WO2005111953A1 - Improved ticketing scheme - Google Patents
Improved ticketing scheme Download PDFInfo
- Publication number
- WO2005111953A1 WO2005111953A1 PCT/GB2005/001899 GB2005001899W WO2005111953A1 WO 2005111953 A1 WO2005111953 A1 WO 2005111953A1 GB 2005001899 W GB2005001899 W GB 2005001899W WO 2005111953 A1 WO2005111953 A1 WO 2005111953A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- validation
- isam
- ipe
- isams
- itso
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/045—Payment circuits using payment protocols involving tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3558—Preliminary personalisation for transfer to user
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F9/00—Details other than those peculiar to special kinds or types of apparatus
- G07F9/002—Vending machines being part of a centrally controlled network of vending machines
Definitions
- the present invention relates to an improved ticketing scheme utilising the basic structure of the ITSO scheme.
- the term 'ITSO' is intended to denote the Interoperable Ticketing Smartcard Organisation standards developed by UK Government and incorporated in European Standard EN 1545, in any of the versions currently available or which become available in future.
- the term 'ticketing scheme' does not only encompass traditional transportation ticketing operations but any secure scheme in which a ticket, token, voucher, or prescription is validated for redemption against the provision of goods or services.
- the existing ITSO scheme's security architecture depends on the inclusion of an ITSO Secure Application Module ('ISAM') at every point-of-service terminal ('POST') for every ticketing use, be it ticket sales or ticket validation. It is clear that for ticket franking the scheme policing functions performed by the ISAM must be completed in a very short period of time, so as not to impede service, when boarding a bus or passing through a turnstile.
- 'ISAM' ITSO Secure Application Module
- 'POST' point-of-service terminal
- the ISAM must be physically installed in the POST so that the transaction can take place 'off-line' of any central host computer which would otherwise be too slow and expensive to communicate with, especially for moving vehicles such as buses.
- an ITSO scheme in which sealing or validation of ITSO Product Entities (IPEs) is carried out by one of a plurality of ITSO Secure Application Modules ('ISAMs') at a location remote from ticket retailer devices from which the IPE fields are derived; each ticket retailer device is connected to an ISAM or plurality of ISAMs over the Internet or other network by control means operable to select an available ISAM from the plurality of ISAMs for the duration of a sealing or validation transaction initiated by that ticket retailer device.
- IPEs ITSO Product Entities
- 'ISAMs' ITSO Secure Application Modules
- the "sealing" of an IPE is in a sense providing an authentication code known as a MAC (message authentication code). This can be by using any of a number of known algorithms such as the DES algorithm. In essence, the IPE has a signature created and stored with the IPE so that the IPE can later be validated by checking the signature or authentication code.
- MAC message authentication code
- the validation of an IPE is the process of checking the previously generated authentication code produced when sealing the IPE. Validation is also known as authenticating and is conducted at the ISAM remote from the retailer devices. In the embodiment of the invention described, the process of sealing an IPE is conducted at an ISAM remote from the retailer device. In addition, the process of authenticating or validating the IPE is also conducted at the ISAM remote from the retailer devices.
- Such a scheme is particularly suited to the sale of transportation tickets, as mentioned above but is also suited to other schemes where the time taken to seal or validate a token, voucher or other 'ticket' is not critical.
- the scheme described may be used to validate prescriptions for pharmaceutical preparations and medicines.
- the invention further provides a scheme for issuing prescriptions for drugs wherein prescription information is transmitted by a doctor or other prescription writer in the form of an ITSO Product Entity ('IPE') sealed in accordance with the scheme of the invention outlined above.
- 'IPE' ITSO Product Entity
- prescriptions for drugs are validated by presenting prescription information at a validation device in the form of an ITSO Product Entity ('IPE') and validating that information at one of a plurality of ITSO Secure Application Modules ('ISAMs') at a location remote from the validation device (such as a POST) at which the IPE is presented for validation; each validation device being connected to an ISAM over the Internet or other network by control means operable to select an available ISAM from the array for the duration of a validation transaction initiated by that validation device.
- a validation device in the form of an ITSO Product Entity ('IPE') and validating that information at one of a plurality of ITSO Secure Application Modules ('ISAMs') at a location remote from the validation device (such as a POST) at which the IPE is presented for validation; each validation device being connected to an ISAM over the Internet or other network by control means operable to select an available ISAM from the array for the duration of a validation transaction initiated by that validation device.
- 'IPE'
- the invention also provides an ISAM array for use in a scheme of the kind outlined above, the array comprising a plurality of ISAMs and control means responsive to a retailer or validation request transmitted over the Internet or other network to the control means from a retailer or validation device at a remote location; the control means being operable to select an available ISAM from the plurality of ISAMs and to connect it to the retailer or validation device over the Internet or other network for the duration of a sealing or validation transaction initiated by that retailer or validation device.
- the "array" of ISAMs is a logical grouping of a plurality of ISAMs. This allows multiple requests for either sealing or authentication of IPEs to be submitted at any time and processed in parallel.
- the control means is able to determine the appropriate ISAM for any given sealing or authentication request.
- the ISAMs can be arranged in logical groups within the array so that a particular grouping of ISAMs is provided, for example, for any one source of sealing or validation requests.
- the source may be a particular retailer or operator such that requests for that given retailer or operator are provided to a corresponding one of the groups of ISAMs within the array.
- FIG. 2 shows diagrammatically an overview of the flow of events; and Figure 3 shows the flow of events in greater detail.
- the ITSO scheme operates using ITSO product entities (IPEs) which comprise data relating to a transaction and which are sealed, validated or authenticated using an algorithm as described above.
- the ITSO product entities themselves (IPEs) comprise a plurality of IPE fields which together comprise an IPE.
- the process of assembling the IPE fields into an IPE is known as construction.
- the construction of the IPE may be at the retailer device (POST) and at which the request for validation is made, or the retailer device may simply provide the IPE fields to a remote third party site at which the IPEs are constructed from the IPE fields. Whichever route is chosen, the IPEs are sealed at an ISAM remote from the retailer device.
- any request for authentication or validation of an IPE that has already been sealed is also made to the remote ISAM device.
- the fields of an IPE are also known as components.
- the system embodying the invention comprises two web servers.
- One of these ('SAM Array WebSite' or ISAS) has an 'array' of ISAMs attached, connected via the Internet to the other which carries third party websites ('3 rd Party WebSites') run by ticket retailers, which provide ticket selection functions to clients, who are the ticket purchasers.
- the ISAM array may have any number of ISAMs; in this case there are assumed to be X such ISAMs in the array.
- third party websites on the other server (there may in fact be any number of third party servers, each hosting any number of third party websites); in this case there are assumed to be Y such websites.
- Each ticket retailing website may, in turn, be accessible from a large number, Z, of devices from which it may be accessed by those wishing to purchase tickets.
- the ISAM array and its management layers act like a telephone switch, routing X ISAMs to Y third party websites which, in turn, route to Z terminals ('Customer Media Interface Devices') on a session-by-session basis. There are, thus X*Y*Z possible connections and this allows one array of ISAMs to be shared across more than one third party web ticket reselling website and by many more terminals.
- the combination of logical and physical components in the form of the hub and IPE handler shown in the diagram of figure 1 provides a control means by which requests for either validation or sealing of IPEs can be allocated to the appropriate SAM or group of SAMS within the SAM array.
- a customer logs onto a 3 rd party website in the usual way and the ticket purchase transaction is handled between the customer and the 3 rd party website in the usual way until payment has been effected and ticket details established.
- the 3 rd party website contacts the ITSO Sam Array Website ('ISAS') to establish a session.
- the ISAS establishes a session and transmits a session identification back to the 3 rd party website and on to the customer.
- the ISAS ('Customer Media Interface') initiates a dialogue with the customer until the ticket sealing transaction is complete.
- the IPE fields are generated at a third party website and are transmitted to the ISAS where the IPE is constructed. It is the ISAS which then transmits the IPE to the ISAM for sealing. As previously explained, it is also possible that the IPE could be constructed entirely at the retailer device or third party website.
- An additional feature of the embodiment (inherited from the ITSO scheme) is that the fields from which the IPEs are constructed are put together in an efficient manner so that any padding between fields is removed to ensure the construction of the IPE is small in size for subsequent storage in the users smart card (customer media device).
- the generation of an IPE may be either at a POST in which the entire IPE is constructed, or the fields of the IPE may be created at the POST and transmitted to a third party site for construction, or the fields of the IPE may be created at the third party site and transmitted to an ISAS for construction.
- the IPEs are derived from the POST or retailer devices in the sense that data input at the POST causes the IPE to be constructed either at the POST itself, at the third party site, or at the ISAS.
- Figure 3 shows this process in greater detail, in particular, the communication between the ISAS and the individual ISAM used in a particular transaction session.
- the details of the ITSO transactions carried out by the ISAM may be entirely conventional within the ITSO scheme.
- Providing the client terminal ('Customer Media Interface' or 'CMI') used to access the 3 rd party website, and thus the ISAS, has a smartcard reader device attached, ITSO Product Entities ('IPEs'), the ITSO formatted and secured 'ticket', can be loaded onto the CMD ('Customer Media Device') remotely, using the best level of security the particular type of CMD can support. Also, if the CMD is dual interface (ISO 7816-3 and ISO 14443) the reader device does NOT need to be an ISO 14443 reader which is advantageous, as these are more costly.
- the scheme of the invention described above provides a dynamically configurable, secure end-to-end protocol over the Internet between the ISAM and many different types of CMD, based on the level and kind of security the CMD can support.
- the security protocols may include the following:
- Card ID derived access passwords per memory sector While these are transferred 'in the clear' they were derived at CMD issuance and can only be used on one particular CMD.
- Mutual authentication based on shared secret keys (Card ID derived). This gives a higher level of assurance that the CMD is genuine, also, the CMD may only be updated following a successful mutual authentication.
- Secure messaging, based on shared secret keys (Session and Card ID derived). This ensures that the data read and written to/from the CMD cannot be altered 'in transit' or replayed at a later time, as it is 'sealed' with a one time session based cryptogram. This is over and above the security protecting the IPE contents itself.
- the ITSO Security Architecture can with very few modifications be used as the basis of an Open Scheme ("Open" meaning available to multiple users, some of whom are competitors, e.g. Visa is an Open Scheme) for the secure dispensing, fulfilment, payment and reimbursement of pharmaceutical prescriptions.
- Open meaning available to multiple users, some of whom are competitors, e.g. Visa is an Open Scheme
- the card held by the patient will need to also be a Secure ID card. It will have to have been issued to the patient using enrolment procedures secure enough to give the overall scheme operator confidence that the patient's identity can be authenticated satisfactorily and that duplicate enrolments have not occurred.
- enrolment procedures secure enough to give the overall scheme operator confidence that the patient's identity can be authenticated satisfactorily and that duplicate enrolments have not occurred.
- cryptographic and security protocol techniques which can be employed, and these in themselves are not the subject of this application.
- the patient's card has within it a secure data structure referred to in the ITSO specifications as an ITSO Shell.
- ITSO Shell This is, in effect, an electronic wallet for tickets of many different types.
- These ticket types have templates for the data items with pre-set definitions within each ticket or IPE ('ITSO Product Entity').
- IPE 'ITSO Product Entity'
- IPE Private
- Private an IPE type known as Private, in which none of the data items are defined, only the ITSO security is employed to 'seal' the ticket data, thus guaranteeing its integrity.
- the system described above utilising an array of remote ISAMs and shown in the drawings provides a practicable scheme by means of which a secure prescription issuing and filling may be carried out. Firstly, it avoids the need for an ISAM to be installed in every POST, in this case, in doctors' surgeries and in pharmacies. Further, it provides a means by which electronic tickets representing prescription information can be securely downloaded remotely over networks such as the Internet or Intranet (private network) versions thereof. This system keeps the ticket, or in this case prescription issuing process, secure by locating the security- providing elements (the ISAM) within a controlled location(s). However ISAMs could also be located within other locations such as doctors' surgeries and pharmacies.
- a ticket can be selected, paid for and delivered to a service user's card on line over the Internet.
- the architecture is based on two web sites, the first principally being responsible for the selection and payment, the second being responsible for the secure delivery. If the ticket in question now is in fact a prescription, the on-line process can be modified as follows.
- a doctor causes an IPE to be constructed either by construction at a POST within the doctor's surgery or by transmitting IPE fields to a third party site where the IPE is constructed.
- the IPE contains the prescription data and this is sealed at the SAM.
- the patient's card is also present at the POST in this process so that the sealing of the IPE is related to the patient's smart card.
- the patients can present their smart card and the sealed IPE can be validated based on the patient's smart card at a different POST at the pharmacy.
- the doctor authenticates to the prescription management web site and 'writes' the prescription for the patient.
- the doctor's card is involved in this process.
- the patient's card can be present at the same time or can log in later to 'pick up ' the prescription.
- the patient authenticates themselves to the prescription management web site, which then instigates the prescription download using the same processes described above.
- the pharmacist's terminal may have an ISAM, or may also be on line over an Intranet to an ISAM array server, which validates the prescription and modifies/franks it accordingly (depending on whether the prescription is a one-time or repeat).
- the ISAM then participates in the creation of a secure transaction record, which is uploaded at a later time to instigate payment and reimbursement procedures according to whatever commercial arrangements and policies apply for the particular individuals involved.
- prescription issuing can also occur "off-line" at a doctor's terminal, provided the terminal is fitted with three card readers (one for the doctor, one for the patient and one for the ISAM).
- This ISAM is also interrogated on occasion for its prescription issuing transaction records which provide a fully accounted scheme as compared against the pharmacist's transaction records.
- This 'closed loop' scheme will provide the same kinds of benefits as in the transport ticket area in terms of reducing discrepancies and many types of fraud.
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200580015555.2A CN1998028B (en) | 2004-05-14 | 2005-05-16 | Improved ticketing scheme |
BRPI0511130-7A BRPI0511130A (en) | 2004-05-14 | 2005-05-16 | improved ticket provisioning scheme |
EP05744903A EP1747541A1 (en) | 2004-05-14 | 2005-05-16 | Improved ticketing scheme |
JP2007512350A JP2007537524A (en) | 2004-05-14 | 2005-05-16 | Improved ticketing system |
AU2005242991A AU2005242991B2 (en) | 2004-05-14 | 2005-05-16 | Improved ticketing scheme |
US11/579,804 US20080195400A1 (en) | 2004-05-14 | 2005-05-16 | Ticketing Scheme |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0410861.9A GB0410861D0 (en) | 2004-05-14 | 2004-05-14 | Improved ticketing system |
GB0410861.9 | 2004-05-14 | ||
GBGB0428320.6A GB0428320D0 (en) | 2004-05-14 | 2004-12-23 | Improved ticketing system |
GB0428320.6 | 2004-12-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005111953A1 true WO2005111953A1 (en) | 2005-11-24 |
Family
ID=34968181
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2005/001899 WO2005111953A1 (en) | 2004-05-14 | 2005-05-16 | Improved ticketing scheme |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1747541A1 (en) |
JP (1) | JP2007537524A (en) |
AU (1) | AU2005242991B2 (en) |
BR (1) | BRPI0511130A (en) |
WO (1) | WO2005111953A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3441945A1 (en) * | 2017-08-07 | 2019-02-13 | Skidata Ag | Method for operating an access control system comprising a server, at least one access control device and at least one point-of-sale terminal for access rights for the area covered by the access control system |
JP2018116682A (en) * | 2017-10-11 | 2018-07-26 | Quadrac株式会社 | Server and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5850442A (en) | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
WO2001050429A1 (en) | 2000-01-05 | 2001-07-12 | American Express Travel Related Services Company, Inc. | Smartcard internet authorization system |
US20020013764A1 (en) | 2000-04-11 | 2002-01-31 | Juha-Petri Karna | Method and system for validating electronic transactions |
GB2368435A (en) * | 2000-10-28 | 2002-05-01 | Univ Salford | Prescription administration system |
US20030088672A1 (en) | 2001-10-29 | 2003-05-08 | Shinobu Togasaki | Apparatus and method for routing a transaction to a server |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3074950B2 (en) * | 1992-08-06 | 2000-08-07 | 日本電信電話株式会社 | IC card issuing device |
US6151591A (en) * | 1997-12-18 | 2000-11-21 | Pitney Bowes Inc. | Postage metering network system with virtual meter mode |
SE518725C2 (en) * | 2001-03-16 | 2002-11-12 | Smarttrust Systems Oy | Procedure and arrangement in a communication system |
-
2005
- 2005-05-16 EP EP05744903A patent/EP1747541A1/en not_active Ceased
- 2005-05-16 JP JP2007512350A patent/JP2007537524A/en active Pending
- 2005-05-16 WO PCT/GB2005/001899 patent/WO2005111953A1/en active Application Filing
- 2005-05-16 BR BRPI0511130-7A patent/BRPI0511130A/en not_active Application Discontinuation
- 2005-05-16 AU AU2005242991A patent/AU2005242991B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5850442A (en) | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
WO2001050429A1 (en) | 2000-01-05 | 2001-07-12 | American Express Travel Related Services Company, Inc. | Smartcard internet authorization system |
US20020013764A1 (en) | 2000-04-11 | 2002-01-31 | Juha-Petri Karna | Method and system for validating electronic transactions |
GB2368435A (en) * | 2000-10-28 | 2002-05-01 | Univ Salford | Prescription administration system |
US20030088672A1 (en) | 2001-10-29 | 2003-05-08 | Shinobu Togasaki | Apparatus and method for routing a transaction to a server |
Non-Patent Citations (3)
Title |
---|
DEPARTMENT FOR TRANSPORT: "ITSO Technical Specification 1000-0. Part 0 : Concept and context", 28 March 2004, QUEEN'S PRINTER AND CONTROLLER OF HER MAJESTY'S STATIONERY OFFICE 2004, NORWICH UK, XP002335098 * |
DEPARTMENT FOR TRANSPORT: "ITSO Technical Specification 1000-3. Part 3 : Terminals", 27 March 2004, QUEEN PRINTER AND CONTROLLER OF HER MAJESTY'S STATIONERY OFFICE 2004, NORWICH UK, XP002335099 * |
See also references of EP1747541A1 * |
Also Published As
Publication number | Publication date |
---|---|
AU2005242991A1 (en) | 2005-11-24 |
BRPI0511130A (en) | 2007-11-27 |
EP1747541A1 (en) | 2007-01-31 |
AU2005242991B2 (en) | 2010-02-25 |
JP2007537524A (en) | 2007-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5943423A (en) | Smart token system for secure electronic transactions and identification | |
US8175973B2 (en) | Internet payment, authentication and loading system using virtual smart card | |
US20170323298A1 (en) | System and method for securely transferring funds between persons | |
US20030028481A1 (en) | Credit card system and method | |
US20060190412A1 (en) | Method and system for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites | |
WO2001059727A2 (en) | Method and system for making anonymous electronic payments on the world wide web | |
JP2003099693A (en) | Electronic settlement method | |
WO2002063825A2 (en) | An optical storage medium for storing a public key infrastructure (pki)-based private key and certificate, a method and system for issuing the same and a method for using such | |
WO1997010560A1 (en) | Stored value transaction system and method using anonymous account numbers | |
WO2005089228A2 (en) | Internet debit system | |
US20230306422A1 (en) | Using a nested random number-based security ecosystem for block chains for electronic cash tokens and other embodiments | |
WO2001043084A2 (en) | Method of masking the identity of a purchaser during a credit transaction | |
EP1265200A1 (en) | Credit card system and method | |
AU2005242991B2 (en) | Improved ticketing scheme | |
US20020073315A1 (en) | Placing a cryptogram on the magnetic stripe of a personal transaction card | |
Sullivan | Can smart cards reduce payments fraud and identity theft? | |
Havinga et al. | Survey of electronic payment methods and systems | |
US20080195400A1 (en) | Ticketing Scheme | |
US20190139036A1 (en) | Method, apparatus, and computer-readable medium for securely performing digital asset transactions | |
JP2003507824A (en) | Guarantee system for performing electronic commerce and method used therefor | |
Pilioura | Electronic payment systems on open computer networks: a survey | |
WO2002001517A1 (en) | A method for carrying out electronic commerce transactions | |
Hansmann et al. | Smart Cards and e-business | |
ZA200106639B (en) | Credit card system and method. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006/08961 Country of ref document: ZA Ref document number: 200608961 Country of ref document: ZA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005242991 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 6495/DELNP/2006 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007512350 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580015555.2 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005744903 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2005242991 Country of ref document: AU Date of ref document: 20050516 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2005242991 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 551984 Country of ref document: NZ |
|
WWP | Wipo information: published in national office |
Ref document number: 2005744903 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: PI0511130 Country of ref document: BR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11579804 Country of ref document: US |