WO2004089004A1 - Procede de protection d'informations relatives a la localisation dans un service de localisation - Google Patents
Procede de protection d'informations relatives a la localisation dans un service de localisation Download PDFInfo
- Publication number
- WO2004089004A1 WO2004089004A1 PCT/CN2004/000297 CN2004000297W WO2004089004A1 WO 2004089004 A1 WO2004089004 A1 WO 2004089004A1 CN 2004000297 W CN2004000297 W CN 2004000297W WO 2004089004 A1 WO2004089004 A1 WO 2004089004A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- target
- service
- information request
- location information
- location
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/16—Mobility data transfer selectively restricting mobility data tracking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
Definitions
- the present invention relates to the positioning technology of network equipment, and particularly to a method for protecting location information requests in a location service. '' Background of the invention
- the location service (LCS, Location Service) of a mobile communication network is to obtain location information of a target user equipment (UE) through positioning technology.
- the target UE refers to a UE terminal located in the mobile communication network.
- the location information may be geographic latitude and longitude information or current location information. Location information of the street.
- the location information obtained by the LCS system can be provided to the target UE for its own positioning; it can also be provided to other client applications, such as institutions and individuals, that request the location information of the target UE for value-added services. Therefore, location services have a wide range of functions in emergency rescue, vehicle navigation and intelligent transportation systems, work scheduling and team management, mobile yellow page query, and enhanced network performance.
- 3GPP 3rd Generation Partnership Project
- the location information request initiated by the requester to the target UE is divided into two types: immediate location information request and delayed location information request.
- Immediate location information request means that the LCS system immediately locates the target UE after receiving the location information request from the requesting end to the target UE, and then immediately sends the positioning result to the requesting end, that is, the LCS system receives the location information sent by the requesting end. After the request, the current location information of the target UE is provided to the requesting end immediately.
- Delayed location information request refers to the requesting end requesting the LCS system to provide the location information of the target UE to it at a future point in time or when a certain event occurs. That is, after the LCS system receives the location information request from the requesting end to the target UE, it needs to go through A delay After the delay event is triggered, the requester is provided with the current location information of the target UE.
- 3GPP allows the requester to request the LCS system to provide it with the location information of the target UE periodically, that is, the requester defines the start time point and the end time point and a certain periodic logic, and requires the LCS system to follow the periodic logic to the It provides location information of the target UE.
- the above-mentioned location information request may be referred to as a periodic location information request.
- the periodic location information request is one of the delayed location information requests, so the periodic location information request can be classified into the delayed location information request type.
- Figure 1 is a schematic diagram of the logical structure of the LCS network.
- the requesting end 101 requests the location information of the target UE 103 through the LCS system 102.
- the LCS system 102 performs legality authentication on the requesting end 101 and checks whether the target UE 103 allows the The requester 101 initiates a request for location information on it. If the requester 101 passes the legality authentication of the LCS system 102, the LCS system 102 provides the location information of the target UE 103 to it; otherwise, the LCS system 102 rejects the requester 101 to the target UE 103. Initiated location request.
- the location information belongs to the privacy information of the target UE, the location information of the target UE should be strictly protected. Since the location service belongs to a service subscribed by the target UE, at some times, it may be necessary to request the LCS system to close the location service to the requesting end for the purpose of protecting its private information, that is, to deactivate the location service; In addition, when the target UE roams out of the home service area, the positioning cost may increase due to roaming. Due to the consideration of charges, the target UE may also need to request the LCS system to close the location service to the requesting end.
- the LCS system When the LCS system deactivates the location service of the target UE, it will interrupt the processing of all currently active location information requests, and in the subsequent process, all location information requests initiated by the target UE to the target UE will be It was rejected by the LCS system. In this way, for some non-value-added service location information requests, such as the legal tracking of local security agencies, and the location information requests initiated by network operators for maintenance operations, will be disturbed, affecting the completion of normal tasks.
- non-value-added service location information requests such as the legal tracking of local security agencies, and the location information requests initiated by network operators for maintenance operations
- the purpose of the present invention is to provide a method for protecting a location information request in a location service, and to specifically protect a location information request with a special application and purpose that exceeds the control range of a target UE user, and to ensure such type of location information.
- the request is executed without interference from the user operation of the target UE.
- the present invention provides a method for protecting a location information request in a location service.
- the method includes the following steps:
- the target sends a location service operation request to the LCS system, and the location service operation request carries a target UE identifier
- the LCS 'system determines whether the location information request for the target UE belongs to the set operation invalid service scope. If it does not, perform step C, otherwise, the current location information request operation protection process is ended;
- the LCS system performs the location service operation requested by the target UE in step A on the location information request.
- the step B includes the following steps:
- step B12 determines whether there is currently a location information request initiated by the target UE according to the target UE identification carried in the location service operation request. If so, step B12 is performed; otherwise, the current location information request operation protection process is ended;
- the LCS system judges whether the location information request initiated by the target UE belongs to the set operation invalid service scope, and if it belongs, execute step B13; otherwise, execute step C;
- the LCS system determines whether to perform the location service operation requested by the target UE for the location information request that belongs to the service invalid service range. If so, execute step C; otherwise, end the current location information request operation protection process.
- the operation invalid service range described in step B is set in the LCS system in advance.
- the service invalid service range described in step B is carried in the location service operation request when the target UE initiates the location service operation.
- the location service operation request is a location service deactivation operation request
- the step A is: the target UE sends a location service deactivation operation request to the LCS system, and the location service deactivation operation request carries a target UE identifier;
- the step B is: the LCS system judges whether the active location information request to the target UE belongs to the set operation invalid service range; if it does not belong to step C, otherwise, the location service of the target UE is set to invalid To end the current location information request operation protection process;
- the step C is: the LCS system performs an invalidation operation on the active position information request to the target UE, and sets the position service of the target UE as invalid.
- the step B includes the following steps:
- the LCS system searches whether there is currently an active position information request initiated by the target UE, and if so, performs step B22; otherwise, ends the current position information request operation protection process;
- the LCS system judges whether the active position information request to the target UE belongs to the set operation invalid service scope. If it belongs, go to step B23; otherwise, go to step C;
- the LCS system determines whether to perform invalidation operation on the location information request that belongs to the operation invalid service range. If so, perform step C; otherwise, set the location service of the target UE to invalid, and end the current location information request operation protection process.
- the method further includes: the LCS system receives the location information request initiated by the target UE, and determines whether to process the location information request according to the set operation invalid service range, if it is , For the location information please Request processing, otherwise, refuse to process the location information request.
- the LCS system described in step C further includes: The LCS system returns a positioning failure response to the requesting end corresponding to the position information request that has performed the invalidation operation.
- the location service operation request is a location service query operation request
- the step A is: the target UE sends a location service query operation request to the LCS system, and the location service query operation request carries a target UE identifier;
- the step B is: the LCS system judges whether the location information request to the target UE that meets the query operation requirements belongs to the set operation invalid service scope; if it does not, step C is performed, otherwise, the current location information request operation protection process is ended ;
- the step C is: The LCS system performs a query operation on the location information request, and returns a query operation result to the target UE.
- the step B includes the following steps:
- the LCS system searches whether there is an active position information request initiated by the target UE, and if so, executes step B32; otherwise, ends the current position information request operation protection process;
- the LCS system judges whether the location information request belongs to a set operation invalid service scope, and if it belongs, execute step B33; otherwise, execute step C;
- the LCS system judges whether to perform a query operation on a location information request that belongs to an operation invalid service range. If so, execute step C; otherwise, end the current location information request operation protection process.
- the location information request can be processed correspondingly for different types of location information request types, and some special features beyond the control range of the target UE user are protected.
- Application and destination location information requests to ensure that the execution of such location information requests is uninterrupted and enhance their security Fullness.
- Figure 1 is a schematic diagram of the logical structure of the LCS network
- FIG. 2 is a flowchart of the operation of the LCS system to protect the position information in the present invention
- FIG. 3 is a flowchart of the LCS system to perform the deactivation protection of the position information in the deactivation operation in the present invention.
- FIG. 2 is a flowchart of seeking protection of position information by the LCS system according to the present invention. As shown in FIG. 2, the implementation process of obtaining protection of position information by the LCS system includes the following steps:
- Steps 201 to 202 The target UE sends a location service operation request to the LCS system, and the location service operation request carries the target UE identity. After receiving the location service operation request, the LCS system searches for a location information request initiated by the target UE that meets the request operation requirements of the target UE according to the target UE identity. If it is found, step 203 is performed; otherwise, the LCS system ends the location information request. Operation protection process. Meeting the request operation requirements of the target UE refers to a preset operating condition, for example, deactivating a location information request in a certain area and querying a certain type of location information request.
- Step 203 The LCS system judges whether the currently searched location information request for the target UE that meets the location service operation requirements of the target UE belongs to the operation invalid service range. If so, step 204 is performed; otherwise, step 205 is performed.
- the operation invalid service range may be preset by a network operator or a target UE user in a location service system (LCS system), or may be carried when the target UE initiates a location service operation request for planning It is divided into whether the location service scope of the currently initiated location service operation request can be directly executed.
- the operational invalid service scope can be divided according to different types of location information requests. For example, it can be divided into value-added service scope, operator operation and maintenance service scope, emergency service scope, and legal tracking service scope according to the application and purpose of the location information request.
- the location information request that belongs to the value-added service range directly executes the currently initiated location service operation request, and the location information request that belongs to the non-value-added service range needs to be determined according to specific circumstances. Whether to perform the currently initiated location service operation request.
- Step 204 The LCS system determines whether to perform the location service operation requested by the target UE for the location information request. If yes, execute step 205; otherwise, end the operation protection process for the location information requested by the LCS system.
- Step 205 The LCS system performs the location service operation requested by the target UE for the location information request.
- the LCS system processing the location service deactivation operation request initiated by the target UE, when the current location information request initiated by the target UE is invalidated, for some non-value-added service type location information requests, for example, local security Institutional legal tracking, location information requests initiated by network operators for maintenance operations, because these types of location information requests are beyond the control of the target UE user, there is no need to deactivate the location service initiated by the target UE user Failure, the LCS system needs to protect such location information requests.
- some non-value-added service type location information requests for example, local security Institutional legal tracking
- location information requests initiated by network operators for maintenance operations because these types of location information requests are beyond the control of the target UE user, there is no need to deactivate the location service initiated by the target UE user Failure, the LCS system needs to protect such location information requests.
- FIG. 3 is a flowchart of performing a deactivation protection on a location information request within a service area where the deactivation operation is invalid during the deactivation operation performed by the LCS system in the present invention.
- the implementation process of requesting deactivation protection for location information in the service scope includes the following steps:
- Steps 301 to 302 The target UE sends a location service deactivation operation request to the LCS system, and the location service deactivation operation request carries the target UE identifier.
- LCS system After requesting the location service deactivation operation, search for an active location information request currently initiated by the target UE according to the target UE identity, and if found, go to step 303; otherwise, go to step 307.
- Step 303 The LCS system judges whether the searched location information request currently initiated by the target UE in the active state belongs to the invalid service range of the deactivation operation, and if it belongs to step 304, otherwise, step 305 is performed.
- Step 304 The LCS system determines whether the location information request is invalid, and if so, performs step 305; otherwise, the LCS system normally processes the location information request, such as authenticating the requesting end, locating the target UE, and returning the target UE. The positioning result and so on, and then step 307 is performed.
- Step 305 The LCS system fails the location information request, and the LCS system terminates the processing of the failed location information request.
- Step 306 The LCS system sends a positioning failure response to the corresponding requester that has failed its location information request.
- the positioning failure response may carry a parameter, which indicates that the target UE has terminated the processing of the location information request initiated by the requester by the LCS system. .
- This step may be omitted, that is, the LCS system may not return any message to the corresponding requesting end.
- Step 307 The LCS system sets the location service of the target UE to be invalid, that is, deactivates the location service of the target UE.
- the LCS system determines whether the location service of the target UE is successfully set to be invalid. If yes, go to step 308; otherwise, go to step 309.
- Step 308 The LCS system returns a successful response to the location service deactivation operation to the target UE, notifies the target UE that the location service deactivation operation it initiated has been successfully performed, and ends the location service deactivation operation.
- Step 309 The LCS system returns a location service deactivation operation failure response to the target UE.
- the location service deactivation operation failure response carries a corresponding failure reason value, and notifies the target UE that the location service deactivation operation initiated by it fails to execute.
- Step 308 or step 309 may be omitted, that is, the LCS system may not return any message to the target UE. If step 308 or step 309 is omitted, the step of the LCS system in step 307 to determine whether the location service of the target UE is successfully set to be invalid may also be omitted. .
- the LCS system receives a subsequent location information request to the target UE, and judges whether the location information request belongs to the deactivation operation invalid service scope. If the location information request belongs to the deactivation operation invalid service scope, the LCS system Continue to determine whether to reject the location information request. If so, the LCS system returns a positioning failure response to the corresponding requester, and refuses to provide the location information of the target UE; otherwise, the LCS system normally processes the location information request, for example, to the Qianqiu terminal. Perform authentication, locate the target UE, return the positioning result of the target UE, etc .; if the location information request does not belong to the invalid service scope of the deactivation operation,
- the LCS system returns a positioning failure response to the corresponding requester, and refuses to provide the location station of the target UE
- a security agency In a mobile communication network, a security agency is using the LCS system to initiate a periodic location information request for a target UE, dynamically track the target UE, and periodically obtain the location information of the target UE.
- an entertainment website initiates a delayed location information request to the target UE, hoping that when the target UE enters a certain area, such as within a large shopping mall, it will immediately obtain its location information.
- the operator pre-sets the invalid service scope of the deactivation operation of the target UE user as: the operator's operation and maintenance service scope, emergency service scope, and legal tracking service scope, that is, the deactivation operation of the target UE should not be applied to the operator's operation Location information requests for maintenance services, emergency services, and legal tracking services.
- the LCS system may allow the target UE to use the short message service (SMS) as a message bearer to perform information interaction with the LCS system, that is, the target UE may send a location service operation request to the LCS system through the SMS.
- SMS short message service
- the target UE needs an invalid location service
- a short message with a specific meaning can be edited and sent to the specified address, for example, the target UE edits the short message LCS + off and sends it to 9999, indicating that the LCS system is requested to locate the target UE.
- Set services for deactivation At this time, the LCS system can authenticate the target UE and determine whether the target UE has permission to request the LCS system to perform the location service deactivation operation.
- the LCS system accepts the location service deactivation operation request initiated by the target UE. , Performing a deactivation operation on the location service of the target UE; otherwise, the LCS system rejects the location service deactivation operation request initiated by the target UE.
- the LCS system authenticates the target UE to require the target UE to provide a location service deactivation operation password. If the location service provided by the target UE deactivates the operation password, the location service deactivation operation password corresponding to the target UE is stored in the LCS system.
- the target UE passes authentication, and the LCS system accepts the location service deactivation operation request initiated by the target UE, and deactivates the location service of the target UE; otherwise, the LCS system rejects the location service deactivation operation request initiated by the target UE. .
- the LCS system After the target UE passes the authentication, the LCS system searches for the active position information request currently initiated on the target UE. If it finds the active position information request currently initiated on the target UE, the LCS system continues to judge the searched current position information request. Whether the active location information request initiated by the target UE belongs to the deactivation operation invalid service scope, that is, determines whether the currently activated location information request belongs to the operator's operation and maintenance service scope, or belongs to the emergency service scope, or belongs to Legal tracking business scope. At this time, the periodic location information request initiated by a previous security agency belongs to the legal tracking business scope, that is, within the invalid business scope of the deactivation operation, and the delayed location information initiated by an entertainment website. The request belongs to the scope of value-added services, and does not belong to the scope of invalid business of deactivation operations.
- the LCS system judges whether the processing method preset by the network operator for the location information request that belongs to the invalid business scope of the deactivation operation is allowed by the deactivation operation. If so, the LCS system terminates the periodic location information request and the entertainment website initiated by the security agency.
- the positioning failure response carries a parameter, which indicates that the target UE terminated the LCS system to send it
- the LCS system invalidates the location service of the target UE; otherwise, the LCS system only suspends the processing of the location information request that does not belong to the invalid service scope of the deactivation operation, that is, it only suspends the initiation of the entertainment website
- the processing of the delayed location information request does not stop the processing of the periodic location information request initiated by the security agency, and then the LCS system sends a positioning failure response to the corresponding requester that suspended the processing of the location information request, such as the entertainment website.
- the LCS system will The location service of the target UE is disabled.
- the LCS system receives the location information request from the target UE, and first determines whether the location information request belongs to the invalid service range of the deactivation operation. If the location information request belongs to the deactivation service, Invalid service scope, the LCS system continues to determine whether the processing method preset by the network operator for the location information request belonging to the invalid service scope of the deactivation operation is allowed for the deactivation operation. If so, the LCS system returns a positioning failure to the corresponding requester.
- the LCS system In response, it refuses to provide the location information of the target UE; otherwise, the LCS system normally processes the location information request, such as authenticating the requesting end, locating the target UE, and returning the positioning result of the target UE; if the location information request is not It belongs to the service invalid operation range. The LCS system returns a positioning failure response to the corresponding requester, and refuses to provide the location information of the target UE.
- the method proposed by the present invention is also applicable to other operations, such as a location information request query operation, a location information request cancel operation, and the like.
- a location information request query operation such as a location information request query operation, a location information request cancel operation, and the like.
- the location information request protection method proposed in the present invention can be used to correspondingly protect them.
- the protection process is basically the same as the above process, so it is no longer To repeat.
- an effective service range of operations may also be set, and the implementation process is the same as the above process, and details are not described herein again.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN03121591.2 | 2003-04-02 | ||
CNA031215912A CN1535040A (zh) | 2003-04-02 | 2003-04-02 | 位置业务中保护位置信息请求的方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004089004A1 true WO2004089004A1 (fr) | 2004-10-14 |
Family
ID=33102898
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2004/000297 WO2004089004A1 (fr) | 2003-04-02 | 2004-03-31 | Procede de protection d'informations relatives a la localisation dans un service de localisation |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN1535040A (fr) |
WO (1) | WO2004089004A1 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101478741B (zh) * | 2009-02-04 | 2011-01-19 | 中兴通讯股份有限公司 | 提供定位业务的方法及系统 |
US12058587B2 (en) | 2021-12-03 | 2024-08-06 | International Business Machines Corporation | Initiating communication on mobile device responsive to event |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1256848A (zh) * | 1997-05-16 | 2000-06-14 | 艾利森电话股份有限公司 | 电信系统中的完整性保护 |
CN1297667A (zh) * | 1998-04-20 | 2001-05-30 | 艾利森公司 | 利用定位服务越权关键字的系统和方法 |
WO2003001818A2 (fr) * | 2001-06-21 | 2003-01-03 | Vodafone Group Plc | Systemes de telecommunication |
-
2003
- 2003-04-02 CN CNA031215912A patent/CN1535040A/zh active Pending
-
2004
- 2004-03-31 WO PCT/CN2004/000297 patent/WO2004089004A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1256848A (zh) * | 1997-05-16 | 2000-06-14 | 艾利森电话股份有限公司 | 电信系统中的完整性保护 |
CN1297667A (zh) * | 1998-04-20 | 2001-05-30 | 艾利森公司 | 利用定位服务越权关键字的系统和方法 |
WO2003001818A2 (fr) * | 2001-06-21 | 2003-01-03 | Vodafone Group Plc | Systemes de telecommunication |
Also Published As
Publication number | Publication date |
---|---|
CN1535040A (zh) | 2004-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101455096B (zh) | 移动通信网络中发送定位业务请求的方法及系统 | |
EP1894430B1 (fr) | Procede et appareil pour la fourniture de services de localisation avec des flux de messages reduits | |
WO2004091235A1 (fr) | Procede pour limiter la quantite de flux de demandes d'informations de position | |
WO2010121557A1 (fr) | Méthode de déclenchement de procédure de localisation de zone, serveur de localisation, et terminal de localisation | |
JP2007259507A (ja) | テレコミュニケーションシステムにおけるなりすましの防止 | |
US20060099960A1 (en) | Method for processing a location request of an area event change | |
US7509132B2 (en) | Method of sending a location report from target user equipment | |
US7778648B2 (en) | Method for handling deferred location request | |
KR100779963B1 (ko) | 사용자 장치로부터의 위치 정보에 대한 요청을 처리하는방법 | |
EP2914027B1 (fr) | Procédé et système de gestion de mobilité dans un réseau m2m | |
WO2005036900A1 (fr) | Procede de traitement apres modification des informations de confidentialite d'un equipement d'utilisateur cible | |
WO2008101438A1 (fr) | Procédé de traitement, système et dispositif mis en oeuvre dans une zone de classification | |
WO2004089004A1 (fr) | Procede de protection d'informations relatives a la localisation dans un service de localisation | |
EP1703749B1 (fr) | Gestion d'une demande d'informations de position lancee par un equipement d'utilisateur | |
CN100474945C (zh) | 位置业务中地域限制位置信息请求的方法 | |
WO2009105984A1 (fr) | Procédé et dispositif d'implication d'interface usi | |
WO2004114688A1 (fr) | Procede de traitement qui fournit au cote demandeur, des informations de position du materiel d'un utilisateur abonne | |
WO2012089030A1 (fr) | Procédé, dispositif d'accès et dispositif d'authentification pour accès au réseau par de multiples procédés d'accès | |
WO2004086679A1 (fr) | Procede servant a activer et desactiver un service de localisation | |
WO2004066658A1 (fr) | Procede de demande de position periodique dans un service de position | |
WO2004091234A1 (fr) | Procede d'activation interimaire d'une demande d'informations de localisation dans un service de localisation | |
WO2005020615A1 (fr) | Procede de mise a jour de position non autorisee | |
WO2004066657A1 (fr) | Procede d'intercommunication entre un materiel utilisateur et un systeme de service de localisation pendant que l'utilisateur initialise l'operation | |
CN119255341A (zh) | 信息处理方法、装置、网络节点、存储介质及计算机程序产品 | |
WO2006024229A1 (fr) | Procede de traitement de notification/validation d'une demande d'information de position de type de zone variationnel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase |