WO2000014716A1 - A method of and apparatus for generation of a key - Google Patents
A method of and apparatus for generation of a key Download PDFInfo
- Publication number
- WO2000014716A1 WO2000014716A1 PCT/SG1998/000067 SG9800067W WO0014716A1 WO 2000014716 A1 WO2000014716 A1 WO 2000014716A1 SG 9800067 W SG9800067 W SG 9800067W WO 0014716 A1 WO0014716 A1 WO 0014716A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- bit pattern
- key
- biometrics
- features
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000015654 memory Effects 0.000 claims abstract description 35
- 238000010606 normalization Methods 0.000 claims description 10
- 238000013528 artificial neural network Methods 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 3
- 230000002085 persistent effect Effects 0.000 claims description 2
- 238000012545 processing Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 3
- 230000008921 facial expression Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000002207 retinal effect Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000001757 thermogravimetry curve Methods 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 210000003462 vein Anatomy 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Definitions
- the present invention relates to the field of data, device and communication protection and access control and in particular to a method of and apparatus for generation of a key.
- biometrics data is used to gain access to a computer system.
- the biometrics data is stored on a token for future reference.
- the identity of the user is verified by comparing the biometrics data of the user with that stored on the token.
- a tokenless identification system is disclosed based on a correlative comparison of a unique biometrics sample, such as a fingerprint or voice recording, gathered directly from the person of an unknown user, with an authenticated biometrics sample of the same type obtained and stored previously.
- a unique biometrics sample such as a fingerprint or voice recording
- a method of generating a key or set of keys from a person's biometrics data comprising the steps of:
- a method of generating a representation of biometrics data comprising the steps of:
- a method of controlling access by generation of an access key from a person's biometrics data comprising the steps of: (1) capturing the person's biometrics data;
- a method of generating a key from the person's biometrics data which comprises the steps of:
- the invention further comprises apparatus for performing any of the above methods.
- a codebook to store data from which, upon retrieval, a key is generated, the codebook comprising distributed associative memory.
- the embodiment described is a tamper-resistant method and system to generate a unique key from biometrics of a person, using neural network associative memory.
- the captured biometrics data of a person may vary from time to time for reasons such as variation of the biometrics itself and variation of capturing conditions .
- the method compensates for this by first detecting invariant features from the biometrics. These features form feature measures in the format of a bit pattern which is stored in associative memory.
- the biometrics data is captured again from the user and the feature measures are again generated.
- the resulting bit pattern is then used to recall the bit pattern previously stored in the associative memory, which is unique to the user.
- a unique key can then be generated from the recalled pattern.
- the key may be of any kind, for example a public/private key pair, identity key or symmetry key.
- Figure 1 is a flow chart of the algorithm of an embodiment of the present invention.
- Figure 2 illustrates the functions of parallel distributed associative memory in the embodiment of Figure 1.
- Figure 3 illustrates feature points of a finger print.
- Figure 4 illustrates a variation of the embodiment of the present invention in which multiple biometrics are combined for key generation.
- Figure 5 illustrates another variation of the embodiment of the present invention using multiple associative memory codebooks .
- the method has the following basic steps :
- Biometrics data acquisition (1) In this step, acquisition devices such as a finger print scanner / sensor are used to capture image data or other forms of biometrics data.
- Step 2 the data of Step 1 is processed in order to reduce the effect of variations due to capturing condition changes. Such processing includes scale change, translation, rotation, and lighting and background changes.
- Feature encoding (3) In this step, feature measures which represent the invariant features of the biometrics are extracted and a bit pattern is generated from the feature measures .
- Feature Registration and Matching (4) In this step the feature measure bit pattern is processed by a codebook 4a implemented as distributed associative memory. In an enrolment and registration step 4b, the bit pattern stored into the associative memory by learning. In a subsequent matching/recognition step 4c, a subsequently generated bit pattern is used to recall the bit pattern previously stored in the codebook to provide an activated pattern at step 4d.
- a key is generated from the activated pattern.
- the generated key is registered with the relevant authority or used to lock or encrypt the items to be protected.
- the generated key is used to unlock or decrypt the items protected, or to authorize the person.
- the technique employed for acquiring the biometrics data depends on the biometrics used.
- fingerprint and face biometrics data are used as examples of the method.
- fingerprints either of the two primary techniques, i.e. inked or live scan may be used.
- live scan the fingerprint image is obtained by the scanner directly.
- face a digital picture of the face is obtained either through scanning of a photograph or directly with a digital camera.
- biometrics data in the form of a digital image is obtained.
- the capture device For additional authentication, it is desirable to capture live biometrics data, that is, the capture device must be able to verify that the biometrics data captured is from a live person. This can be done by by employing various techniques for various biometrics.
- face recognition where the video camera continuously captures a face image with a speed, for example of 30 frames per second, a processing function to check for motion of the face and facial expressions may be employed. If both face motion and facial expressions are regular, the face images captured are "live". They will be rejected as false otherwise.
- scanners which make use of the properties of a "live” fingerprint.
- the aquisition system can prompt the speaker to repeat a voice segment (eg a phrase or name) several times and check for variations, the absence of which between any two segments will cause the biometrics data to be rejected.
- the biometrics data is normalised with reference to landmarks, which are central to the data and exist for all circumstances.
- the normalization is then done using these landmarks.
- normalization is meant scaling the data range to a standard range and transforming the biometrics image to a standard location, orientation, and scale.
- the typical normalization methods for fingerprint and face biometrics data are well known in the art and examples are as follows:
- Finger print Filtering to enhance minutiae points, identification of the core (a small but consistent part of the finger) and use of the core location and orientation to define a geometric transform for normalization.
- Face Identify the face region and eyes, use the location of two eyes to define a geometric transform. Focus on face region and perform histogram normalization to reduce the effect of background and lighting condition changes and transform the face image using the defined geometric transform.
- a bit pattern is generated to represent the invariant features of the biometrics of a person.
- the bit pattern is not a binary version of the actual biometrics image but is formed by using salient feature points and possible lines linking those feature points.
- Figure 3 shows an example of feature points used to generate a bit pattern of a finger print. Here, salient feature points are highlighted with black points linked by the lines shown. Since invariant salient feature points are extracted from the normalized image, for the same person, the locations of those feature points would be almost the same.
- minutiae points of fingerprints are used as feature points.
- feature points such as the corners detected by Harris and Stephens (Harris, C. and Stephens, M. (1988) A combined corner and edge detector, Proc. 4 t Alvey Vision Conference, pp 147-151) are invariant and can be used to form the bit pattern.
- Feature points are of varying importance and a representation scheme for the bit pattern generation may be used. For example, in a fingerprint image, minutiae points are considered more important than ridge points, so more (data) bits can be assigned to represent the minutiae points in the bit pattern.
- the data forming the bit patterns may represent feature points from a smaller area than the original biometrics image with the central part emphasized, since parts far from central part may be missing in some cases.
- Associative memory codebooks can be implemented using various neural networks provided the stored patterns are randomly distributed. Hopfield-like networks are one of the possible implementations and will be used to explain this part of the described embodiment of the invention.
- the network is fully connected.
- a node receives input from all other nodes.
- the total energy function of the network system is defined as summation of productions of value of all possible pairs of nodes and the link weight between them.
- the energy minima are referred to as stable states.
- the network stores information via its stable points in the state space.
- the state evolution of the network system performs a gradient descent toward energy minima, and always ends up in a state of equilibrium. When the system reaches equilibrium, no state changes will happen to any node of the neural network system.
- bit patterns are stored by learning.
- One or several bit patterns representing the biometrics of a person are presented to the network as input and the network will evolve to create a stable state corresponding to the input patterns .
- the information retrieval is performed by state evolution. When a subsequent input bit pattern is presented, all nodes obtain their initial state from the input bit pattern. The information is retrieved when the state evolution reaches a local stable point.
- the retrieved (activated) pattern is represented by states of MN nodes as a binary word of MN bits .
- Figure 2 illustrates the functions provided by the associative memory which plays the roles of both matching/recognition (10) and biometrics database (12) of prior art methods. It is also coupled with the decision making (14) and key generation (16) /rejection (18) process in the sense that tolerance of distortion of the recalled bit pattern is reflected in the key generation, and that the key is directly generated from the recalled bit pattern while in the prior art, the key is assigned using separated methods. By doing so, the method of the described embodiment successfully hides the biometrics database and the key generation methods, making them difficult to attack.
- the key to be generated which can be used as a public/private key pair and/or an identity key, requires more than 128 bits for security reasons.
- the network evolution will converge to a stable state.
- the tamper resistance of the present method can best be explained in answer to the following question: if an attacker randomly input a biometrics pattern, what is the probability that the network converges to a stored valid biometrics pattern? This can be looked at in three ways:
- the energy function actually represents the correlation between the input pattern and the stored pattern.
- the recalled pattern is a mixture of the input pattern and the stored pattern (see book “Neural Networks and Simulation Methods” by Jian Kang WU, Marcel Dekker Inc.) .
- the generated key will not be a valid one if the input pattern is quite different from the recalled one. That is to say, the input pattern must resemble the stored valid pattern in order to generate a valid key.
- biometrics there should not be any two identical biometrics patterns.
- Hopfield network can be as high as 2N even for non-orthogonal patterns using the learning method by Krauth and Mezard (See “Neural Networks” by B. Muller, J. Reinhardt; Springer-Verlag) .
- Krauth and Mezard See “Neural Networks” by B. Muller, J. Reinhardt; Springer-Verlag
- the associative memory Since there may be noise in the storage and retrieval process of the associative memory, it is preferred not to use directly the whole bit pattern represented by the network stable state to generate keys. Rather, only the most reliable and important feature points in the bit pattern are used. To decide on these points, a person to be enrolled in the enrolment/registration phase will repeat the step (1) of having his/her biometrics data captured as samples.
- the reliable feature points are defined as those points persistent for all sample biometrics data collected in the enrolment/registration phase.
- a hash algorithm (see book: Bruce Schneider, Applied Cryptography: protocols, algorithms and source code in C; John Wiley & Sons 1996) can be used to generate a unique key, that may be further used to generate the private key and public key for a specific application, such keys then being used to encrypt and decrypt data as this is input and output.
- the key needs to be changed within a certain period. This can be achieved by adding and changing at least one parameter in the key generation program.
- biometrics can be combined for authentication. For example, using multiple finger prints, a combination of finger print with voice, etc. This is illustrated in Fig. 4 in which one set of processing modules 3-4d ...4d' ...4d" (capturing, normalisation, feature extraction and encoding, and registration/recall of associative memory codebook) for each biometrics is necessary to obtain recalled/activated pattern. All recalled/activated patterns (1, 2, ...,n) are then input to key generation module, and combined to generate one key.
- processing modules 3-4d ...4d' ...4d capturing, normalisation, feature extraction and encoding, and registration/recall of associative memory codebook
- finger print data (1, 2, ...,n) are processed using one set of processing modules to obtain activated patterns for respective finger prints.
- a key is generated using all of recalled patterns.
- one associative memory may not be able to store all biometrics patterns.
- multiple parallel associative memories 4a, 4a', 4a" and 4a'" can be used as illustrated in Fig. 5. Since such memories will run in parallel, the speed of authentication will not be reduced.
- the method of the present invention can be implemented with a digital processor for example an ordinary computer, suitably programmed.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Biodiversity & Conservation Biology (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG1998/000067 WO2000014716A1 (en) | 1998-09-07 | 1998-09-07 | A method of and apparatus for generation of a key |
AU91960/98A AU9196098A (en) | 1998-09-07 | 1998-09-07 | A method of and apparatus for generation of a key |
EP98944421A EP1112554A1 (en) | 1998-09-07 | 1998-09-07 | A method of and apparatus for generation of a key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG1998/000067 WO2000014716A1 (en) | 1998-09-07 | 1998-09-07 | A method of and apparatus for generation of a key |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000014716A1 true WO2000014716A1 (en) | 2000-03-16 |
Family
ID=20429869
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SG1998/000067 WO2000014716A1 (en) | 1998-09-07 | 1998-09-07 | A method of and apparatus for generation of a key |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1112554A1 (en) |
AU (1) | AU9196098A (en) |
WO (1) | WO2000014716A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002078249A1 (en) * | 2001-03-23 | 2002-10-03 | Kent Ridge Digital Labs | Method of using biometric information for secret generation |
WO2002065693A3 (en) * | 2001-02-14 | 2003-02-27 | Scient Generics Ltd | Cryptographic key generation apparatus and method |
WO2002098053A3 (en) * | 2001-05-31 | 2003-09-04 | Scient Generics Ltd | Biometric value generation apparatus and method |
WO2003103217A1 (en) * | 2002-01-20 | 2003-12-11 | Scientific Generics Limited | Biometric authentication system |
WO2003044744A3 (en) * | 2001-11-23 | 2003-12-24 | Koninkl Kpn Nv | Security method and system |
EP1654854A2 (en) * | 2003-08-01 | 2006-05-10 | Philips Intellectual Property & Standards GmbH | Configuring a network connection |
CN101976321A (en) * | 2010-09-21 | 2011-02-16 | 北京工业大学 | Generated encrypting method based on face feature key |
US7996683B2 (en) | 2001-10-01 | 2011-08-09 | Genkey As | System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys |
WO2011113478A1 (en) * | 2010-03-16 | 2011-09-22 | Carlo Trugenberger | Authentication system, method for authenticating an object, apparatus for producing an identication device, method for producing an identification device |
US8165289B2 (en) | 2006-07-06 | 2012-04-24 | University Of Kent | Method and apparatus for the generation of code from pattern features |
US8572673B2 (en) | 2004-06-10 | 2013-10-29 | Dominic Gavan Duffy | Data processing apparatus and method |
CN112733173A (en) * | 2021-01-18 | 2021-04-30 | 北京灵汐科技有限公司 | Image processing method, device, secret key generating method, device, training method and device, and computer readable medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4243908A1 (en) * | 1992-12-23 | 1994-06-30 | Gao Ges Automation Org | Digital signature signal generation |
US5497430A (en) * | 1994-11-07 | 1996-03-05 | Physical Optics Corporation | Method and apparatus for image recognition using invariant feature signals |
WO1996008093A1 (en) * | 1994-09-07 | 1996-03-14 | Mytec Technologies Inc. | Biometric controlled key generation |
-
1998
- 1998-09-07 EP EP98944421A patent/EP1112554A1/en not_active Withdrawn
- 1998-09-07 WO PCT/SG1998/000067 patent/WO2000014716A1/en not_active Application Discontinuation
- 1998-09-07 AU AU91960/98A patent/AU9196098A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4243908A1 (en) * | 1992-12-23 | 1994-06-30 | Gao Ges Automation Org | Digital signature signal generation |
WO1996008093A1 (en) * | 1994-09-07 | 1996-03-14 | Mytec Technologies Inc. | Biometric controlled key generation |
US5497430A (en) * | 1994-11-07 | 1996-03-05 | Physical Optics Corporation | Method and apparatus for image recognition using invariant feature signals |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002065693A3 (en) * | 2001-02-14 | 2003-02-27 | Scient Generics Ltd | Cryptographic key generation apparatus and method |
WO2002078249A1 (en) * | 2001-03-23 | 2002-10-03 | Kent Ridge Digital Labs | Method of using biometric information for secret generation |
WO2002098053A3 (en) * | 2001-05-31 | 2003-09-04 | Scient Generics Ltd | Biometric value generation apparatus and method |
US8229177B2 (en) | 2001-05-31 | 2012-07-24 | Fountain Venture As | Data processing apparatus and method |
US7996683B2 (en) | 2001-10-01 | 2011-08-09 | Genkey As | System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys |
WO2003044744A3 (en) * | 2001-11-23 | 2003-12-24 | Koninkl Kpn Nv | Security method and system |
WO2003103217A1 (en) * | 2002-01-20 | 2003-12-11 | Scientific Generics Limited | Biometric authentication system |
US7882363B2 (en) | 2002-05-31 | 2011-02-01 | Fountain Venture As | Biometric authentication system |
EP1654854A2 (en) * | 2003-08-01 | 2006-05-10 | Philips Intellectual Property & Standards GmbH | Configuring a network connection |
US8572673B2 (en) | 2004-06-10 | 2013-10-29 | Dominic Gavan Duffy | Data processing apparatus and method |
US8165289B2 (en) | 2006-07-06 | 2012-04-24 | University Of Kent | Method and apparatus for the generation of code from pattern features |
WO2011113478A1 (en) * | 2010-03-16 | 2011-09-22 | Carlo Trugenberger | Authentication system, method for authenticating an object, apparatus for producing an identication device, method for producing an identification device |
US9268990B2 (en) | 2010-03-16 | 2016-02-23 | Carlo Trugenberger | Apparatus and method for producing an identification device |
CN101976321A (en) * | 2010-09-21 | 2011-02-16 | 北京工业大学 | Generated encrypting method based on face feature key |
CN112733173A (en) * | 2021-01-18 | 2021-04-30 | 北京灵汐科技有限公司 | Image processing method, device, secret key generating method, device, training method and device, and computer readable medium |
Also Published As
Publication number | Publication date |
---|---|
AU9196098A (en) | 2000-03-27 |
EP1112554A1 (en) | 2001-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar Jindal et al. | Face template protection using deep convolutional neural network | |
Natgunanathan et al. | Protection of privacy in biometric data | |
Patel et al. | Cancelable biometrics: A review | |
US6851051B1 (en) | System and method for liveness authentication using an augmented challenge/response scheme | |
Teoh et al. | Cancelable biometrics realization with multispace random projections | |
O'Gorman | Comparing passwords, tokens, and biometrics for user authentication | |
US7398549B2 (en) | Biometric authentication with security against eavesdropping | |
Kaur et al. | Biometric template protection using cancelable biometrics and visual cryptography techniques | |
Riaz et al. | Biometric template security: an overview | |
Zheng et al. | Facial biohashing based user-device physical unclonable function for bring your own device security | |
WO2000014716A1 (en) | A method of and apparatus for generation of a key | |
Nafea et al. | Hybrid multi-biometric template protection using watermarking | |
Keller et al. | Fuzzy commitments offer insufficient protection to biometric templates produced by deep learning | |
CN117061235A (en) | Identity authentication method, system, equipment and computer readable storage medium | |
Takahashi et al. | Parameter management schemes for cancelable biometrics | |
Latha et al. | A study on attacks and security against fingerprint template database | |
Tarek | Face Templates Encryption Technique Based on Random Projection and Deep Learning. | |
Ahmad | Global and local feature-based transformations for fingerprint data protection | |
Chand et al. | Biometric authentication using SaaS in cloud computing | |
Tuyls et al. | Privacy protecting biometric authentication systems: an overview | |
Cimato et al. | Biometrics and privacy | |
Sharma et al. | A novel transformation based security scheme for multi-instance fingerprint biometric system | |
Al-Assam et al. | Multi-factor challenge/response approach for remote biometric authentication | |
Punithavathi et al. | Cancelable biometric template security using segment-based visual cryptography | |
Pandiaraja et al. | An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WD | Withdrawal of designations after international publication |
Free format text: AL, AM, AT, AU, AZ, BA, BB, BG, BR, BY, CA, CH, CN, CU, CZ, DE, DK, EE, ES, FI, GB, GE, GH, GM, HU,ID, IL, IS, JP, KE, KG, KP, KR, KZ, LC, LK, LR, LS, LT, LU, LV, MD, MG, MK, MN, MW, MX, NO, NZ, PL, PT, RO, RU, SD, SE, SI, SK, SL, TJ, TM, TR, TT, UA, UG, UZ, VN, YU, ZW; AP (GH, GM, KE, LS, MW, SD, SZ, UG, ZW); EA (AM, AZ, BY, KG, KZ, MD, RU, TJ, TM); EP (AT, BE, CH, CY, DE, DK, ES, FI, FR, GB, GR, IE, IT, LU, MC, NL, PT, SE); OA (BF, BJ, CF, CG, CI, CM, GA, GN, GW, ML, MR, NE, SN, TD, TG) |
|
WD | Withdrawal of designations after international publication |
Free format text: AL, AM, AT, AU, AZ, BA, BB, BG, BR, BY, CA, CH, CN, CU, CZ, DE, DK, EE, ES, FI, GB, GE, GH, GM, HU,ID, IL, IS, JP, KE, KG, KP, KR, KZ, LC, LK, LR, LS, LT, LU, LV, MD, MG, MK, MN, MW, MX, NO, NZ, PL, PT, RO, RU, SD, SE, SI, SK, SL, TJ, TM, TR, TT, UA, UG, UZ, VN, YU, ZW; AP (GH, GM, KE, LS, MW, SD, SZ, UG, ZW); EA (AM, AZ, BY, KG, KZ, MD, RU, TJ, TM); OA (BF, BJ, CF, CG, CI, CM, GA, GN, GW, ML, MR, NE, SN, TD, TG) |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998944421 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09763624 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 1998944421 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998944421 Country of ref document: EP |