WO1996018139A1 - Entree de code de securite - Google Patents
Entree de code de securite Download PDFInfo
- Publication number
- WO1996018139A1 WO1996018139A1 PCT/IB1995/001035 IB9501035W WO9618139A1 WO 1996018139 A1 WO1996018139 A1 WO 1996018139A1 IB 9501035 W IB9501035 W IB 9501035W WO 9618139 A1 WO9618139 A1 WO 9618139A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- pattern
- target
- target points
- indicator
- sequence
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
Definitions
- the present invention relates to methods for security coding and in particular to a method for restricting access to a computer-based system having a processor, a display, and user input means arranged to move an indicator about the display under user control, the method requiring correct entry by the user of a predetermined security code as a prerequisite to access.
- the invention also relates to an apparatus having such restricted access.
- PIN personal identification number
- account code or a credit card number for a home shopping service
- password or other conditional access code for on-line information.
- PINs keyed into cash machines via keypads
- user passwords typed into computer systems via keyboards. These methods require a set of physical numeric or alphanumeric keys which can be operated in a secure manner, without revealing the PIN or password to other people in the vicinity.
- the user input may comprise a simple XY pointing device with a small number of buttons (maybe only two) .
- An example of this would be a CD-i (Compact Disc - Interactive) player connected to a public data network with a remote control being used to purchase films offered by a Video on Demand service through the network.
- a method for restricting access as set forth in the opening paragraph, characterised in that; - the user is presented, via the display, with a first pattern comprising a start point and a plurality of target points arranged related thereto, and the security code comprises a predetermined sequence of the target points; the user is required to move the indicator through the predetermined sequence of target points whilst display of the indicator is inhibited; and on determining that the indicator has been moved through a sequence of target points, an indication is provided to the user if that sequence does not correspond to the predetermined sequence.
- the first pattern (which may simply comprise a grid arrangement of alphanumeric and/or graphical symbols arranged around the start point) further comprises an end point, with the determination that the indicator has been moved through a sequence of target points occurring when the indicator is moved by the user to the end point.
- correct entry of the security code may further require selection of a predetermined one or ones of the target points in the predetermined sequence.
- selection of (or placing the indicator on) that target point may be specified to cause the first pattern to be changed to a second pattern of target points: this may be extended to bring a change to a third pattern from the second, a fourth from the third and so on with, in the extreme, the pattern being changed for each indicated or selected target point of the sequence, and with only one correct target point in each pattern.
- the changed pattern may comprise the respective target points of the preceding pattern rearranged on the display, or it may include one or more target points not included in the preceding pattern.
- each pattern preferably includes a start point and, on changing from the preceding pattern, the indicator is preferably positioned at the start point of the new pattern.
- the target points of the first pattern may be repositioned for each successive attempt to enter the correct sequence.
- an escape point is preferably provided, the selection (or indication) of which restarts the users sequence input.
- the selection (or indication) of which restarts the users sequence input may be provided by returning the indicator to the start point after commencing the sequence.
- a computer-based apparatus having access restricted by the method of the present invention, the apparatus including a target point store holding data specifying the respective locations of the target points on the display; a security code store holding at least one security code; first comparator means arranged to receive an identification of current indicator position, compare this with the target point location data from the target store, and output an identification of a currently indicated target point; and second comparator means arranged to receive a sequence of the identifications from the first comparator means, compare that sequence with the code in the security code store, and output one or more signals indicating whether or not there is a match.
- the target point store holds a plurality of target point arrangements and the apparatus may further include a pseudo-random selector arranged to select which target point arrangement is displayed.
- FIG. 1 is a block schematic diagram of a networked CD-i system embodying the invention
- FIG. 2 is a block schematic diagram of a games system console embodying the invention
- Figure 3 schematically represents a code storage and comparison stage embodying the invention
- Figure 4 shows a first arrangement of screen targets
- Figure 5 shows a modified version of the arrangement of Figure 4.
- Figure 6 shows a sequence of target arrangements according to an alternative embodiment of the present invention.
- a first arrangement of apparatus in which the security scheme of the invention may be employed is shown in Figure 1 .
- a CD-i player 10 connected to display on a television screen 12, is coupled (via link 14) to a consumer data network under control of network server 1 6.
- the network server 1 6 is configured to provide services to users such as Video on Demand, in which the user may select from a menu of available feature films which are then downloaded to the CD-i 1 0 over the data link 14. Selection from an on-screen menu of available films is made using a remote controller 1 8 of the CD-i which enables the user to control the movement (by up/down/left/right controls 20) of a cursor or select bar 22.
- a select button 24 is used to indicate that the choice currently marked by the cursor is the desired option.
- the network server 1 6 requests the user to enter a security code via a displayed grid of targets 26 to confirm that the user is a registered subscriber to the service.
- FIG. 2 An alternative system employing the target-based security code scheme is shown in Figure 2 comprising a computer games console 30 with a display screen 32.
- the games console may suitably be of the type which accepts different games loaded as cartridges 34. Movement of a cursor 38 may be achieved by use of a joystick 36 or trackerball (not shown) and selection of a target from the displayed grid 26A is achieved by pressing the joystick "fire" button 40.
- the coding scheme may be used to restrict access by minors to certain games, such as games having a highly violent content.
- the XY pointing device will be used to move around a sequence of these targets already known to the user and corresponding to the access code. While this is happening, there is no visible counterpart (such as the cursor) on the display - the display is simply an aide-memoire for the user.
- the cursor may remain visible until such time as the user has moved it from outside the pattern of targets to the start point but preferably the cursor would be automatically relocated to the start point and blanked simultaneously with the appearance of the target pattern.
- the user may need to press a button on the controller (for example the "fire” button 40, Fig.2), or the display may change spontaneously as the XY control is moved, as will be described below.
- a button on the controller for example the "fire” button 40, Fig.2
- the display may change spontaneously as the XY control is moved, as will be described below.
- an accept or reject response will be generated by the service. This may comprise a visual or audio indication or (for successful entry) this may simply be indicated by the granting of access.
- a storage and comparison stage for the code input technique is shown in Figure 3. This may comprise a dedicated hardware arrangement or the respective functions may be assigned to existing storage and processor devices of, for example, the CD-i player 10 or games console 30 of Figures 1 and 2 respectively.
- a target point store 42 holds display data and screen positions for a number of target point arrangements, with the particular arrangement displayed being selected by a pseudo-random selector 44.
- a first comparator 46 receives the x,y screen position of the cursor and compares this with the target point positioning data for the selected arrangement from the store 42 to determine which target point is current being indicated (which target the non-displayed cursor currently lies on) . Where the operation requires selection (as in 3. above) the comparator may only carry out the current target point determination on receiving a "select" command from the user input device.
- the sequence of target points identified by the first comparator 46 is passed to a second comparator 48 which compares the sequence with a security code or one of a number of security codes in the form of target point sequences and held in a further store 50. When compared, the comparator outputs a match/no-match signal to indicate whether the user-entered code is accepted or rejected.
- a helpful technique for the user is to provide pictorial symbols which the user could relate to a remembered - and fictitious - story. This could improve the probability of accurate recall by exploiting the power of visual memory, a technique used by memory "experts" is to convert names, numbers etc into pictures and sequences of pictures forming a storyline.
- the display consists of a 2-dimensional array of numeric keys, with a "START” key and “END” key, as shown in Figure 4.
- the user "jogs” the XY control to move off the "START” key onto the first number of the code; this could take several movements, for example getting to the "9" target from the "START” .
- the design would allow movement in the four main directions UP, RIGHT, DOWN and LEFT, or might also allow diagonal movements as well to give eight in all.
- the grid size and spacing is determined as integer numbers of "clicks" (depressions of the movement control) to give the user an accurate idea of where the cursor lies: where movement control is by continuous movement means such as a mouse, the size of the targets should be greater to give a greater probability of the cursor being in the space where the user intends it to be.
- a button on the controller is pressed to select that digit as a part of the code. Completion is indicated by clicking on the "END” key or, if no specific "END” key is provided, on the last target of the sequence. If the user was conscious of making an error, clicking on the "START" key could clear the code and re-start.
- the system may be set up to rearrange some or all of the targets for each attempt to enter the code, as shown by Figure 5.
- a third party would then only be able to learn a users security code by observing both the movement instructions input by the user and the arrangement and identity of targets at that time.
- the idea of changing target arrangements is extended to an interaction using a sequence of choice patterns A, B and C, one for each symbol in the code as shown in Figure 6 for a three-target code.
- the user moves from the origin (start point) of the first arrangement A presented, to one of the eight surrounding pictures (targets).
- the choice pattern is replaced by another B, and the user is re-positioned at the origin.
- the existing targets may simply be rearranged (as with Figures 4 and 5), they may be partially replaced (transition from A to B), or they may be completely replaced (transition from B to C).
- PCMB95/01035 PCMB95/01035
- any suitable layout of targets could be used, and the number of targets could be varied, as shown in Figures 1 and 2. It may even be desirable to repeat some of the targets within the layout, but if the selection of a particular one from a number of repeated targets is important, care must be taken when specifying rearrangement of the pattern (for example with two targets the same, it might be specified that the required one will always appear somewhere in the top row of a grid and the other somewhere in the bottom row). If the controller has two or more buttons which may be used to select, then the use of one or another button may be specified as a conditional feature when entering the code. Audio feedback could be provided so that the user knows they have made a valid movement; the important thing is that no visual effect should occur which could reveal the code the user is entering.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
L'invention concerne un procédé d'entrée de code de sécurité destiné à limiter l'accès à un système informatique doté d'un processeur (30), d'une unité d'affichage (32) et d'un moyen d'entrée utilisateur (34, 36) conçu pour déplacer un curseur (38) sur l'unité d'affichage, sous le contrôle de l'utilisateur. Lorsque l'accès est demandé, l'utilisateur voit apparaître, par l'intermédiaire de l'unité d'affichage, un motif d'affichage (26A) comprenant un point de départ (S) et un certain nombre de points cibles, le code de sécurité comprenant une séquence prédéterminée de point cibles. Pour entrer le code, l'utilisateur doit modifier la position apparente du curseur (dont l'affichage est inhibé) dans la séquence prédéterminée de points cibles. La disposition des points cibles (26A) peut être modifiée après chaque tentative d'entrée du code, le code pouvant être acheminé dans une séquence de dispositions des points cibles.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9424791.3 | 1994-12-08 | ||
GBGB9424791.3A GB9424791D0 (en) | 1994-12-08 | 1994-12-08 | Security code input |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1996018139A1 true WO1996018139A1 (fr) | 1996-06-13 |
Family
ID=10765618
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB1995/001035 WO1996018139A1 (fr) | 1994-12-08 | 1995-11-21 | Entree de code de securite |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB9424791D0 (fr) |
WO (1) | WO1996018139A1 (fr) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2313460A (en) * | 1996-05-21 | 1997-11-26 | Bosch Gmbh Robert | Graphical password entry |
FR2808340A1 (fr) * | 2000-04-26 | 2001-11-02 | Scm Schneider Microsysteme | Procede et dispositif de saisie securisee de donnees exploitables par un peripherique |
WO2002054199A1 (fr) * | 2001-01-05 | 2002-07-11 | Schlumberger Systemes | Procede d'acces a un systeme securise |
EP0901060A3 (fr) * | 1997-09-05 | 2002-08-21 | Fujitsu Limited | Dispositif et procédé de commande de données sécurisée |
WO2002027442A3 (fr) * | 2000-09-29 | 2002-09-19 | Reinhold Rohrbach | Procede et dispositif de determination d'un code d'acces |
WO2001077792A3 (fr) * | 2000-04-07 | 2003-01-30 | Rsa Security Inc | Systeme et procede d'authentification d'un utilisateur |
WO2002071177A3 (fr) * | 2001-03-03 | 2005-03-10 | Moneyhive Com Pte Ltd | Procede et systeme de transactions electroniques sensiblement securisees |
AT413775B (de) * | 2004-03-31 | 2006-05-15 | Helmut Dipl Ing Schluderbacher | Verfahren zur sicheren anmeldung an ein technisches system |
WO2006010058A3 (fr) * | 2004-07-07 | 2006-07-13 | Bharosa Inc | Cryptage et decryptage de donnees en ligne |
AT413894B (de) * | 2004-04-15 | 2006-07-15 | Helmut Dipl Ing Schluderbacher | Nicht personenabhängiger zugangscode |
WO2007000845A1 (fr) * | 2005-06-27 | 2007-01-04 | Kabushiki Kaisha Toshiba | Dispositif serveur, procede et programme |
US7219368B2 (en) | 1999-02-11 | 2007-05-15 | Rsa Security Inc. | Robust visual passwords |
WO2007098569A1 (fr) * | 2006-03-01 | 2007-09-07 | Norman Frank Goertzen | Procédé et système de sécurisation d'accès interface via des chemins d'ensembles visuels associés à des opérateurs cachés |
WO2008105602A1 (fr) * | 2007-02-28 | 2008-09-04 | Mininfo Co., Ltd. | Procédé et système d'authentification d'utilisateur mettant en œuvre un mot de passe graphique à usage unique |
EP1574931A3 (fr) * | 2004-03-11 | 2008-09-24 | Wincor Nixdorf International GmbH | Dispositif self-service ayant un dispositif de saisie de données et méthode pour interroger le PIN |
US7543154B2 (en) | 2000-09-29 | 2009-06-02 | Patev Gmbh & Co., Kg | Method and device for determining an access code |
US7596701B2 (en) | 2004-07-07 | 2009-09-29 | Oracle International Corporation | Online data encryption and decryption |
US7689831B2 (en) | 2004-08-30 | 2010-03-30 | Passrules Canadian Security Inc. | Method and system for securing interface access via visual array paths in combination with hidden operators |
US7908645B2 (en) | 2005-04-29 | 2011-03-15 | Oracle International Corporation | System and method for fraud monitoring, detection, and tiered user authentication |
US8739278B2 (en) | 2006-04-28 | 2014-05-27 | Oracle International Corporation | Techniques for fraud monitoring and detection using application fingerprinting |
WO2015003672A1 (fr) * | 2013-07-12 | 2015-01-15 | Anect A.S. | Procédé de saisie d'informations secrètes dans des dispositifs électroniques numériques |
US9106422B2 (en) | 2006-12-11 | 2015-08-11 | Oracle International Corporation | System and method for personalized security signature |
EP1956813B1 (fr) | 2000-06-30 | 2016-04-13 | III Holdings 3, LLC | Verrouillage de clavier avec une manette |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1993011511A2 (fr) * | 1991-11-30 | 1993-06-10 | John Hugh Evans Davies | Dispositifs d'identification de personnes et systemes de commande d'acces |
EP0677801A1 (fr) * | 1994-04-04 | 1995-10-18 | AT&T Corp. | Mot de passe graphique |
-
1994
- 1994-12-08 GB GBGB9424791.3A patent/GB9424791D0/en active Pending
-
1995
- 1995-11-21 WO PCT/IB1995/001035 patent/WO1996018139A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1993011511A2 (fr) * | 1991-11-30 | 1993-06-10 | John Hugh Evans Davies | Dispositifs d'identification de personnes et systemes de commande d'acces |
EP0677801A1 (fr) * | 1994-04-04 | 1995-10-18 | AT&T Corp. | Mot de passe graphique |
Non-Patent Citations (1)
Title |
---|
IBM TECHNICAL DISCLOSURE BULLETIN, Volume 32, No. 10B, March 1990, "Menu Icon With Hidden Geometrical Password", pages 463-464. * |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2313460B (en) * | 1996-05-21 | 1998-07-08 | Bosch Gmbh Robert | Graphical password entry |
GB2313460A (en) * | 1996-05-21 | 1997-11-26 | Bosch Gmbh Robert | Graphical password entry |
EP0901060A3 (fr) * | 1997-09-05 | 2002-08-21 | Fujitsu Limited | Dispositif et procédé de commande de données sécurisée |
US7219368B2 (en) | 1999-02-11 | 2007-05-15 | Rsa Security Inc. | Robust visual passwords |
WO2001077792A3 (fr) * | 2000-04-07 | 2003-01-30 | Rsa Security Inc | Systeme et procede d'authentification d'un utilisateur |
FR2808340A1 (fr) * | 2000-04-26 | 2001-11-02 | Scm Schneider Microsysteme | Procede et dispositif de saisie securisee de donnees exploitables par un peripherique |
EP1956813B1 (fr) | 2000-06-30 | 2016-04-13 | III Holdings 3, LLC | Verrouillage de clavier avec une manette |
US7543154B2 (en) | 2000-09-29 | 2009-06-02 | Patev Gmbh & Co., Kg | Method and device for determining an access code |
WO2002027442A3 (fr) * | 2000-09-29 | 2002-09-19 | Reinhold Rohrbach | Procede et dispositif de determination d'un code d'acces |
WO2002054199A1 (fr) * | 2001-01-05 | 2002-07-11 | Schlumberger Systemes | Procede d'acces a un systeme securise |
FR2819323A1 (fr) * | 2001-01-05 | 2002-07-12 | Schlumberger Systems & Service | Procede d'acces a un systeme securise |
WO2002071177A3 (fr) * | 2001-03-03 | 2005-03-10 | Moneyhive Com Pte Ltd | Procede et systeme de transactions electroniques sensiblement securisees |
EP1574931A3 (fr) * | 2004-03-11 | 2008-09-24 | Wincor Nixdorf International GmbH | Dispositif self-service ayant un dispositif de saisie de données et méthode pour interroger le PIN |
AT413775B (de) * | 2004-03-31 | 2006-05-15 | Helmut Dipl Ing Schluderbacher | Verfahren zur sicheren anmeldung an ein technisches system |
AT413894B (de) * | 2004-04-15 | 2006-07-15 | Helmut Dipl Ing Schluderbacher | Nicht personenabhängiger zugangscode |
US7822990B2 (en) | 2004-07-07 | 2010-10-26 | Oracle International Corporation | Online data encryption and decryption |
US8484455B2 (en) | 2004-07-07 | 2013-07-09 | Oracle International Corporation | Online data encryption and decryption |
WO2006010058A3 (fr) * | 2004-07-07 | 2006-07-13 | Bharosa Inc | Cryptage et decryptage de donnees en ligne |
US7596701B2 (en) | 2004-07-07 | 2009-09-29 | Oracle International Corporation | Online data encryption and decryption |
US7616764B2 (en) | 2004-07-07 | 2009-11-10 | Oracle International Corporation | Online data encryption and decryption |
US7689831B2 (en) | 2004-08-30 | 2010-03-30 | Passrules Canadian Security Inc. | Method and system for securing interface access via visual array paths in combination with hidden operators |
US7908645B2 (en) | 2005-04-29 | 2011-03-15 | Oracle International Corporation | System and method for fraud monitoring, detection, and tiered user authentication |
WO2007000845A1 (fr) * | 2005-06-27 | 2007-01-04 | Kabushiki Kaisha Toshiba | Dispositif serveur, procede et programme |
WO2007098569A1 (fr) * | 2006-03-01 | 2007-09-07 | Norman Frank Goertzen | Procédé et système de sécurisation d'accès interface via des chemins d'ensembles visuels associés à des opérateurs cachés |
US8739278B2 (en) | 2006-04-28 | 2014-05-27 | Oracle International Corporation | Techniques for fraud monitoring and detection using application fingerprinting |
US9106422B2 (en) | 2006-12-11 | 2015-08-11 | Oracle International Corporation | System and method for personalized security signature |
WO2008105602A1 (fr) * | 2007-02-28 | 2008-09-04 | Mininfo Co., Ltd. | Procédé et système d'authentification d'utilisateur mettant en œuvre un mot de passe graphique à usage unique |
WO2015003672A1 (fr) * | 2013-07-12 | 2015-01-15 | Anect A.S. | Procédé de saisie d'informations secrètes dans des dispositifs électroniques numériques |
US10192075B2 (en) | 2013-07-12 | 2019-01-29 | Aducid S.R.O. | Method of secret information entering into electronic digital devices |
CZ309308B6 (cs) * | 2013-07-12 | 2022-08-17 | Aducid S.R.O. | Způsob zadávání tajné informace do elektronických digitálních zařízení |
Also Published As
Publication number | Publication date |
---|---|
GB9424791D0 (en) | 1995-02-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO1996018139A1 (fr) | Entree de code de securite | |
US5815083A (en) | Process for entry of a confidential piece of information and associated terminal | |
US5428349A (en) | Nondisclosing password entry system | |
US7240367B2 (en) | User interface and method for inputting password and password system using the same | |
US8010797B2 (en) | Electronic apparatus and recording medium storing password input program | |
EP1181643B1 (fr) | Procede et appareil pour une introduction securisee de codes d'acces dans un environnement informatique | |
US5276314A (en) | Identity verification system resistant to compromise by observation of its use | |
US8239937B2 (en) | User validation using images | |
US6658574B1 (en) | Method for non-disclosing password entry | |
US6209104B1 (en) | Secure data entry and visual authentication system and method | |
JP2007264929A (ja) | ユーザ認証システム、ユーザ認証方法、操作端末及びサーバ等 | |
US20020129269A1 (en) | Method and apparatus for inputting secret information | |
US20030146931A1 (en) | Method and apparatus for inputting secret information using multiple screen pointers | |
US20040178881A1 (en) | Information service terminal | |
US20100043079A1 (en) | Code securing for a personal entity | |
US11354395B2 (en) | Authentication method for a computing device using interactive game board and game piece images | |
JP2891206B2 (ja) | パスワード照合方式 | |
KR102246446B1 (ko) | 문자와 패턴을 조합한 인증암호의 인증방법 및 인증장치 | |
KR20210027317A (ko) | 숫자와 패턴 혼용 입력부를 이용한 숫자와 패턴을 조합한 인증암호의 인증방법 및 인증장치 | |
US20060179471A1 (en) | System and method for providing secure disclosure of a secret | |
JPH05334334A (ja) | 暗証番号入力装置 | |
KR20210049069A (ko) | 문자와 패턴을 조합한 인증암호의 인증방법 및 인증장치 | |
WO2002069240A2 (fr) | Appareil et procede de selection de donnees | |
JPH05224802A (ja) | ランダムキー装置 | |
WO2014009725A1 (fr) | Sécurisation de saisie d'informations sensibles |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP KR |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase |