-07 | 2006-06-06 | Itso fvc2 application monitor |
AU2006256601A AU2006256601B2 (en) | 2005-06-07 | 2006-06-06 | ITSO FVC2 application monitor |
CA002611382A CA2611382A1 (en) | 2005-06-07 | 2006-06-06 | Itso fvc2 application monitor |
GB0800223A GB2443749B (en) | 2005-06-07 | 2006-06-06 | Itso FVC2 application monitor |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0511599.3A GB0511599D0 (en) | 2005-06-07 | 2005-06-07 | ITSO FCV2 application monitor |
GB0511599.3 | 2005-06-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006131729A1 true WO2006131729A1 (en) | 2006-12-14 |
Family
ID=34835271
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2006/002078 WO2006131729A1 (en) | 2005-06-07 | 2006-06-06 | Itso fvc2 application monitor |
Country Status (9)
Country | Link |
---|---|
US (1) | US20080275917A1 (en) |
EP (1) | EP1891611A1 (en) |
JP (1) | JP2008542941A (en) |
CN (1) | CN101238492A (en) |
AU (1) | AU2006256601B2 (en) |
BR (1) | BRPI0611797A2 (en) |
CA (1) | CA2611382A1 (en) |
GB (3) | GB0511599D0 (en) |
WO (1) | WO2006131729A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9197612B2 (en) | 2013-08-08 | 2015-11-24 | Symbol Technologies, Llc | Apparatus and method for deploying encrypted mobile off-line web applications |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102006060080B4 (en) * | 2006-12-19 | 2008-12-11 | Infineon Technologies Ag | Device for the contactless transmission of data from a memory |
JP6279217B2 (en) * | 2013-03-08 | 2018-02-14 | 株式会社東芝 | IC card, electronic device, and portable electronic device |
CN104182699B (en) * | 2014-08-25 | 2017-02-22 | 飞天诚信科技股份有限公司 | Receipt verification method and system |
CN104657684B (en) * | 2014-08-27 | 2018-01-30 | 北京中电华大电子设计有限责任公司 | Strengthen the method for reliability of smart card |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0657851A2 (en) * | 1993-12-10 | 1995-06-14 | Kabushiki Kaisha Toshiba | File management system for memory card |
EP1094423A2 (en) * | 1999-10-19 | 2001-04-25 | Hitachi, Ltd. | Card observing method |
EP1132873A1 (en) * | 2000-03-07 | 2001-09-12 | THOMSON multimedia | Electronic wallet system |
EP1258807A2 (en) * | 2001-05-14 | 2002-11-20 | Matsushita Electric Industrial Co., Ltd. | Illegal access monitoring device, ic card, and illegal access monitoring method |
US20030005294A1 (en) * | 2001-06-29 | 2003-01-02 | Dominique Gougeon | System and method for restoring a secured terminal to default status |
US20030021165A1 (en) * | 2001-07-02 | 2003-01-30 | Martin Hurich | Method of protecting a microcomputer system against manipulation of its program |
EP1403761A1 (en) * | 2001-06-27 | 2004-03-31 | Sony Corporation | Integrated circuit device, information processing device, information recording device memory management method, mobile terminal device, semiconductor integrated circuit device, and communication method using mobile terminal device |
US20040078571A1 (en) * | 2000-12-27 | 2004-04-22 | Henry Haverinen | Authentication in data communication |
WO2004066196A1 (en) * | 2003-01-24 | 2004-08-05 | Ecebs Limited | Smartcard with protected memory access |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4804825A (en) * | 1986-06-17 | 1989-02-14 | Casio Computer Co., Ltd. | I C card system |
DE68919483T2 (en) * | 1988-02-20 | 1995-04-06 | Fujitsu Ltd | Smart cards. |
US5649118A (en) * | 1993-08-27 | 1997-07-15 | Lucent Technologies Inc. | Smart card with multiple charge accounts and product item tables designating the account to debit |
EP0818761A1 (en) * | 1996-07-12 | 1998-01-14 | Koninklijke KPN N.V. | Integrated circuit card, secure application module, system comprising a secure application module and a terminal and a method for controlling service actions to be carried out by the secure application module on the integrated circuit card |
EP1026641B1 (en) * | 1999-02-01 | 2013-04-24 | International Business Machines Corporation | Method and system for establishing a trustworthy connection between a user and a terminal |
CN1337029A (en) * | 1999-09-16 | 2002-02-20 | 松下电器产业株式会社 | Electronic wallet |
US20020158123A1 (en) * | 2001-01-30 | 2002-10-31 | Allen Rodney F. | Web-based smart card system and method for maintaining status information and verifying eligibility |
US8245292B2 (en) * | 2005-11-16 | 2012-08-14 | Broadcom Corporation | Multi-factor authentication using a smartcard |
-
2005
- 2005-06-07 GB GBGB0511599.3A patent/GB0511599D0/en not_active Ceased
-
2006
- 2006-06-06 AU AU2006256601A patent/AU2006256601B2/en active Active
- 2006-06-06 GB GB0922646A patent/GB2464008B/en active Active
- 2006-06-06 CA CA002611382A patent/CA2611382A1/en not_active Abandoned
- 2006-06-06 BR BRPI0611797-0A patent/BRPI0611797A2/en not_active Application Discontinuation
- 2006-06-06 US US11/916,750 patent/US20080275917A1/en not_active Abandoned
- 2006-06-06 JP JP2008515283A patent/JP2008542941A/en not_active Withdrawn
- 2006-06-06 GB GB0800223A patent/GB2443749B/en active Active
- 2006-06-06 EP EP06744132A patent/EP1891611A1/en not_active Withdrawn
- 2006-06-06 WO PCT/GB2006/002078 patent/WO2006131729A1/en active Application Filing
- 2006-06-06 CN CN200680029073.7A patent/CN101238492A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0657851A2 (en) * | 1993-12-10 | 1995-06-14 | Kabushiki Kaisha Toshiba | File management system for memory card |
EP1094423A2 (en) * | 1999-10-19 | 2001-04-25 | Hitachi, Ltd. | Card observing method |
EP1132873A1 (en) * | 2000-03-07 | 2001-09-12 | THOMSON multimedia | Electronic wallet system |
US20040078571A1 (en) * | 2000-12-27 | 2004-04-22 | Henry Haverinen | Authentication in data communication |
EP1258807A2 (en) * | 2001-05-14 | 2002-11-20 | Matsushita Electric Industrial Co., Ltd. | Illegal access monitoring device, ic card, and illegal access monitoring method |
EP1403761A1 (en) * | 2001-06-27 | 2004-03-31 | Sony Corporation | Integrated circuit device, information processing device, information recording device memory management method, mobile terminal device, semiconductor integrated circuit device, and communication method using mobile terminal device |
US20030005294A1 (en) * | 2001-06-29 | 2003-01-02 | Dominique Gougeon | System and method for restoring a secured terminal to default status |
US20030021165A1 (en) * | 2001-07-02 | 2003-01-30 | Martin Hurich | Method of protecting a microcomputer system against manipulation of its program |
WO2004066196A1 (en) * | 2003-01-24 | 2004-08-05 | Ecebs Limited | Smartcard with protected memory access |
Non-Patent Citations (2)
Title |
---|
ITSO TECHNICAL COMMITTEE: "ITSO Technical Specification 1000-10 ? Interoperable public transport ticketing using contactless smart customer media ? Part 10: Customer media definitions", ITSO TS 1000-10, XX, XX, 27 March 2004 (2004-03-27), XP002397601, Retrieved from the Internet <URL:http://www.itso.org.uk/content/documents/ITSO_TS1000-10_2004-03.pdf> [retrieved on 20060905] * |
ITSO TECHNICAL COMMITTEE: "ITSO Technical Specification 1000-7 ? Interoperable public transport ticketing using contactless smart customer media ? Part 7: ITSO Security Subsystem", ITSO TS 1000-7, XX, XX, 30 March 2004 (2004-03-30), XP002397600, Retrieved from the Internet <URL:http://www.itso.org.uk/content/documents/ITSO_TS1000-7_2004-03.pdf> [retrieved on 20060905] * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9197612B2 (en) | 2013-08-08 | 2015-11-24 | Symbol Technologies, Llc | Apparatus and method for deploying encrypted mobile off-line web applications |
Also Published As
Publication number | Publication date |
---|---|
CN101238492A (en) | 2008-08-06 |
BRPI0611797A2 (en) | 2010-10-19 |
AU2006256601A1 (en) | 2006-12-14 |
JP2008542941A (en) | 2008-11-27 |
GB2464008A (en) | 2010-04-07 |
GB2443749A (en) | 2008-05-14 |
EP1891611A1 (en) | 2008-02-27 |
GB2443749B (en) | 2010-03-03 |
US20080275917A1 (en) | 2008-11-06 |
AU2006256601B2 (en) | 2010-12-23 |
GB0511599D0 (en) | 2005-07-13 |
GB0922646D0 (en) | 2010-02-10 |
GB0800223D0 (en) | 2008-02-13 |
GB2464008B (en) | 2010-06-30 |
CA2611382A1 (en) | 2006-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101501642B (en) | Use the method for the portable mass storage of virtual machine activation | |
JP4251667B2 (en) | Integrated circuit card with application history list | |
EP2115655B1 (en) | Virtual secure on-chip one time programming | |
US8255655B2 (en) | Authentication and securing of write-once, read-many (WORM) memory devices | |
EP0849658A2 (en) | Secure data processing method and system | |
JPH0844805A (en) | Security managing method for card type storage medium, card type storage medium and transaction device for card type storage medium | |
CN107832589B (en) | Software copyright protection method and system | |
AU2006256601B2 (en) | ITSO FVC2 application monitor | |
JP2003513388A (en) | System and method for ensuring data reliability with a secured counter | |
US6983364B2 (en) | System and method for restoring a secured terminal to default status | |
JP2008541251A (en) | Safe processing of data | |
CN109445705A (en) | Firmware authentication method and solid state hard disk | |
WO2011141997A1 (en) | External boot device, external boot program, external boot method and network communication system | |
CN112199740B (en) | Encryption lock implementation method and encryption lock | |
EP1079339B1 (en) | Secure personalization of chip cards | |
US20090271875A1 (en) | Upgrade Module, Application Program, Server, and Upgrade Module Distribution System | |
JP3491273B2 (en) | Chip card and how to import information on it | |
JP4961834B2 (en) | IC card issuing method and IC card | |
CN108345804A (en) | A kind of storage method in trusted computation environment and device | |
JP4899499B2 (en) | IC card issuing method, IC card issuing system, and IC card | |
WO2012053053A1 (en) | External boot device, and network communication system | |
JP4601329B2 (en) | Electronic authentication device primary issuing device, electronic authentication device issuing system, electronic authentication device secondary issuing device, electronic authentication device primary issuing method, electronic authentication device issuing method, and electronic authentication device secondary issuing method | |
JPH0997315A (en) | Transaction information processing method, transaction information processor, and information recording medium | |
CN117751361A (en) | Method for protecting the use of software | |
JP2004185348A (en) | Program correction method and ic card for executing the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006256601 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008515283 Country of ref document: JP Ref document number: 2611382 Country of ref document: CA Ref document number: MX/A/2007/015615 Country of ref document: MX |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006744132 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 564769 Country of ref document: NZ |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10205/DELNP/2007 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2006256601 Country of ref document: AU Date of ref document: 20060606 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2006256601 Country of ref document: AU |
|
ENP | Entry into the national phase |
Ref document number: 0800223 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20060606 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 800223 Country of ref document: GB Ref document number: 0800223.0 Country of ref document: GB |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200680029073.7 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11916750 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2006744132 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: PI0611797 Country of ref document: BR Kind code of ref document: A2 |