WO2005099340A3 - On-line centralized and local authorization of executable files - Google Patents

On-line centralized and local authorization of executable files Download PDF

Info

Publication number
WO2005099340A3
WO2005099340A3 PCT/IB2005/001623 IB2005001623W WO2005099340A3 WO 2005099340 A3 WO2005099340 A3 WO 2005099340A3 IB 2005001623 W IB2005001623 W IB 2005001623W WO 2005099340 A3 WO2005099340 A3 WO 2005099340A3
Authority
WO
WIPO (PCT)
Prior art keywords
executable
permission
executable files
execute
execution
Prior art date
Application number
PCT/IB2005/001623
Other languages
French (fr)
Other versions
WO2005099340A2 (en
Inventor
Viacheslav Usov
Original Assignee
Securewave S A
Viacheslav Usov
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Securewave S A, Viacheslav Usov filed Critical Securewave S A
Priority to EP05744086A priority Critical patent/EP1745342A2/en
Publication of WO2005099340A2 publication Critical patent/WO2005099340A2/en
Publication of WO2005099340A3 publication Critical patent/WO2005099340A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Abstract

A system and method for controlling the execution of executable files. The executables are identified by either a cryptographic digest or a digital certificate. The crytographic digest is computed from the binary image of the executable. An executable that is attempting to execute is intercepted by a protection module that consults a database of stored rules over a secure channel to determine whether or not the executable can be identified as a permitted executable and whether or not it has permission to execute on a particular computer system under certain specified conditions. If a stored permission is available, it is used to control the execution. Otherwise, the user is consulted for permission.
PCT/IB2005/001623 2004-04-19 2005-04-18 On-line centralized and local authorization of executable files WO2005099340A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP05744086A EP1745342A2 (en) 2004-04-19 2005-04-18 On-line centralized and local authorization of executable files

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US56298204P 2004-04-19 2004-04-19
US56298304P 2004-04-19 2004-04-19
US60/562,983 2004-04-19
US60/562,982 2004-04-19
US56457904P 2004-04-23 2004-04-23
US60/564,579 2004-04-23

Publications (2)

Publication Number Publication Date
WO2005099340A2 WO2005099340A2 (en) 2005-10-27
WO2005099340A3 true WO2005099340A3 (en) 2006-04-20

Family

ID=35150392

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/IB2005/001623 WO2005099340A2 (en) 2004-04-19 2005-04-18 On-line centralized and local authorization of executable files
PCT/IB2005/002335 WO2005099342A2 (en) 2004-04-19 2005-04-18 A generic framework for runtime interception and execution control of interpreted languages

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/IB2005/002335 WO2005099342A2 (en) 2004-04-19 2005-04-18 A generic framework for runtime interception and execution control of interpreted languages

Country Status (3)

Country Link
US (4) US7487495B2 (en)
EP (2) EP1745342A2 (en)
WO (2) WO2005099340A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8959642B2 (en) 2005-12-28 2015-02-17 Websense, Inc. Real time lockdown
US9130972B2 (en) 2009-05-26 2015-09-08 Websense, Inc. Systems and methods for efficient detection of fingerprinted data and information
US9253060B2 (en) 2003-03-14 2016-02-02 Websense, Inc. System and method of monitoring and controlling application files
US9342693B2 (en) 2003-03-14 2016-05-17 Websense, Inc. System and method of monitoring and controlling application files
US9378282B2 (en) 2008-06-30 2016-06-28 Raytheon Company System and method for dynamic and real-time categorization of webpages

Families Citing this family (68)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001294677A1 (en) * 2000-09-22 2002-04-02 Patchlink.Com Corporation Non-invasive automatic offsite patch fingerprinting and updating system and method
US8539063B1 (en) 2003-08-29 2013-09-17 Mcafee, Inc. Method and system for containment of networked application client software by explicit human input
US7840968B1 (en) 2003-12-17 2010-11-23 Mcafee, Inc. Method and system for containment of usage of language interfaces
US7783735B1 (en) 2004-03-22 2010-08-24 Mcafee, Inc. Containment of network communication
EP1745342A2 (en) 2004-04-19 2007-01-24 Securewave S.A. On-line centralized and local authorization of executable files
EP2267625A3 (en) 2004-04-19 2015-08-05 Lumension Security S.A. On-line centralized and local authorization of executable files
US7873955B1 (en) 2004-09-07 2011-01-18 Mcafee, Inc. Solidifying the executable software set of a computer
WO2006101549A2 (en) 2004-12-03 2006-09-28 Whitecell Software, Inc. Secure system for allowing the execution of authorized computer program code
US7685149B2 (en) * 2005-03-28 2010-03-23 Microsoft Corporation Identifying and removing potentially unwanted software
US7603552B1 (en) * 2005-05-04 2009-10-13 Mcafee, Inc. Piracy prevention using unique module translation
US7856661B1 (en) 2005-07-14 2010-12-21 Mcafee, Inc. Classification of software on networked systems
US7757269B1 (en) * 2006-02-02 2010-07-13 Mcafee, Inc. Enforcing alignment of approved changes and deployed changes in the software change life-cycle
US20070226800A1 (en) * 2006-03-22 2007-09-27 Tony Nichols Method and system for denying pestware direct drive access
US7895573B1 (en) 2006-03-27 2011-02-22 Mcafee, Inc. Execution environment file inventory
US7870387B1 (en) * 2006-04-07 2011-01-11 Mcafee, Inc. Program-based authorization
US8352930B1 (en) 2006-04-24 2013-01-08 Mcafee, Inc. Software modification by group to minimize breakage
US8555404B1 (en) 2006-05-18 2013-10-08 Mcafee, Inc. Connectivity-based authorization
US8117441B2 (en) * 2006-06-20 2012-02-14 Microsoft Corporation Integrating security protection tools with computer device integrity and privacy policy
US8190868B2 (en) 2006-08-07 2012-05-29 Webroot Inc. Malware management through kernel detection
US9424154B2 (en) 2007-01-10 2016-08-23 Mcafee, Inc. Method of and system for computer system state checks
US8332929B1 (en) 2007-01-10 2012-12-11 Mcafee, Inc. Method and apparatus for process enforced configuration management
US9906549B2 (en) * 2007-09-06 2018-02-27 Microsoft Technology Licensing, Llc Proxy engine for custom handling of web content
US9043861B2 (en) 2007-09-17 2015-05-26 Ulrich Lang Method and system for managing security policies
US8195931B1 (en) 2007-10-31 2012-06-05 Mcafee, Inc. Application change control
US8515075B1 (en) 2008-01-31 2013-08-20 Mcafee, Inc. Method of and system for malicious software detection using critical address space protection
GB2457305A (en) * 2008-02-11 2009-08-12 Symbian Software Ltd Controlling access to system resources using script and application identifiers
JP2009211190A (en) * 2008-02-29 2009-09-17 Hitachi Ltd Information processor
US8615502B2 (en) 2008-04-18 2013-12-24 Mcafee, Inc. Method of and system for reverse mapping vnode pointers
US8176554B1 (en) * 2008-05-30 2012-05-08 Symantec Corporation Malware detection through symbol whitelisting
US8544003B1 (en) 2008-12-11 2013-09-24 Mcafee, Inc. System and method for managing virtual machine configurations
US8332909B2 (en) * 2008-12-16 2012-12-11 Microsoft Corporation Automated software restriction policy rule generation
US8984296B1 (en) * 2009-03-29 2015-03-17 Cypress Semiconductor Corporation Device driver self authentication method and system
US11489857B2 (en) 2009-04-21 2022-11-01 Webroot Inc. System and method for developing a risk profile for an internet resource
US8381284B2 (en) 2009-08-21 2013-02-19 Mcafee, Inc. System and method for enforcing security policies in a virtual environment
US8341627B2 (en) 2009-08-21 2012-12-25 Mcafee, Inc. Method and system for providing user space address protection from writable memory area in a virtual environment
US9552497B2 (en) 2009-11-10 2017-01-24 Mcafee, Inc. System and method for preventing data loss using virtual machine wrapped applications
ES2628224T3 (en) * 2010-05-21 2017-08-02 Sfnt Germany Gmbh Method to control the execution of an application in a computer system
US20120011573A1 (en) * 2010-07-12 2012-01-12 Menasce Daniel A System and method for managing insider security threats
US8925101B2 (en) 2010-07-28 2014-12-30 Mcafee, Inc. System and method for local protection against malicious software
US8938800B2 (en) 2010-07-28 2015-01-20 Mcafee, Inc. System and method for network level protection against malicious software
US8549003B1 (en) 2010-09-12 2013-10-01 Mcafee, Inc. System and method for clustering host inventories
US8745064B2 (en) 2010-09-13 2014-06-03 Lumension Security, Inc. Systems and methods for operating a saturated hash table
EP2439673A3 (en) 2010-10-11 2012-05-30 Lumension Security, Inc. Systems and methods for implementing application control security
US9075993B2 (en) 2011-01-24 2015-07-07 Mcafee, Inc. System and method for selectively grouping and managing program files
US9112830B2 (en) 2011-02-23 2015-08-18 Mcafee, Inc. System and method for interlocking a host and a gateway
US9152404B2 (en) * 2011-07-13 2015-10-06 Z124 Remote device filter
US20130268559A1 (en) 2011-07-13 2013-10-10 Z124 Virtual file system remote search
US8631244B1 (en) 2011-08-11 2014-01-14 Rockwell Collins, Inc. System and method for preventing computer malware from exfiltrating data from a user computer in a network via the internet
US20130268703A1 (en) 2011-09-27 2013-10-10 Z124 Rules based hierarchical data virtualization
US9594881B2 (en) 2011-09-09 2017-03-14 Mcafee, Inc. System and method for passive threat detection using virtual memory inspection
US8694738B2 (en) 2011-10-11 2014-04-08 Mcafee, Inc. System and method for critical address space protection in a hypervisor environment
US9069586B2 (en) 2011-10-13 2015-06-30 Mcafee, Inc. System and method for kernel rootkit protection in a hypervisor environment
US8973144B2 (en) 2011-10-13 2015-03-03 Mcafee, Inc. System and method for kernel rootkit protection in a hypervisor environment
US8713668B2 (en) 2011-10-17 2014-04-29 Mcafee, Inc. System and method for redirected firewall discovery in a network environment
US8800024B2 (en) 2011-10-17 2014-08-05 Mcafee, Inc. System and method for host-initiated firewall discovery in a network environment
US9059853B1 (en) 2012-02-22 2015-06-16 Rockwell Collins, Inc. System and method for preventing a computing device from obtaining unauthorized access to a secure network or trusted computing environment
US8656494B2 (en) * 2012-02-28 2014-02-18 Kaspersky Lab, Zao System and method for optimization of antivirus processing of disk files
US8739272B1 (en) 2012-04-02 2014-05-27 Mcafee, Inc. System and method for interlocking a host and a gateway
US8694961B2 (en) 2012-04-03 2014-04-08 Microsoft Corporation Thread-agile execution of dynamic programming language programs
US8661246B1 (en) 2012-04-09 2014-02-25 Rockwell Collins, Inc. System and method for protecting certificate applications using a hardened proxy
US8959362B2 (en) * 2012-04-30 2015-02-17 General Electric Company Systems and methods for controlling file execution for industrial control systems
US8973146B2 (en) 2012-12-27 2015-03-03 Mcafee, Inc. Herd based scan avoidance system in a network environment
EP3061030A4 (en) 2013-10-24 2017-04-19 McAfee, Inc. Agent assisted malicious application blocking in a network environment
US9430216B2 (en) 2014-05-11 2016-08-30 Lumension Security, Inc. Self-contained executable for predetermined software updating
WO2017147441A1 (en) * 2016-02-26 2017-08-31 Cylance Inc. Sub-execution environment controller
US11082491B2 (en) 2016-10-07 2021-08-03 Microsoft Technology Licensing, Llc Propagating origin information for applications during application installation
US10949642B2 (en) * 2017-11-24 2021-03-16 Integrated Biometrics, Llc Method for capture of a fingerprint using an electro-optical material
US10884899B2 (en) * 2018-10-01 2021-01-05 International Business Machines Corporation Optimized trampoline design for fast software tracing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998050843A1 (en) * 1997-05-02 1998-11-12 Network Associates, Inc. Process-level data security system
WO2001098876A2 (en) * 2000-06-21 2001-12-27 Microsoft Corporation Filtering a permission set using permission requests associated with a code assembly
US20020099952A1 (en) * 2000-07-24 2002-07-25 Lambert John J. Policies for secure software execution

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2742892B1 (en) * 1995-12-21 1998-02-13 Bull Sa SOFTWARE PROTECTION SYSTEM FOR A WRITTEN LANGUAGE COMPUTER
US5794049A (en) * 1996-06-05 1998-08-11 Sun Microsystems, Inc. Computer system and method for executing architecture specific code with reduced run-time memory space requirements
US6721941B1 (en) * 1996-08-27 2004-04-13 Compuware Corporation Collection of timing and coverage data through a debugging interface
US6094528A (en) * 1996-10-24 2000-07-25 Sun Microsystems, Inc. Method and apparatus for system building with a transactional interpreter
US5923878A (en) * 1996-11-13 1999-07-13 Sun Microsystems, Inc. System, method and apparatus of directly executing an architecture-independent binary program
US6367012B1 (en) * 1996-12-06 2002-04-02 Microsoft Corporation Embedding certifications in executable files for network transmission
US5854930A (en) * 1996-12-30 1998-12-29 Mci Communications Corporations System, method, and computer program product for script processing
CA2194848C (en) 1997-01-10 2003-12-23 Jonathan Layes Condition handling using script interpreters
US6766454B1 (en) 1997-04-08 2004-07-20 Visto Corporation System and method for using an authentication applet to identify and authenticate a user in a computer network
US6473893B1 (en) 1997-05-30 2002-10-29 International Business Machines Corporation Information objects system, method, and computer program organization
US6141793A (en) 1998-04-01 2000-10-31 Hewlett-Packard Company Apparatus and method for increasing the performance of interpreted programs running on a server
EP1133188A3 (en) 2000-02-23 2004-11-24 Sony Corporation Information processing apparatus, network system, recording medium
US6941470B1 (en) * 2000-04-07 2005-09-06 Everdream Corporation Protected execution environments within a computer system
GB2404262B (en) * 2003-06-19 2008-03-05 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
AU2001294677A1 (en) 2000-09-22 2002-04-02 Patchlink.Com Corporation Non-invasive automatic offsite patch fingerprinting and updating system and method
US6686002B2 (en) 2001-01-11 2004-02-03 Seal-Ops, Llc Sealing strip composition
US7613930B2 (en) * 2001-01-19 2009-11-03 Trustware International Limited Method for protecting computer programs and data from hostile code
US7278158B2 (en) 2001-03-16 2007-10-02 Securewave S.A. Method and system for shadowing accesses to removable medium storage devices
US20030014667A1 (en) 2001-07-16 2003-01-16 Andrei Kolichtchak Buffer overflow attack detection and suppression
US8041815B2 (en) * 2001-09-21 2011-10-18 Microsoft Corporation Systems and methods for managing network connectivity for mobile users
KR100692425B1 (en) 2001-09-28 2007-03-09 하이 덴시티 디바이시스 에이에스 Method and device for encryption/decryption of data on mass storage device
US6996814B2 (en) * 2001-11-14 2006-02-07 Sun Microsystems, Inc. Method and apparatus for dynamically compiling byte codes into native code
US20030099952A1 (en) * 2001-11-26 2003-05-29 Roland Green Microarrays with visible pattern detection
AU2003201231A1 (en) * 2002-01-04 2003-07-30 Lab 7 Networks, Inc. Communication security system
US7219344B2 (en) * 2002-04-30 2007-05-15 Accenture Global Services Gmbh Method and apparatus for deploying programs and computing platforms to selected computers
US7454508B2 (en) * 2002-06-28 2008-11-18 Microsoft Corporation Consent mechanism for online entities
US7500108B2 (en) * 2004-03-01 2009-03-03 Microsoft Corporation Metered execution of code
EP2267625A3 (en) 2004-04-19 2015-08-05 Lumension Security S.A. On-line centralized and local authorization of executable files
EP1745342A2 (en) 2004-04-19 2007-01-24 Securewave S.A. On-line centralized and local authorization of executable files
US7802110B2 (en) * 2004-08-25 2010-09-21 Microsoft Corporation System and method for secure execution of program code
US20090210267A1 (en) 2008-02-18 2009-08-20 Bryan David Fish System and method for automatically mapping security controls to subjects

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998050843A1 (en) * 1997-05-02 1998-11-12 Network Associates, Inc. Process-level data security system
WO2001098876A2 (en) * 2000-06-21 2001-12-27 Microsoft Corporation Filtering a permission set using permission requests associated with a code assembly
US20020099952A1 (en) * 2000-07-24 2002-07-25 Lambert John J. Policies for secure software execution

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9253060B2 (en) 2003-03-14 2016-02-02 Websense, Inc. System and method of monitoring and controlling application files
US9342693B2 (en) 2003-03-14 2016-05-17 Websense, Inc. System and method of monitoring and controlling application files
US8959642B2 (en) 2005-12-28 2015-02-17 Websense, Inc. Real time lockdown
US9230098B2 (en) 2005-12-28 2016-01-05 Websense, Inc. Real time lockdown
US9378282B2 (en) 2008-06-30 2016-06-28 Raytheon Company System and method for dynamic and real-time categorization of webpages
US9130972B2 (en) 2009-05-26 2015-09-08 Websense, Inc. Systems and methods for efficient detection of fingerprinted data and information

Also Published As

Publication number Publication date
US8474011B2 (en) 2013-06-25
EP1745343B1 (en) 2017-06-07
US7487495B2 (en) 2009-02-03
US20090133004A1 (en) 2009-05-21
EP1745342A2 (en) 2007-01-24
US8001536B2 (en) 2011-08-16
WO2005099342A3 (en) 2006-04-20
US8060924B2 (en) 2011-11-15
EP1745343A2 (en) 2007-01-24
US20050246683A1 (en) 2005-11-03
WO2005099340A2 (en) 2005-10-27
WO2005099342A2 (en) 2005-10-27
US20050262558A1 (en) 2005-11-24
US20120047556A1 (en) 2012-02-23

Similar Documents

Publication Publication Date Title
WO2005099340A3 (en) On-line centralized and local authorization of executable files
EP2267625A3 (en) On-line centralized and local authorization of executable files
AU2017263285A1 (en) Validation of pal protection areas
US8689015B2 (en) Portable secure data files
IL223027A (en) Interoperable systems and methods for peer-to-peer service orchestration
WO2009155473A3 (en) Information rights management
WO2004062164A3 (en) Methods and apparatus for managing secured software for a wireless device
EP2498200A4 (en) Method of authentication at time of update of software embedded in information terminal, system for same and program for same
WO2006017756A3 (en) Method and system for controlling access to a wireless client device
RU2010114241A (en) MULTIFACTOR CONTENT PROTECTION
WO2006023116A3 (en) System and method for enabling device dependent rights protection
WO2003027924A1 (en) Content usage authority management system and management method
GB2384593A (en) Method and apparatus for software authentication
WO2006101549A3 (en) Secure system for allowing the execution of authorized computer program code
ATE386290T1 (en) PROTECTED CONTENT ACCESS SYSTEM AND METHODS IN A PERMISSION MANAGEMENT SYSTEM
WO2006065956A3 (en) Protecting computing systems from unauthorized programs
CN101901313A (en) Linux file protection system and method
WO2010144815A3 (en) System and method for providing security aboard a moving platform
WO2004049096A3 (en) Creation of local usage rights voucher
WO2007011816A3 (en) An improved means for protecting computers from malicious software
WO2006065633A3 (en) Method and device for digital rights management
WO2002023315A3 (en) System for managing rights and permitting on-line playback of digital content
WO2008029393A3 (en) Method for managing simultaneous modification of database objects during development
WO2006028488A3 (en) Authentication of users and computer systems
WO2001046782A3 (en) Method of pre-releasing encrypted digital data

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

WWE Wipo information: entry into national phase

Ref document number: 2005744086

Country of ref document: EP

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWP Wipo information: published in national office

Ref document number: 2005744086

Country of ref document: EP