+

WO2009118847A1 - Méthode de signatures - Google Patents

Méthode de signatures Download PDF

Info

Publication number
WO2009118847A1
WO2009118847A1 PCT/JP2008/055761 JP2008055761W WO2009118847A1 WO 2009118847 A1 WO2009118847 A1 WO 2009118847A1 JP 2008055761 W JP2008055761 W JP 2008055761W WO 2009118847 A1 WO2009118847 A1 WO 2009118847A1
Authority
WO
WIPO (PCT)
Prior art keywords
signature
electronic
data
electronic data
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2008/055761
Other languages
English (en)
Japanese (ja)
Inventor
泰次 岡本
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to PCT/JP2008/055761 priority Critical patent/WO2009118847A1/fr
Publication of WO2009118847A1 publication Critical patent/WO2009118847A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the present invention relates to a signature management method, and more particularly to a signature management method capable of appropriately verifying the validity of an electronic signature even in transmission of electronic data other than electronic mail.
  • a third party is not impersonating a legitimate sender by adding an electronic signature to an e-mail, and the contents of the e-mail are not altered by the third party.
  • a mechanism is used that allows the recipient to confirm this.
  • Patent Document 1 A technique described in Patent Document 1 has been proposed as a technique for using the same correctness confirmation function also in transmission of electronic data other than electronic mail.
  • a message digest and electronic signature of electronic data to be transmitted are registered in the document verification information storage device, and the electronic data receiver sends a digital signature corresponding to the message digest calculated from the electronic data to the document.
  • a request is made to the verification information storage device, and the validity of the electronic data is confirmed using the transmitted electronic signature.
  • Patent Document 1 has a problem that although the sender of electronic data can be confirmed, theft of electronic data cannot be prevented. That is, when a person who does not have a legitimate right about electronic data creates an electronic signature of the electronic data and registers it in the document verification information storage device, the recipient of the electronic data is obtained from the document verification information storage device When the validity of the electronic data is confirmed using the electronic signature, the electronic data is normally verified, and the receiver cannot know that the electronic data is transmitted from a person who does not have a valid right.
  • the present invention has been made to solve the above-described problems caused by the prior art, and provides a signature management method capable of properly verifying the validity of an electronic signature even in transmission of electronic data other than electronic mail.
  • the purpose is to provide.
  • a signature management method disclosed in the present application is, in one aspect, a signature management method for holding an electronic signature of electronic data in a signature management apparatus, the first terminal Transmitting the first electronic data and signature verification key to the signature management device, the signature management device generating processing data, and the signature management device using the processing data.
  • the signature management device stores the management number, the signature verification key, the electronic signature, and the processing data in association with each other, and the signature management device includes the management Transmitting a number to the first terminal; a second terminal transmitting third electronic data and a management number corresponding to the data to the signature management apparatus; and the signature management apparatus comprising: A step of acquiring an electronic signature and processing data stored in association with a management number corresponding to the third electronic data from the storage means; and the processing data acquired by the signature management apparatus from the storage means Processing the third electronic data by using the method to generate fourth electronic data, and the signature management apparatus converts the electronic signature and the fourth electronic data acquired from the storage means to the first electronic data. 2 terminals Transmitting, and the second terminal confirms the validity
  • one of the application methods is auxiliary confirmation data indicating the disclosure fact of the electronic data disclosure location, publisher name, etc. Is stored and managed in association with electronic data and electronic signatures, so that the facts relating to the disclosure of electronic data are registered in the signature management apparatus, and the user of the electronic data confirms the fact of disclosure The usage method of using is considered.
  • a person who obtains a set of publicly available electronic data, an electronic signature, and a signature verification key creates a copy of the set and publishes it to another new public location without permission. Demonstrates a deterrent effect in two aspects.
  • the first deterrent effect is that, according to the present invention, every time it is registered in the signature management apparatus, it is necessary to create an electronic signature with a different value every time even if the original electronic data is the same. There is an effect that the obtained electronic signature cannot be used as it is when attempting to register the fact of disclosure to a place.
  • the second deterrent effect is that the user must always ask the signature verification device when verifying the validity of the electronic signature for the published electronic data. There is an effect that the data showing the fact can be presented and the user can confirm that there is no difference between the actual public location and the public fact.
  • FIG. 1 is a diagram illustrating an example of a signature management system including a signature management apparatus according to the present embodiment.
  • FIG. 2 is a diagram showing a procedure for publishing electronic data.
  • FIG. 3 is a diagram illustrating a procedure of a validity confirmation process for public data.
  • FIG. 4 is a diagram showing another procedure of the validity confirmation process for the public data.
  • FIG. 5 is a functional block diagram showing the configuration of the signature management apparatus.
  • FIG. 6 is a functional block diagram illustrating a computer that executes a signature management program.
  • FIG. 1 is a diagram illustrating an example of a signature management system including a signature management apparatus 30 according to the present embodiment.
  • the signature management system 1 shown in FIG. 1 is configured by connecting user terminals 10a to 10n, service providing devices 20a to 20m, and a signature management device 30 via a network 2 such as the Internet.
  • User terminals 10a to 10n are devices for creating various electronic data and using electronic data created by other terminals, and correspond to, for example, a personal computer or a mobile terminal.
  • the service providing devices 20a to 20m are devices that provide services that hold and publish electronic data transmitted from the user terminals 10a to 10n.
  • the service providing apparatus 20a is an apparatus that provides an electronic bulletin board service or a blog service
  • the user terminals 10a to 10n create articles as document data and post them to the service providing apparatus 20a.
  • the service providing apparatus 20a The posted document data is posted and released to other terminals.
  • the service providing apparatus 20b is an apparatus that provides a photo sharing service
  • the user terminals 10a to 10n edit the image data and post it to the service providing apparatus 20b.
  • the service providing apparatus 20b Publish to other devices.
  • the signature management apparatus 30 is an apparatus that manages an electronic signature for verifying the identity of a provider of electronic data disclosed in the service providing apparatuses 20a to 20m.
  • the signature management apparatus 30 processes the electronic data by a predetermined method to generate signature data, and the requester receives the signature data.
  • the electronic signature obtained by signing with the signature creation key is stored in association with a management number for identifying the electronic data.
  • the signature management apparatus 30 verifies the validity of the electronic signature using the signature verification key corresponding to the signature creation key before storing the electronic signature in association with the management number.
  • unknown data that is automatically generated, such as signature data it is very difficult to forge a combination of a correct electronic signature and a signature verification key. Therefore, by verifying the validity of the electronic signature for the signature data using the signature verification key, the requester of the electronic signature management can obtain the right owner of the signature creation key and signature verification key pair. It can be confirmed.
  • FIG. 2 is a diagram showing a procedure for publishing electronic data.
  • the user of the user terminal 10a intends to send electronic data to the service providing apparatus 20a and make it public, and to request the signature management apparatus 30 to manage the electronic signature in order to prevent falsification of the electronic data. It shall be.
  • the user terminal 10a After generating the electronic data (step S101), the user terminal 10a acquires auxiliary confirmation information such as a public location and a publisher name (step S102).
  • the auxiliary confirmation information may be any information as long as it indicates a fact regarding the disclosure of electronic data.
  • the user terminal 10a transmits electronic data, auxiliary confirmation information, and a signature verification key to the signature management apparatus 30 and requests management of the electronic signature (step S103).
  • the signature verification key may be transmitted by the user, or may be transmitted in advance.
  • the signature management apparatus 30 Upon receiving the request, the signature management apparatus 30 generates processing data (step S104).
  • the processing data may be anything as long as the contents are different each time the management of the electronic signature is requested.
  • the signature management apparatus 30 processes the electronic data using the processing data to generate signature data (step S105).
  • any processing method may be used.
  • the processing data may be added to a predetermined position of the electronic data, or the electronic data may be encrypted using the processing data as an encryption key.
  • the electronic data may be divided into blocks having a predetermined length, and each block and the processing data may be XORed.
  • the signature management apparatus 30 transmits the signature data to the user terminal 10a, and instructs to sign it with the signature creation key corresponding to the signature verification key (step S106).
  • the user terminal 10a creates an electronic signature from the signature data using the signature creation key corresponding to the signature verification key (step S107), and transmits it to the signature management apparatus 30 (step S108).
  • the signature management apparatus 30 confirms the validity of the electronic signature using the signature verification key transmitted in step S103 (step S109).
  • the signature management apparatus 30 suspends the process after executing a predetermined error process.
  • the signature management apparatus 30 issues a management number for identifying the electronic signature (step S110), and associates the management number, the processing data, the electronic signature, and the auxiliary confirmation information with the management DB. (Step S111).
  • the management DB is a database in which information related to electronic data requested to manage electronic signatures is stored. Then, the signature management apparatus 30 transmits the management number to the user terminal 10a (step S112).
  • the user terminal 10a transmits the electronic data, the signature verification key, the management number, and the auxiliary confirmation information to the service providing apparatus 20a and discloses them (step S113).
  • FIG. 3 is a diagram showing a procedure for a validity confirmation process for public data.
  • the user of the user terminal 10b is trying to acquire public data published in the service providing apparatus 20a and check the validity of the public data.
  • the user terminal 10b After the user terminal 10b acquires the electronic data, signature verification key, management number, and auxiliary confirmation information from the service providing apparatus 20a (step S201), the user terminal 10b receives the electronic data, the management number, The auxiliary confirmation information is transmitted to the signature management apparatus 30 to request confirmation of validity (step S202).
  • the signature management apparatus 30 searches the management DB using the transmitted management number as a key and acquires registered information (step S203).
  • the signature management apparatus 30 checks whether the auxiliary confirmation information obtained by searching the management DB matches the transmitted auxiliary confirmation information (step S204). For example, when the name of the provider of electronic data is disclosed as auxiliary confirmation information, the name of the provider acquired in step S201 is compared with the name of the provider stored in the management DB. .
  • step S205 if the information does not match (No in step S205), it means that some alteration has been made to the published data, so the signature management apparatus 30 indicates that the public data is not valid.
  • the signature management apparatus 30 uses the processed data obtained by searching the management DB in the same manner as step S105.
  • the electronic data is processed to create signature data (step S207), and the electronic signature and signature data are transmitted to the user terminal 10b (step S208).
  • the user terminal 10b verifies the validity of the electronic signature for the signature data using the signature verification key (step S209).
  • the signature data is verified in the user terminal 10 b, but the signature data can also be verified in the signature management apparatus 30.
  • the processing procedure in this case is shown in FIG. Steps S301 to S306 in FIG. 4 are the same as Steps S201 to S206 in FIG. 3 except that the signature verification key is further transmitted to the signature management apparatus 30 in Step S302, and thus description thereof is omitted.
  • the signature management apparatus 30 uses the processing data obtained by searching the management DB, The electronic data is processed by the same method as in step S105 to create signature data (step S307).
  • the signature management apparatus 30 verifies the validity of the electronic signature for the signature data using the signature verification key (step S308).
  • a response that the electronic signature is not valid is returned to the user terminal 10b (Step S306), and when the validity is confirmed (Yes at Step S309), A response is sent to the user terminal 10b that the electronic signature is valid (step S310).
  • public in the present application does not only mean that electronic data is posted on a server device or the like on the network as in the above example, but the electronic data is available to a third party. Means to.
  • the third party here may be a specific one or an unspecified number.
  • “public” in the present application includes transmission of electronic data via a recording medium such as a CD-ROM, in addition to transmission by electronic mail and transmission by a P2P system.
  • FIG. 5 is a functional block diagram showing the configuration of the signature management apparatus 30.
  • the signature management apparatus 30 includes a control unit 31, a storage unit 32, and a network interface unit 33.
  • the control unit 31 is a control unit that totally controls the signature management apparatus 30, and includes a management request reception unit 31a, a processing data generation unit 31b, a signature data generation unit 31c, a signature request unit 31d, and a signature verification unit. 31e, a management number generation unit 31f, an information storage unit 31g, a management number transmission unit 31h, a confirmation request reception unit 31i, an information search unit 31j, an information comparison unit 31k, and a verification result response unit 31l .
  • the management request receiving unit 31a is a processing unit that receives a management request for an electronic signature. Specifically, the management request receiving unit 31a receives electronic data, auxiliary confirmation information, and signature verification key transmitted from the user terminal 10a or the like in step S103 of FIG.
  • the processing data generation unit 31b is a processing unit that generates processing data for creating signature data.
  • the processing data generation unit 31b uses, for example, random numbers to generate processing data having different values each time a new request is received by the management request reception unit 31a. Specifically, the processing data generation unit 31b generates processing data in step S104 of FIG.
  • the signature data generation unit 31c is a processing unit that processes the electronic data using the processing data to generate the signature data. Specifically, the signature data generation unit 31c generates signature data by adding processing data to the electronic data in step S105 of FIG. 2, step S207 of FIG. 3, and step S307 of FIG. .
  • the signature request unit 31d is a processing unit that transmits the signature data generated by the signature data generation unit 31c to the transmission source of the electronic data and requests the creation of the electronic signature. Specifically, the signature request unit 31d transmits signature data to the user terminal 10a and the like in step S106 of FIG. 2 and requests creation of an electronic signature.
  • the signature verification unit 31e is a processing unit that verifies the validity of the electronic signature for the signature data using the signature verification key. Specifically, the signature verification unit 31e verifies the electronic signature in step S109 in FIG. 2 and step S308 in FIG. As in the example illustrated in FIG. 4, when the signature management apparatus 30 executes up to the verification of the electronic signature, the signature verification unit 31e causes the verification result response unit 31l to respond with the verification result.
  • the management number generation unit 31f is a processing unit that issues a management number for identifying an electronic signature. Specifically, the management number generation unit 31f issues a different management number for each electronic signature in step S110 of FIG.
  • the information storage unit 31g is a processing unit that stores a management number, processing data, an electronic signature, and auxiliary confirmation information in association with each other in the management DB 32a. Specifically, the information storage unit 31g executes the information storage process in step S111 in FIG.
  • the management number transmitting unit 31h is a processing unit that transmits the issued management number to the transmission source of the electronic data. Specifically, the management number transmission unit 31h transmits the management number in step S112 in FIG.
  • the confirmation request accepting unit 31i is a processing unit that accepts an electronic data validity confirmation request. Specifically, the confirmation request receiving unit 31i receives electronic data, management number, auxiliary confirmation information, and signature verification key transmitted from the user terminal 10b or the like in step S202 of FIG. 3 and step S302 of FIG.
  • the information search unit 31j is a processing unit that searches the management DB 32a using the management number received by the confirmation request receiving unit 31i as a key, and acquires the registered processing data, electronic signature, and auxiliary confirmation information. Specifically, the information search unit 31j searches the management DB 32a in step S203 in FIG. 3 and step S303 in FIG.
  • the information comparison unit 31k compares the information received by the confirmation request reception unit 31i with the information acquired from the management DB 32a by the information search unit 31j, thereby determining whether the public data has been tampered with. It is. Specifically, the information comparison unit 31k compares information in step S204 in FIG. 3 and step S304 in FIG. If the information does not match, the information comparison unit 31k causes the verification result response unit 31l to respond that it is not valid.
  • the verification result response unit 31l is a processing unit that responds to the requester of the confirmation request with the confirmation result of validity. Specifically, the verification result response unit 31l responds in steps S206 and S208 in FIG. 3 and steps S306 and S310 in FIG.
  • the storage unit 32 is a storage unit that stores various types of information, and includes a management DB 32a.
  • the management DB 32a is a database that stores information related to electronic data requested to manage an electronic signature, and holds processing data, an electronic signature, and auxiliary confirmation information in association with a management number.
  • the configuration of the signature management apparatus 30 according to the present embodiment shown in FIG. 5 can be variously changed without departing from the gist of the present invention.
  • a function equivalent to that of the signature management apparatus 30 can be realized by mounting the function of the control unit 31 of the signature management apparatus 30 as software and executing the function by a computer.
  • An example of a computer that executes the signature management program 1071 in which the function of the control unit 31 is implemented as software is shown below.
  • FIG. 6 is a functional block diagram showing the computer 1000 that executes the signature management program 1071.
  • the computer 1000 includes a CPU (Central Processing Unit) 1010 that executes various arithmetic processes, an input device 1020 that receives input of data from a user, a monitor 1030 that displays various information, and a medium that reads a program from a recording medium.
  • a bus 1080 includes a reading device 1040, a network interface device 1050 that exchanges data with other computers via a network, a RAM (Random Access Memory) 1060 that temporarily stores various information, and a hard disk device 1070. Connected and configured.
  • the hard disk device 1070 includes a signature management program 1071 having the same function as the control unit 31 shown in FIG. 5 and signature management data 1072 corresponding to various data stored in the storage unit 32 shown in FIG. Is memorized.
  • the signature management data 1072 can be appropriately distributed and stored in another computer connected via a network.
  • the signature management program 1071 functions as the signature management process 1061.
  • the signature management process 1061 expands information read from the signature management data 1072 and the like in an area allocated to itself on the RAM 1060 as appropriate, and executes various data processing based on the expanded data.
  • the signature management program 1071 is not necessarily stored in the hard disk device 1070, and the computer 1000 may read and execute the program stored in a storage medium such as a CD-ROM. .
  • the computer 1000 stores the program in another computer (or server) connected to the computer 1000 via a public line, the Internet, a LAN (Local Area Network), a WAN (Wide Area Network), or the like. You may make it read and run a program from these.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention porte sur une méthode de vérification de la validité d'une signature électronique s'avérant efficace même en cas de transmission de données électroniques autres que des courriels. Pour résoudre le problème, ladite méthode de gestion de signatures comporte les étapes suivantes:  i) transmission par un terminal utilisateur de premières données électroniques à un appareil de gestion de signatures ; ii) traitement par l'appareil de gestion de signatures des premières données électroniques pour obtenir de deuxièmes données électroniques; iii) création par le terminal utilisateur d'une signature électronique des deuxièmes données électroniques ; iv) et stockage dans un moyen de stockage.par l'appareil de gestion de signatures d'un numéro de gestion et de la signature électronique des deuxièmes données électroniques dans une relation correspondante. L'appareil de gestion de signatures vérifie ladite validité à l'aide de la signal électronique ou analogue stockée dans le moyen de stockage, en réponse à une demande du terminal utilisateur
PCT/JP2008/055761 2008-03-26 2008-03-26 Méthode de signatures Ceased WO2009118847A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2008/055761 WO2009118847A1 (fr) 2008-03-26 2008-03-26 Méthode de signatures

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2008/055761 WO2009118847A1 (fr) 2008-03-26 2008-03-26 Méthode de signatures

Publications (1)

Publication Number Publication Date
WO2009118847A1 true WO2009118847A1 (fr) 2009-10-01

Family

ID=41113088

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2008/055761 Ceased WO2009118847A1 (fr) 2008-03-26 2008-03-26 Méthode de signatures

Country Status (1)

Country Link
WO (1) WO2009118847A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112383555A (zh) * 2020-11-17 2021-02-19 宏图智能物流股份有限公司 一种物流网络中的网络请求有效性验证方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09311854A (ja) * 1996-05-22 1997-12-02 Mitsubishi Electric Corp 署名文書通信装置
JPH1020781A (ja) * 1996-06-28 1998-01-23 Nippon Telegr & Teleph Corp <Ntt> 電子署名方法、その検証方法および装置
JP2003169052A (ja) * 2001-11-30 2003-06-13 Hitachi Ltd デジタル署名システム

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09311854A (ja) * 1996-05-22 1997-12-02 Mitsubishi Electric Corp 署名文書通信装置
JPH1020781A (ja) * 1996-06-28 1998-01-23 Nippon Telegr & Teleph Corp <Ntt> 電子署名方法、その検証方法および装置
JP2003169052A (ja) * 2001-11-30 2003-06-13 Hitachi Ltd デジタル署名システム

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112383555A (zh) * 2020-11-17 2021-02-19 宏图智能物流股份有限公司 一种物流网络中的网络请求有效性验证方法
CN112383555B (zh) * 2020-11-17 2022-06-03 宏图智能物流股份有限公司 一种物流网络中的网络请求有效性验证方法

Similar Documents

Publication Publication Date Title
CN111164594B (zh) 用于将去中心化标识映射到真实实体的系统和方法
CN112333198B (zh) 安全跨域登录方法、系统及服务器
CN111095865B (zh) 用于发布可验证声明的系统和方法
CN107979590B (zh) 数据共享方法、客户端、服务器、计算设备及存储介质
CN110851879B (zh) 一种基于存证区块链的侵权存证方法、装置及设备
CN109074579B (zh) 使用分布式散列表和区块链保护计算机软件的方法及系统
CN108111314B (zh) 数字证书的生成和校验方法及设备
US10958436B2 (en) Methods contract generator and validation server for access control of contract data in a distributed system with distributed consensus
US9736146B2 (en) Embedded extrinsic source for digital certificate validation
CN108551437B (zh) 用于认证信息的方法和装置
US20230403154A1 (en) Verifier credential determination by a registrant
CN110879903A (zh) 证据存储方法、证据验证方法及装置、设备和介质
CN113056741A (zh) 基于分布式账本的简档验证
WO2020055926A2 (fr) Établissement de la provenance d&#39;actifs numériques à l&#39;aide d&#39;un système de chaîne de blocs
US20190354725A1 (en) Distributed Blockchain-Based Method for Saving the Location of a File
JP2003283491A (ja) ディジタル署名管理方法とディジタル署名処理装置およびプログラムと記録媒体
US8218763B2 (en) Method for ensuring the validity of recovered electronic documents from remote storage
US20230206219A1 (en) Identification token, systems and methods for identification and identity verification.
US20080109651A1 (en) System and methods for digital file management and authentication
KR101890584B1 (ko) m of n 다중 서명에 의한 인증서 서비스를 제공하는 방법 및 이를 이용한 서버
JP2011160349A (ja) デジタルデータ内容証明システム、データ証明装置、ユーザ端末、コンピュータプログラム及び方法
KR100932266B1 (ko) 전자문서중계 서비스 제공 방법
WO2020130864A1 (fr) Système de gestion et de dépôt automatiques de hachage de documents (images) dans une technologie de chaîne de blocs
WO2024112394A1 (fr) Partage de réglages de sécurité entre entités à l&#39;aide de justificatifs d&#39;identité vérifiables
JP2008509591A (ja) 電子取引の明細に関するプライバシを保護する取引認証方法および取引認証システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08738949

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08738949

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载