WO2000054491A1 - Process for screening and tracking users on a telephonic network - Google Patents
Process for screening and tracking users on a telephonic network Download PDFInfo
- Publication number
- WO2000054491A1 WO2000054491A1 PCT/US2000/006195 US0006195W WO0054491A1 WO 2000054491 A1 WO2000054491 A1 WO 2000054491A1 US 0006195 W US0006195 W US 0006195W WO 0054491 A1 WO0054491 A1 WO 0054491A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- call
- calls
- platform
- target platform
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/48—Arrangements for recalling a calling subscriber when the wanted subscriber ceases to be busy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2207/00—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
- H04M2207/18—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2242/00—Special services or facilities
- H04M2242/22—Automatic class or number identification arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2218—Call detail recording
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/36—Statistical metering, e.g. recording occasions when traffic exceeds capacity of trunks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
- H04M3/382—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/54—Arrangements for diverting calls for one subscriber to another predetermined subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q3/00—Selecting arrangements
- H04Q3/72—Finding out and indicating number of calling subscriber
Definitions
- the present invention relates to processes for screening and tracking user information on a telephone network, and more specifically to a process for screening and tracking users of a telephone wagering system.
- Gambling is legal, although tightly regulated, in only two states (Nevada and New Jersey) and in limited areas within other states, such as Native American reservations.
- Electronic networks allow people residing in places where gambling is illegal to easily place bets with bookmakers in places where gambling is legal. This not only violates federal law against interstate gambling, but may violate laws of jurisdictions where gambling is otherwise legal.
- An inventive process is presented for screening and monitoring users connecting or attempting to connect from a user platform to a target platform via a telephone network, the target platform being located within a specified jurisdiction.
- the process comprises filtering unauthorized calls from connecting to the target platform, writing call information in a database for all connections made or attempted, and establishing a network connection between authorized callers and the target platform.
- Figure 1 shows a flow chart which illustrates the overall process of screening users of a telephone wagering system.
- Figure 2 shows a sample set of data saved by the process for each call. The data is used to track unauthorized use of the system.
- Figure 3 shows the suspect user targeting matrix used to assign risk values to specific calls.
- An embodiment of the present invention is described below in the context of a wagering system accessible via a telephone network.
- the present invention is capable of use with any type of platform connected to a telephone network to which access should be limited and tracked.
- Figure 1 illustrates an embodiment of the screening process for screening users on a telephone network.
- the process is designed to ensure that a person authorized to access a regulated telephonic system is within a defined group, is within a geographically regulated region or is using an approved access medium.
- the process is also designed to collect data necessary to target, track and provide the means necessary to eliminate or investigate potential fraud or illegal attempts at accessing a regulated service.
- Multiple tiers or layers of security provide redundancy, fault tolerance and adherence to the laws the system was designed to enforce like the Racketeer Influence Corrupt Organization (RICO) Act and the Kyle Act (also deemed the Communications Decency Act II).
- RICO Racketeer Influence Corrupt Organization
- a user is attempting to establish a connection over the telephone network between their user platform and a target platform located in a jurisdiction, such as Nevada, where gambling is legal.
- the user platform is a telephone set
- the target platform is a regulated telephone wagering system.
- the process prevents calls originating from jurisdictions outside Nevada from accessing the wagering system, and also prevents calls from unauthorized locations within Nevada from accessing the wagering system. Additionally, the process can detect attempts to circumvent the law by using a callback feature.
- the process takes place at the carrier level, i.e., it takes place using the basic coding of the telephone network itself. It is not an application superimposed on top of the telephone network.
- a user attempts to initiate a call to the telephone wagering system by dialing the telephone wagering system's assigned telephone number, which will usually be a toll- free "800" number supplied by the wagering system's telephone carrier.
- the telephone switching equipment at the telephone company transmits a user identification code known as Automatic Number Identification (ANI) of origin taken from the user's Local Exchange Routing Guide.
- ANI is similar to caller ID, but ANI is carrier-based raw coded data contained in the Call Detail Report (CDR) transmitted with the telephone call.
- the ANI code is a string of digits comprising, among other things, the originating telephone set's area code, phone number, and information digits.
- the information digits consist of a two-digit code which identifies the origin of that call based on calling type, organization type or function type. Thus, the information digits indicate whether the telephone set is installed in a residence, a business, a government building, or is a mobile telephone such as a cellular or satellite phone.
- the detailed components of ANI and CDR are outlined in the publication Local Exchange Routing Guide, General Information, Volume I (Bell Communications Research, Dec. 1 , 1998).
- the first tier of security occurs at step 14, where calls originating outside the wagering system's jurisdiction are identified and terminated. This filtration is accomplished by parsing from the ANI of origin the area code where the user initiated the call. Once extracted, the area code of the ANI of origin is checked against a stored list of approved area codes. Usually, these approved area codes will be all area codes within the jurisdiction where the wagering system is located. For example, in Nevada the 702 and 775 area codes (corresponding to Las Vegas and Reno, respectively) would be approved for access. If the area code of the user's ANI of origin is not on the approved list of area codes, the call is either terminated or forwarded to an operator. If the user telephone's area code is on the list of approved area codes, then the connection is allowed to proceed to the next security tier at step 16. Any calls that are terminated are logged in a call detail report in a suspect user database.
- Step 16 is the next level of security, in which calls from unauthorized locations within the jurisdiction are identified and terminated.
- the law does not permit gambling from certain facilities, for example government buildings, so step 16 is designed to filter out calls originating from these locations.
- the user's ANI of origin contains a two-digit code (know as info digits) corresponding to the call type or organization type.
- the process parses the info digits from the call's ANI of origin and compares them against a stored list of authorized info digits. If the call's info digits match those on the authorized list, the call originates from an authorized location and the connection is routed to step 18. If the call's info digits do not match those on the authorized list, the call does not originate from an authorized location and the connection is either terminated or forwarded to an operator, and the call information is recorded in a call detail report in a suspect user database.
- Mobile user platforms such as cellular or satellite telephones, require no additional steps beyond those outlined for step 14.
- Cellular telephone usually have an ANI code associated with the jurisdiction in which the phone was registered (i.e. the user's home area). But if a user makes a cellular telephone call while roaming, the ANI of origin is a temporary number issued by the telephonic switch servicing the call. This prevents a user from violating the gambling laws, as they must physically be present in the jurisdiction to gamble. For example, a user may have a cellular phone registered in Nevada, yet be located in California when attempting to place a call to the wagering system. As long as the user's call is serviced by a California telephone switch, the user will be unable to access the system.
- Step 18 the call undergoes a redundant round of filtering identical to the filtering of steps 14 and 16.
- Step 18 checks whether the call originates inside the jurisdiction and whether the call originates from an authorized location within the jurisdiction. This redundancy is built into the system in case there is some sort or error or malfunction at steps 14 and 16.
- the next security tier is step 20, where the user is asked to input their user identification number (user ID), which is a unique alphanumeric identifier assigned to a user when registering to use the wagering system. Under the law, only users previously registered with the wagering system can use the system.
- user ID user identification number
- the process queries a user database to ensure that the input user ID is registered in the system. If the user ID is not in the database, the user's call is forwarded to an operator and logged in the call detail report database. If the user's identification is registered, the call proceeds to step 22.
- the user next inputs a password at step 22.
- the user database is checked to ensure that the entered password corresponds to the user identification. If the password does not correspond to the user's ID, the call is forwarded to an operator. Otherwise, the call is forwarded to step 24.
- the process examines the info digits parsed from the ANI of the incoming call to assess whether the call is a high-risk call type that merits further anti-fraud verification. Calls originating from residential phones, for example, are suspect because it is difficult to trace the origin of a call forwarded through a residential phone number. Step 26 also checks the user's ANI information against ANI information of registered users and suspect users stored in databases C and D. If either the info digits or the user is identified as a high-risk type, the call is logged in the call detail report database and is either terminated or passed to the next level of security at step 28.
- the next tier at step 28 checks for simultaneous connections to the system by the same ANI of origin, i.e. a forwarded phone call, or simultaneous connections under the same user identification. If a multiple connection is found, the call is terminated and the details of the call are stored in the call detail report on a suspect user database, with the user's risk code changed to identify the level of risk.
- the process of assigning risk codes is explained below.
- the process performs an automatic dial-back to the user based on the info digit code (ANI) passed to it and the 800 number used to contact the platform. In the event of a forwarded call, for example, the call will be switched back to the wagering system; in essence it will be forwarded to itself.
- ANI info digit code
- step 32 If found at step 32, these calls are logged in the Call Detail Report database with a risk rating indicating a "high suspect call" and the call is terminated. If the call passes the test at step 32, the call is passed to step 34, where the user's password is verified and the user is finally allowed access to the wagering system.
- Figure 2 lists the 22 items of data kept in the suspect user database for each call made to the wagering system, whether successful or unsuccessful. Each item of data has a number corresponding to it.
- the call information in the suspect user database is periodically processed and each unsuccessful call is assigned a risk rating according to the suspect user targeting matrix shown in Figure 3.
- the numbers 13 through 22 in the top and left-hand columns correspond to data items 13 through 22 in the table of Figure 2.
- Risk ratings are assigned based on the frequency and characteristics of each unsuccessful call. The risk rating reflects the probability that a particular call was fraudulent.
- the process logs a single unsuccessful call from a particular ANI of origin, the process assumes that the call was simply a mistake on the part of the user and assigns the call a risk rating of zero.
- the user is assigned a risk rating of 1, depending on how the call was terminated. For example, if the call was terminated because a callback found that calls were being forwarded (i.e. they are at the intersection of row 16 and column 16 because both connection attempts were from the same origin), then there are probably interstate calls going on and the call is assigned a risk rating of 2.
- the call is probably intrastate and the call is assigned a risk rating of 1. Ratings of 4 and 5 are assigned to calls attempted three or more times based on statistical inference. The attempted calls are compared in both frequency and amount to 1.5 times the standard deviation, and a risk rating of 4 or 5 is assigned depending on the confidence level resulting from comparing the calls to the statistical measures. A rating of 6 is assigned only when there are repeated calls at a confidence level of 97.5 % and there has been a wagering payout. At a risk factor of 6, fraud is almost certainly occurring.
- a "High Suspect Call” report is generated and individual reports on those calls can be generated.
- the individual chart generated by his multiple call attempts means that at least two attempts to penetrate the system have occurred and the probability of accident is greatly diminished.
- call comparisons are done against criteria specific to the type of target application the process is protecting. For example, in the telephone wagering system a suspect call must occur twice before becoming a suspect call and get a high risk rating. As origination, frequency of calls and dollar amount wagered vary from statistical means, confidence in the level of risk is raised as the deviation from the mean increases. The process becomes “smarter” as the sample size of the data set increases.
- the screening and tracking process described is independent of the hardware used, and thus may be implemented using a variety of hardware.
- the first two steps (14 and 16) are carried out by the carrier's own telephone switching equipment.
- the remaining steps are preferably carried out by hardware comprising at least two Tl boards (one inbound, one outbound) programmed with basic telephonic functionality, including the ability to process ANI codes. It requires as a minimum one Tl line in and one Tl line out. At a minimum, these Tl's are carrier coded with Automatic Number Identification (ANI), info digits, and destination number identification (DNIS).
- ANI Automatic Number Identification
- info DNIS destination number identification
- the telephone wagering system may be hosted by any compatible hardware.
- the preferred method of setting up the hardware requires a P2 or above processor based server running any current network operating system, housing redundant processors, Tl boards, power supplies, disk drives in a level 5 raid array, tape backup unit (size determined by maximum user data expected over 18 month period), and a backup AC generator.
- the server is preferably connected to redundant Tl 's from 2 different local topologies of physical transport infrastructures. This configuration, along with client server access for database and statistical engine administration with multi-tiered network security, should not suffer any downtime if any single hardware component fails. Server notification diagnostics should page a service technician prior to hardware failure, resulting in zero downtime.
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU37347/00A AU3734700A (en) | 1999-03-09 | 2000-03-09 | Process for screening and tracking users on a telephonic network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US26511899A | 1999-03-09 | 1999-03-09 | |
US09/265,118 | 1999-03-09 |
Publications (3)
Publication Number | Publication Date |
---|---|
WO2000054491A1 true WO2000054491A1 (en) | 2000-09-14 |
WO2000054491A8 WO2000054491A8 (en) | 2001-04-05 |
WO2000054491A9 WO2000054491A9 (en) | 2002-03-14 |
Family
ID=23009083
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/006195 WO2000054491A1 (en) | 1999-03-09 | 2000-03-09 | Process for screening and tracking users on a telephonic network |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU3734700A (en) |
WO (1) | WO2000054491A1 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002028079A2 (en) * | 2000-09-28 | 2002-04-04 | Accessline Communications Corporation | User configurable system for handling incoming calls to users having multiple destinations adresses |
WO2002080512A1 (en) * | 2001-03-30 | 2002-10-10 | Elisa Communications Oyj | Controlling method for contact requests using recommendations by approved contact-requesting parties |
EP1845698A1 (en) * | 2006-04-13 | 2007-10-17 | Evercom Systems, Inc. | Unauthorised call activity detection and prevention systems and methods for a voice over internet protocol environment |
US7899167B1 (en) | 2003-08-15 | 2011-03-01 | Securus Technologies, Inc. | Centralized call processing |
US8000269B1 (en) | 2001-07-13 | 2011-08-16 | Securus Technologies, Inc. | Call processing with voice over internet protocol transmission |
US8340260B1 (en) | 2003-08-15 | 2012-12-25 | Securus Technologies, Inc. | Inmate management and call processing systems and methods |
US9990683B2 (en) | 2002-04-29 | 2018-06-05 | Securus Technologies, Inc. | Systems and methods for acquiring, accessing, and analyzing investigative information |
US10115080B2 (en) | 2002-04-29 | 2018-10-30 | Securus Technologies, Inc. | System and method for proactively establishing a third-party payment account for services rendered to a resident of a controlled-environment facility |
US10178224B2 (en) | 2002-04-29 | 2019-01-08 | Securus Technologies, Inc. | Systems and methods for detecting a call anomaly using biometric identification |
US10796392B1 (en) | 2007-05-22 | 2020-10-06 | Securus Technologies, Llc | Systems and methods for facilitating booking, bonding and release |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5003595A (en) * | 1989-08-29 | 1991-03-26 | At&T Bell Laboratories | Secure dial access to computer systems |
US5022067A (en) * | 1990-04-20 | 1991-06-04 | Millicom Incorporated | Telephone call security system |
US5351285A (en) * | 1985-07-10 | 1994-09-27 | First Data Resources Inc. | Multiple format telephonic interface control system |
US5465387A (en) * | 1993-10-08 | 1995-11-07 | At&T Corp. | Adaptive fraud monitoring and control |
US5524145A (en) * | 1995-04-06 | 1996-06-04 | Bell Atlantic Network Services, Inc. | Incoming call completion threshold restriction |
-
2000
- 2000-03-09 WO PCT/US2000/006195 patent/WO2000054491A1/en active Application Filing
- 2000-03-09 AU AU37347/00A patent/AU3734700A/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5351285A (en) * | 1985-07-10 | 1994-09-27 | First Data Resources Inc. | Multiple format telephonic interface control system |
US5003595A (en) * | 1989-08-29 | 1991-03-26 | At&T Bell Laboratories | Secure dial access to computer systems |
US5022067A (en) * | 1990-04-20 | 1991-06-04 | Millicom Incorporated | Telephone call security system |
US5465387A (en) * | 1993-10-08 | 1995-11-07 | At&T Corp. | Adaptive fraud monitoring and control |
US5524145A (en) * | 1995-04-06 | 1996-06-04 | Bell Atlantic Network Services, Inc. | Incoming call completion threshold restriction |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002028079A3 (en) * | 2000-09-28 | 2003-05-22 | Accessline Comm Corp | User configurable system for handling incoming calls to users having multiple destinations adresses |
WO2002028079A2 (en) * | 2000-09-28 | 2002-04-04 | Accessline Communications Corporation | User configurable system for handling incoming calls to users having multiple destinations adresses |
WO2002080512A1 (en) * | 2001-03-30 | 2002-10-10 | Elisa Communications Oyj | Controlling method for contact requests using recommendations by approved contact-requesting parties |
US8000269B1 (en) | 2001-07-13 | 2011-08-16 | Securus Technologies, Inc. | Call processing with voice over internet protocol transmission |
US10115080B2 (en) | 2002-04-29 | 2018-10-30 | Securus Technologies, Inc. | System and method for proactively establishing a third-party payment account for services rendered to a resident of a controlled-environment facility |
US9990683B2 (en) | 2002-04-29 | 2018-06-05 | Securus Technologies, Inc. | Systems and methods for acquiring, accessing, and analyzing investigative information |
US10178224B2 (en) | 2002-04-29 | 2019-01-08 | Securus Technologies, Inc. | Systems and methods for detecting a call anomaly using biometric identification |
US7899167B1 (en) | 2003-08-15 | 2011-03-01 | Securus Technologies, Inc. | Centralized call processing |
US8340260B1 (en) | 2003-08-15 | 2012-12-25 | Securus Technologies, Inc. | Inmate management and call processing systems and methods |
US10740861B1 (en) | 2003-11-24 | 2020-08-11 | Securus Technologies, Inc. | Systems and methods for acquiring, accessing, and analyzing investigative information |
US7916845B2 (en) | 2006-04-13 | 2011-03-29 | Securus Technologies, Inc. | Unauthorized call activity detection and prevention systems and methods for a Voice over Internet Protocol environment |
EP1845698A1 (en) * | 2006-04-13 | 2007-10-17 | Evercom Systems, Inc. | Unauthorised call activity detection and prevention systems and methods for a voice over internet protocol environment |
US10796392B1 (en) | 2007-05-22 | 2020-10-06 | Securus Technologies, Llc | Systems and methods for facilitating booking, bonding and release |
Also Published As
Publication number | Publication date |
---|---|
WO2000054491A8 (en) | 2001-04-05 |
AU3734700A (en) | 2000-09-28 |
WO2000054491A9 (en) | 2002-03-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11496621B2 (en) | Telecommunication call management and monitoring system with voiceprint verification | |
US10230838B2 (en) | Telecommunication call management and monitoring system with voiceprint verification | |
US8494144B2 (en) | System and method for controlled call handling | |
WO2000054491A1 (en) | Process for screening and tracking users on a telephonic network | |
WO2001045380A1 (en) | Country to domestic call intercept process (cip) | |
US6335971B1 (en) | Country to country call intercept process | |
WO2001045364A1 (en) | Termination number screening |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: C1 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: C1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
CFP | Corrected version of a pamphlet front page | ||
CR1 | Correction of entry in section i | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
AK | Designated states |
Kind code of ref document: C2 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: C2 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
COP | Corrected version of pamphlet |
Free format text: PAGES 1/3-3/3, DRAWINGS, REPLACED BY NEW PAGES 1/3-3/3; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTICE DRAWING ATTENTION TO ARTICLE 86(2) EPC, ART.2 NO.5 OF THE RULES RELATING TO FEES |
|
122 | Ep: pct application non-entry in european phase |