WO2003088018A3 - System and techniques to bind information objects to security labels - Google Patents

System and techniques to bind information objects to security labels Download PDF

Info

Publication number
WO2003088018A3
WO2003088018A3 PCT/US2003/010751 US0310751W WO03088018A3 WO 2003088018 A3 WO2003088018 A3 WO 2003088018A3 US 0310751 W US0310751 W US 0310751W WO 03088018 A3 WO03088018 A3 WO 03088018A3
Authority
WO
WIPO (PCT)
Prior art keywords
security
user
data object
techniques
information objects
Prior art date
Application number
PCT/US2003/010751
Other languages
French (fr)
Other versions
WO2003088018A2 (en
Inventor
Kenneth C Kung
Original Assignee
Raytheon Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Raytheon Co filed Critical Raytheon Co
Priority to EP03718263A priority Critical patent/EP1495389A2/en
Priority to AU2003221685A priority patent/AU2003221685A1/en
Publication of WO2003088018A2 publication Critical patent/WO2003088018A2/en
Publication of WO2003088018A3 publication Critical patent/WO2003088018A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Abstract

A method to providing multilevel security for a data object requested by a workstation user includes providing a security label for the data object, associating security rules including a security clearance level for the data object with the security label, binding the security label to the data object, validating the correctness of the security label, associating the user's security clearance level with at least one user certificate, verifying the at least one user certificate, and determining whether the user has clearance to receive the requested data.
PCT/US2003/010751 2002-04-12 2003-04-09 System and techniques to bind information objects to security labels WO2003088018A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP03718263A EP1495389A2 (en) 2002-04-12 2003-04-09 System and techniques to bind information objects to security labels
AU2003221685A AU2003221685A1 (en) 2002-04-12 2003-04-09 System and techniques to bind information objects to security labels

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US37248902P 2002-04-12 2002-04-12
US60/372,489 2002-04-12
US10/404,703 US20030196108A1 (en) 2002-04-12 2003-04-01 System and techniques to bind information objects to security labels

Publications (2)

Publication Number Publication Date
WO2003088018A2 WO2003088018A2 (en) 2003-10-23
WO2003088018A3 true WO2003088018A3 (en) 2004-04-01

Family

ID=28794482

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/010751 WO2003088018A2 (en) 2002-04-12 2003-04-09 System and techniques to bind information objects to security labels

Country Status (4)

Country Link
US (1) US20030196108A1 (en)
EP (1) EP1495389A2 (en)
AU (1) AU2003221685A1 (en)
WO (1) WO2003088018A2 (en)

Families Citing this family (88)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8677505B2 (en) * 2000-11-13 2014-03-18 Digital Doors, Inc. Security system with extraction, reconstruction and secure recovery and storage of data
US7103914B2 (en) * 2002-06-17 2006-09-05 Bae Systems Information Technology Llc Trusted computer system
US7360095B2 (en) * 2003-05-22 2008-04-15 International Business Machines Corporation Method and apparatus for a proximity warning system
US7367889B2 (en) * 2003-06-09 2008-05-06 Wms Gaming Inc. Gaming machine having hardware-accelerated software authentication
US7653936B2 (en) * 2003-06-25 2010-01-26 Microsoft Corporation Distributed expression-based access control
US20050015592A1 (en) * 2003-07-15 2005-01-20 Jeou-Kai Lin System and method for application and user-based class of security
US7380209B2 (en) * 2003-09-02 2008-05-27 International Business Machines Corporation Managing electronic documents utilizing a digital seal
US7530112B2 (en) 2003-09-10 2009-05-05 Cisco Technology, Inc. Method and apparatus for providing network security using role-based access control
US7451483B2 (en) * 2003-10-09 2008-11-11 International Business Machines Corporation VLAN router with firewall supporting multiple security layers
US7836490B2 (en) * 2003-10-29 2010-11-16 Cisco Technology, Inc. Method and apparatus for providing network security using security labeling
US7966493B2 (en) * 2003-11-18 2011-06-21 Oracle International Corporation Method of and system for determining if an electronic signature is necessary in order to commit a transaction to a database
US20050108211A1 (en) * 2003-11-18 2005-05-19 Oracle International Corporation, A California Corporation Method of and system for creating queries that operate on unstructured data stored in a database
US7600124B2 (en) * 2003-11-18 2009-10-06 Oracle International Corporation Method of and system for associating an electronic signature with an electronic record
US7650512B2 (en) * 2003-11-18 2010-01-19 Oracle International Corporation Method of and system for searching unstructured data stored in a database
US8782020B2 (en) * 2003-11-18 2014-07-15 Oracle International Corporation Method of and system for committing a transaction to database
US7694143B2 (en) * 2003-11-18 2010-04-06 Oracle International Corporation Method of and system for collecting an electronic signature for an electronic record stored in a database
US7302708B2 (en) * 2004-03-11 2007-11-27 Harris Corporation Enforcing computer security utilizing an adaptive lattice mechanism
US7657925B2 (en) * 2004-10-14 2010-02-02 Oracle International Corporation Method and system for managing security policies for databases in a distributed system
US7877796B2 (en) 2004-11-16 2011-01-25 Cisco Technology, Inc. Method and apparatus for best effort propagation of security group information
US7721323B2 (en) 2004-11-23 2010-05-18 Cisco Technology, Inc. Method and system for including network security information in a frame
US8561126B2 (en) * 2004-12-29 2013-10-15 International Business Machines Corporation Automatic enforcement of obligations according to a data-handling policy
US7987494B1 (en) * 2005-12-19 2011-07-26 Adobe Systems Incorporated Method and apparatus providing end to end protection for a document
US8375020B1 (en) * 2005-12-20 2013-02-12 Emc Corporation Methods and apparatus for classifying objects
CN100556042C (en) * 2006-03-10 2009-10-28 腾讯科技(深圳)有限公司 A kind of accounts security management system and method based on instant messaging
US8171557B2 (en) * 2006-05-17 2012-05-01 Galois, Inc. Document accessing through multiple security domains
US8166559B2 (en) * 2006-05-17 2012-04-24 Galois, Inc. Document accessing through multiple security domains including multi-tear wiki webpage and/or using cross domain trusted service
US20080016547A1 (en) * 2006-07-11 2008-01-17 International Business Machines Corporation System and method for security planning with hard security constraints
US10394849B2 (en) 2006-09-18 2019-08-27 EMC IP Holding Company LLC Cascaded discovery of information environment
US8612570B1 (en) 2006-09-18 2013-12-17 Emc Corporation Data classification and management using tap network architecture
US8250360B2 (en) * 2006-11-29 2012-08-21 The Boeing Company Content based routing with high assurance MLS
EP1933522B1 (en) * 2006-12-11 2013-10-23 Sap Ag Method and system for authentication
US8132259B2 (en) * 2007-01-04 2012-03-06 International Business Machines Corporation System and method for security planning with soft security constraints
US8195939B2 (en) * 2007-01-12 2012-06-05 Sap Ag Systems and methods for protecting sensitive data
US8930331B2 (en) * 2007-02-21 2015-01-06 Palantir Technologies Providing unique views of data based on changes or rules
NO326590B1 (en) * 2007-04-16 2009-01-19 Kubekit As Procedure and device for verification of information access in ICT systems with multiple security dimensions and security levels.
AU2008253593A1 (en) * 2007-05-18 2008-11-27 Secure Keys Pty Limited A security token and system and method for generating and decoding the security token
US8024788B2 (en) * 2007-05-31 2011-09-20 The Boeing Company Method and apparatus for reliable, high speed data transfers in a high assurance multiple level secure environment
US7840708B2 (en) * 2007-08-13 2010-11-23 Cisco Technology, Inc. Method and system for the assignment of security group information using a proxy
US9461890B1 (en) 2007-09-28 2016-10-04 Emc Corporation Delegation of data management policy in an information management system
US8548964B1 (en) 2007-09-28 2013-10-01 Emc Corporation Delegation of data classification using common language
US8868720B1 (en) 2007-09-28 2014-10-21 Emc Corporation Delegation of discovery functions in information management system
US9141658B1 (en) * 2007-09-28 2015-09-22 Emc Corporation Data classification and management for risk mitigation
US9323901B1 (en) 2007-09-28 2016-04-26 Emc Corporation Data classification for digital rights management
US8522248B1 (en) 2007-09-28 2013-08-27 Emc Corporation Monitoring delegated operations in information management systems
US20110087670A1 (en) * 2008-08-05 2011-04-14 Gregory Jorstad Systems and methods for concept mapping
US9348499B2 (en) 2008-09-15 2016-05-24 Palantir Technologies, Inc. Sharing objects that rely on local resources with outside servers
WO2010040125A1 (en) * 2008-10-03 2010-04-08 Beliefnetworks, Inc. Systems and methods for automatic creation of agent-based systems
US8468344B2 (en) * 2009-05-26 2013-06-18 Raytheon Company Enabling multi-level security in a single-level security computing system
US8745385B2 (en) * 2009-06-24 2014-06-03 Raytheon Company System and method for protecting data with multiple independent levels of security
US8572760B2 (en) * 2010-08-10 2013-10-29 Benefitfocus.Com, Inc. Systems and methods for secure agent information
US8510335B2 (en) * 2011-02-14 2013-08-13 Protegrity Corporation Database and method for controlling access to a database
US8935705B2 (en) 2011-05-13 2015-01-13 Benefitfocus.Com, Inc. Execution of highly concurrent processing tasks based on the updated dependency data structure at run-time
US8799240B2 (en) 2011-06-23 2014-08-05 Palantir Technologies, Inc. System and method for investigating large amounts of data
US8627097B2 (en) 2012-03-27 2014-01-07 Igt System and method enabling parallel processing of hash functions using authentication checkpoint hashes
US9270667B2 (en) * 2012-11-01 2016-02-23 Microsoft Technology Licensing, Llc Utilizing X.509 authentication for single sign-on between disparate servers
US9047472B2 (en) * 2013-01-14 2015-06-02 International Business Machines Corporation Managing sensitive content
US8990205B2 (en) * 2013-01-28 2015-03-24 International Business Machines Corporation Data caveats for database tables
US9355279B1 (en) 2013-03-29 2016-05-31 Secturion Systems, Inc. Multi-tenancy architecture
US9374344B1 (en) 2013-03-29 2016-06-21 Secturion Systems, Inc. Secure end-to-end communication system
US9317718B1 (en) 2013-03-29 2016-04-19 Secturion Systems, Inc. Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
US9798899B1 (en) 2013-03-29 2017-10-24 Secturion Systems, Inc. Replaceable or removable physical interface input/output module
US9524399B1 (en) * 2013-04-01 2016-12-20 Secturion Systems, Inc. Multi-level independent security architecture
US10152607B2 (en) * 2013-06-07 2018-12-11 A9.Com Inc. Secure access to hierarchical documents in a sorted, distributed key/value data store
US9245150B2 (en) * 2014-05-06 2016-01-26 The Boeing Company Semantically determining a security classification of data
US9536073B2 (en) * 2014-07-24 2017-01-03 Google Technology Holdings LLC Device-based application security
US11283774B2 (en) 2015-09-17 2022-03-22 Secturion Systems, Inc. Cloud storage using encryption gateway with certificate authority identification
US9794064B2 (en) 2015-09-17 2017-10-17 Secturion Systems, Inc. Client(s) to cloud or remote server secure data or file object encryption gateway
US10708236B2 (en) 2015-10-26 2020-07-07 Secturion Systems, Inc. Multi-independent level secure (MILS) storage encryption
US9967288B2 (en) 2015-11-05 2018-05-08 International Business Machines Corporation Providing a common security policy for a heterogeneous computer architecture environment
US10594730B1 (en) * 2015-12-08 2020-03-17 Amazon Technologies, Inc. Policy tag management
US11386041B1 (en) 2015-12-08 2022-07-12 Amazon Technologies, Inc. Policy tag management for data migration
US10235176B2 (en) 2015-12-17 2019-03-19 The Charles Stark Draper Laboratory, Inc. Techniques for metadata processing
US9542446B1 (en) 2015-12-17 2017-01-10 Palantir Technologies, Inc. Automatic generation of composite datasets based on hierarchical fields
US10936713B2 (en) * 2015-12-17 2021-03-02 The Charles Stark Draper Laboratory, Inc. Techniques for metadata processing
US10536277B1 (en) * 2015-12-22 2020-01-14 Amazon Technologies, Inc. Contribution signatures for tagging
US10621198B1 (en) * 2015-12-30 2020-04-14 Palantir Technologies Inc. System and method for secure database replication
DE102017205552A1 (en) * 2017-03-31 2018-10-04 Siemens Aktiengesellschaft A method of controlling access of an electronic device to a system and security device
US10534548B2 (en) * 2017-06-20 2020-01-14 International Business Machines Corporation Validating restricted operations on a client using trusted environments
WO2019152772A1 (en) 2018-02-02 2019-08-08 The Charles Stark Draper Laboratory, Inc. Systems and methods for policy execution processing
WO2019152792A1 (en) 2018-02-02 2019-08-08 Dover Microsystems, Inc. Systems and methods for policy linking and/or loading for secure initialization
WO2019153127A1 (en) 2018-02-06 2019-08-15 Nokia Shanghai Bell Co., Ltd. Method, apparatus, and computer readable medium for providing security service for data center
WO2019213061A1 (en) 2018-04-30 2019-11-07 Dover Microsystems, Inc. Systems and methods for checking safety properties
TW202022679A (en) 2018-11-06 2020-06-16 美商多佛微系統公司 Systems and methods for stalling host processor
WO2020132012A1 (en) 2018-12-18 2020-06-25 Dover Microsystems, Inc. Systems and methods for data lifecycle protection
JP7354620B2 (en) * 2019-06-28 2023-10-03 株式会社リコー Service system, information registration method
US11218491B2 (en) * 2019-12-12 2022-01-04 At&T Intellectual Property I, L.P. Security de-escalation for data access
US11693948B2 (en) * 2020-08-04 2023-07-04 International Business Machines Corporation Verifiable labels for mandatory access control
US11783073B2 (en) * 2021-06-21 2023-10-10 Microsoft Technology Licensing, Llc Configuration of default sensitivity labels for network file storage locations

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5577209A (en) * 1991-07-11 1996-11-19 Itt Corporation Apparatus and method for providing multi-level security for communication among computers and terminals on a network
US5276901A (en) * 1991-12-16 1994-01-04 International Business Machines Corporation System for controlling group access to objects using group access control folder and group identification as individual user
US5828832A (en) * 1996-07-30 1998-10-27 Itt Industries, Inc. Mixed enclave operation in a computer network with multi-level network security
US6408336B1 (en) * 1997-03-10 2002-06-18 David S. Schneider Distributed administration of access to information
US5996077A (en) * 1997-06-16 1999-11-30 Cylink Corporation Access control system and method using hierarchical arrangement of security devices
US6324645B1 (en) * 1998-08-11 2001-11-27 Verisign, Inc. Risk management for public key management infrastructure using digital certificates
US20020053020A1 (en) * 2000-06-30 2002-05-02 Raytheon Company Secure compartmented mode knowledge management portal
US6920558B2 (en) * 2001-03-20 2005-07-19 Networks Associates Technology, Inc. Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system
US7216173B2 (en) * 2001-06-12 2007-05-08 Varian Medical Systems Technologies, Inc. Virtual private network software system
US6807636B2 (en) * 2002-02-13 2004-10-19 Hitachi Computer Products (America), Inc. Methods and apparatus for facilitating security in a network

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
BRANSTAD M ET AL: "The role of trust in protected mail", PROCEEDINGS OF THE SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY. OAKLAND, MAY 7 - 9, 1990, LOS ALAMITOS, IEEE COMP. SOC. PRESS, US, vol. SYMP. 11, 7 May 1990 (1990-05-07), pages 210 - 215, XP010020200, ISBN: 0-8186-2060-9 *
GASSER M ET AL: "An architecture for practical delegation in a distributed system", PROCEEDINGS OF THE SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY. OAKLAND, MAY 7 - 9, 1990, LOS ALAMITOS, IEEE COMP. SOC. PRESS, US, vol. SYMP. 11, 7 May 1990 (1990-05-07), pages 20 - 30, XP010020183, ISBN: 0-8186-2060-9 *
RUSSELL D., GANGEMI G.: "Computer Security Basics", O'REILLY & ASSOCIATES, INC, 1991, XP002261456 *
SAMESHIMA Y ET AL: "Authorization with security attributes and privilege delegation - Access control beyond the ACL", COMPUTER COMMUNICATIONS, ELSEVIER SCIENCE PUBLISHERS BV, AMSTERDAM, NL, vol. 20, no. 5, 1 July 1997 (1997-07-01), pages 376 - 384, XP004126692, ISSN: 0140-3664 *
SIUDA K: "Security services in telecommunications networks", DIGITAL COMMUNICATIONS, 1988. MAPPING NEW APPLICATIONS ONTO NEW TECHNOLOGIES, 1988 INTERNATIONAL ZURICH SEMINAR ON ZURICH, SWITZERLAND 8-10 MARCH 1988, ZURICH, SWITZERLAND,IEEE, 8 March 1988 (1988-03-08), pages 45 - 52, XP010000006, ISBN: 3-908265-01-0 *
YESBERG J D ET AL: "QuARC: expressive security mechanisms", NEW SECURITY PARADIGMS WORKSHOP, 1995. PROCEEDINGS LA JOLLA, CA, USA 22-25 AUG. 1995, LOS ALAMITOS, CA, USA,IEEE COMPUT. SOC, US, 22 August 1995 (1995-08-22), pages 34 - 40, XP010158974, ISBN: 0-8186-7318-4 *

Also Published As

Publication number Publication date
WO2003088018A2 (en) 2003-10-23
US20030196108A1 (en) 2003-10-16
EP1495389A2 (en) 2005-01-12
AU2003221685A1 (en) 2003-10-27

Similar Documents

Publication Publication Date Title
WO2003088018A3 (en) System and techniques to bind information objects to security labels
WO2004086171A3 (en) Methods and apparatus for facilitating a transaction
WO2001069455A3 (en) A system and method for analyzing a query and generating results and related questions
SG142159A1 (en) Index structure of metadata, method for providing indices of metadata, and metadata searching method and apparatus using the indices of metadata
WO2005094411A3 (en) Transaction instrument inventory management system and method
MXPA02000185A (en) Method and system for searching classified advertising.
CA2379855A1 (en) Spreadsheet cell-data source binding
WO2004061589A3 (en) System, method and computer program product for providing profile information
IL147386A0 (en) Method and system for banking
WO2004029762A3 (en) System and method for providing enhanced services in a multi-channel interactive distributed environment
CA2487999A1 (en) Behavior-based adaptation of computer systems
WO2003012594A3 (en) System and method for providing financial planning and advice
WO2002033525A3 (en) A method and system for detecting rogue software
WO2004006590A3 (en) Selecting load options in road frequency identification
WO2004051406A3 (en) Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model
WO2004114060A3 (en) Security-to-entity crosswalk
WO2006076513A3 (en) Systems and methods for collecting and managing animal-related information
WO2005114374A3 (en) Object-based storage
WO2008015458A3 (en) System and method for authenticating a workflow
EP1083560A3 (en) Hybrid optical recording disc with copy protection
IL156091A0 (en) Method and system for online purchasing
WO2005022356A3 (en) System and method for assessing a supplier’s compliance
EP1605709A3 (en) Method and system for validating configuration data in a private branch exchange switch
WO2007047982A3 (en) Systems and methods for managing an expenditure cycle
WO2004036454A3 (en) Automated information management system and methods

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2003718263

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2003718263

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP