WO2014084831A1 - Full spectrum cyber identification determination process - Google Patents
Full spectrum cyber identification determination process Download PDFInfo
- Publication number
- WO2014084831A1 WO2014084831A1 PCT/US2012/067028 US2012067028W WO2014084831A1 WO 2014084831 A1 WO2014084831 A1 WO 2014084831A1 US 2012067028 W US2012067028 W US 2012067028W WO 2014084831 A1 WO2014084831 A1 WO 2014084831A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cyber
- observations
- series
- identification
- resources
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 170
- 238000001228 spectrum Methods 0.000 title claims abstract description 44
- 239000011888 foil Substances 0.000 claims description 7
- 150000002500 ions Chemical class 0.000 claims description 6
- 235000019987 cider Nutrition 0.000 claims description 5
- 241001167556 Catena Species 0.000 claims description 2
- 235000018734 Sambucus australis Nutrition 0.000 claims 1
- 244000180577 Sambucus australis Species 0.000 claims 1
- SGPGESCZOCHFCL-UHFFFAOYSA-N Tilisolol hydrochloride Chemical compound [Cl-].C1=CC=C2C(=O)N(C)C=C(OCC(O)C[NH2+]C(C)(C)C)C2=C1 SGPGESCZOCHFCL-UHFFFAOYSA-N 0.000 claims 1
- 235000013616 tea Nutrition 0.000 claims 1
- 230000033001 locomotion Effects 0.000 description 6
- 239000011521 glass Substances 0.000 description 3
- 235000001543 Corylus americana Nutrition 0.000 description 2
- 240000007582 Corylus avellana Species 0.000 description 2
- 235000007466 Corylus avellana Nutrition 0.000 description 2
- 244000269722 Thea sinensis Species 0.000 description 2
- 230000001149 cognitive effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- BSFODEXXVBBYOC-UHFFFAOYSA-N 8-[4-(dimethylamino)butan-2-ylamino]quinolin-6-ol Chemical compound C1=CN=C2C(NC(CCN(C)C)C)=CC(O)=CC2=C1 BSFODEXXVBBYOC-UHFFFAOYSA-N 0.000 description 1
- 206010014970 Ephelides Diseases 0.000 description 1
- 241001272567 Hominoidea Species 0.000 description 1
- 241000408495 Iton Species 0.000 description 1
- DIWRORZWFLOCLC-UHFFFAOYSA-N Lorazepam Chemical compound C12=CC(Cl)=CC=C2NC(=O)C(O)N=C1C1=CC=CC=C1Cl DIWRORZWFLOCLC-UHFFFAOYSA-N 0.000 description 1
- 208000003351 Melanosis Diseases 0.000 description 1
- 101150034459 Parpbp gene Proteins 0.000 description 1
- 244000046052 Phaseolus vulgaris Species 0.000 description 1
- 235000010627 Phaseolus vulgaris Nutrition 0.000 description 1
- 240000008042 Zea mays Species 0.000 description 1
- 235000005824 Zea mays ssp. parviglumis Nutrition 0.000 description 1
- 235000002017 Zea mays subsp mays Nutrition 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 150000001768 cations Chemical class 0.000 description 1
- 230000001609 comparable effect Effects 0.000 description 1
- 235000005822 corn Nutrition 0.000 description 1
- 210000004905 finger nail Anatomy 0.000 description 1
- 230000037308 hair color Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 210000001672 ovary Anatomy 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 239000011435 rock Substances 0.000 description 1
- 231100000241 scar Toxicity 0.000 description 1
- 229910001415 sodium ion Inorganic materials 0.000 description 1
- 241000894007 species Species 0.000 description 1
- 230000037303 wrinkles Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Definitions
- the present invention pertains to a full s ectrum cyber Identifica ion
- deienrnnatloo process thai utilizes o servation information, predetermined criteria, sod cyber resources for providing Iden ification determinatio s from a loll spectrum of cyber identification determinations.
- c ber shsil generally be understood to refer to utilizing non ⁇ hi oiogicai processing of rogramming, further definition involving the use of the term: follows below.
- P14] h utilizes any number of observed, unique biologies! character stics of a known person and/or a unidentified person for making Identification determinations; 1S
- [82 3 i. utilizes more than one recognized char cte istic for determining
- resources may be configured and utfeed to provide anywhere from a self- contained process for u ization ith the smallest of Identification determination needs, to a self-contained: process that provides a full spectrum of identification determination resources that are utilised to provide s fu!i spectrum of identification determinations.
- intercon ected environment that provides ail users with re sona le levels of cyber security, cyber safety, and cyber privacy.
- PSS Absolute: occurring at a ratio of one to the total numbe of prooess- ide occurrences SS] And/or: either or both ef "and” and “or” p57
- Unidentified person one single person h® m a subject of a second aeries of observations; a person who has not been determined * utilizing predetermined criteria, to be the same person as a known person
- the process provides its identification determinations by comparing: an unidentified subject of an observation with a known subject of an observation.
- the process utilizes predetermined criteria for every aspect of the process where criteria cars ba used.
- the prooess captures observations 2$a t of a selected uniden ified person, during a second series af observations step 23 ⁇ 4 characteristics f om the observation are ecognised 20b, assigned designations 2 te, and than the designations representing the characteristics are included in the second series of
- observations 40 the process interacts with utlfeed cyber resources to control the operations of those resourc s for capturing any possible observations and also for roviding any useful cyber resource; B2] any step of the process, or any portion thereof, may be performed in any order or s que ce; &S1 in any usable order or sequence, the process may:
- PS8J recognize usable characteristics from observations: 8 ⁇ ] f . iiii e r cogni ed characterstics from any observation;
- P ⁇ 2J i determine which, and the order in which recognized characteristics i be yifesd for comparing and/or detemiirw-sg:
- CSTl p provide Identification determinations Including determinations of an indicated measure of probability of a known person and a u ide tified eson: being the same person during a determining step 7 ⁇ ; and, ⁇ B 0. report on any aspect of the process during: reporting step SO. 8Sl Additionally,, based open predetermined criteria,, the process may be persistent in atem ting to attain art attainable identification determination.
- the process may contnue the co aring and de ermi ing until any attainable selected Identification determination is achiev d
- the process osy select a portion or a first series of observations to be repeated y an unidentified person for inclusion in the second series of observations
- the process may alter the operations of any cyber resources utilized, for ca turing observations in order to captors observations that are most likel to aid In the process providing an attainable selected identification determination.
- T e core operations of the process rosy best fee disclosed through detailed example of the utilization ot the process for t purpose of providing a single sele ted identification determination tret en enidenhhed person and kno n person a solutely are the same person.
- One of many predetermined criteria utilized for the erform g of this cycle of the epil tion of the process Is that the foil resources that are available to the process should be utilized In any a possible to ers s tly work towards accom lis ing the selected achievable identification determination,
- the known person owns a portable computer. This process is utilised by the kno n person tor exclusively g an ing only the known person access to fu the use of their portable computer's resources.
- the portable computer runs the programming of the known perso 's personalty configured end ooi!t cyber Identification determin tion process.
- the portable computer has a microphone and a camera that the process may control the operation oi.
- the process utilizes observations of the known person that come from Ihe vest collection of observations that make op the known person's f rst series of ser tions.
- the fi st series of observations of the known person Is exclusively made up of observations that include the known person as a su ject of the observation,
- a cycle of the utilization of the process Is Initiated by an unidentified person requesting to use the known person ' s portable computer.
- Criteria horn a full spectrum ot criteria may be predetermined by the known person, or criteria may bo predetermined as an Integral part of the operations of the cyber resources Ihal were selected for us , or cri er a may be predetermined es a part of the operations of the process, or criteria may be predetermined utilising: any other me s for selecting criteria, or any com i ati n thereof.
- Criteria is a selected choice of who, when, where, what, why. or how as each relate to any aspect oi the process and Its operations.- Providing e choice of any possible criteria, and any criteria being possible, may well be one of the most important fe tures that cyber resou ces provide, And, this cybe Identification determination process takes Ml and best ad a tag of this rticul cyber feature to provide each user ild a choice of selection of ail aspects of their utilization of the process. in the ins ance of this cycle of the utilisation of the process, the process, utilizing predetermined criteria, utilizes the computer's camera to capture an image of the unidentified person.
- the p ocess again using predetermined, criteria, utilizes the zoom feature of the camera to f ame m image of the face of the onirientified erson in order to provide an observation that would e most likely to aid in achieving the selected attainable identiiioate determinate.
- the process utilizes cyber resources end predetermined criteria for matching designat ns representing the observation and characteristics tram the second series of observations with designations representing at least one comparable observation of the known person from their first senss of observations [110]
- predetermined oteriss call for selecting and then utilizing: one o more comparable obse vatio s from the first series of observations of the known person.
- the one or more selected observations should be the most likely of all available observations to aid in accurately achieving the attainable selected Identfication determination.
- predetermined criteria utilize: fee, date, tem eratu e, light sources, light levels, die portion of the unidentified p rson that was observed, and clarify of observation for matching the observation of the unidentified person with at least one comparable observation from the first sodas of observations of the known person, i 21]
- the ocess provides final identification determinations for many aspects of each observation at the time when designations are assigned to recognised
- a final identification determination may foe provided that a person who was the subject of so observation had red hair, or hazel eyes, or a particular geometry and ratio of movement between pints in a finger hile opening or closing, or any other characteristic,
- the process may exclude, from fu the Identification determinations, any person who is a subject of the observation ho has been determined to have hair that Is not red and/or ayes that ai e not mareet Also, basad upon predetermined crite ia, an unidentified person may be determined to absolutely not be the same person as the known person If if was determined thsst the unidentified person old not have red hair, and/or hazel eyes.
- comparing, along wtifo any useful inf rmation; may be utilized by the process for making identification determinations. Any predetermined criteria ma be utilised by the process for any aspect of its making cyber Identification determinations.
- the process selects utilization of a further observation of the unidentified person presenting their fully opened left hand to the computer's camera, fingernails facing the camera, then slowly closing the hand and opening it again folly.
- the selected cyber Identification determination having been attained, then, utilising cyber resources and any predetermined criteria for any aspect, the process reports the Identification determination.
- the Single-Polnt-of -Access Cyber System architecture provides each person with one remotely accessible point of cyber access computer.
- Each person ma utilize ny mobile or stationary remote te ms nai!-type-oi device that Is called an "input output device" to gain secure ana private access to their own remotely located computer, 13 ⁇ ]
- Their remotely located point of cyber access compute ' utilises the process that Is the subject of this patent application for dete mining : , with 100%. accuracy, that an uniden ified person absolutely is the same perso as tea proprietary user of the computer before granting the previously unidentified: person acc ss to t e personal end private resources of their awn remotely located point of cyber access computer.
- the Single- Poini-of Access Cyber System provides s technologically Interconnected world with m. environment that provides for toe highest attainable levels of cyber security, cyber safety, and cyber privacy.
- a cyde of the process is Initiated by an unidentified person who utilizes any Input output device to call up their own remotely located point of cyber access computer, and t ; requests access to the persons! and private resources of their computer.
- Their point of cyber access com uter is configured to where only one specific rso can: gain access to personal and private resources and, only after thai person has. with 100% accuracy, & determined to he the proprietary wsmr of the computer.
- the computer requests that the unidentified person requesting access repeat a phrase t e rocess has randomly selected om the fi st se ies of observations of the proprietary user of the computer, f M]
- the process may uiize any criteria for selecting the phrase to be repeated., in the Instance of this cycle of the process.: the phrase to be repealed was selected based upon observations from the utilized in ut output device in regard to light levels, light source, temperature, movemen of the on identified person, movement of the Input output device, and a number of other process selected factors.
- the unidentified person repeats the selected phrase for t e m cro hone and c mera of the input output device,
- the process utilising predetermined criteria, and available cyber resources, controls the operations of the micro ho e and the pan, tilt, and zoom modes of the camera of the input output device in order to capture the optimum observation for a second series of observations,
- the rocess ar ines that the unidentified person requesting access absolutely is the proprietary user of the computer and t ereby grants the proprietary user exclusive acces to the persons! and private resources of their o n, ramoiefy located point of cyber access computer.
- the S!n ⁇ le-Poln -of-Acoess Cyber System not only requires that a person be accuratel determined to de the proprietary user of a point of cyber access computer before they may gain access to its resources, feci
- the Single- Point-oi-Acoess Cyber System also requires the person utilizing the computer to constantly he dete mi ed to de the proprietar user of the computer while they, themselves, are personally using their own point ⁇ cyber access computer In any way,
- the u!!feed predetermined eHfens calls for the comparing of the most current Image of the eyes with the Immediate prior Image of the eyas at a frequency that would not allow the observed user to be changed.
- This method provides a weak, but accurate constant Identification deterrninatloo, However, for the Instance of this constant cycle of utilization of the process, further predetermined criteria also calls for a full comparison and a 100% accurate Identification determination to be made each time the person who Is using the Input output device blinks their eyes naturall ,
- point of cyber access computers are primarily voice o e at d, thereby providing the roc s with a vast collection of first series observations of the proprietary user of the computer speaking, Sa. should a person be wearing large dark glasses thai prevent th use of the person's eyes for making identification
- the rocess may utilize observations of the person's mouth for roviding identification determinations.
- the process may also utilize the capturing of observations of the unlpae characteristics of the mouth at a frequency that would provide a constant dete minat on aa to whether or not the same mouth was the subject of the observation.. And, a 100% accurate identification determination may be provided when this person speaks, whereby the process utilizes a portion o? what e said ay tha parson in conjunction with a matching com parable observation of the proprietary user of the point of cyber access computer saying the ame phrase.
- the process may utilize any possible observation of the user of the Input output device for persistently trying to attain e 00%: aceur te determination that the person using the Input output: device is the proprietary user of the point of cyber access computer.
- the point of cyber access computer of the person will utilize cyber positioning resources to determine the geographic toeaion of the person.
- the point of cyber access computer of the person w! then utilize available public cameras from the area to. : first find the person from the large grou of people at the market, and then accu ately oornf!rm that the found parson was the proprietary user of the computer, and then, as much as Is possible, provide a constant identification and location
- identification determination p oc ss the feature of the process providing identification determinations not o ly for a erson, but also providing: identification determinations to any other recognizable biologies! observation, any rec g izably non-btoiogk i observation, and, an recognizable observance of the environment of an observation,
- the voice operated point of cyber access computer can be fully utilized through use of an input output device that is similar else, and is worn similarly to a ristwateh.
- a « input output device with an image display scr en of such a small sure would requ e
- a wristwateh configured Input out ut device to provide the greatest all-around utility. I find this, in part, because a wristwatch configured Input output device may also be utilized to securely and privately monitor, and report to your point of cyber access computer, any possible health observations, both Internally and externally.
- de s may have the ability to b tter provide us with the Pes of alii possible health care outcomes
- the cyber identification det mi a ion process of the present invention provides Identification determlnsflone for a person utilizing onipoe biological characteristics of a person, unique biological characteristics that could not he repeated fey any other person or device,
- the foil spectrum cyber identification determination process utilizes as many unique biological characteristics of a person as are necessary to achieve an attainable selected identification: d termination, any examples of uni ue biological characteristics of a person have previously been addressed.
- d termination any examples of uni ue biological characteristics of a person have previously been addressed.
- d termination any examples of uni ue biological characteristics of a person have previously been addressed.
- there are a ery targe number of ossible mbin tio s of unlqoe biological characteristics thai could be yfiti ed for ro iding identification determinations for Just one erson.
- Every unique biological characteristic of a person t at has been observed also exists one more means for accurately comparing an unidentified erson wil a known person.
- the process may provide any identification determination from a full spectr m of cyber Identification determl nations for not only a person, but also any other biological, nomb logleal, or environment observances.
- Identification determinations for a rso are a multitude of determinations that foil short of providing a determination that n unidentified person and a known person absolutely are the same person. For example, there am Identification determinations of hair color, moles, wrinkles in skin, freckles, geometry of motion at joints, soars, h igh eye safer, and on sod on, fie ⁇ l There are also identification determinations of any measure of probability that might exist of a known person and an unidentified person being the same person. This type of Identification determination is useful m many ways. It can be utilized to provide en Indicated measure of probability that has been accomplished at any point In a cycle of the utilization of the rocess.
- the process can be utiliz d for determining the exact identity of an unknown unidentified person, even when there is no knowledge of who the unidentified person might be other than the designations that represent observations of the unidentified person. For example, the process may determine who an onldentlied person is by utilizing selected criteria that called for the most unique combinatio of recognized characteristics of the unidentified person to be utilized for searching available databases for firs! series of observations of known persons unlit either a known person was found that absolutely was the same person as the unidentified person, or there were no further database records of first series of observations of known persons, from which to search. [167] The process also utilizes useful information from any source for ovidi g Identification determinations.
- the full spectrum cyber identification determination process of this Invention not. only utilizes unique b logleal characteristics of a person that can never be shared win or copied by others, but the process also utilises, in many instances, a combination of a number of unique biological characteristics of a person that are observed both simultaneously, and over any measu ed period of time.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020157017277A KR20150092215A (en) | 2012-11-29 | 2012-11-29 | Full spectrum cyber identification determination process |
BR112015012496-8A BR112015012496B1 (en) | 2012-11-29 | CYBER IDENTIFICATION DETERMINATION PROCESS | |
EP12889052.2A EP2926261A4 (en) | 2012-11-29 | 2012-11-29 | Full spectrum cyber identification determination process |
PCT/US2012/067028 WO2014084831A1 (en) | 2012-11-29 | 2012-11-29 | Full spectrum cyber identification determination process |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2012/067028 WO2014084831A1 (en) | 2012-11-29 | 2012-11-29 | Full spectrum cyber identification determination process |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014084831A1 true WO2014084831A1 (en) | 2014-06-05 |
Family
ID=50828306
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2012/067028 WO2014084831A1 (en) | 2012-11-29 | 2012-11-29 | Full spectrum cyber identification determination process |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2926261A4 (en) |
KR (1) | KR20150092215A (en) |
WO (1) | WO2014084831A1 (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5229764A (en) | 1991-06-20 | 1993-07-20 | Matchett Noel D | Continuous biometric authentication matrix |
US20040223631A1 (en) * | 2003-05-07 | 2004-11-11 | Roman Waupotitsch | Face recognition based on obtaining two dimensional information from three-dimensional face shapes |
US20070290800A1 (en) * | 2006-06-05 | 2007-12-20 | Fuller Milton E | Biometric identification and authentication system using electromagnetic frequency response |
US7929733B1 (en) | 2006-02-17 | 2011-04-19 | Verizon Patent And Licensing Inc. | Biometric identification and analysis |
US20120102540A1 (en) * | 2010-10-20 | 2012-04-26 | Jeffry Aronson | Single-Point-Of-Access Cyber System |
US20120154117A1 (en) | 2010-12-16 | 2012-06-21 | Microsoft Corporation | Supplementing biometric identification with device identification |
-
2012
- 2012-11-29 WO PCT/US2012/067028 patent/WO2014084831A1/en active Application Filing
- 2012-11-29 KR KR1020157017277A patent/KR20150092215A/en active Search and Examination
- 2012-11-29 EP EP12889052.2A patent/EP2926261A4/en not_active Ceased
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5229764A (en) | 1991-06-20 | 1993-07-20 | Matchett Noel D | Continuous biometric authentication matrix |
US20040223631A1 (en) * | 2003-05-07 | 2004-11-11 | Roman Waupotitsch | Face recognition based on obtaining two dimensional information from three-dimensional face shapes |
US7929733B1 (en) | 2006-02-17 | 2011-04-19 | Verizon Patent And Licensing Inc. | Biometric identification and analysis |
US20110221567A1 (en) * | 2006-02-17 | 2011-09-15 | Lehnert Thomas R | Biometric identification and analysis |
US20070290800A1 (en) * | 2006-06-05 | 2007-12-20 | Fuller Milton E | Biometric identification and authentication system using electromagnetic frequency response |
US20120102540A1 (en) * | 2010-10-20 | 2012-04-26 | Jeffry Aronson | Single-Point-Of-Access Cyber System |
US20120154117A1 (en) | 2010-12-16 | 2012-06-21 | Microsoft Corporation | Supplementing biometric identification with device identification |
Non-Patent Citations (1)
Title |
---|
See also references of EP2926261A4 * |
Also Published As
Publication number | Publication date |
---|---|
BR112015012496A2 (en) | 2017-07-11 |
KR20150092215A (en) | 2015-08-12 |
EP2926261A4 (en) | 2016-07-20 |
EP2926261A1 (en) | 2015-10-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113228124B (en) | Image processing method and device, electronic equipment and storage medium | |
Hossain et al. | Toward end-to-end biomet rics-based security for IoT infrastructure | |
Li et al. | Unobservable re-authentication for smartphones. | |
Ryoo et al. | First-person activity recognition: What are they doing to me? | |
Wang et al. | Attacks and defenses in user authentication systems: A survey | |
EP3312762A1 (en) | Method and system for tracking an object in a defined area | |
Saxena et al. | Smart home security solutions using facial authentication and speaker recognition through artificial neural networks | |
CN107346568B (en) | Authentication method and device of access control system | |
CN105654026A (en) | Fingerprint storage method and apparatus thereof, fingerprint identification method and apparatus thereof | |
US20180212947A1 (en) | Methods for dynamic user identity authentication | |
Abate et al. | On the impact of multimodal and multisensor biometrics in smart factories | |
Sarin et al. | Cnn-based multimodal touchless biometric recognition system using gait and speech | |
JP2007067972A (en) | Conference system and control method for conference system | |
WO2014084831A1 (en) | Full spectrum cyber identification determination process | |
Shang et al. | Face and lip-reading authentication system based on android smart phones | |
US8769649B2 (en) | Full spectrum cyber identification determination process | |
US9635025B2 (en) | Scalable full spectrum cyber determining machine | |
CN106101824B (en) | Information processing method, electronic equipment and server | |
Melnik et al. | Voice authentication system for cloud network | |
US10462139B2 (en) | Scalable universal full spectrum cyber cyber determining process | |
US10708271B2 (en) | Scalable configurable universal full spectrum cyberspace identity verification test | |
US11444947B2 (en) | Identity testing machine | |
US9319414B2 (en) | Scalable full spectrum cyber determination process | |
Akhil et al. | Video Calling System Using Biometric Remote Authentication | |
JP2004272892A (en) | Processing system by personal identification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12889052 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012889052 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112015012496 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 20157017277 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 112015012496 Country of ref document: BR Kind code of ref document: A2 Effective date: 20150528 |