WO2003088018A3 - System and techniques to bind information objects to security labels - Google Patents
System and techniques to bind information objects to security labels Download PDFInfo
- Publication number
- WO2003088018A3 WO2003088018A3 PCT/US2003/010751 US0310751W WO03088018A3 WO 2003088018 A3 WO2003088018 A3 WO 2003088018A3 US 0310751 W US0310751 W US 0310751W WO 03088018 A3 WO03088018 A3 WO 03088018A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security
- user
- data object
- techniques
- information objects
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Abstract
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP03718263A EP1495389A2 (en) | 2002-04-12 | 2003-04-09 | System and techniques to bind information objects to security labels |
AU2003221685A AU2003221685A1 (en) | 2002-04-12 | 2003-04-09 | System and techniques to bind information objects to security labels |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US37248902P | 2002-04-12 | 2002-04-12 | |
US60/372,489 | 2002-04-12 | ||
US10/404,703 US20030196108A1 (en) | 2002-04-12 | 2003-04-01 | System and techniques to bind information objects to security labels |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2003088018A2 WO2003088018A2 (en) | 2003-10-23 |
WO2003088018A3 true WO2003088018A3 (en) | 2004-04-01 |
Family
ID=28794482
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2003/010751 WO2003088018A2 (en) | 2002-04-12 | 2003-04-09 | System and techniques to bind information objects to security labels |
Country Status (4)
Country | Link |
---|---|
US (1) | US20030196108A1 (en) |
EP (1) | EP1495389A2 (en) |
AU (1) | AU2003221685A1 (en) |
WO (1) | WO2003088018A2 (en) |
Families Citing this family (88)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8677505B2 (en) * | 2000-11-13 | 2014-03-18 | Digital Doors, Inc. | Security system with extraction, reconstruction and secure recovery and storage of data |
US7103914B2 (en) * | 2002-06-17 | 2006-09-05 | Bae Systems Information Technology Llc | Trusted computer system |
US7360095B2 (en) * | 2003-05-22 | 2008-04-15 | International Business Machines Corporation | Method and apparatus for a proximity warning system |
US7367889B2 (en) * | 2003-06-09 | 2008-05-06 | Wms Gaming Inc. | Gaming machine having hardware-accelerated software authentication |
US7653936B2 (en) * | 2003-06-25 | 2010-01-26 | Microsoft Corporation | Distributed expression-based access control |
US20050015592A1 (en) * | 2003-07-15 | 2005-01-20 | Jeou-Kai Lin | System and method for application and user-based class of security |
US7380209B2 (en) * | 2003-09-02 | 2008-05-27 | International Business Machines Corporation | Managing electronic documents utilizing a digital seal |
US7530112B2 (en) | 2003-09-10 | 2009-05-05 | Cisco Technology, Inc. | Method and apparatus for providing network security using role-based access control |
US7451483B2 (en) * | 2003-10-09 | 2008-11-11 | International Business Machines Corporation | VLAN router with firewall supporting multiple security layers |
US7836490B2 (en) * | 2003-10-29 | 2010-11-16 | Cisco Technology, Inc. | Method and apparatus for providing network security using security labeling |
US7966493B2 (en) * | 2003-11-18 | 2011-06-21 | Oracle International Corporation | Method of and system for determining if an electronic signature is necessary in order to commit a transaction to a database |
US20050108211A1 (en) * | 2003-11-18 | 2005-05-19 | Oracle International Corporation, A California Corporation | Method of and system for creating queries that operate on unstructured data stored in a database |
US7600124B2 (en) * | 2003-11-18 | 2009-10-06 | Oracle International Corporation | Method of and system for associating an electronic signature with an electronic record |
US7650512B2 (en) * | 2003-11-18 | 2010-01-19 | Oracle International Corporation | Method of and system for searching unstructured data stored in a database |
US8782020B2 (en) * | 2003-11-18 | 2014-07-15 | Oracle International Corporation | Method of and system for committing a transaction to database |
US7694143B2 (en) * | 2003-11-18 | 2010-04-06 | Oracle International Corporation | Method of and system for collecting an electronic signature for an electronic record stored in a database |
US7302708B2 (en) * | 2004-03-11 | 2007-11-27 | Harris Corporation | Enforcing computer security utilizing an adaptive lattice mechanism |
US7657925B2 (en) * | 2004-10-14 | 2010-02-02 | Oracle International Corporation | Method and system for managing security policies for databases in a distributed system |
US7877796B2 (en) | 2004-11-16 | 2011-01-25 | Cisco Technology, Inc. | Method and apparatus for best effort propagation of security group information |
US7721323B2 (en) | 2004-11-23 | 2010-05-18 | Cisco Technology, Inc. | Method and system for including network security information in a frame |
US8561126B2 (en) * | 2004-12-29 | 2013-10-15 | International Business Machines Corporation | Automatic enforcement of obligations according to a data-handling policy |
US7987494B1 (en) * | 2005-12-19 | 2011-07-26 | Adobe Systems Incorporated | Method and apparatus providing end to end protection for a document |
US8375020B1 (en) * | 2005-12-20 | 2013-02-12 | Emc Corporation | Methods and apparatus for classifying objects |
CN100556042C (en) * | 2006-03-10 | 2009-10-28 | 腾讯科技(深圳)有限公司 | A kind of accounts security management system and method based on instant messaging |
US8171557B2 (en) * | 2006-05-17 | 2012-05-01 | Galois, Inc. | Document accessing through multiple security domains |
US8166559B2 (en) * | 2006-05-17 | 2012-04-24 | Galois, Inc. | Document accessing through multiple security domains including multi-tear wiki webpage and/or using cross domain trusted service |
US20080016547A1 (en) * | 2006-07-11 | 2008-01-17 | International Business Machines Corporation | System and method for security planning with hard security constraints |
US10394849B2 (en) | 2006-09-18 | 2019-08-27 | EMC IP Holding Company LLC | Cascaded discovery of information environment |
US8612570B1 (en) | 2006-09-18 | 2013-12-17 | Emc Corporation | Data classification and management using tap network architecture |
US8250360B2 (en) * | 2006-11-29 | 2012-08-21 | The Boeing Company | Content based routing with high assurance MLS |
EP1933522B1 (en) * | 2006-12-11 | 2013-10-23 | Sap Ag | Method and system for authentication |
US8132259B2 (en) * | 2007-01-04 | 2012-03-06 | International Business Machines Corporation | System and method for security planning with soft security constraints |
US8195939B2 (en) * | 2007-01-12 | 2012-06-05 | Sap Ag | Systems and methods for protecting sensitive data |
US8930331B2 (en) * | 2007-02-21 | 2015-01-06 | Palantir Technologies | Providing unique views of data based on changes or rules |
NO326590B1 (en) * | 2007-04-16 | 2009-01-19 | Kubekit As | Procedure and device for verification of information access in ICT systems with multiple security dimensions and security levels. |
AU2008253593A1 (en) * | 2007-05-18 | 2008-11-27 | Secure Keys Pty Limited | A security token and system and method for generating and decoding the security token |
US8024788B2 (en) * | 2007-05-31 | 2011-09-20 | The Boeing Company | Method and apparatus for reliable, high speed data transfers in a high assurance multiple level secure environment |
US7840708B2 (en) * | 2007-08-13 | 2010-11-23 | Cisco Technology, Inc. | Method and system for the assignment of security group information using a proxy |
US9461890B1 (en) | 2007-09-28 | 2016-10-04 | Emc Corporation | Delegation of data management policy in an information management system |
US8548964B1 (en) | 2007-09-28 | 2013-10-01 | Emc Corporation | Delegation of data classification using common language |
US8868720B1 (en) | 2007-09-28 | 2014-10-21 | Emc Corporation | Delegation of discovery functions in information management system |
US9141658B1 (en) * | 2007-09-28 | 2015-09-22 | Emc Corporation | Data classification and management for risk mitigation |
US9323901B1 (en) | 2007-09-28 | 2016-04-26 | Emc Corporation | Data classification for digital rights management |
US8522248B1 (en) | 2007-09-28 | 2013-08-27 | Emc Corporation | Monitoring delegated operations in information management systems |
US20110087670A1 (en) * | 2008-08-05 | 2011-04-14 | Gregory Jorstad | Systems and methods for concept mapping |
US9348499B2 (en) | 2008-09-15 | 2016-05-24 | Palantir Technologies, Inc. | Sharing objects that rely on local resources with outside servers |
WO2010040125A1 (en) * | 2008-10-03 | 2010-04-08 | Beliefnetworks, Inc. | Systems and methods for automatic creation of agent-based systems |
US8468344B2 (en) * | 2009-05-26 | 2013-06-18 | Raytheon Company | Enabling multi-level security in a single-level security computing system |
US8745385B2 (en) * | 2009-06-24 | 2014-06-03 | Raytheon Company | System and method for protecting data with multiple independent levels of security |
US8572760B2 (en) * | 2010-08-10 | 2013-10-29 | Benefitfocus.Com, Inc. | Systems and methods for secure agent information |
US8510335B2 (en) * | 2011-02-14 | 2013-08-13 | Protegrity Corporation | Database and method for controlling access to a database |
US8935705B2 (en) | 2011-05-13 | 2015-01-13 | Benefitfocus.Com, Inc. | Execution of highly concurrent processing tasks based on the updated dependency data structure at run-time |
US8799240B2 (en) | 2011-06-23 | 2014-08-05 | Palantir Technologies, Inc. | System and method for investigating large amounts of data |
US8627097B2 (en) | 2012-03-27 | 2014-01-07 | Igt | System and method enabling parallel processing of hash functions using authentication checkpoint hashes |
US9270667B2 (en) * | 2012-11-01 | 2016-02-23 | Microsoft Technology Licensing, Llc | Utilizing X.509 authentication for single sign-on between disparate servers |
US9047472B2 (en) * | 2013-01-14 | 2015-06-02 | International Business Machines Corporation | Managing sensitive content |
US8990205B2 (en) * | 2013-01-28 | 2015-03-24 | International Business Machines Corporation | Data caveats for database tables |
US9355279B1 (en) | 2013-03-29 | 2016-05-31 | Secturion Systems, Inc. | Multi-tenancy architecture |
US9374344B1 (en) | 2013-03-29 | 2016-06-21 | Secturion Systems, Inc. | Secure end-to-end communication system |
US9317718B1 (en) | 2013-03-29 | 2016-04-19 | Secturion Systems, Inc. | Security device with programmable systolic-matrix cryptographic module and programmable input/output interface |
US9798899B1 (en) | 2013-03-29 | 2017-10-24 | Secturion Systems, Inc. | Replaceable or removable physical interface input/output module |
US9524399B1 (en) * | 2013-04-01 | 2016-12-20 | Secturion Systems, Inc. | Multi-level independent security architecture |
US10152607B2 (en) * | 2013-06-07 | 2018-12-11 | A9.Com Inc. | Secure access to hierarchical documents in a sorted, distributed key/value data store |
US9245150B2 (en) * | 2014-05-06 | 2016-01-26 | The Boeing Company | Semantically determining a security classification of data |
US9536073B2 (en) * | 2014-07-24 | 2017-01-03 | Google Technology Holdings LLC | Device-based application security |
US11283774B2 (en) | 2015-09-17 | 2022-03-22 | Secturion Systems, Inc. | Cloud storage using encryption gateway with certificate authority identification |
US9794064B2 (en) | 2015-09-17 | 2017-10-17 | Secturion Systems, Inc. | Client(s) to cloud or remote server secure data or file object encryption gateway |
US10708236B2 (en) | 2015-10-26 | 2020-07-07 | Secturion Systems, Inc. | Multi-independent level secure (MILS) storage encryption |
US9967288B2 (en) | 2015-11-05 | 2018-05-08 | International Business Machines Corporation | Providing a common security policy for a heterogeneous computer architecture environment |
US10594730B1 (en) * | 2015-12-08 | 2020-03-17 | Amazon Technologies, Inc. | Policy tag management |
US11386041B1 (en) | 2015-12-08 | 2022-07-12 | Amazon Technologies, Inc. | Policy tag management for data migration |
US10235176B2 (en) | 2015-12-17 | 2019-03-19 | The Charles Stark Draper Laboratory, Inc. | Techniques for metadata processing |
US9542446B1 (en) | 2015-12-17 | 2017-01-10 | Palantir Technologies, Inc. | Automatic generation of composite datasets based on hierarchical fields |
US10936713B2 (en) * | 2015-12-17 | 2021-03-02 | The Charles Stark Draper Laboratory, Inc. | Techniques for metadata processing |
US10536277B1 (en) * | 2015-12-22 | 2020-01-14 | Amazon Technologies, Inc. | Contribution signatures for tagging |
US10621198B1 (en) * | 2015-12-30 | 2020-04-14 | Palantir Technologies Inc. | System and method for secure database replication |
DE102017205552A1 (en) * | 2017-03-31 | 2018-10-04 | Siemens Aktiengesellschaft | A method of controlling access of an electronic device to a system and security device |
US10534548B2 (en) * | 2017-06-20 | 2020-01-14 | International Business Machines Corporation | Validating restricted operations on a client using trusted environments |
WO2019152772A1 (en) | 2018-02-02 | 2019-08-08 | The Charles Stark Draper Laboratory, Inc. | Systems and methods for policy execution processing |
WO2019152792A1 (en) | 2018-02-02 | 2019-08-08 | Dover Microsystems, Inc. | Systems and methods for policy linking and/or loading for secure initialization |
WO2019153127A1 (en) | 2018-02-06 | 2019-08-15 | Nokia Shanghai Bell Co., Ltd. | Method, apparatus, and computer readable medium for providing security service for data center |
WO2019213061A1 (en) | 2018-04-30 | 2019-11-07 | Dover Microsystems, Inc. | Systems and methods for checking safety properties |
TW202022679A (en) | 2018-11-06 | 2020-06-16 | 美商多佛微系統公司 | Systems and methods for stalling host processor |
WO2020132012A1 (en) | 2018-12-18 | 2020-06-25 | Dover Microsystems, Inc. | Systems and methods for data lifecycle protection |
JP7354620B2 (en) * | 2019-06-28 | 2023-10-03 | 株式会社リコー | Service system, information registration method |
US11218491B2 (en) * | 2019-12-12 | 2022-01-04 | At&T Intellectual Property I, L.P. | Security de-escalation for data access |
US11693948B2 (en) * | 2020-08-04 | 2023-07-04 | International Business Machines Corporation | Verifiable labels for mandatory access control |
US11783073B2 (en) * | 2021-06-21 | 2023-10-10 | Microsoft Technology Licensing, Llc | Configuration of default sensitivity labels for network file storage locations |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5577209A (en) * | 1991-07-11 | 1996-11-19 | Itt Corporation | Apparatus and method for providing multi-level security for communication among computers and terminals on a network |
US5276901A (en) * | 1991-12-16 | 1994-01-04 | International Business Machines Corporation | System for controlling group access to objects using group access control folder and group identification as individual user |
US5828832A (en) * | 1996-07-30 | 1998-10-27 | Itt Industries, Inc. | Mixed enclave operation in a computer network with multi-level network security |
US6408336B1 (en) * | 1997-03-10 | 2002-06-18 | David S. Schneider | Distributed administration of access to information |
US5996077A (en) * | 1997-06-16 | 1999-11-30 | Cylink Corporation | Access control system and method using hierarchical arrangement of security devices |
US6324645B1 (en) * | 1998-08-11 | 2001-11-27 | Verisign, Inc. | Risk management for public key management infrastructure using digital certificates |
US20020053020A1 (en) * | 2000-06-30 | 2002-05-02 | Raytheon Company | Secure compartmented mode knowledge management portal |
US6920558B2 (en) * | 2001-03-20 | 2005-07-19 | Networks Associates Technology, Inc. | Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system |
US7216173B2 (en) * | 2001-06-12 | 2007-05-08 | Varian Medical Systems Technologies, Inc. | Virtual private network software system |
US6807636B2 (en) * | 2002-02-13 | 2004-10-19 | Hitachi Computer Products (America), Inc. | Methods and apparatus for facilitating security in a network |
-
2003
- 2003-04-01 US US10/404,703 patent/US20030196108A1/en not_active Abandoned
- 2003-04-09 AU AU2003221685A patent/AU2003221685A1/en not_active Abandoned
- 2003-04-09 WO PCT/US2003/010751 patent/WO2003088018A2/en not_active Application Discontinuation
- 2003-04-09 EP EP03718263A patent/EP1495389A2/en not_active Ceased
Non-Patent Citations (6)
Title |
---|
BRANSTAD M ET AL: "The role of trust in protected mail", PROCEEDINGS OF THE SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY. OAKLAND, MAY 7 - 9, 1990, LOS ALAMITOS, IEEE COMP. SOC. PRESS, US, vol. SYMP. 11, 7 May 1990 (1990-05-07), pages 210 - 215, XP010020200, ISBN: 0-8186-2060-9 * |
GASSER M ET AL: "An architecture for practical delegation in a distributed system", PROCEEDINGS OF THE SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY. OAKLAND, MAY 7 - 9, 1990, LOS ALAMITOS, IEEE COMP. SOC. PRESS, US, vol. SYMP. 11, 7 May 1990 (1990-05-07), pages 20 - 30, XP010020183, ISBN: 0-8186-2060-9 * |
RUSSELL D., GANGEMI G.: "Computer Security Basics", O'REILLY & ASSOCIATES, INC, 1991, XP002261456 * |
SAMESHIMA Y ET AL: "Authorization with security attributes and privilege delegation - Access control beyond the ACL", COMPUTER COMMUNICATIONS, ELSEVIER SCIENCE PUBLISHERS BV, AMSTERDAM, NL, vol. 20, no. 5, 1 July 1997 (1997-07-01), pages 376 - 384, XP004126692, ISSN: 0140-3664 * |
SIUDA K: "Security services in telecommunications networks", DIGITAL COMMUNICATIONS, 1988. MAPPING NEW APPLICATIONS ONTO NEW TECHNOLOGIES, 1988 INTERNATIONAL ZURICH SEMINAR ON ZURICH, SWITZERLAND 8-10 MARCH 1988, ZURICH, SWITZERLAND,IEEE, 8 March 1988 (1988-03-08), pages 45 - 52, XP010000006, ISBN: 3-908265-01-0 * |
YESBERG J D ET AL: "QuARC: expressive security mechanisms", NEW SECURITY PARADIGMS WORKSHOP, 1995. PROCEEDINGS LA JOLLA, CA, USA 22-25 AUG. 1995, LOS ALAMITOS, CA, USA,IEEE COMPUT. SOC, US, 22 August 1995 (1995-08-22), pages 34 - 40, XP010158974, ISBN: 0-8186-7318-4 * |
Also Published As
Publication number | Publication date |
---|---|
WO2003088018A2 (en) | 2003-10-23 |
US20030196108A1 (en) | 2003-10-16 |
EP1495389A2 (en) | 2005-01-12 |
AU2003221685A1 (en) | 2003-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2003088018A3 (en) | System and techniques to bind information objects to security labels | |
WO2004086171A3 (en) | Methods and apparatus for facilitating a transaction | |
WO2001069455A3 (en) | A system and method for analyzing a query and generating results and related questions | |
SG142159A1 (en) | Index structure of metadata, method for providing indices of metadata, and metadata searching method and apparatus using the indices of metadata | |
WO2005094411A3 (en) | Transaction instrument inventory management system and method | |
MXPA02000185A (en) | Method and system for searching classified advertising. | |
CA2379855A1 (en) | Spreadsheet cell-data source binding | |
WO2004061589A3 (en) | System, method and computer program product for providing profile information | |
IL147386A0 (en) | Method and system for banking | |
WO2004029762A3 (en) | System and method for providing enhanced services in a multi-channel interactive distributed environment | |
CA2487999A1 (en) | Behavior-based adaptation of computer systems | |
WO2003012594A3 (en) | System and method for providing financial planning and advice | |
WO2002033525A3 (en) | A method and system for detecting rogue software | |
WO2004006590A3 (en) | Selecting load options in road frequency identification | |
WO2004051406A3 (en) | Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model | |
WO2004114060A3 (en) | Security-to-entity crosswalk | |
WO2006076513A3 (en) | Systems and methods for collecting and managing animal-related information | |
WO2005114374A3 (en) | Object-based storage | |
WO2008015458A3 (en) | System and method for authenticating a workflow | |
EP1083560A3 (en) | Hybrid optical recording disc with copy protection | |
IL156091A0 (en) | Method and system for online purchasing | |
WO2005022356A3 (en) | System and method for assessing a supplier’s compliance | |
EP1605709A3 (en) | Method and system for validating configuration data in a private branch exchange switch | |
WO2007047982A3 (en) | Systems and methods for managing an expenditure cycle | |
WO2004036454A3 (en) | Automated information management system and methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2003718263 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2003718263 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |