WO2001053965A1 - Filtre anti messages spam pour courrier electronique - Google Patents
Filtre anti messages spam pour courrier electronique Download PDFInfo
- Publication number
- WO2001053965A1 WO2001053965A1 PCT/AU2000/000089 AU0000089W WO0153965A1 WO 2001053965 A1 WO2001053965 A1 WO 2001053965A1 AU 0000089 W AU0000089 W AU 0000089W WO 0153965 A1 WO0153965 A1 WO 0153965A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- spam
- decoy
- characteristic
- database
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
Definitions
- the present invention relates to the provision of e-mail services over the internet and in particular, it provides a method and system for filtering unsolicited material from an incoming stream.
- Internet electronic mail (or, e-mail) is becoming increasingly clogged by unsolicited advertising material ('"spam"), which causes network congestion and server overload for Internet Service Providers (ISPs) and corporations, as well as increased clutter for users.
- '"spam unsolicited advertising material
- the present invention consists in a method of selecting and removing spam from a stream of mail, received by mail service or mail client, comprising the steps of: i) establishing a decoy e-mail mailbox with a decoy e-mail address which is not used for communication with other parties; ii) engaging in activities known to attract spam using the decoy mail address; iii) monitoring the decoy mailbox for mail sent to the decoy address; iv) generating a characteristic string for each e-mail received, which can be used to identify other differently addressed copies of the same e-mail; v) creating a database of characteristic strings and adding new characteristic strings as they are generated; vi) providing the database to a mail filter associated with the mail service or mail client; vii) filtering a stream of mail received by the mail service or mail client to remove from the stream, any mail
- the present invention consists in a system for selecting and removing spam from a stream of mail received by a mail service or mail client comprising; i) a decoy e-mail mailbox with a decoy e-mail address which is not used for communication with other parties; ii) spam attracting means arranged to engage in activities known to attract spam, using the decoy e-mail address; iii) monitoring means which monitors the decoy e-mail mailbox for mail sent to the decoy address; iv) spam characteristic generating means arranged to generate a characteristic string for each e-mail received which can be used to identify other differently addressed copies of the same e- mail; v) a database of characteristic strings to which each new characteristic string is added as it is generated, vi) A mail filter associated with the mail service or mail client, the mail filter being arranged to monitor a stream of mail received by the mail service or mail client and to remove from the stream any mail having a characteristic matching one of the characteristic strings in the data base.
- the present invention consists in a method of generating a database of spam characteristic strings for detecting spam in a stream of mail received by a mail service or mail client comprising the steps of: i) establishing a decoy e-mail mailbox with a decoy e-mail address which is not used for communication with other parties; ii) engaging in activities known to attract spam using the decoy e-mail address; iii) monitoring the decoy mailbox for mail sent to the decoy address; iv) generating a characteristic string for each e-mail received which can be used to identify other differently addressed copies of the same e-mail; v) creating a database of characteristic strings and adding new characteristic strings as they are generated.
- the present invention consists in a system for generating a database of spam characteristic strings used for detecting spam in a stream of mail received by a mail service or mail client comprising: i) a decoy e-mail mailbox with a decoy e-mail address which is not used for communication with other parties; ii) spam attracting means arranged to engage in activities known to attract spam, using the decoy e-mail address; iii) mon toring means which monitors the decoy mailbox for mail sent to the decoy e-mail address; iv) spam characteristic generating means arranged to generate a characteristic string for each e-mail received which can be used to identify other differently addressed copies of the same e- mail; v) the database of characteristic strings being created by adding new characteristic string as it is generated.
- the present invention consists in a method of selecting and removing spam from a stream of mail received by a mail service or mail client comprising the steps of: i) creating a database of characteristic strings representing known spam messages received by a spam attractor; ii) providing the database to a mail filter associated with the mail service or mail client. iii) filtering a stream of mail received by the mail service or mail client to remove from the stream any mail having a characteristic which matches a characteristic string in the database.
- the present invention consists in a system for selecting and removing spam from a stream of mail received by a mail service or mail client comprising: i) a database of characteristic strings representing known spam messages received by a spam attractor; and ii) a mail filter associated with the mail service or mail client, the mail filter being arranged to monitor a stream of mail received by the mail service or mail client and to remove from the stream any mail having a characteristic which matches a characteristic string in the database.
- the server carrying the decoy mailbox, the server monitoring the decoy mailbox and the filter should preferably be closely linked such that when a piece of spam is received by the decoy mailbox, its characteristic can be determined and added to the database used by the filter as quickly as possible. This will require high speed communications between the decoy mailbox, the monitoring server and the filter.
- the term high speed communications means any communications method which is faster than the store and forward method used in email delivery systems.
- the mail delivery system would check the decoy mailbox and generate any new characteristics for the filter before accessing any user mailboxes on the mail server. In such a system, it may not be necessary to even have a dedicated decoy mailbox as it may be possible to subscribe to a service to be provided with spam characteristics generated via a centralised spam attracting and database building system.
- the "fingerprint” is constructed by a combination of linguistic, textual and numeric methods to yield a relatively short binary number that serves to identify the content of the spamed message, with a very high likelihood for uniqueness.
- the scheme of the preferred embodiment has the following advantages over conventional spam suppression techniques:
- the preferred scheme works by using a source of pure spam to leverage cleansing of mail streams that consist of a mixture of spam and non-spam. It is relatively easy to obtain a source of pure spam by creating one or more e- mail addresses that are made to engage in "high risk" activity known to attract spam. Because these e-mail addresses have no real interaction with real people, then any e-mail they receive must surely be spam.
- Spam is attracted by creating a series of e-mail addresses held by a spam attractor site 11 connected to the internet SMTP mail network 12, that are used to engage in high risk activities known to attract spam. This would include, but not be limited to:
- the spam attractor central site 11 is preferably connected to the Internet via a fast link, and as directly as possible, to minimize mail propagation delays.
- the spam would be sent to the various e-mail addresses in use. All spam received would be funnelled and subject to the same processing, regardless to which of the e-mail addresses it was actually sent to.
- e-mail addresses will be placed in different categories, depending on the type of spam attracting activities for which they were used.
- an e-mail address that was used to post a message to a newsgroup would receive the 'worst' kind of spam.
- another e-mail address that was used to join various mailing lists would be placed in a different category.
- spam is received and added to the fingerprint database, note would be kept of which category e-mail address the spam was addressed. This allows subscribers to the service to nominate whether they want all mass e-mail to be blocked, or only spam but not subscribed mailing lists, etc.
- the spam attractor 11 located at a central site 21 must regularly and continuously make POP connections to the various mail servers at which it has e-mail addresses in use. This can be done using standard POP software components.
- the central fingerprint database 14 contains a relational table with the following structure, and one row for each unique item of spam detected. TABLE SPAMDATABASE FINGERPRINT CODE VARCHAR UNIQUE KEY
- the following table maps the e-mail addresses receiving spam into the various categories. This table would be maintained as new e-mail addresses are created and maintained to ensure that spam is attracted from the best possible sources.
- the processing logic is as follows: 1. Obtain message.
- Fingerprint Algorithm There are many possible methods of calculating the fingerprint code, and in practice the method may be varied over time to combat countermeasures spamers may employ.
- the core method is to first dispose of the SMTP envelope which contains information about the e-mail and the path it took. From there, compute a binary signature over the remainder of the body of the message.
- a signature For example, a simple CRC or HMAC (Key-hashing for
- the Notification Processor is advised as new spam is identified. New spam is placed in a queue, containing the spam signature and the category.
- the Notification Processor contains database information identifying all the customers who have subscribed to the service, and which categories they wish to be informed of. This could be implemented using the following tables: TABLE CUSTOMERS CUSTOMERJD NUMERIC
- the Notification Processor When a new spam item is placed in the outgoing queue, the Notification Processor performs a SELECT on these two tables to determine which customers wish to obtain notifications for spam of that category, what the customers IP address is, and with what priority the customer is to be processed. These are queued in priority sequence. Priority of individual customers may be set according to commercial or other consideration.
- the Notification Processor continually works its queue, sending notifications. Each notification is a small TCP/IP packet sent to the customers chosen IP address and port number, containing the spam signature and category code.
- the Notification Processor opens multiple TCP/IP sockets at a time, so that individual slow customers do not impact other customers further down the queue.
- the maximum number of concurrent sockets is a tuning parameter, but would be started at some value such as 10. Failed transmissions are added to the end of the queue for customers of the same priority level. If the same notification to that customer fails again, it is added to the end of the queue for customers of the next lowest (less important) priority. Failed notifications that reach the lowest level of priority and still fail are logged and discarded.
- the processing that occurs in the spam filter 17 associated with the mail gateway 15 is as follows.
- the mail gateway calculates a mail signature using the same algorithm as the central site.
- the signature is looked up in the local database 16, and (subject to user- level over-ride processing described below), if found is discarded. If not found the e-mail is allowed to pass through.
- the mail gateway listens on the specified IP address and port number to receive notifications from the central site of new spam items. Such entries are simply added to the local database 16.
- a site may opt to receive notifications for various levels of spam, it is desirable to allow individual users 18 the option of not having spam blocked in that category.
- a site may opt for maximum protection and prevent spam from all categories.
- a bona fide user may wish to join a particular mailing list.
- the filter 17 associated with the customer mail gateway 15 must also contain a table of user over-rides, as follows
- the table is used as follows. When a matching spam message is detected, the mail gateway filter 17 inspects who the spam was being sent to, and what address it walic ; being sent from. It does a lookup using these compound keys and, if found, allows the e-mail to proceed.
- This process can also be applied to the prevention of propagation of e- mail computer viruses. Once a virus has come to the attention of a human operator, the virus is simply forwarded to the central spam attractor, and all client sites will thereafter be automatically protected against receipt of the virus.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Computer Hardware Design (AREA)
- Tourism & Hospitality (AREA)
- Data Mining & Analysis (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU26498/00A AU2649800A (en) | 2000-01-20 | 2000-02-10 | E-mail spam filter |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AUPQ5180A AUPQ518000A0 (en) | 2000-01-20 | 2000-01-20 | E-mail spam filter |
AUPQ5180 | 2000-01-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001053965A1 true WO2001053965A1 (fr) | 2001-07-26 |
Family
ID=3819307
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2000/000089 WO2001053965A1 (fr) | 2000-01-20 | 2000-02-10 | Filtre anti messages spam pour courrier electronique |
Country Status (2)
Country | Link |
---|---|
AU (1) | AUPQ518000A0 (fr) |
WO (1) | WO2001053965A1 (fr) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2373130A (en) * | 2001-03-05 | 2002-09-11 | Messagelabs Ltd | Method and system for processing e-mail to detect unsolicited bulk and/or commercial e-mail. |
DE10243243A1 (de) * | 2002-09-17 | 2004-03-25 | T-Mobile Deutschland Gmbh | Verfahren zur empfängerseitigen automatischen Behandlung von unerwünschter elektronischer Post in Kommunikationsnetzen |
GB2397139A (en) * | 2003-01-07 | 2004-07-14 | Intellprop Ltd | Telecommunications services apparatus for countering spam |
EP1447765A3 (fr) * | 2003-02-14 | 2004-09-15 | Microsoft Corporation | Méthode, appareil, et interface utilisateur pour contrôler le courrier électronique et les messages d'alerte |
WO2005071517A1 (fr) * | 2004-01-21 | 2005-08-04 | Quibus International Ab | Procede et dispositif d'amelioration de l'efficacite de la protection des donnees electroniques contre la reproduction pirate dans un reseau et evitement des systemes de filtrage |
WO2005091656A1 (fr) * | 2004-03-18 | 2005-09-29 | Telsis Holdings Limited | Dispositif et procedes permettant d'obtenir des services de telecommunication |
EP1635291A1 (fr) * | 2004-09-10 | 2006-03-15 | France Telecom | Procédé et agent de détection de messages non sollicités |
WO2007002002A1 (fr) * | 2005-06-20 | 2007-01-04 | Symantec Corporation | Procede et appareil pour le regroupement de pourriel |
WO2008053141A1 (fr) * | 2006-11-03 | 2008-05-08 | Messagelabs Limited | Détection de pourriel sous forme d'image |
EP1557763A4 (fr) * | 2002-12-06 | 2008-09-17 | Fujitsu Ltd | Terminal de communication et serveur de messagerie |
EP2079030A1 (fr) * | 2007-12-24 | 2009-07-15 | Intel Corporation | Système et procédé de filtrage des contenus video des utilisateurs par des empreintes digitales |
RU2387001C2 (ru) * | 2004-09-21 | 2010-04-20 | Майкрософт Корпорейшн | Надежная передача сообщений с использованием тактовых сигналов с синхронизированными частотами |
US7899870B2 (en) | 2007-06-25 | 2011-03-01 | Microsoft Corporation | Determination of participation in a malicious software campaign |
US8135778B1 (en) * | 2005-04-27 | 2012-03-13 | Symantec Corporation | Method and apparatus for certifying mass emailings |
US8438636B2 (en) | 2008-01-11 | 2013-05-07 | Microsoft Corporation | Secure and extensible policy-driven application platform |
US8612560B2 (en) | 2004-02-10 | 2013-12-17 | Sonicwall, Inc. | Message classification using domain name and IP address extraction |
US8776244B2 (en) | 2007-12-24 | 2014-07-08 | Intel Corporation | System and method for the generation of a content fingerprint for content identification |
US10019570B2 (en) | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5530853A (en) * | 1992-11-12 | 1996-06-25 | International Business Machines Corportaion | Method for filtering items in a computer application program container object using filter data for related entries in a container object of another application program |
GB2317793A (en) * | 1996-09-18 | 1998-04-01 | Secure Computing Corp | System and method of electronic mail filtering |
WO1999033188A2 (fr) * | 1997-12-23 | 1999-07-01 | Bright Light Technologies, Inc. | Appareil et procede servant a limiter la remise de courrier electronique non sollicite |
-
2000
- 2000-01-20 AU AUPQ5180A patent/AUPQ518000A0/en not_active Abandoned
- 2000-02-10 WO PCT/AU2000/000089 patent/WO2001053965A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5530853A (en) * | 1992-11-12 | 1996-06-25 | International Business Machines Corportaion | Method for filtering items in a computer application program container object using filter data for related entries in a container object of another application program |
GB2317793A (en) * | 1996-09-18 | 1998-04-01 | Secure Computing Corp | System and method of electronic mail filtering |
WO1999033188A2 (fr) * | 1997-12-23 | 1999-07-01 | Bright Light Technologies, Inc. | Appareil et procede servant a limiter la remise de courrier electronique non sollicite |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2373130B (en) * | 2001-03-05 | 2004-09-22 | Messagelabs Ltd | Method of,and system for,processing email in particular to detect unsolicited bulk email |
GB2373130A (en) * | 2001-03-05 | 2002-09-11 | Messagelabs Ltd | Method and system for processing e-mail to detect unsolicited bulk and/or commercial e-mail. |
DE10243243A1 (de) * | 2002-09-17 | 2004-03-25 | T-Mobile Deutschland Gmbh | Verfahren zur empfängerseitigen automatischen Behandlung von unerwünschter elektronischer Post in Kommunikationsnetzen |
DE10243243B4 (de) * | 2002-09-17 | 2005-01-27 | T-Mobile Deutschland Gmbh | Verfahren zur empfängerseitigen automatischen Behandlung von unerwünschter elektronischer Post in Kommunikationsnetzen |
EP1557763A4 (fr) * | 2002-12-06 | 2008-09-17 | Fujitsu Ltd | Terminal de communication et serveur de messagerie |
GB2397139A (en) * | 2003-01-07 | 2004-07-14 | Intellprop Ltd | Telecommunications services apparatus for countering spam |
EP1447765A3 (fr) * | 2003-02-14 | 2004-09-15 | Microsoft Corporation | Méthode, appareil, et interface utilisateur pour contrôler le courrier électronique et les messages d'alerte |
US7467183B2 (en) | 2003-02-14 | 2008-12-16 | Microsoft Corporation | Method, apparatus, and user interface for managing electronic mail and alert messages |
WO2005071517A1 (fr) * | 2004-01-21 | 2005-08-04 | Quibus International Ab | Procede et dispositif d'amelioration de l'efficacite de la protection des donnees electroniques contre la reproduction pirate dans un reseau et evitement des systemes de filtrage |
US9860167B2 (en) | 2004-02-10 | 2018-01-02 | Sonicwall Inc. | Classifying a message based on likelihood of spoofing |
US9100335B2 (en) | 2004-02-10 | 2015-08-04 | Dell Software Inc. | Processing a message based on a boundary IP address and decay variable |
US8856239B1 (en) | 2004-02-10 | 2014-10-07 | Sonicwall, Inc. | Message classification based on likelihood of spoofing |
US8612560B2 (en) | 2004-02-10 | 2013-12-17 | Sonicwall, Inc. | Message classification using domain name and IP address extraction |
WO2005091656A1 (fr) * | 2004-03-18 | 2005-09-29 | Telsis Holdings Limited | Dispositif et procedes permettant d'obtenir des services de telecommunication |
AU2005223809B2 (en) * | 2004-03-18 | 2009-07-02 | Solent Text Limited | Telecommunications services apparatus and methods |
US7797003B2 (en) | 2004-03-18 | 2010-09-14 | Solent Text Limited | Telecommunication services apparatus and methods for addressing the problem of mobile terminated message faking |
EP1635291A1 (fr) * | 2004-09-10 | 2006-03-15 | France Telecom | Procédé et agent de détection de messages non sollicités |
RU2387001C2 (ru) * | 2004-09-21 | 2010-04-20 | Майкрософт Корпорейшн | Надежная передача сообщений с использованием тактовых сигналов с синхронизированными частотами |
US8135778B1 (en) * | 2005-04-27 | 2012-03-13 | Symantec Corporation | Method and apparatus for certifying mass emailings |
WO2007002002A1 (fr) * | 2005-06-20 | 2007-01-04 | Symantec Corporation | Procede et appareil pour le regroupement de pourriel |
US7817861B2 (en) | 2006-11-03 | 2010-10-19 | Symantec Corporation | Detection of image spam |
WO2008053141A1 (fr) * | 2006-11-03 | 2008-05-08 | Messagelabs Limited | Détection de pourriel sous forme d'image |
US10019570B2 (en) | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
US7899870B2 (en) | 2007-06-25 | 2011-03-01 | Microsoft Corporation | Determination of participation in a malicious software campaign |
EP2079030A1 (fr) * | 2007-12-24 | 2009-07-15 | Intel Corporation | Système et procédé de filtrage des contenus video des utilisateurs par des empreintes digitales |
US8776244B2 (en) | 2007-12-24 | 2014-07-08 | Intel Corporation | System and method for the generation of a content fingerprint for content identification |
CN101470757B (zh) * | 2007-12-24 | 2012-07-18 | 英特尔公司 | 用于内容指纹过滤器的系统及方法 |
US8438636B2 (en) | 2008-01-11 | 2013-05-07 | Microsoft Corporation | Secure and extensible policy-driven application platform |
Also Published As
Publication number | Publication date |
---|---|
AUPQ518000A0 (en) | 2000-02-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9338026B2 (en) | Delay technique in e-mail filtering system | |
US20050081059A1 (en) | Method and system for e-mail filtering | |
US20050015626A1 (en) | System and method for identifying and filtering junk e-mail messages or spam based on URL content | |
US7580982B2 (en) | Email filtering system and method | |
US7653698B2 (en) | Identifying e-mail messages from allowed senders | |
US8103727B2 (en) | Use of global intelligence to make local information classification decisions | |
US8527592B2 (en) | Reputation-based method and system for determining a likelihood that a message is undesired | |
US7389413B2 (en) | Method and system for filtering communication | |
US7366761B2 (en) | Method for creating a whitelist for processing e-mails | |
EP1877904B1 (fr) | Detection de messages electroniques non sollicites a partir de l'analyse probabiliste de ressources referencees | |
US8219627B2 (en) | System for policing junk e-mail messages | |
US7206814B2 (en) | Method and system for categorizing and processing e-mails | |
US6941348B2 (en) | Systems and methods for managing the transmission of electronic messages through active message date updating | |
US7603472B2 (en) | Zero-minute virus and spam detection | |
WO2001053965A1 (fr) | Filtre anti messages spam pour courrier electronique | |
US20050091320A1 (en) | Method and system for categorizing and processing e-mails | |
US20050080857A1 (en) | Method and system for categorizing and processing e-mails | |
US20050091319A1 (en) | Database for receiving, storing and compiling information about email messages | |
US20060149823A1 (en) | Electronic mail system and method | |
WO2005119484A2 (fr) | Gestion de connexions et de messages au niveau d'un serveur par association d'actions differentes aussi bien pour des expediteurs differents que pour des destinataires differents | |
WO2000049776A1 (fr) | Procede et appareil permettant de mandater et de filtrer un message de courrier electronique | |
US20060265459A1 (en) | Systems and methods for managing the transmission of synchronous electronic messages | |
US7958187B2 (en) | Systems and methods for managing directory harvest attacks via electronic messages |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase |