WO1999026188A1 - A remotely accessible private space using a fingerprint - Google Patents
A remotely accessible private space using a fingerprint Download PDFInfo
- Publication number
- WO1999026188A1 WO1999026188A1 PCT/US1998/023802 US9823802W WO9926188A1 WO 1999026188 A1 WO1999026188 A1 WO 1999026188A1 US 9823802 W US9823802 W US 9823802W WO 9926188 A1 WO9926188 A1 WO 9926188A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- fingerprint
- private space
- private
- access
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Definitions
- the present invention relates to biometrics, and more specifically, to accessing remote networks using biometric verification of identity.
- a virtual private network is constructed by using public wires, such as the Internet, to connect nodes.
- These systems use encryption to ensure that only authorized users can access the network and that the data cannot be intercepted. However, encryption is only as safe as the storage of the keys.
- a private space is set up in a remote system accessible through a network.
- a user identification based on the user's fingerprint is associated with the private space.
- Fingerprint information is received from the user to access the space, and compared to the user identification stored in the remote system.
- the private space is only accessible if the fingerprint information matches the user identification.
- FIG. 1 is an illustration of the network on which the present invention may be implemented.
- Figure 2 illustrates the remote system including the private area that may be accessed.
- Figure 3 illustrates the local system that is used to access the private area.
- Figure 4 is a flowchart illustrating the process of creating the private space.
- Figure 5 is a flowchart illustrating the process of logging into the private space.
- Figure 6 is a flowchart illustrating another embodiment of the registration process.
- Figure 7 is a flowchart illustrating another embodiment of the process of logging into a private space.
- Figure 1 illustrates a network in which the present invention may be utilized.
- Sensor 130 is coupled to local system 120.
- Local system 120 is enabled to connect to a network 130, which couples a plurality of systems 140, 150, 160 together.
- the network 130 is the Internet.
- a remote system 140 contains the private area that the local system 120 is trying to connect to. Other systems 150, 160 may be accessed through the network as well. Because the network 130 is not secure, the security mechanism described below is used to restrict access to the private area.
- Figure 2 illustrates the remote system including the private area that may be accessed.
- the remote system 140 includes a system area 210, which may store the operating system, various application programs, and other files.
- the remote system 140 further includes a network access unit 220.
- the remote system 140 has a semi-permanent network connection, such as Ethernet, ISDN, Tl, or similar connection.
- the remote system 140 may be connected to the network 130 via a modem.
- the remote system 140 further may include a fingerprint recognition unit 230.
- the fingerprint recognition unit matches a template stored within the remote system 140 to a fingerprint received from a user.
- the matching may use any matching algorithm known in the art.
- no fingerprint recognition unit is included in the remote system 140.
- the remote system may further include an encryption unit 240.
- the encryption unit 240 encrypts and decrypts using public and private keys.
- the encryption unit 240 retrieves a public key stored with the user data 260, in order to verify the identity of the user by decrypting a file encrypted with the user's private key.
- the encryption unit further includes the private and public keys of the remote system 140.
- the remote system further includes an access control unit 250.
- the access control unit 250 controls access to the user data 260.
- the access control unit 250 receives indication from the fingerprint recognition unit 230 whether the template matched the fingerprint sent by the user.
- the identity verification unit 250 receives indication from the encryption unit 240 whether the public key decrypted the file sent by the user encrypted with the user's fingerprint based private key.
- the access control unit 250 only permits access to the user data 260 when a match was found.
- the user data 260 may be actual data, various application programs, or anything that the user may have access to.
- the user data 260 may include the operating system of the computer. That is, the user may remotely adjust the operation of the remote system 140.
- multiple users may have private areas within the same user data block 260. Each user is permitted access only to his or her private area.
- FIG. 3 illustrates the local system that is used to access the private area.
- the local system 110 includes a system area 310, which may store the operating system, various application programs, and other files.
- the local system 110 further includes a network access unit 320.
- the network access unit 320 provides a network connection such as Ethernet, ISDN, Tl, etc.
- the network access unit 320 may provide a network connection via a modem.
- the local system 110 may further include a scanner interface 330.
- the scanner 120 is coupled to the local system 110.
- the scanner interface 330 receives a digitized fingerprint image from the scanner.
- the scanner interface 330 may further extract a template from the digitized fingerprint image.
- the local system may further include an encryption unit 340.
- the encryption unit 340 encrypts and decrypts using public and private keys.
- the encryption unit generates the private and public keys of the user from the fingerprint data received by the scanner interface 330.
- the encryption unit 340 generates a fingerprint template from the fingerprint data received by the scanner interface 330. This fingerprint template is sent to the remote system 140.
- Figure 4 is a flowchart illustrating the process of creating the private space.
- the remote access system is set up. For one embodiment, this includes adding server software to the remote system.
- the remote system receives a fingerprint template from the user.
- the remote system receives an actual digital image of the fingerprint.
- the remote system receives a template including extracted features of the fingerprint.
- the remote system receives other data representing various characteristics of the fingerprint.
- This fingerprint template is received either locally, or remotely with validation.
- the user may set up the private space locally, for remote access.
- validation may be a digital certificate, or an encryption verification method. Since the private space at this point does not contain any data, the security of this step is not vital.
- private space is allocated to the user.
- actual space is allocated to the user.
- flexible allocation may be made, permitting the user to store varied amounts of data, and reallocating space as needed. However, this establishes an area for the user's data.
- the fingerprint template is stored within the remote system to control access to the private space.
- the template is stored in the access control unit 250 of the remote system.
- the access control unit 250 is enabled, and access to the private space is routed through the access control unit 250. At this point, the user needs to be validated in order to access the private space.
- Figure 5 is a flowchart illustrating the process of logging into the private space
- the remote system receives an access request.
- the user may request access by entering the remote system's IP address into a web browser.
- the remote system responds with a request for validation.
- the request for validation may specifically request a fingerprint.
- the user now has to place his or her finger on the fingerprint scanner 120 attached to the user's local system. This fingerprint information is transmitted to the remote system.
- the fingerprint information is received by the remote system.
- the fingerprint information is a digital image of the fingerprint.
- the fingerprint information may be a list of extracted features of the fingerprint, or other data. Some of the processing for creating this information may occur in the user's local system.
- the fingerprint information is compared with the fingerprint template associated with the private space. For one embodiment, if there are multiple private spaces within the remote system, the user requests his or her own private space by entering a handle or name. For another embodiment, the user merely attempts to access the remote system, and the matching is to all fingerprint templates within the remote system.
- the fingerprint recognition unit 230 of the remote system manipulates the data of the fingerprint image and the fingerprint template to be in the same format. If the information does not match the template, the process continues to block 560, and the user is denied access to the private space. If the information matches the template, the process continues to block 570, and the user is allowed access to the private space. For one embodiment, after the user is allowed access, a one-time session key is exchanged with the user for further verification during the access period. For another embodiment, the remote system periodically challenges the user's local system for re-verification.
- Figure 6 illustrates another embodiment of the registration process.
- the remote access system is set up.
- the remote system receives a digital certificate of the user.
- Digital certificates are known in the art. They are used to verify the identity of a user.
- the digital certificate includes the public key of the user. This public key is generated based on the fingerprint of the user.
- the public key of the user is extracted from the digital certificate. For one embodiment, this involves decrypting the digital certificate with the certifying authority's public key.
- the public key of the user is verified. For one embodiment, this is done by receiving a file encrypted with the private key that corresponds to the public key of the user. Decrypting this file with the user's public key verifies that the user is in fact associated with the public key included in the digital certificate. Because the private key is generated based on an actual fingerprint image of the user, the user's identity is also verified.
- the user's public key is stored in the system. And at block 660, space is allocated for the user.
- Figure 7 is a flowchart illustrating the process of logging into the private space.
- the remote system receives a request for access to the private space.
- the remote system sends a request for a file encrypted the user's private key.
- the private key is fingerprint based, and therefore also verifies that the actual user associated with the private key is sitting in front of the computer system.
- the remote system receives the file encrypted with the fingerprint based private key.
- the remote system retrieves the public key associated with the user, and attempts to decrypt the file sent by the user.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000521477A JP2001523903A (en) | 1997-11-14 | 1998-11-10 | Private space that can be accessed remotely using fingerprints |
EP98965955A EP1036372A1 (en) | 1997-11-14 | 1998-11-10 | A remotely accessible private space using a fingerprint |
KR1020007005234A KR20010052103A (en) | 1997-11-14 | 1998-11-10 | A remotely accessible private space using a fingerprint |
AU21968/99A AU2196899A (en) | 1997-11-14 | 1998-11-10 | A remotely accessible private space using a fingerprint |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US97034197A | 1997-11-14 | 1997-11-14 | |
US08/970,341 | 1997-11-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999026188A1 true WO1999026188A1 (en) | 1999-05-27 |
Family
ID=25516800
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1998/023802 WO1999026188A1 (en) | 1997-11-14 | 1998-11-10 | A remotely accessible private space using a fingerprint |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1036372A1 (en) |
JP (1) | JP2001523903A (en) |
KR (1) | KR20010052103A (en) |
CN (1) | CN1291313A (en) |
AU (1) | AU2196899A (en) |
WO (1) | WO1999026188A1 (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001216270A (en) * | 2000-01-31 | 2001-08-10 | Netmarks Inc | Authentication station, authentication system and authentication method |
JP2001306524A (en) * | 2000-04-19 | 2001-11-02 | Nec Corp | System and method for sharing business terminal |
JP2002073566A (en) * | 2000-08-31 | 2002-03-12 | Sony Corp | System and method for processing data applied to personal identification, information processor and program supply medium |
JP2002073568A (en) * | 2000-08-31 | 2002-03-12 | Sony Corp | System and method for personal identification and program supply medium |
JP2002073569A (en) * | 2000-08-31 | 2002-03-12 | Sony Corp | Personal identification system, personal identification method, information processor and program providing medium |
WO2002037403A1 (en) * | 2000-11-01 | 2002-05-10 | Nitgen Co., Ltd. | User authenticating system and method using one-time fingerprint template |
JP2002175279A (en) * | 2000-08-31 | 2002-06-21 | Sony Corp | Personal authentication system, personal authentication method, and information processing device, and program providing medium |
EP1417555A2 (en) * | 2001-06-18 | 2004-05-12 | Daon Holdings Limited | An electronic data vault providing biometrically protected electronic signatures |
US7181627B2 (en) * | 2002-08-01 | 2007-02-20 | Freescale Semiconductor, Inc. | Biometric system for replacing password or pin terminals |
US7409543B1 (en) | 2000-03-30 | 2008-08-05 | Digitalpersona, Inc. | Method and apparatus for using a third party authentication server |
KR100899471B1 (en) | 2001-02-01 | 2009-05-27 | 쓰리엠 이노베이티브 프로퍼티즈 컴파니 | Method and system for securing a computer network and personal identification device used therein for controlling access to network components |
US7698565B1 (en) | 2000-03-30 | 2010-04-13 | Digitalpersona, Inc. | Crypto-proxy server and method of using the same |
US8046589B2 (en) | 2004-06-25 | 2011-10-25 | Koninklijke Philips Electronics N.V. | Renewable and private biometrics |
CN102799956A (en) * | 2011-05-23 | 2012-11-28 | 方良卫 | System for applying fingerprint analysis to talent seeking, job hunting, friend making, life planning and career planning |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100772292B1 (en) * | 2003-09-22 | 2007-11-01 | 김형윤 | Sensors and systems for structural health monitoring |
FR2946209A1 (en) * | 2009-06-02 | 2010-12-03 | Alcatel Lucent | METHOD FOR PROTECTING A TELECOMMUNICATION NETWORK AND SECURE ROUTER USING SUCH A METHOD |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5497422A (en) * | 1993-09-30 | 1996-03-05 | Apple Computer, Inc. | Message protection mechanism and graphical user interface therefor |
US5534855A (en) * | 1992-07-20 | 1996-07-09 | Digital Equipment Corporation | Method and system for certificate based alias detection |
US5541994A (en) * | 1994-09-07 | 1996-07-30 | Mytec Technologies Inc. | Fingerprint controlled public key cryptographic system |
US5613012A (en) * | 1994-11-28 | 1997-03-18 | Smarttouch, Llc. | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
-
1998
- 1998-11-10 AU AU21968/99A patent/AU2196899A/en not_active Abandoned
- 1998-11-10 CN CN98812160A patent/CN1291313A/en active Pending
- 1998-11-10 JP JP2000521477A patent/JP2001523903A/en active Pending
- 1998-11-10 EP EP98965955A patent/EP1036372A1/en not_active Withdrawn
- 1998-11-10 WO PCT/US1998/023802 patent/WO1999026188A1/en not_active Application Discontinuation
- 1998-11-10 KR KR1020007005234A patent/KR20010052103A/en not_active Application Discontinuation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5534855A (en) * | 1992-07-20 | 1996-07-09 | Digital Equipment Corporation | Method and system for certificate based alias detection |
US5497422A (en) * | 1993-09-30 | 1996-03-05 | Apple Computer, Inc. | Message protection mechanism and graphical user interface therefor |
US5541994A (en) * | 1994-09-07 | 1996-07-30 | Mytec Technologies Inc. | Fingerprint controlled public key cryptographic system |
US5613012A (en) * | 1994-11-28 | 1997-03-18 | Smarttouch, Llc. | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
Non-Patent Citations (1)
Title |
---|
STOCKEL A: "SECURING DATA AND FINANCIAL TRANSACTIONS", PROCEEDINGS OF THE 29TH. ANNUAL INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY. SANDERSTEAD, GB, OCT. 18 - 20, 1995., NEW YORK, IEEE., US, vol. CONF. 29, 18 October 1995 (1995-10-18), US, pages 397 - 401, XP002918744, ISBN: 978-0-7803-2628-6 * |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001216270A (en) * | 2000-01-31 | 2001-08-10 | Netmarks Inc | Authentication station, authentication system and authentication method |
US7895432B2 (en) | 2000-03-30 | 2011-02-22 | Digitalpersona, Inc. | Method and apparatus for using a third party authentication server |
US7409543B1 (en) | 2000-03-30 | 2008-08-05 | Digitalpersona, Inc. | Method and apparatus for using a third party authentication server |
US7698565B1 (en) | 2000-03-30 | 2010-04-13 | Digitalpersona, Inc. | Crypto-proxy server and method of using the same |
JP2001306524A (en) * | 2000-04-19 | 2001-11-02 | Nec Corp | System and method for sharing business terminal |
JP2002073568A (en) * | 2000-08-31 | 2002-03-12 | Sony Corp | System and method for personal identification and program supply medium |
JP2002073569A (en) * | 2000-08-31 | 2002-03-12 | Sony Corp | Personal identification system, personal identification method, information processor and program providing medium |
JP2002175279A (en) * | 2000-08-31 | 2002-06-21 | Sony Corp | Personal authentication system, personal authentication method, and information processing device, and program providing medium |
JP4654498B2 (en) * | 2000-08-31 | 2011-03-23 | ソニー株式会社 | Personal authentication system, personal authentication method, information processing apparatus, and program providing medium |
JP2002073566A (en) * | 2000-08-31 | 2002-03-12 | Sony Corp | System and method for processing data applied to personal identification, information processor and program supply medium |
JP4654497B2 (en) * | 2000-08-31 | 2011-03-23 | ソニー株式会社 | Personal authentication system, personal authentication method, information processing apparatus, and program providing medium |
WO2002037403A1 (en) * | 2000-11-01 | 2002-05-10 | Nitgen Co., Ltd. | User authenticating system and method using one-time fingerprint template |
US7035442B2 (en) | 2000-11-01 | 2006-04-25 | Secugen Corporation | User authenticating system and method using one-time fingerprint template |
KR100899471B1 (en) | 2001-02-01 | 2009-05-27 | 쓰리엠 이노베이티브 프로퍼티즈 컴파니 | Method and system for securing a computer network and personal identification device used therein for controlling access to network components |
US7941380B2 (en) | 2001-06-18 | 2011-05-10 | Daon Holdings Limited | Electronic data vault providing biometrically protected electronic signatures |
US7865449B2 (en) | 2001-06-18 | 2011-01-04 | Daon Holdings Limited | Electronic data vault providing biometrically protected electronic signatures |
US7676439B2 (en) | 2001-06-18 | 2010-03-09 | Daon Holdings Limited | Electronic data vault providing biometrically protected electronic signatures |
EP1417555A2 (en) * | 2001-06-18 | 2004-05-12 | Daon Holdings Limited | An electronic data vault providing biometrically protected electronic signatures |
US7181627B2 (en) * | 2002-08-01 | 2007-02-20 | Freescale Semiconductor, Inc. | Biometric system for replacing password or pin terminals |
US8046589B2 (en) | 2004-06-25 | 2011-10-25 | Koninklijke Philips Electronics N.V. | Renewable and private biometrics |
CN102799956A (en) * | 2011-05-23 | 2012-11-28 | 方良卫 | System for applying fingerprint analysis to talent seeking, job hunting, friend making, life planning and career planning |
Also Published As
Publication number | Publication date |
---|---|
KR20010052103A (en) | 2001-06-25 |
EP1036372A1 (en) | 2000-09-20 |
JP2001523903A (en) | 2001-11-27 |
CN1291313A (en) | 2001-04-11 |
AU2196899A (en) | 1999-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200228335A1 (en) | Authentication system for enhancing network security | |
US7698565B1 (en) | Crypto-proxy server and method of using the same | |
US7409543B1 (en) | Method and apparatus for using a third party authentication server | |
US9544297B2 (en) | Method for secured data processing | |
JP4460763B2 (en) | Encryption key generation method using biometric data | |
CA2341784C (en) | Method to deploy a pki transaction in a web browser | |
JP5619019B2 (en) | Method, system, and computer program for authentication (secondary communication channel token-based client-server authentication with a primary authenticated communication channel) | |
JP5470344B2 (en) | User authentication methods and related architectures based on the use of biometric identification technology | |
EP1244263A2 (en) | Access control method | |
EP1866873B1 (en) | Method, system, personal security device and computer program product for cryptographically secured biometric authentication | |
US20020178366A1 (en) | Method for performing on behalf of a registered user an operation on data stored on a publicly accessible data access server | |
US7051209B1 (en) | System and method for creation and use of strong passwords | |
CA2345688A1 (en) | Automatic recovery of forgotten passwords | |
JP2003337923A (en) | Method and system for data update | |
EP1036372A1 (en) | A remotely accessible private space using a fingerprint | |
JPWO2007094165A1 (en) | Identification system and program, and identification method | |
WO2002037403A1 (en) | User authenticating system and method using one-time fingerprint template | |
US20030115154A1 (en) | System and method for facilitating operator authentication | |
US20030076961A1 (en) | Method for issuing a certificate using biometric information in public key infrastructure-based authentication system | |
JPH11212922A (en) | Password management and recovery system | |
JPH05333775A (en) | User authentication system | |
JPH05298174A (en) | Remote file access system | |
JP4253167B2 (en) | Personal information access control method, terminal, system, and program | |
KR102070248B1 (en) | User authentication apparatus supporting secure storage of private key and operating method thereof | |
TWI606363B (en) | Key share system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 98812160.3 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AT AU AZ BA BB BG BR BY CA CH CN CU CZ CZ DE DE DK DK EE EE ES FI FI GB GD GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1998965955 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2000 521477 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020007005234 Country of ref document: KR |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 1998965955 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: CA |
|
WWP | Wipo information: published in national office |
Ref document number: 1020007005234 Country of ref document: KR |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998965955 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1020007005234 Country of ref document: KR |