WO1998023061A1 - Method for signing and/or authenticating electronic messages - Google Patents
Method for signing and/or authenticating electronic messages Download PDFInfo
- Publication number
- WO1998023061A1 WO1998023061A1 PCT/FR1997/002086 FR9702086W WO9823061A1 WO 1998023061 A1 WO1998023061 A1 WO 1998023061A1 FR 9702086 W FR9702086 W FR 9702086W WO 9823061 A1 WO9823061 A1 WO 9823061A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- message
- keys
- module
- public
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Definitions
- the present invention relates to a method for signing and / or authenticating electronic messages.
- a smart card In order to preserve the exclusivity of certain services, a smart card generally includes digital keys, a digital key consisting of a string of digital characters which will be used by a calculation algorithm to sign or authenticate messages exchanged between the card and a verifier such as a reading terminal or a central authority, or else to authenticate the card used.
- the messages can then be decrypted only by an organ possessing either a key equal to the encryption key (we then speak of symmetric cryptography), or a corresponding key (asymmetric cryptography) to the secret encryption key.
- this involves signing messages sent by a card to a reading terminal or to a central authority; or again, it involves making a transaction (electronic check) and signing this transaction so that it can be verified first by the reading terminal in which the transaction is made, then by a central authority which manages the transactions.
- the expressions "electronic signature” and “digital signature” will be used interchangeably, or the expressions “digital key” and “electronic key”.
- signing using keys made up of digital channels is particularly suitable for signing messages transmitted electronically.
- An electronic signature is calculated using a series of calculation rules defined by an algorithm and a set of parameters used in these calculations.
- the signature allows both to ensure the identity of the signatory (because it involves a secret exponent specific to the signatory) and the integrity of the signed message (because it involves the message itself).
- the algorithm allows on the one hand, to generate signatures and on the other hand, to verify signatures; operation called verification.
- Authentication is a specific verification operation during which the terminal or the central authority verifies only a signature of the card, before any exchange of significant messages. During this procedure, the verifier sends any message to the card which returns it signed. The verifier can then authenticate the signature of this message. Authentication preferably involves a different digital key from that reserved for message signature / verification operations.
- RSA signature generation involves a secret exponent.
- the audit involves a public setting that corresponds to the 'secret exponent but is not identical to it.
- Each user has a pair of exhibitors (secret, public). Public exhibitors can be known to everyone, while secret exhibitors are never revealed.
- Congress has the ability to verify a user's signature using their public exponent, but only the owner of the secret exhibitor can generate a signature corresponding to the pair of exhibitors.
- the RSA electronic keys comprise three parameters (N, e, d) called respectively module N, public exponent e, and secret exponent d.
- the first two numbers (N, e) can be read on the smart card, where they are stored, and are called public parameters.
- the secret exponent d is stored in a protected memory area of the card which cannot be read from the outside. Only the protected computing circuits of the card can access the secret exponent d for reading.
- the electronic keys are installed in a card by programming an EEPROM read-only memory.
- the public parameters (N, e) are located in an area of the EEPROM memory accessible for reading by a terminal.
- the secret exponent d is located in a protected area of the EEPROM memory, the exponent d being supplied only to the processor of the card for its calculations.
- Each parameter is made up of a whole number.
- the length of module N is generally greater than or equal to 512 bits.
- each parameter of a triplet (N, e, d) has on average a length of 512 bits.
- the public exhibitor is often shorter in order to speed up the verification of the signature.
- the smart card To obtain the signature S of a message M, by means of a key whose public parameters are (N, e, d), the smart card implements the following calculation:
- M d modulo N S.
- the card then transmits the pair (M, S), that is to say the message accompanied by its signature S.
- the card transmits or the terminal will read the parameters (N, e) which were used to calculate the signature S of the message M.
- the terminal then checks that M 'is equal to M.
- the authentication operation between a card and a verifier consists for the card of proving its identity to the verifier.
- the verifier sends a random X message to the card;
- an RSA key has three binary numbers of 512 bits each. Note that a single key then occupies a memory space of 192 bytes.
- Another function of the digital keys and the RSA algorithm is to preserve the confidentiality of an exchange of messages between the card and the terminal or the central authority.
- Confidentiality is obtained by encryption and decryption of the messages exchanged.
- the encryption of a message M is obtained by the RSA algorithm, by performing the following binary operation:
- the card can thus decrypt the encrypted message C using the module N and the secret exponent d of its digital key.
- EEPROM memory must then contain as many triples (Nl, el, dl) (N2, e2, d2) ..., (Ni, ei, di) as there are keys.
- An object of the present invention is to optimize the memory space of a smart card and to simplify the operations of signature and authentication.
- Another object of the invention is to guarantee the security and inviolability of digital coding.
- only one digital key (N, el, dl) among the digital keys (N, el, dl), ..., (N, ei, di) comprising an identical module N can be used for encryption procedures and / or decryption.
- a method for signing and / or authenticating electronic messages in which a calculation algorithm uses electronic keys in order to sign the messages and / or in order to authenticate the messages, keys being made up of strings of numeric characters and implanted on smart cards, a key comprising in particular a triplet (N, e, d) of whole numbers:
- the invention is implemented by using a method in which, among the keys (N, e, d), (N, e ', d'), (N, e ", d") having a module ( N) identical, at most one key (N, e, d) is used for encryption and / or decryption of messages.
- the invention is preferably carried out with a method in which the signature of a message (M) is preceded by a hashing operation.
- the invention provides for producing an electronic chip card (Cl) comprising a memory containing electronic keys (N, e, d) used to sign and / or authenticate electronic messages, the keys (N, e, d) being consisting of strings of digital characters stored in the memory, a key (N, e, d) comprising in particular a triplet of whole numbers:
- a secret exponent (d) two keys (NO, eO, dO), (NI, e3, d3), distinguished in that the triplet (N0, e0, d0) of a key is different from the triplet (Nl, e7 , d7) of the other key, characterized in that a key (N0, e0, d0) of the card comprises a module (NO) identical to the module (NO) of another key (N0, el, dl), (N0, e5, d5) of this card (Cl) or another card (C2).
- Figure 1 shows a diagram of smart cards using a method of signing, verifying and / or authenticating electronic messages according to the invention.
- Figure 1 schematically illustrates the implementation of several digital keys (NO, eO, dO) ... (NI, e3 ', d3') on two different cards with the method according to one invention.
- a first smart card C1 is represented in two parts, a public part PI and a secret part SI, representing respectively the accessible area and the protected area of the read only memory.
- a second smart card C2 is represented in a similar manner with a public part P2 and a secret part S2 representing the accessible and protected areas of its read-only memory.
- a first series of parameters NO, NI, eO, eO ', el, el', e2, e2 ', e3, e3' is represented in the public part PI of the card Cl.
- the first series corresponds to modules and public exhibitors stored in the accessible area of the read-only memory of the first card C1.
- a second series of parameters d0, d0 ', dl, dl', d2, d2 ', d3, d3' is represented in the secret part SI of the card Cl.
- the second series corresponds to secret exponents stored in the protected area of the read-only memory of the first card Cl.
- the table below indicates two groups of digital keys formed for example by taking up the series of parameters of the cards C1 and C2 in FIG. 1 and the use of these keys for signature / verification, authentication and encryption operations. / decryption according to the invention.
- the card Cl has six keys (N0, e0, d0), (N0, e0 ', d0'), (N0, el, dl), (NO, el ', dl '), (N0, e2, d2) and (N0, e2', d2 '), having the same module NO.
- the authentication operations preferably use keys distinct from the signature / verification keys, even if these operations relate to the same service of the card.
- each key having the common module NO can be associated with the use of a separate service.
- the three keys (N0, e0, d0), (N0, el, dl) and (N0, e2, d2) can correspond to three bank accounts of the user of the Cl card.
- Each pair of exhibitors ( e0, d0), (el, dl) and (e2, d2) is then associated with a separate electronic signature corresponding to each of the accounts.
- the key (N0, e0, d0) is used for encryption-decryption operations.
- the NO module is not used in two separate encryption-decryption keys. Conditions security and inviolability of encryption operations are then respected.
- card C2 has four keys (N0, e4, d4), (NO, e4 ', d4'), (N0, e5, d5) and (N0, e5 ', d5') including the same module
- hash algorithms are random functions that match binary strings, like a message M, with numbers less than an integer P, in a pseudo-random manner.
- the result of the hash of the message M is thus a digest of fixed binary size, the size of the integer P.
- a SHA hashing algorithm will be used, that is to say in accordance with the "Secure Hash Standard" standard published by the National Institute of Standards and Technology. Note that if we apply a hashing algorithm whose size of the results, that is to say the size of the integer P, is much smaller than the size of the modules NO, NI, ..., it is better to apply a repeated hash. During a repeated hash the message M is truncated into sub-messages m, m ', ... and each sub-message is treated in isolation by the hash algorithm.
- numeric keys have parameters N, e, d of around 512 bits and the result of the hashing algorithm used gives results having a dimension of 128 or 160 bits, it will be preferable to apply a such repeated hashing.
- a preferred embodiment of the invention provides for using a hash function h making call to the public exhibitor e and to the message M, noted in the following form:
- H h (e . M), H being the result of the hash, ie the hashed message.
- S e mod N h (e, M).
- This hashing procedure has the advantage of giving significant security to the signature and authentication process.
- a preferred embodiment of the invention also provides for using a complex encryption function f before encryption. We thus obtain a coding of order 2 with two distinct coding methods, which reinforces the security of encryption. Algorithms meeting data encryption standards such as Data Enscryption Standard (DES) algorithms can thus be used to perform a symmetric encryption function.
- DES Data Enscryption Standard
- an encryption function f calling on the message M to be encrypted and on a parameter k, and noted in the following form:
- the function f admits an inverse function, noted f -1 , verifying the following relation:
- the parameter k is preference obtained by hashing the public exponent e, according to the following relation: k ⁇ h (e)
- the encrypted message F is therefore obtained, according to this embodiment, after the following calculation:
- a final precaution will consist in limiting the number of smart cards and more precisely the number i of keys (N, ei, di) comprising an identical module N.
- One of the particularly interesting applications of the method according to the invention is precisely the issue of cards in limited series comprising an identical module N.
- This module used to recognize for example a group of users or a service used in common.
- Another application of the method according to the invention is the implantation on the same card of several keys (N, ei, di) having the same module N to recognize the user or allow the recognition of a group of services offered by the same provider.
- a particular application is the identification of cards before their personalization, that is to say before they are handed over to the user with keys specific to the user.
- the memories of smart cards are initially loaded with transport keys to test and distinguish them in the middle of a batch.
- Known cards include an identification number of the card, noted Id.
- This identification number Id is for safety transmitted in the following signed form:
- An advantage of the invention is the limitation of the memory size used by the digital keys in the EEPROM or ROM memory. It is thus possible to use components of reduced dimensions or to use the unoccupied memory area to store other data.
- the terminal can store the module N common to several keys while avoiding recharging it when changing the key used.
- the method according to the invention provides a significant saving in computation time during the generation of the digital keys since the N modules, having been the subject of complex calculations, can be used several times.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP10523288A JP2001503162A (en) | 1996-11-20 | 1997-11-20 | Electronic message signing and / or authentication method |
EP97947096A EP0940021A1 (en) | 1996-11-20 | 1997-11-20 | Method for signing and/or authenticating electronic messages |
CA002271989A CA2271989A1 (en) | 1996-11-20 | 1997-11-20 | Method for signing and/or authenticating electronic messages |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9614158A FR2756122B1 (en) | 1996-11-20 | 1996-11-20 | METHOD FOR SIGNING AND / OR AUTHENTICATING ELECTRONIC MESSAGES |
FR96/14158 | 1996-11-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998023061A1 true WO1998023061A1 (en) | 1998-05-28 |
Family
ID=9497820
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR1997/002086 WO1998023061A1 (en) | 1996-11-20 | 1997-11-20 | Method for signing and/or authenticating electronic messages |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP0940021A1 (en) |
JP (1) | JP2001503162A (en) |
CA (1) | CA2271989A1 (en) |
FR (1) | FR2756122B1 (en) |
WO (1) | WO1998023061A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19848378A1 (en) * | 1998-09-05 | 2000-03-09 | Orga Kartensysteme Gmbh | Microprocessor-aided portable data medium for exchanging data through a data exchange device runs an RSA encoding algorithm for creating a verifiable digital signature for a message |
DE19952944A1 (en) * | 1999-11-03 | 2001-05-23 | Siemens Ag | Access authorization method for computer or similar system |
WO2016057086A3 (en) * | 2014-06-10 | 2016-06-02 | Qualcomm Incorporated | Common modulus rsa key pairs for signature generation and encryption/decryption |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2803961B1 (en) | 2000-01-19 | 2002-03-15 | Ghislain Moret | SYSTEM FOR SECURING TRANSACTIONS DURING CORRESPONDENCE PURCHASES |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0624014A2 (en) * | 1993-05-05 | 1994-11-09 | Addison M. Fischer | Personal date/time notary device |
FR2718309A1 (en) * | 1994-03-31 | 1995-10-06 | Korea Telecommunication | Identification exchange and electronic signature generation method |
-
1996
- 1996-11-20 FR FR9614158A patent/FR2756122B1/en not_active Expired - Fee Related
-
1997
- 1997-11-20 CA CA002271989A patent/CA2271989A1/en not_active Abandoned
- 1997-11-20 JP JP10523288A patent/JP2001503162A/en active Pending
- 1997-11-20 EP EP97947096A patent/EP0940021A1/en not_active Withdrawn
- 1997-11-20 WO PCT/FR1997/002086 patent/WO1998023061A1/en not_active Application Discontinuation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0624014A2 (en) * | 1993-05-05 | 1994-11-09 | Addison M. Fischer | Personal date/time notary device |
FR2718309A1 (en) * | 1994-03-31 | 1995-10-06 | Korea Telecommunication | Identification exchange and electronic signature generation method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19848378A1 (en) * | 1998-09-05 | 2000-03-09 | Orga Kartensysteme Gmbh | Microprocessor-aided portable data medium for exchanging data through a data exchange device runs an RSA encoding algorithm for creating a verifiable digital signature for a message |
DE19848378C2 (en) * | 1998-09-05 | 2000-11-30 | Orga Kartensysteme Gmbh | Method for verifying the digital signature of a message |
DE19952944A1 (en) * | 1999-11-03 | 2001-05-23 | Siemens Ag | Access authorization method for computer or similar system |
WO2016057086A3 (en) * | 2014-06-10 | 2016-06-02 | Qualcomm Incorporated | Common modulus rsa key pairs for signature generation and encryption/decryption |
US9949115B2 (en) | 2014-06-10 | 2018-04-17 | Qualcomm Incorporated | Common modulus RSA key pairs for signature generation and encryption/decryption |
Also Published As
Publication number | Publication date |
---|---|
CA2271989A1 (en) | 1998-05-28 |
FR2756122B1 (en) | 1999-02-12 |
EP0940021A1 (en) | 1999-09-08 |
JP2001503162A (en) | 2001-03-06 |
FR2756122A1 (en) | 1998-05-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0675614B1 (en) | Apparatus for the secure exchange of data according to the RSA method limited to digital signatures and message verification and smart card containing such an apparatus | |
EP1151576B1 (en) | Public and private key cryptographic method | |
US20020174339A1 (en) | Data card verification system | |
FR2759226A1 (en) | PROTOCOL FOR VERIFYING A DIGITAL SIGNATURE | |
EP0311470B1 (en) | Methods and systems to authenticate authorizations and messages with a zero knowledge-proof system and to provide messages with a signature | |
FR2713419A1 (en) | A method of generating DSA signatures with low cost portable devices. | |
FR2822002A1 (en) | CRYPTOGRAPHIC AUTHENTICATION BY EPHEMERIC MODULES | |
EP0661846A1 (en) | Method for authenticating at least one identification device by a verification device using a zero-knowledge protocol | |
EP1791292A1 (en) | Personalisation of an electronic circuit | |
WO2000062477A1 (en) | Authentication and signature method for messages using reduced size of binary units of information content and corresponding systems | |
FR2763451A1 (en) | PUBLIC KEY IDENTIFICATION METHOD USING TWO HASH FUNCTIONS | |
EP1400056B1 (en) | Cryptographic authentication process | |
FR2699300A1 (en) | Authentication of terminal by server - using signature algorithm in terminal to encode random number sent by server and validating returned signature | |
WO2013093373A1 (en) | Authentication method between a reader and a radio tag | |
EP1514377A1 (en) | Interface method and device for the on-line exchange of contents data in a secure manner | |
EP1240630A1 (en) | Method for authenticating a portable object, corresponding portable object, and apparatus therefor | |
FR2892252A1 (en) | METHOD AND DEVICE FOR CREATING A GROUP SIGNATURE AND METHOD AND DEVICE FOR VERIFYING AN ASSOCIATED GROUP SIGNATURE. | |
WO1998023061A1 (en) | Method for signing and/or authenticating electronic messages | |
EP4012972A1 (en) | Method for selective disclosure of data via a blockchain | |
FR3070516B1 (en) | METHOD FOR AUTHENTICATING A USER FROM AN AUTHENTICATION SERVER | |
WO1998010563A2 (en) | Instrument for making secure data exchanges | |
FR2948839A1 (en) | METHOD FOR SECURELY AUTHENTICATING ACCESS TO FIGURE DATA | |
M’Raıhi et al. | Couponing scheme reduces computational power requirements for dss signatures | |
EP1470663A1 (en) | Method for generating and verifying electronic signatures | |
FR3070517A1 (en) | SYSTEM AND METHOD FOR AUTHENTICATION AND DIGITAL SIGNATURE |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CA JP SG US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1997947096 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2271989 Country of ref document: CA |
|
WWP | Wipo information: published in national office |
Ref document number: 1997947096 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 1998523288 Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09308369 Country of ref document: US |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1997947096 Country of ref document: EP |