WO2000002348A2 - Secure web-based mail - Google Patents

Secure web-based mail Download PDF

Info

Publication number
WO2000002348A2
WO2000002348A2 PCT/US1999/015029 US9915029W WO0002348A2 WO 2000002348 A2 WO2000002348 A2 WO 2000002348A2 US 9915029 W US9915029 W US 9915029W WO 0002348 A2 WO0002348 A2 WO 0002348A2
Authority
WO
WIPO (PCT)
Prior art keywords
message
secure
mail
set forth
web
Prior art date
Application number
PCT/US1999/015029
Other languages
French (fr)
Other versions
WO2000002348A3 (en
Inventor
Eugene E. Kashpureff
Charles R. Walden, Jr.
Original Assignee
Mail.Com, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mail.Com, Inc. filed Critical Mail.Com, Inc.
Priority to AU48548/99A priority Critical patent/AU4854899A/en
Publication of WO2000002348A2 publication Critical patent/WO2000002348A2/en
Publication of WO2000002348A3 publication Critical patent/WO2000002348A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/08Annexed information, e.g. attachments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Definitions

  • Figures 1-3 are block diagrams of a secure web-based mail system
  • Figure 4 is a flowchart of the method of acquiring a secure mail channel
  • Figure 5 is a flowchart of the method of authenticating the identity of the sender
  • Figure 6 is a block diagram of a secure mail system with multiple web-based e- mail systems.
  • Users A and B are computers with browsers 10 that interact with a network-based messaging system, such as a web-based electronic mail (or "e-mail") system 100 through a public, on-line electronic communications network, such as the Internet or some other network.
  • the web-based e-mail system 100 may comprise a web server 110, an e-mail client 120 having a web-based user interface 122, a mail transfer agent or MTA 130 (such as an SMTP server), a mail server such as a POP (post office protocol) server 140, and a message storage device 150.
  • Users A and B and the web-based e-mail system 100 typically connect to the Internet through Internet service providers or ISPs 20.
  • the web-based e-mail system 100 invokes a secure protocol, such as secure "http” or "https” (hypertext transport protocol under SSL or secure socket layer; see, e.g., U.S. Patent No. 5,657,390, titled “Secure socket layer application program apparatus and method," incorporated herein by reference), SSH (secure shell), PCT (Microsoft's private communications technology), TLS (transport layer security), or some other protocol that provides a secure connection.
  • a secure protocol such as secure "http” or "https” (hypertext transport protocol under SSL or secure socket layer; see, e.g., U.S. Patent No. 5,657,390, titled “Secure socket layer application program apparatus and method,” incorporated herein by reference
  • SSH secure shell
  • PCT Microsoft's private communications technology
  • TLS transport layer security
  • Protocol-compatible software package device such as a conventional web browser (e.g., Netscape Communicator or Microsoft Internet Explorer); no additional software or hardware is required.
  • the web-based e-mail system 100 in concert with the browser, creates an encrypted channel or link between the user's browser and the web server 110 using the routine determined by the protocol.
  • SSL Secure Sockets Layer
  • a secure connection may be created at any one of the following points: (1 ) prior to or immediately upon log-in to the e-mail service, either automatically or at the user's request; (2) when an e-mail message is composed, again either automatically or at the user's request; or (3) automatically based upon a user or subscriber profile.
  • the point at which the secure connection is created may be chosen to suit the application and is a matter of design choice; the secure connection could be created at times and in ways other than those mentioned, as well, if desired.
  • a user connects to the Internet and logs onto the web-based e-mail service, resident in the web-based e-mail system 100.
  • the user can enter a password when requested to do so, and the server can verify the identity of the user, based on previously-stored information. The user can then select from options including reading and sending mail. Additionally, if the user's profile so provides, a secure connection is automatically established using https or some other protocol, or, if the system is so configured, the user may request a secure connection if one does not exist.
  • the user desires to create and send a message in a secure fashion, the user first requests a secure connection and, if one does not already exist, the system invokes the appropriate protocol. Then, the user composes the message and the message is sent.
  • a configuration that will accomplish the foregoing is illustrated in Figure 2, showing a secure link 30 between the browser of user A and the web-based e-mail system 100. A method for achieving this is outlined in the left-hand column of the flowchart of Figure 4.
  • the message may contain text, data, graphics, audio, and/or video.
  • user A functions as a virtual remote terminal communicating with the web-based e-mail system 100 via the Internet under the secure protocol.
  • the recipient or recipients of the message connect to the Internet and then log onto the web-based e-mail system 100. Again, the identity of the recipient may be confirmed by a password or some other device. If mail generated under the secure protocol is present for the recipient(s), a secure link 30 between the recipient(s) and the web-based e-mail system 100 is established or confirmed, as shown in Figure 3 (an additional secure link to a second recipient, user C, shown dashed), and the mail is retrieved.
  • the recipients are functioning as virtual remote terminals ofthe web-based e-mail system 100. A method for accomplishing the retrieval is illustrated in the right-hand column of the flowchart of Figure 4.
  • the system can be configured to confirm that the message was sent and retrieved under secure conditions as well as authenticate the sender's identity. If the sender is a user of the web-based e-mail service, the sender's e-mail address or other identification information (and, therefore, the sender's identity) is authenticated by the password or some other method of authentication used to enter the e-mail service. If a secure and/or authenticated connection is used when the message is originally sent, the web-based e-mail system 100 can add a secure-transmission/authentication device to the message, such as a tag placed in the message header, upon its arrival at the e-mail system 100.
  • a secure-transmission/authentication device such as a tag placed in the message header
  • the web-based e-mail system 100 could indicate to the recipient that the message was received under secure conditions and could also authenticate the identity ore-mail address ofthe sender.
  • the secure-transmission/authentication device (such as a tag) can be stripped from the message when the message leaves the web-based e-mail system 100.
  • a method for confirming the identity of the sender is illustrated in the flowchart of Figure 5. This method can be combined with the method of Figure 4 to provide secure messaging and authentication. It should be understood that these methods may be used independently and that the indicators of secure transmission status and authentication status may be combined or kept separate.
  • a person masquerading as an authorized user through the use of forged e-mail headers will lack the appropriate authenticating information, and messages originating from the "masquerader" and received over the Internet can be marked as not authenticated or, in the alternative, blocked.
  • the web-based e-mail system 100 could utilize a look-up table or database, cross-referencing each message with its secure (or non-secure) and/or authenticated (or not authenticated) status. Whenever a message is sent or retrieved, the table or database would be consulted regarding the status and proper handling of the message, and updated if necessary.
  • the system of Figure 1 can be expanded to incorporate multiple, third-party web-based e-mail systems 200, each with its own users (x and y), as shown in Figure 6.
  • the web-based e-mail system 100 is connected to a third-party web-based e-mail system 200 by a secure link, such as a leased or dial-up telephone line or fiber optic cable 210, encrypted if necessary, or an encrypted channel 220 over the Internet. Since each of the systems 200 implement similar policies of secure connection and user authentication, the benefits of secure transmission and authentication provided by a single system 200 is expanded across multiple systems.
  • a secure link such as a leased or dial-up telephone line or fiber optic cable 210, encrypted if necessary, or an encrypted channel 220 over the Internet.
  • third-party web-based e-mail systems 200 are interconnected with the primary web-based e-mail system 100, the third-party system 200 could confirm the- secure status of a message by the presence of an secure-transmission device and receipt of the message via a secure link.
  • the secure status of a message could be determined by use of a shared look-up table or database.

Abstract

Electronic mail ('e-mail') messages and attachments can be sent securely via the Internet by using a web-based e-mail system under a secure protocol. The sender logs onto the web-based e-mail system under the secure protocol and sends or composes the message for the recipient. The recipient then logs onto the system and retrieves or reads the message over a secure link. Confirmation of secure transmission over the Internet and authentication of the sender's identity or e-mail address can be provided by recording secure-transmission status and authentication within the system.

Description

SECURE WEB-BASED MAIL AND AUTHENTICATION SYSTEM
Technical Field and Background Art This application claims the benefit of U.S. Provisional Application no. 60/091 ,484, filed July 2, 1998.
It is a well known fact that the Internet is not secure. Send information via the Internet, and you run the risk of having others intercept it. To prevent this, encryption systems have been devised to shield the information from all but the sender and the intended recipients. Although such measures accomplish the desired goal, they require the installation of special software on both the sender's and recipient's computers. Further, the complexity of the software occasionally prevents the completion of a secure channel. Additionally, mail headers in messages can be forged, permitting unauthorized assumption of others' identities. When such messages are received, the recipient has no readily-available means of determining the authenticity of the purported identities.
Brief Description of Drawings Figures 1-3 are block diagrams of a secure web-based mail system;
Figure 4 is a flowchart of the method of acquiring a secure mail channel; Figure 5 is a flowchart of the method of authenticating the identity of the sender; and
Figure 6 is a block diagram of a secure mail system with multiple web-based e- mail systems.
Modes for Carrying Out the Invention
By creating a secure connection between an Internet user and a web-based electronic mail provider, mail and any attachments or other data can be sent by the originator securely without the need for additional software, such as an encryption package (e.g., PGP) or a specialized electronic mail software package (e.g., Eudora). The recipient retrieves the mail through a secure connection to the same electronic mail provider, insuring that the mail remains confidential. Additionally, messages sent through the web-based electronic mail provider can be authenticated by virtue of a secure log-in process. A system for secure mail transmission is illustrated in the block diagram of
Figure 1. Users A and B are computers with browsers 10 that interact with a network-based messaging system, such as a web-based electronic mail (or "e-mail") system 100 through a public, on-line electronic communications network, such as the Internet or some other network. The web-based e-mail system 100 may comprise a web server 110, an e-mail client 120 having a web-based user interface 122, a mail transfer agent or MTA 130 (such as an SMTP server), a mail server such as a POP (post office protocol) server 140, and a message storage device 150. Users A and B and the web-based e-mail system 100 typically connect to the Internet through Internet service providers or ISPs 20. To obtain a secure communications link, the web-based e-mail system 100 invokes a secure protocol, such as secure "http" or "https" (hypertext transport protocol under SSL or secure socket layer; see, e.g., U.S. Patent No. 5,657,390, titled "Secure socket layer application program apparatus and method," incorporated herein by reference), SSH (secure shell), PCT (Microsoft's private communications technology), TLS (transport layer security), or some other protocol that provides a secure connection.
Software for the desired protocol could reside in the web server 110. The user requires only a protocol-compatible software package device such as a conventional web browser (e.g., Netscape Communicator or Microsoft Internet Explorer); no additional software or hardware is required. The web-based e-mail system 100, in concert with the browser, creates an encrypted channel or link between the user's browser and the web server 110 using the routine determined by the protocol. In the case of SSL, a secure session is started by changing the protocol from "http" to "https."
A secure connection may be created at any one of the following points: (1 ) prior to or immediately upon log-in to the e-mail service, either automatically or at the user's request; (2) when an e-mail message is composed, again either automatically or at the user's request; or (3) automatically based upon a user or subscriber profile. The point at which the secure connection is created may be chosen to suit the application and is a matter of design choice; the secure connection could be created at times and in ways other than those mentioned, as well, if desired. Initially, a user connects to the Internet and logs onto the web-based e-mail service, resident in the web-based e-mail system 100. Optionally, the user can enter a password when requested to do so, and the server can verify the identity of the user, based on previously-stored information. The user can then select from options including reading and sending mail. Additionally, if the user's profile so provides, a secure connection is automatically established using https or some other protocol, or, if the system is so configured, the user may request a secure connection if one does not exist.
If the user desires to create and send a message in a secure fashion, the user first requests a secure connection and, if one does not already exist, the system invokes the appropriate protocol. Then, the user composes the message and the message is sent. A configuration that will accomplish the foregoing is illustrated in Figure 2, showing a secure link 30 between the browser of user A and the web-based e-mail system 100. A method for achieving this is outlined in the left-hand column of the flowchart of Figure 4. The message may contain text, data, graphics, audio, and/or video. By virtue of the secure link 30, user A functions as a virtual remote terminal communicating with the web-based e-mail system 100 via the Internet under the secure protocol.
The recipient or recipients of the message (user B, user C, etc.) connect to the Internet and then log onto the web-based e-mail system 100. Again, the identity of the recipient may be confirmed by a password or some other device. If mail generated under the secure protocol is present for the recipient(s), a secure link 30 between the recipient(s) and the web-based e-mail system 100 is established or confirmed, as shown in Figure 3 (an additional secure link to a second recipient, user C, shown dashed), and the mail is retrieved. Here, the recipients are functioning as virtual remote terminals ofthe web-based e-mail system 100. A method for accomplishing the retrieval is illustrated in the right-hand column of the flowchart of Figure 4. The system can be configured to confirm that the message was sent and retrieved under secure conditions as well as authenticate the sender's identity. If the sender is a user of the web-based e-mail service, the sender's e-mail address or other identification information (and, therefore, the sender's identity) is authenticated by the password or some other method of authentication used to enter the e-mail service. If a secure and/or authenticated connection is used when the message is originally sent, the web-based e-mail system 100 can add a secure-transmission/authentication device to the message, such as a tag placed in the message header, upon its arrival at the e-mail system 100. When the recipient logs onto the system and the message is retrieved, the web-based e-mail system 100 could indicate to the recipient that the message was received under secure conditions and could also authenticate the identity ore-mail address ofthe sender. The secure-transmission/authentication device (such as a tag) can be stripped from the message when the message leaves the web-based e-mail system 100. A method for confirming the identity of the sender is illustrated in the flowchart of Figure 5. This method can be combined with the method of Figure 4 to provide secure messaging and authentication. It should be understood that these methods may be used independently and that the indicators of secure transmission status and authentication status may be combined or kept separate. A person masquerading as an authorized user through the use of forged e-mail headers will lack the appropriate authenticating information, and messages originating from the "masquerader" and received over the Internet can be marked as not authenticated or, in the alternative, blocked.
In lieu of a secure-transmission/authentication device or tag, the web-based e-mail system 100 could utilize a look-up table or database, cross-referencing each message with its secure (or non-secure) and/or authenticated (or not authenticated) status. Whenever a message is sent or retrieved, the table or database would be consulted regarding the status and proper handling of the message, and updated if necessary. The system of Figure 1 can be expanded to incorporate multiple, third-party web-based e-mail systems 200, each with its own users (x and y), as shown in Figure 6. There, the web-based e-mail system 100 is connected to a third-party web-based e-mail system 200 by a secure link, such as a leased or dial-up telephone line or fiber optic cable 210, encrypted if necessary, or an encrypted channel 220 over the Internet. Since each of the systems 200 implement similar policies of secure connection and user authentication, the benefits of secure transmission and authentication provided by a single system 200 is expanded across multiple systems.
Where third-party web-based e-mail systems 200 are interconnected with the primary web-based e-mail system 100, the third-party system 200 could confirm the- secure status of a message by the presence of an secure-transmission device and receipt of the message via a secure link. Alternatively, the secure status of a message could be determined by use of a shared look-up table or database.
By interconnecting two or more web-based e-mail systems through secure links, an expanded universe of security is created. Messages can then pass between the systems and its users in secure fashion, with indicia of secure status (e.g., a security device or tag).

Claims

What is claimed is:
1. A system for communicating over a public on-line electronic communications network, comprising: at least one user, each user comprising means for sending and retrieving messages over the network; a network-based messaging system; and means for selectively establishing a secure connection between the messaging system and a user.
2. A system as set forth in claim 1 , where the network is the Internet and the network-based messaging system is a web-based electronic mail system.
3. A system as set forth in claim 2, where the web-based electronic mail system comprises a web server and an e-mail client with a web-based user interface, and the user comprises a web browser.
4. A system as set forth in claim 2, where the web-based electronic mail system comprises a web server, an e-mail client with a web-based user interface, a mail transfer agent, and a mail server.
5. A system as set forth in claim 1 , where the means for selectively establishing a secure connection comprises means for establishing a secure hypertext transfer protocol connection.
6. A system as set forth in claim 1 , further comprising means for retrieving the message from the network-based messaging system over the public on-line electronic communications network via a secure connection.
7. A system as set forth in claim 1 , further comprising means for providing an indication of secure-transmission of the message.
8. A system as set forth in claim 1 , further comprising means for providing an indication of authentication of the identity of the user.
9. A system as set forth in claim 1 , further comprising at least one third-party network-based messaging system and means for establishing a secure connection between the network-based messaging systems.
10. A system for securely sending an e-mail message over the Internet, comprising: means for sending a message via a secure connection over the Internet using a web-based e-mail system; and means for retrieving the message via a secure connection from the e-mail system over the Internet.
11. A system for authenticating the sender of a message to a network-based messaging system over a public on-line electronic communications network, comprising: means for requesting user-identification and a password from the sender; means for logging in the sender to the network-based messaging system; means for generating an authentication device based on the identity of the sender; and means for associating the authentication device with the message.
12. A system as set forth in claim 21 , further comprising means for establishing a secure connection between the messaging system and the sender.
13. A method of transmitting secure messages, comprising the step of sending a message to a network-based messaging system over a public on-line electronic communications network via a secure connection.
14. A method as set forth in claim 10, where step of sending comprises the step of creating a secure connection.
15. A method as set forth in claim 11 , where step of creating a secure connection comprises the step of invoking a secure protocol.
16. A method as set forth in claim 10, further comprising the step of providing an indication of secure-transmission of the message.
17. A method as set forth in claim 10, further comprising the step of providing an indication of authentication of the identity of the user.
18. A method as set forth in claim 10, further comprising the step of retrieving the message from the network-based messaging system over the public on-line electronic communications network via a secure connection.
19. A method as set forth in claim 14, where step of retrieving comprises the step of creating a secure connection.
20. A method as set forth in claim 15, where step of creating a secure connection comprises the step of invoking a secure protocol.
21. A method of retrieving secure messages, comprising the step of retrieving a message from a network-based messaging system over a public on-line electronic communications network via a secure connection.
22. A method of securely sending an e-mail message over the Internet, comprising the steps of: sending a message over the Internet via a secure connection using a web-based e-mail system; and retrieving the message from the web-based e-mail system over the Internet via a secure connection.
23. A method of authenticating the sender of a message to a network-based messaging system over a public on-line electronic communications network, comprising the steps of: requesting user-identification and a password from the sender; logging in the sender to the network-based messaging system; generating an authentication device based on the identity of the sender; and associating the authentication device with the message.
24. A method as set forth in claim 19, further comprising the step of establishing a secure connection between the messaging system and the sender.
PCT/US1999/015029 1998-07-02 1999-07-01 Secure web-based mail WO2000002348A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU48548/99A AU4854899A (en) 1998-07-02 1999-07-01 Secure web-based mail and authentication system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US9148498P 1998-07-02 1998-07-02
US60/091,484 1998-07-02

Publications (2)

Publication Number Publication Date
WO2000002348A2 true WO2000002348A2 (en) 2000-01-13
WO2000002348A3 WO2000002348A3 (en) 2000-05-04

Family

ID=22228025

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/015029 WO2000002348A2 (en) 1998-07-02 1999-07-01 Secure web-based mail

Country Status (2)

Country Link
AU (1) AU4854899A (en)
WO (1) WO2000002348A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001054377A2 (en) * 2000-01-19 2001-07-26 Fmr Corporation Network server
WO2002037756A2 (en) * 2000-10-23 2002-05-10 Arch Wireless Holdings, Inc. Method and device for wireless network access_

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998017042A2 (en) * 1996-10-15 1998-04-23 Mordhai Barkan Electronic mail method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998017042A2 (en) * 1996-10-15 1998-04-23 Mordhai Barkan Electronic mail method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
KOLLETZKI S: "Secure Internet banking with Privacy Enhanced Mail -- A protocol for reliable exchange of secured order forms" COMPUTER NETWORKS AND ISDN SYSTEMS,NL,NORTH HOLLAND PUBLISHING. AMSTERDAM, vol. 28, no. 14, 1 November 1996 (1996-11-01), pages 1891-1899, XP004014500 ISSN: 0169-7552 *
STALLINGS W: "S/MIME: E-MAIL GETS SECURE" BYTE,US,MCGRAW-HILL INC. ST PETERBOROUGH, vol. 23, no. 7, 1 July 1998 (1998-07-01), pages 41-42, XP000774260 ISSN: 0360-5280 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001054377A2 (en) * 2000-01-19 2001-07-26 Fmr Corporation Network server
WO2001054377A3 (en) * 2000-01-19 2002-02-14 Fmr Corp Network server
US6714982B1 (en) 2000-01-19 2004-03-30 Fmr Corp. Message passing over secure connections using a network server
WO2002037756A2 (en) * 2000-10-23 2002-05-10 Arch Wireless Holdings, Inc. Method and device for wireless network access_
WO2002037756A3 (en) * 2000-10-23 2003-01-16 Arch Wireless Holdings Inc Method and device for wireless network access_

Also Published As

Publication number Publication date
WO2000002348A3 (en) 2000-05-04
AU4854899A (en) 2000-01-24

Similar Documents

Publication Publication Date Title
US10313135B2 (en) Secure instant messaging system
EP1247187B1 (en) Secure gateway having routing feature
US8266421B2 (en) Private electronic information exchange
US6324648B1 (en) Secure gateway having user identification and password authentication
US7360079B2 (en) System and method for processing digital documents utilizing secure communications over a network
US9917828B2 (en) Secure message delivery using a trust broker
US20030115448A1 (en) Methods and apparatus for securely communicating a message
JP2006520112A (en) Security key server, implementation of processes with non-repudiation and auditing
EP1151573A1 (en) Secure messaging system and method
EP1387239B1 (en) Secure messaging
WO2000002348A2 (en) Secure web-based mail
CA2390817A1 (en) Method for the moderately secure transmission of electronic mail
AU2005236499B2 (en) Electronic message authentication process
WO2005104422A1 (en) Electronic message authentication process
Mäntysaari Extensible Messaging and Presence Protocol (XMPP)
WO2010016845A1 (en) Private electronic information exchange
WO2002071719A1 (en) A method and system for encrypting digital messages

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase