[go: up one dir, main page]

WO2001030036A1 - Dispositif pour serveurs proxy h.323 - Google Patents

Dispositif pour serveurs proxy h.323 Download PDF

Info

Publication number
WO2001030036A1
WO2001030036A1 PCT/NO2000/000336 NO0000336W WO0130036A1 WO 2001030036 A1 WO2001030036 A1 WO 2001030036A1 NO 0000336 W NO0000336 W NO 0000336W WO 0130036 A1 WO0130036 A1 WO 0130036A1
Authority
WO
WIPO (PCT)
Prior art keywords
network adapter
arrangement according
media
port
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/NO2000/000336
Other languages
English (en)
Inventor
Knut Snorre Bach Corneliussen
Kevin Kliland
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Priority to GB0209264A priority Critical patent/GB2371457B/en
Priority to DE10085067T priority patent/DE10085067T1/de
Priority to AU11796/01A priority patent/AU1179601A/en
Publication of WO2001030036A1 publication Critical patent/WO2001030036A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • H04L65/1106Call signalling protocols; H.323 and related
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/663Transport layer addresses, e.g. aspects of transmission control protocol [TCP] or user datagram protocol [UDP] ports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/256NAT traversal
    • H04L61/2564NAT traversal for a higher-layer protocol, e.g. for session initiation protocol [SIP]

Definitions

  • the present invention relates to large scale multimedia network implementations according to the H.323 standard recommendation of the International Telecommunication Union, and especially to such networks comprising firewalls.
  • the recommended standard H.323 describes multimedia networks and communication therein, wherein such networks may include local area networks (LAN) such as a LAN in a private enterprise, a public agency, a business corporation or some other type of organisation.
  • LAN local area networks
  • a firewall In order to protect a LAN connected to other networks from unauthorised, and possibly hostile access from network users outside the LAN, communication between the LAN and other networks is often run through a protection arrangement referred to as a firewall.
  • the firewall interacts with the communication so as to limit or refuse undesired or unwanted communication according to a given set of rules.
  • H.323 Important areas covered by H.323 are: a) Registration, admission and status (RAS) signalling, b) Q.931 and H.245 signalling, and c) traffic and media channels
  • RAS is usually signalled over predefined ports and is accordingly trivial to get through firewalls.
  • Q.931 and H.245 are usually signalled over dynamically allocated ports and hence more difficult to get through firewalls.
  • GK Gatekeeper
  • Performance improvements e.g. by multiplexing traffic, prioritising traffic or QoS (Quality of Service), eavesdropping, interfering with the media (e.g. for adding commercials) and bridging (e.g. between protocols and or protocol versions), security mechanisms (integrity, authentication and privacy) all points out functionality normally hard to achieve in H.323 networks.
  • QoS Quality of Service
  • eavesdropping interfering with the media (e.g. for adding commercials) and bridging (e.g. between protocols and or protocol versions), security mechanisms (integrity, authentication and privacy) all points out functionality normally hard to achieve in H.323 networks.
  • UDP User Datagram Protocol
  • TCP Transmission Control Protocol
  • IPSEC Internet Protocol Security
  • US 5 802 058 discloses a media manager in a communications network that intermediates connection setup between endpoints and marshals resources for the connection
  • WO 98/37664 describes a network wherein a set of media components including IP traffic is encapsulated in an ATM VC as an entity and switched using a robust signalling system to employ resultant connection records for usage based tarriffing
  • US 5 898 830 discloses a firewall providing enhanced network security and user transparency.
  • an object of the present invention is to propose an arrangement which is capable of solving all of the problems mentioned in the Problem Areas section of this specification.
  • the objects of the present invention is achieved by providing an H.323 proxy, hereinafter referred to as a network adapter (NA), which could be embodied by implementation as a small computer application.
  • the NA is typically located somewhere on the LAN or the border of corporate LAN, and usually in the demilitarised zone (DMZ) of a firewall.
  • the network adapter of the present invention is capable of solving all of the problems mentioned in the Problem Areas section of this specification.
  • the network adapter receives all the signalling (RAS/Q.931 /H.245 hence is itself a GK) as well as the media (RTP/RTCP) from its connected endpoints, other network adapters and/or one or more H.323 gatekeepers (GK).
  • RAS/Q.931 /H.245 hence is itself a GK
  • RTP/RTCP media from its connected endpoints
  • Figure A is a schematic drawing of an example a possible configuration of a multimedia network incorporating the network adapter of the present invention
  • figure B is a schematic drawing of a network adapter of the present invention.
  • FIG 1 an example of a typical signalling scenario is shown, wherein an endpoint (1) behind a NA (2) is communicating with another endpoint (5) behind another NA (4), and wherein both NAs are communicating with the same GK (3) .
  • the same signalling scenario could also be described by: endpoint (1) -> network adapter (2) -> gatekeeper (3) -> network adapter (4) -> endpoint (5).
  • a network adapter of the present invention The important features of a network adapter of the present invention are: a) Endpoints need not be made aware of the fact that its traffic is passed through a network adapter. b) There is no constraint on the number of network adapters that could forward traffic between endpoints.
  • a network adapter consisting of two different modules.
  • One module is a controlling part (6) for controlling the H.323 signalling (RAS/Q.931/H.245) and another is a forwarding part (7) for forwarding media packets.
  • the controlling module or part (6) is responsible for communicating with endpoints, gatekeepers and other network adapters. It is also responsible for providing instructions to the forwarding part regarding where to expect traffic, and to where this traffic should be sent.
  • the forwarding module or part (7) simply forwards media traffic from a NA port connected to an H.323 client to a NA port connected to another NA. Hence this part is a prerequisite when traversing firewalls. Since the forwarding part also handles TCP, T.120 is supported also for the T.120 clients dynamically allocating ports
  • the NA of the present invention is contemplated also to include functionality such as: a) Enabling of support for firewalls and Network Address Translation (NAT).
  • NAT Network Address Translation
  • the network adapter of the present invention can use the H.245 part of H.323 to instruct endpoints and NAs on which port and IP address to send traffic.
  • it is simple to configure a firewall to support this arrangement by opening a predefined range of ports.
  • the network adapters of the present invention should be placed in a De-Militarised Zone (DMZ).
  • DMZ De-Militarised Zone
  • the F- interface (8) is used by the controlling part for instructing the forwarding part on which connections to forward traffic, as described earlier.
  • Such functionality will be provided by the controlling part and may be used when setting up new connections d) Multiplexing of the signalling connections in order to enhance performance. This requires a signalling multiplexing protocol that could work in the same way as a media multiplexing protocol, although on TCP instead of UDP. This functionality is provided by the controlling part.
  • Provision of integrity, authentication and privacy can easily be applied between network adapters. For such purposes, IPSEC and or SSL may be applied.
  • a configuration manager may decide the kind of security mechanisms which is to apply between different NAs.
  • SSL could be used for all TCP (used for signalling) connections between certain identified GKs and NAs.
  • a manager may specify that between certain identified NAs, IPSEC shall be used on all UDP connections. This functionality can be provided by the controlling or the forwarding part, or by a combination of these.
  • the controlling part, the F- interface and the forwarding part makes use of methods for copying UDP packets on certain predefined connections, and then forward such copies to a recording unit.
  • Different kinds of bridging can be located in the network adapter of the present invention. Such bridging may be to translate between different versions of the standard, such as version 1 of h.323 to version 2. or between different standards, such as SIP to H323. This functionality may be provided by the controlling or the forwarding part, or a combination of these.
  • Interacting with the media channels by means of a media Application Programmers Interface ( API), located above the forwarding part.
  • API media Application Programmers Interface
  • the forwarding part (7) provides an interface with three basic commands or messages and their corresponding acknowledge messages and return values: a) openChannel(direction, protocol) -> return freePort, status(d l ⁇ ⁇ X ok) b) startChannel(direction, port, remotelpAddress, r ⁇ motePort, protocol) -> return status (ok/not ok) c) closeChannel ⁇ ort, direction, protocol) -> return status (ok/not ok)
  • the parameter direction indicates either from the LAN environment to the external environment or from the external environment to the LAN environment.
  • the parameter protocol is either TCP or UDP, indicating that the network adapter example according to the present invention is also supporting TCP packets forwarding, although initially built to forward UDP packets.
  • the reason for separating openChannel and startChannel was to optimise the code.
  • the message openChannel initiates and sets up parts of the environment that may be initiated and prepared before the startChannel command is executed, such as for getting a free server port etc.
  • the H.323 message that triggers both the openChannel and startChannel messages is the Q.931 set-up message when running fast start, and the H.245 openLogicalChannel message when running plain H.323. On closing, it is in order the Q.931 releaseComplete and H.245 closeLogicalChannel that invokes closeChannel. This applies in both cases when running TCP and UDP. To clarify, when running fast start, the H.245 openLogicalChannel is in fact tunnelled within the Q.931 set-up message. The openChannel and startChannel messages could in this scenario have been merged, but have, however, in other scenarios proven useful to be kept separate.
  • the network adapter comprises functionality for allowing signals/messages to traverse several nodes.
  • a node can be an endpoint, a NA (network adapter) or a gatekeeper (in SIP, a SIP server).
  • NA network adapter
  • SIP network adapter
  • NA network adapter
  • NA gatekeeper
  • NA NA
  • Plain e.g. H.323 systems don't have such functionality, but this is provided in systems including the NA according to the invention.
  • Two different solutions or approaches can support node traversal:
  • each node stores such information, preferably persistent;
  • the signals/messages are updated with such information as the messages are transported through the system, and, hence, through NAs.
  • Each node, or the message itself, must maintain data on which node that sent a message and to which node the message is going to be passed.
  • Endpoint or endpoint-like data The home environment, represented by an H.323 gatekeeper (or SIP server) in this document, receives endpoint and or network adapter like information.
  • NA like information might be accesstype (e.g. H323Phone, H323Pc PstnUni, PstnNni, H320Uni, H320Nni, GsmUni, GsmNni, PbxUni). Or similarly, for SIP systems, SipPhone, SipPc, etc.. If the message itself is going to maintain information on addresses, the following elements are added in the messages:
  • Address pair list Each node in the system adds its addresses to the address pair list. There might in fact be several addresses for each node: The physical address of the node, the address of the voice channel, the media channel,etc.
  • Link index The link index identifies which node is currently addressed in the address pair list. Messages can be issued either from the endpoints or the home environment gatekeepers. The link index only has to be used when messages are issued from the home environment gatekeepers. Then, the whole addressing path down to the endpoint should be included in the messages before the message traverse down to the endpoint. On the way, only the link index is modified.
  • the range of ports that the forwarding part of the NA is going to use has to be configured both on the firewall and the NA.
  • T.120 is supported also for the T.120 clients dynamically allocating ports

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention concerne, dans des réseaux multimédias comprenant des coupe-feu, un dispositif destiné à une unité de communication, en particulier à des serveurs proxy H.323, l'invention faisant intervenir un adaptateur réseau (NA) (2, 4). Le NA (2, 4) comprend des mécanismes permettant d'autoriser la circulation H.323 multimédia à travers les coupe-feu et une large gamme de fonctionnalités telles que le support de coupe-feu, le NAT, le multiplexage de flux média, les mécanismes QoS, les améliorations de performances en ce qui concerne la signalisation des connexions, de l'écoute clandestine, de la connexion en parallèle, de l'interaction avec des canaux média, et l'intégrité, l'authenticité et la confidentialité entre des adaptateurs réseau de l'invention.
PCT/NO2000/000336 1999-10-18 2000-10-11 Dispositif pour serveurs proxy h.323 Ceased WO2001030036A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
GB0209264A GB2371457B (en) 1999-10-18 2000-10-11 An arrangement for H.323 proxies
DE10085067T DE10085067T1 (de) 1999-10-18 2000-10-11 Eine Anordnung für H.323 Proxies
AU11796/01A AU1179601A (en) 1999-10-18 2000-10-11 An arrangement for h.323 proxies

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NO995081A NO995081D0 (no) 1999-10-18 1999-10-18 Anordning for H.323 proxy
NO19995081 1999-10-18

Publications (1)

Publication Number Publication Date
WO2001030036A1 true WO2001030036A1 (fr) 2001-04-26

Family

ID=19903874

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NO2000/000336 Ceased WO2001030036A1 (fr) 1999-10-18 2000-10-11 Dispositif pour serveurs proxy h.323

Country Status (6)

Country Link
AU (1) AU1179601A (fr)
DE (1) DE10085067T1 (fr)
ES (1) ES2222790B2 (fr)
GB (1) GB2371457B (fr)
NO (1) NO995081D0 (fr)
WO (1) WO2001030036A1 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2369746A (en) * 2000-11-30 2002-06-05 Ridgeway Systems & Software Lt Communications system with network address translation
KR20020083887A (ko) * 2001-04-26 2002-11-04 (주)엔써커뮤니티 에이치.323기반의 멀티미디어 통신 시스템에서 오디오 및비디오 데이터를 통신하는 방법
KR20030047471A (ko) * 2001-12-10 2003-06-18 (주)애니 유저넷 인터넷 전화의 방화벽 통과방법 및 터널링 게이트웨이
WO2004043040A1 (fr) * 2002-11-05 2004-05-21 Marratech Ab Appareil et procede de negociation de parametres de reseau
EP1667378A4 (fr) * 2003-09-02 2006-09-27 Huawei Tech Co Ltd Procede destine a mettre en oeuvre un protocole multimedia traversant un dispositif de transformation d'adresse reseau
US7752319B2 (en) 2001-09-25 2010-07-06 Siemens Aktiengesellschaft Method and device for implementation of a firewall application for communication data
US8185943B1 (en) 2001-12-20 2012-05-22 Mcafee, Inc. Network adapter firewall system and method
US9055098B2 (en) 2001-12-20 2015-06-09 Mcafee, Inc. Embedded anti-virus scanner for a network adapter

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998017048A1 (fr) * 1996-10-16 1998-04-23 British Telecommunications Public Limited Company Centre telephonique multimedia
WO1998037664A2 (fr) * 1997-02-21 1998-08-27 Northern Telecom Limited Systeme de commutation multimedia
US5802058A (en) * 1996-06-03 1998-09-01 Lucent Technologies Inc. Network-independent connection management
EP0910197A2 (fr) * 1997-09-12 1999-04-21 Lucent Technologies Inc. Procédés et dispositif pour un firewall dans un réseau informatique avec traitement dynamique de règles
US5898830A (en) * 1996-10-17 1999-04-27 Network Engineering Software Firewall providing enhanced network security and user transparency
US5958015A (en) * 1996-10-29 1999-09-28 Abirnet Ltd. Network session wall passively listening to communication session, with use of access rules, stops further communication between network devices by emulating messages to the devices
EP0967764A2 (fr) * 1998-06-25 1999-12-29 Siemens Information and Communication Networks, Inc. Dispositif et procédé amélioré pour réaliser des services de proxy H.323

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5550906A (en) * 1994-08-05 1996-08-27 Lucent Technologies Inc. Telecommunications feature server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5802058A (en) * 1996-06-03 1998-09-01 Lucent Technologies Inc. Network-independent connection management
WO1998017048A1 (fr) * 1996-10-16 1998-04-23 British Telecommunications Public Limited Company Centre telephonique multimedia
US5898830A (en) * 1996-10-17 1999-04-27 Network Engineering Software Firewall providing enhanced network security and user transparency
US5958015A (en) * 1996-10-29 1999-09-28 Abirnet Ltd. Network session wall passively listening to communication session, with use of access rules, stops further communication between network devices by emulating messages to the devices
WO1998037664A2 (fr) * 1997-02-21 1998-08-27 Northern Telecom Limited Systeme de commutation multimedia
EP0910197A2 (fr) * 1997-09-12 1999-04-21 Lucent Technologies Inc. Procédés et dispositif pour un firewall dans un réseau informatique avec traitement dynamique de règles
EP0967764A2 (fr) * 1998-06-25 1999-12-29 Siemens Information and Communication Networks, Inc. Dispositif et procédé amélioré pour réaliser des services de proxy H.323

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8291116B2 (en) 2000-11-30 2012-10-16 Cisco Technology, Inc. Communications system
GB2369746A (en) * 2000-11-30 2002-06-05 Ridgeway Systems & Software Lt Communications system with network address translation
US7512708B2 (en) 2000-11-30 2009-03-31 Tandberg Telecom As Communications system
KR20020083887A (ko) * 2001-04-26 2002-11-04 (주)엔써커뮤니티 에이치.323기반의 멀티미디어 통신 시스템에서 오디오 및비디오 데이터를 통신하는 방법
US7752319B2 (en) 2001-09-25 2010-07-06 Siemens Aktiengesellschaft Method and device for implementation of a firewall application for communication data
KR20030047471A (ko) * 2001-12-10 2003-06-18 (주)애니 유저넷 인터넷 전화의 방화벽 통과방법 및 터널링 게이트웨이
US9876818B2 (en) 2001-12-20 2018-01-23 McAFEE, LLC. Embedded anti-virus scanner for a network adapter
US9055098B2 (en) 2001-12-20 2015-06-09 Mcafee, Inc. Embedded anti-virus scanner for a network adapter
US8627443B2 (en) 2001-12-20 2014-01-07 Mcafee, Inc. Network adapter firewall system and method
US8185943B1 (en) 2001-12-20 2012-05-22 Mcafee, Inc. Network adapter firewall system and method
WO2004043040A1 (fr) * 2002-11-05 2004-05-21 Marratech Ab Appareil et procede de negociation de parametres de reseau
US8605728B2 (en) 2003-09-02 2013-12-10 Huawei Technologies Co., Ltd. Method of implementing traversal of multimedia protocols through network address translation device
US8102856B2 (en) 2003-09-02 2012-01-24 Huawei Technologies Co., Ltd. Method of implementing traversal of multimedia protocols through network address translation device
US7706370B2 (en) 2003-09-02 2010-04-27 Huawei Technologies Co., Ltd. Method of implementing multimedia protocol passing through network address transform device
EP1667378A4 (fr) * 2003-09-02 2006-09-27 Huawei Tech Co Ltd Procede destine a mettre en oeuvre un protocole multimedia traversant un dispositif de transformation d'adresse reseau

Also Published As

Publication number Publication date
GB2371457A (en) 2002-07-24
GB2371457B (en) 2004-05-05
AU1179601A (en) 2001-04-30
ES2222790B2 (es) 2006-07-01
GB0209264D0 (en) 2002-06-05
NO995081D0 (no) 1999-10-18
DE10085067T1 (de) 2002-12-12
ES2222790A1 (es) 2005-02-01

Similar Documents

Publication Publication Date Title
AU2002218404B2 (en) Communications system
JP3774191B2 (ja) ファイアウォールおよびネットワークアドレス変換を有するオーディオ−ビデオ回線技術
EP1687958B1 (fr) Procédé et système de filtrage du trafic multimedia a base d'associations d'adresses ip
US8489751B2 (en) Middlebox control
US7483437B1 (en) Method of communicating packet multimedia to restricted endpoints
EP1065858B1 (fr) Passerelle de média commutés par étiquette et réseau
US20030033418A1 (en) Method of implementing and configuring an MGCP application layer gateway
US10484435B2 (en) Call set-up systems
AU2002218404A1 (en) Communications system
WO2001030036A1 (fr) Dispositif pour serveurs proxy h.323
US20030046403A1 (en) Method for routing data streams of a communication connection between users of a connectionless packet data network, and a packet data network, a control device and a program module therefore
US20070192844A1 (en) Network security system and the method thereof
Gou et al. Multi-agent system for multimedia communications traversing NAT/firewall in next generation networks
EP1168749B1 (fr) Dispositif pare-feu
EP2019555B1 (fr) Mise en communication de systèmes de communication avancés d'entreprise par Internet public
Reis of routing and IP masquerading for Internet access
苟先太 et al. Distributed Broker-Agent Architecture for Multimedia Communications Traversing NAT/Firewall in NGN
HK1055364B (en) Communications system
KR20030021511A (ko) Rtp 채널 설정방법

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 200250032

Country of ref document: ES

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: P200250032

Country of ref document: ES

ENP Entry into the national phase

Ref document number: 200209264

Country of ref document: GB

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 10110303

Country of ref document: US

122 Ep: pct application non-entry in european phase
RET De translation (de og part 6b)

Ref document number: 10085067

Country of ref document: DE

Date of ref document: 20021212

WWE Wipo information: entry into national phase

Ref document number: 10085067

Country of ref document: DE

NENP Non-entry into the national phase

Ref country code: JP

WWP Wipo information: published in national office

Ref document number: 200250032

Country of ref document: ES

Kind code of ref document: A

WWG Wipo information: grant in national office

Ref document number: 200250032

Country of ref document: ES

Kind code of ref document: A