WO2005065008A3 - System and method for managing a proxy request over a secure network using inherited security attributes - Google Patents

System and method for managing a proxy request over a secure network using inherited security attributes Download PDF

Info

Publication number
WO2005065008A3
WO2005065008A3 PCT/IB2004/003831 IB2004003831W WO2005065008A3 WO 2005065008 A3 WO2005065008 A3 WO 2005065008A3 IB 2004003831 W IB2004003831 W IB 2004003831W WO 2005065008 A3 WO2005065008 A3 WO 2005065008A3
Authority
WO
WIPO (PCT)
Prior art keywords
proxy
security
proxy request
managing
secure
Prior art date
Application number
PCT/IB2004/003831
Other languages
French (fr)
Other versions
WO2005065008A2 (en
Inventor
Jeremey Barrett
Craig R Watkins
Adam Cain
Original Assignee
Nokia Inc
Jeremey Barrett
Craig R Watkins
Adam Cain
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Inc, Jeremey Barrett, Craig R Watkins, Adam Cain filed Critical Nokia Inc
Priority to JP2006546354A priority Critical patent/JP2007520797A/en
Priority to EP04798946A priority patent/EP1700180A2/en
Publication of WO2005065008A2 publication Critical patent/WO2005065008A2/en
Publication of WO2005065008A3 publication Critical patent/WO2005065008A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Abstract

Methods, devices, and systems are directed to managing a proxy request over a secure network using inherited security attributes. Proxy traffic, such as HTTP proxy traffic, is tunneled through a secure tunnel such that the proxy request inherits security attributes of the secure tunnel. The secure attributes may be employed to enable proxy access to a server, thereby extending a security property of the secure tunnel to the proxy connection tunneled through it. A secure tunnel service receives a proxy request from a client and modifies the proxy request to include the security attribute. In one embodiment, the security attribute is an identifier that enables a proxy service may employ to determine another security attribute. The proxy service is enabled to employ the security attribute, and the security attribute to determine if the client is authorized access to the server.
PCT/IB2004/003831 2003-12-29 2004-11-23 System and method for managing a proxy request over a secure network using inherited security attributes WO2005065008A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2006546354A JP2007520797A (en) 2003-12-29 2004-11-23 System and method for managing proxy requests on a secure network using inherited security attributes
EP04798946A EP1700180A2 (en) 2003-12-29 2004-11-23 System and method for managing a proxy request over a secure network using inherited security attributes

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/748,845 US20050160161A1 (en) 2003-12-29 2003-12-29 System and method for managing a proxy request over a secure network using inherited security attributes
US10/748,845 2003-12-29

Publications (2)

Publication Number Publication Date
WO2005065008A2 WO2005065008A2 (en) 2005-07-21
WO2005065008A3 true WO2005065008A3 (en) 2007-01-25

Family

ID=34749280

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2004/003831 WO2005065008A2 (en) 2003-12-29 2004-11-23 System and method for managing a proxy request over a secure network using inherited security attributes

Country Status (6)

Country Link
US (1) US20050160161A1 (en)
EP (1) EP1700180A2 (en)
JP (1) JP2007520797A (en)
KR (1) KR100758733B1 (en)
CN (1) CN100380870C (en)
WO (1) WO2005065008A2 (en)

Families Citing this family (90)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040133606A1 (en) 2003-01-02 2004-07-08 Z-Force Communications, Inc. Directory aggregation for files distributed over a plurality of servers in a switched file system
US7509322B2 (en) 2001-01-11 2009-03-24 F5 Networks, Inc. Aggregated lock management for locking aggregated files in a switched file system
US20070027910A1 (en) * 2002-09-12 2007-02-01 Buss Duane F Enforcing security on attributes of objects
CN101715194A (en) * 2002-10-18 2010-05-26 卡耐特无线有限公司 Apparatus and method for extending the coverage area of a licensed wireless communication system using an unlicensed wireless communication system
US7606190B2 (en) 2002-10-18 2009-10-20 Kineto Wireless, Inc. Apparatus and messages for interworking between unlicensed access network and GPRS network for data services
US20050273849A1 (en) * 2004-03-11 2005-12-08 Aep Networks Network access using secure tunnel
US20050262357A1 (en) * 2004-03-11 2005-11-24 Aep Networks Network access using reverse proxy
US7539858B2 (en) * 2004-04-05 2009-05-26 Nippon Telegraph And Telephone Corporation Packet encryption substituting device, method thereof, and program recording medium
US7603454B2 (en) * 2004-05-19 2009-10-13 Bea Systems, Inc. System and method for clustered tunneling of requests in application servers and transaction-based systems
US7653008B2 (en) 2004-05-21 2010-01-26 Bea Systems, Inc. Dynamically configurable service oriented architecture
US20060031431A1 (en) * 2004-05-21 2006-02-09 Bea Systems, Inc. Reliable updating for a service oriented architecture
US20060005063A1 (en) * 2004-05-21 2006-01-05 Bea Systems, Inc. Error handling for a service oriented architecture
US7940746B2 (en) 2004-08-24 2011-05-10 Comcast Cable Holdings, Llc Method and system for locating a voice over internet protocol (VoIP) device connected to a network
US7885970B2 (en) 2005-01-20 2011-02-08 F5 Networks, Inc. Scalable system for partitioning and accessing metadata over multiple servers
US7958347B1 (en) * 2005-02-04 2011-06-07 F5 Networks, Inc. Methods and apparatus for implementing authentication
US8224333B2 (en) 2005-05-10 2012-07-17 Network Equipment Technologies, Inc. LAN-based UMA network controller with aggregated transport
CN100411355C (en) 2005-08-20 2008-08-13 华为技术有限公司 Information service hierarchy inheritance relation realizing method in network management interface
US8069475B2 (en) * 2005-09-01 2011-11-29 Alcatel Lucent Distributed authentication functionality
US7974270B2 (en) * 2005-09-09 2011-07-05 Kineto Wireless, Inc. Media route optimization in network communications
US20070186281A1 (en) * 2006-01-06 2007-08-09 Mcalister Donald K Securing network traffic using distributed key generation and dissemination over secure tunnels
US8782393B1 (en) 2006-03-23 2014-07-15 F5 Networks, Inc. Accessing SSL connection data by a third-party
US8417746B1 (en) 2006-04-03 2013-04-09 F5 Networks, Inc. File system management with enhanced searchability
US8165086B2 (en) * 2006-04-18 2012-04-24 Kineto Wireless, Inc. Method of providing improved integrated communication system data service
US20080076425A1 (en) 2006-09-22 2008-03-27 Amit Khetawat Method and apparatus for resource management
US8527770B2 (en) * 2006-07-20 2013-09-03 Research In Motion Limited System and method for provisioning device certificates
US8341747B2 (en) * 2006-08-08 2012-12-25 International Business Machines Corporation Method to provide a secure virtual machine launcher
US8082574B2 (en) * 2006-08-11 2011-12-20 Certes Networks, Inc. Enforcing security groups in network of data processors
GB0616467D0 (en) * 2006-08-17 2006-09-27 Camrivox Ltd Network tunnelling
US20080072281A1 (en) * 2006-09-14 2008-03-20 Willis Ronald B Enterprise data protection management for providing secure communication in a network
US8284943B2 (en) * 2006-09-27 2012-10-09 Certes Networks, Inc. IP encryption over resilient BGP/MPLS IP VPN
US7716378B2 (en) * 2006-10-17 2010-05-11 A10 Networks, Inc. System and method to associate a private user identity with a public user identity
US7864762B2 (en) * 2007-02-14 2011-01-04 Cipheroptics, Inc. Ethernet encryption over resilient virtual private LAN services
WO2008147973A2 (en) 2007-05-25 2008-12-04 Attune Systems, Inc. Remote file virtualization in a switched file system
US8548953B2 (en) 2007-11-12 2013-10-01 F5 Networks, Inc. File deduplication using storage tiers
TW200929974A (en) * 2007-11-19 2009-07-01 Ibm System and method for performing electronic transactions
GB0800268D0 (en) * 2008-01-08 2008-02-13 Scansafe Ltd Automatic proxy detection and traversal
US10015158B2 (en) 2008-02-29 2018-07-03 Blackberry Limited Methods and apparatus for use in enabling a mobile communication device with a digital certificate
US9479339B2 (en) * 2008-02-29 2016-10-25 Blackberry Limited Methods and apparatus for use in obtaining a digital certificate for a mobile communication device
CN101277246B (en) * 2008-05-12 2010-08-04 华耀环宇科技(北京)有限公司 Safety communication method based on transport layer VPN technique
US8910255B2 (en) * 2008-05-27 2014-12-09 Microsoft Corporation Authentication for distributed secure content management system
US8549582B1 (en) 2008-07-11 2013-10-01 F5 Networks, Inc. Methods for handling a multi-protocol content name and systems thereof
US8271777B2 (en) * 2008-09-05 2012-09-18 Psion Teklogix Inc. Secure host connection
US20100106841A1 (en) * 2008-10-28 2010-04-29 Adobe Systems Incorporated Handling Proxy Requests in a Computing System
US8769257B2 (en) * 2008-12-23 2014-07-01 Intel Corporation Method and apparatus for extending transport layer security protocol for power-efficient wireless security processing
US8887242B2 (en) 2009-04-14 2014-11-11 Fisher-Rosemount Systems, Inc. Methods and apparatus to provide layered security for interface access control
US8732451B2 (en) * 2009-05-20 2014-05-20 Microsoft Corporation Portable secure computing network
US8887264B2 (en) * 2009-09-21 2014-11-11 Ram International Corporation Multi-identity access control tunnel relay object
JP4914479B2 (en) * 2009-11-04 2012-04-11 日本ユニシス株式会社 Remote access device, remote access program, remote access method, and remote access system
US20110296048A1 (en) * 2009-12-28 2011-12-01 Akamai Technologies, Inc. Method and system for stream handling using an intermediate format
US20110162074A1 (en) * 2009-12-31 2011-06-30 Sap Portals Israel Ltd Apparatus and method for remote processing while securing classified data
US9195500B1 (en) 2010-02-09 2015-11-24 F5 Networks, Inc. Methods for seamless storage importing and devices thereof
US8700892B2 (en) 2010-03-19 2014-04-15 F5 Networks, Inc. Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion
US20110275360A1 (en) * 2010-05-10 2011-11-10 Nokia Siemens Networks Oy Privacy gateway
US9286298B1 (en) 2010-10-14 2016-03-15 F5 Networks, Inc. Methods for enhancing management of backup data sets and devices thereof
WO2012162815A1 (en) * 2011-06-02 2012-12-06 Surfeasy Inc. Proxy based network communications
US8396836B1 (en) 2011-06-30 2013-03-12 F5 Networks, Inc. System for mitigating file virtualization storage import latency
US9635028B2 (en) * 2011-08-31 2017-04-25 Facebook, Inc. Proxy authentication
JP5895285B2 (en) * 2011-09-28 2016-03-30 西日本電信電話株式会社 Information processing system and information processing method
US9020912B1 (en) 2012-02-20 2015-04-28 F5 Networks, Inc. Methods for accessing data in a compressed file system and devices thereof
US8978093B1 (en) * 2012-05-03 2015-03-10 Google Inc. Policy based trust of proxies
US9519501B1 (en) 2012-09-30 2016-12-13 F5 Networks, Inc. Hardware assisted flow acceleration and L2 SMAC management in a heterogeneous distributed multi-tenant virtualized clustered system
US10375155B1 (en) 2013-02-19 2019-08-06 F5 Networks, Inc. System and method for achieving hardware acceleration for asymmetric flow connections
US9554418B1 (en) 2013-02-28 2017-01-24 F5 Networks, Inc. Device for topology hiding of a visited network
WO2014207262A1 (en) * 2013-06-24 2014-12-31 Telefonica Digital España, S.L.U. Method for secure communication via different networks using the socks protocol
US9544329B2 (en) * 2014-03-18 2017-01-10 Shape Security, Inc. Client/server security by an intermediary executing instructions received from a server and rendering client application instructions
US11838851B1 (en) 2014-07-15 2023-12-05 F5, Inc. Methods for managing L7 traffic classification and devices thereof
US9438625B1 (en) 2014-09-09 2016-09-06 Shape Security, Inc. Mitigating scripted attacks using dynamic polymorphism
US9602543B2 (en) * 2014-09-09 2017-03-21 Shape Security, Inc. Client/server polymorphism using polymorphic hooks
US10182013B1 (en) 2014-12-01 2019-01-15 F5 Networks, Inc. Methods for managing progressive image delivery and devices thereof
US11895138B1 (en) 2015-02-02 2024-02-06 F5, Inc. Methods for improving web scanner accuracy and devices thereof
US10834065B1 (en) 2015-03-31 2020-11-10 F5 Networks, Inc. Methods for SSL protected NTLM re-authentication and devices thereof
US9756020B2 (en) * 2015-04-27 2017-09-05 Microsoft Technology Licensing, Llc Persistent uniform resource locators (URLs) for client applications acting as web services
US10404698B1 (en) 2016-01-15 2019-09-03 F5 Networks, Inc. Methods for adaptive organization of web application access points in webtops and devices thereof
US10412198B1 (en) 2016-10-27 2019-09-10 F5 Networks, Inc. Methods for improved transmission control protocol (TCP) performance visibility and devices thereof
US10567492B1 (en) 2017-05-11 2020-02-18 F5 Networks, Inc. Methods for load balancing in a federated identity environment and devices thereof
KR102026375B1 (en) * 2017-12-18 2019-09-27 부산대학교 산학협력단 Apparatus and method for supporting communication of wearable device
US11223689B1 (en) 2018-01-05 2022-01-11 F5 Networks, Inc. Methods for multipath transmission control protocol (MPTCP) based session migration and devices thereof
US10833943B1 (en) 2018-03-01 2020-11-10 F5 Networks, Inc. Methods for service chaining and devices thereof
CN111147420A (en) * 2018-11-02 2020-05-12 深信服科技股份有限公司 Data disaster tolerance method, device, system, equipment and computer readable storage medium
CN111464609A (en) * 2020-03-27 2020-07-28 北京金山云网络技术有限公司 Data communication method and device and electronic equipment
CN112165480B (en) * 2020-09-22 2022-11-11 北京字跳网络技术有限公司 Information acquisition method and device and electronic equipment
US11184403B1 (en) 2021-04-23 2021-11-23 Netskope, Inc. Synthetic request injection to generate metadata at points of presence for cloud security enforcement
US11178188B1 (en) * 2021-04-22 2021-11-16 Netskope, Inc. Synthetic request injection to generate metadata for cloud policy enforcement
US11190550B1 (en) 2021-04-22 2021-11-30 Netskope, Inc. Synthetic request injection to improve object security posture for cloud security enforcement
US11336698B1 (en) 2021-04-22 2022-05-17 Netskope, Inc. Synthetic request injection for cloud policy enforcement
US11647052B2 (en) * 2021-04-22 2023-05-09 Netskope, Inc. Synthetic request injection to retrieve expired metadata for cloud policy enforcement
US11303647B1 (en) 2021-04-22 2022-04-12 Netskope, Inc. Synthetic request injection to disambiguate bypassed login events for cloud policy enforcement
US11271972B1 (en) * 2021-04-23 2022-03-08 Netskope, Inc. Data flow logic for synthetic request injection for cloud security enforcement
US11271973B1 (en) * 2021-04-23 2022-03-08 Netskope, Inc. Synthetic request injection to retrieve object metadata for cloud policy enforcement
US11943260B2 (en) 2022-02-02 2024-03-26 Netskope, Inc. Synthetic request injection to retrieve metadata for cloud policy enforcement

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5948066A (en) * 1997-03-13 1999-09-07 Motorola, Inc. System and method for delivery of information over narrow-band communications links
US20020038371A1 (en) * 2000-08-14 2002-03-28 Spacey Simon Alan Communication method and system
US20020091835A1 (en) * 2000-12-05 2002-07-11 Lentini Russell P. System and method for internet content collaboration
US20020143897A1 (en) * 2001-03-29 2002-10-03 Manoj Patil Bearer identification tags and method of using same

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5742762A (en) * 1995-05-19 1998-04-21 Telogy Networks, Inc. Network management gateway
US5774670A (en) * 1995-10-06 1998-06-30 Netscape Communications Corporation Persistent client state in a hypertext transfer protocol based client-server system
US5673322A (en) * 1996-03-22 1997-09-30 Bell Communications Research, Inc. System and method for providing protocol translation and filtering to access the world wide web from wireless or low-bandwidth networks
US6584567B1 (en) * 1999-06-30 2003-06-24 International Business Machines Corporation Dynamic connection to multiple origin servers in a transcoding proxy
JP2001056795A (en) * 1999-08-20 2001-02-27 Pfu Ltd Access authentication processor, network provided with the processor, storage medium therefor and access authentication processing method
JP2001251297A (en) * 2000-03-07 2001-09-14 Cti Co Ltd Information processor, and cipher communication system and method provided with the processor
US7228438B2 (en) * 2001-04-30 2007-06-05 Matsushita Electric Industrial Co., Ltd. Computer network security system employing portable storage device
US20030021253A1 (en) * 2001-07-03 2003-01-30 Tae-Sung Jung Method of transmitting data from server of virtual private network to mobile node
JP2003131929A (en) * 2001-08-10 2003-05-09 Hirohiko Nakano Information terminal, information network system and program thereof
JP3901487B2 (en) * 2001-10-18 2007-04-04 富士通株式会社 VPN service management system, VPN service manager and VPN service agent
JP2003316742A (en) * 2002-04-24 2003-11-07 Nippon Telegr & Teleph Corp <Ntt> Anonymous communication method and device having single sign-on function
JP2003330886A (en) * 2002-05-09 2003-11-21 Kyocera Communication Systems Co Ltd Network processing device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5948066A (en) * 1997-03-13 1999-09-07 Motorola, Inc. System and method for delivery of information over narrow-band communications links
US20020038371A1 (en) * 2000-08-14 2002-03-28 Spacey Simon Alan Communication method and system
US20020091835A1 (en) * 2000-12-05 2002-07-11 Lentini Russell P. System and method for internet content collaboration
US20020143897A1 (en) * 2001-03-29 2002-10-03 Manoj Patil Bearer identification tags and method of using same

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GUPTA V. ET AL.: "Experiments in wireless Internet Security", May 2002 (2002-05-01), pages 860 - 864, XP010585708 *

Also Published As

Publication number Publication date
JP2007520797A (en) 2007-07-26
CN1645813A (en) 2005-07-27
US20050160161A1 (en) 2005-07-21
CN100380870C (en) 2008-04-09
KR20050069912A (en) 2005-07-05
EP1700180A2 (en) 2006-09-13
WO2005065008A2 (en) 2005-07-21
KR100758733B1 (en) 2007-09-14

Similar Documents

Publication Publication Date Title
WO2005065008A3 (en) System and method for managing a proxy request over a secure network using inherited security attributes
AU2015324004B2 (en) Using credentials stored in different directories to access a common endpoint
US10021101B2 (en) Embedding security posture in network traffic
JP5925335B2 (en) Network security protection method, apparatus and system
CN104426740B (en) System and method for management tunnel endpoint
WO2003063023A3 (en) Method and system for distributing multimedia object
WO2007084973A3 (en) Network security system and method
US9584523B2 (en) Virtual private network access control
CN101442565A (en) Method and gateway for distributing fixed virtual network address
TW200625905A (en) A system and method for performing application layer service authentication and providing secure access to an application server
WO2014120621A3 (en) Securing communication over a network using client integrity verification
US20170063800A1 (en) Dynamic virtual private network
GB0520836D0 (en) Remote access to resources
US20120167196A1 (en) Automatic Virtual Private Network
CN106254353A (en) The update method of IPS strategy and device
CN102271136A (en) Access control method and equipment under NAT (Network Address Translation) network environment
CN101599977B (en) Method and system for managing network service
CN107005411B (en) Data management method, computer program therefor, recording medium thereof, user client for executing data management method, and security policy server
CN106209727A (en) A kind of session access method and apparatus
CN105704094A (en) Application access authority control method and device
US11546296B2 (en) Cloud computing architecture with secure multi-cloud integration
CN102045310B (en) Industrial Internet intrusion detection as well as defense method and device
ATE388571T1 (en) REMOTE MANAGEMENT OF IPSEC SECURITY ASSOCIATIONS
CN104980428A (en) Network communication method, device and system
CN117081800A (en) Proxy method and system for accessing B/S application by zero trust hierarchy

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2004798946

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2006546354

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Ref document number: DE

WWE Wipo information: entry into national phase

Ref document number: 2784/CHENP/2006

Country of ref document: IN

WWP Wipo information: published in national office

Ref document number: 2004798946

Country of ref document: EP