WO2005031585A1 - サービス利用装置 - Google Patents
サービス利用装置 Download PDFInfo
- Publication number
- WO2005031585A1 WO2005031585A1 PCT/JP2004/011645 JP2004011645W WO2005031585A1 WO 2005031585 A1 WO2005031585 A1 WO 2005031585A1 JP 2004011645 W JP2004011645 W JP 2004011645W WO 2005031585 A1 WO2005031585 A1 WO 2005031585A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- service
- information
- change
- stored
- Prior art date
Links
- 238000000034 method Methods 0.000 claims description 76
- 238000012217 deletion Methods 0.000 claims description 41
- 230000037430 deletion Effects 0.000 claims description 41
- 238000003860 storage Methods 0.000 claims description 35
- 238000001514 detection method Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 230000010365 information processing Effects 0.000 claims description 2
- 238000012545 processing Methods 0.000 description 42
- 238000010586 diagram Methods 0.000 description 16
- 238000002360 preparation method Methods 0.000 description 15
- 230000004044 response Effects 0.000 description 13
- 238000004891 communication Methods 0.000 description 11
- 238000006243 chemical reaction Methods 0.000 description 4
- 102100022907 Acrosin-binding protein Human genes 0.000 description 2
- 101100328887 Caenorhabditis elegans col-34 gene Proteins 0.000 description 2
- 102100038445 Claudin-2 Human genes 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 241000722921 Tulipa gesneriana Species 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005304 joining Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Definitions
- the present invention relates to a service using apparatus, and is suitably applied to a service providing system that provides a service of downloading content data such as music to a user terminal device.
- a terminal device as a service using device that has received a user's operation instruction can use a service such as acquiring content such as music from a management server that manages the system.
- this service providing system needs to perform settlement processing for acquiring content, etc., so that a user ID for identifying the user and a corresponding password (hereinafter referred to as these Is called user authentication information) from the terminal device to the management server.
- user authentication information a user ID for identifying the user and a corresponding password
- the terminal device stores the user authentication information in advance in order to save the trouble of the user inputting each time. The information is read out as needed.
- the terminal device is designed to improve user-friendliness by storing user usage information such as bookmarks that differ for each user, such as storing web pages that are frequently referred to by users as bookmarks.
- Patent Document 1 Japanese Patent Application Laid-Open No. 2002-210699 (Page 14, FIG. 1).
- such a terminal device may be used by another user different from the original user, for example, because it is transferred.
- the personal information is deleted. This can prevent information leaks that are known to other users.
- the present invention has been made in view of the above points, and proposes a service using apparatus, a method, and a program which can prevent information leakage by detecting a change of a user to be used and deleting user information. It is something to try.
- transmitting means for transmitting user information together with request information requesting user registration to the service providing apparatus; and user registration using the user information from the service providing apparatus is completed.
- Receiving means for receiving the registration completion information indicating the completion of the user registration transmitted, and storing the user information in a storage medium in accordance with the received registration completion information;
- a user change detecting means for detecting the change and an erasing means for erasing the user information stored in the storage medium when the user change is detected by the user change detecting means are provided.
- this service using device can detect the change of the user to use and can automatically delete the user information from the storage medium and the service providing device when the change of the user to use is detected.
- the user information is transmitted together with the request information for requesting the user registration to the service providing apparatus, and the user information is transmitted from the service providing apparatus.
- the user information stored in the storage medium is deleted.
- the change of the user to use can be detected, and when the change of the user to use is detected, the user information can be automatically deleted from the storage medium and the service providing device.
- the service utilization program of the present invention causes the information processing apparatus to transmit user information together with request information for requesting user registration to the service providing apparatus, and completes user registration using the user information from the service providing apparatus. Received the registration completion information indicating the completion of the user registration transmitted, and stores the user information in the storage medium in accordance with the received registration completion information, and detects a change in the user to whom the service is provided. Then, the user information stored in the storage medium is deleted.
- this service utilization program can detect the change of the user to use, and can automatically delete the user information from the storage medium and the service providing device when the change of the user to use is detected.
- the change of the user to use can be detected, and when the change of the user to use is detected, user information can be automatically deleted from a storage medium and a service providing apparatus, and thus other users can be deleted.
- a service use device, a service use method, and a service use program that can prevent the leakage of user information even when used for a user can be realized.
- FIG. 1 is a schematic diagram illustrating an overall configuration of a service using system according to the present embodiment.
- FIG. 2 is a schematic block diagram showing the configuration of the service providing server.
- FIG. 3 is a schematic block diagram showing a circuit configuration of the terminal device.
- FIG. 4 is a schematic diagram showing a directory structure.
- FIG. 5 is a schematic diagram illustrating a program module of the terminal device.
- FIG. 6 is a schematic diagram for explaining storage of user information.
- FIG. 7 is a schematic diagram showing a service enrollment sequence.
- FIG. 8 is a schematic diagram showing a service login sequence.
- FIG. 9 is a schematic diagram illustrating a device name registration sequence.
- FIG. 10 is a schematic diagram showing a bookmark registration sequence.
- FIG. 11 is a schematic diagram showing a service provision information registration sequence.
- FIG. 12 is a schematic diagram showing a FEP learning information registration sequence.
- FIG. 13 is a schematic diagram showing a service withdrawal sequence.
- FIG. 14 is a schematic diagram showing a terminal deletion sequence ′.
- FIG. 15 is a schematic diagram showing a key input pattern change corresponding sequence.
- FIG. 16 is a schematic diagram showing a network change correspondence sequence. BEST MODE FOR CARRYING OUT THE INVENTION
- reference numeral 1 denotes a service use system that constitutes the present invention as a whole, and a service provision server 3 in which a service provision server 3 and a terminal device 4 are connected to the Internet 2.
- a service provision server 3 in which a service provision server 3 and a terminal device 4 are connected to the Internet 2.
- content data such as music and the like
- information on the terminal device 4 and information on the user who owns the terminal device 4 are managed.
- the terminal device 4 is adapted to receive a radio broadcast, play a CD (CompactD iSc), etc., and also obtain and reproduce content data from the service providing server 3.
- the service providing server 3 has a CPU (Central Processing Unit)
- the control unit 60 consisting of a process unit (Processing Unit) starts up via the ROM (Read Only Memory) 61 and the RAM (R and om Access Memory) 62 and operates the operating system (OS). Based on the basic program and various application programs, overall control and predetermined arithmetic processing are performed.
- Process Unit Processing Unit
- OS operating system
- the service providing server 3 stores information about the terminal device 4 and the user of the terminal device 4 in a hard disk drive (HDD) 63 3 in addition to the content data such as music, etc. In response to a request or a deletion request, registration or deletion of information on the user or the terminal device 4 is performed.
- HDD hard disk drive
- the service providing server 3 When receiving the content data request from the terminal device 4 via the data communication processing unit 64, the service providing server 3 performs user authentication using the information on the user of the terminal device 4, and performs a predetermined payment process. Then, the requested content data is read from the hard disk drive 63 and transmitted to the terminal device 4.
- the CPU 11 of the terminal device 4 reads the basic programs such as the OS and various application programs from the ROM 13 connected via the path 12 and expands them in the RAM 20, and Based on programs and various application programs, overall control and predetermined arithmetic processing are performed. For example, communication operations via the network 2, input / output operations from users, content playback from media / services It writes the content downloaded from the providing server 3 to the hard disk drive 21 and manages the content.
- the operation input unit 15 sends input information corresponding to the user's operation on the surface of the housing of the main body and various controls of a remote controller (not shown) to the input processing unit 14, and the input processing unit 14 determines the input information.
- a remote controller not shown
- the input processing unit 14 determines the input information.
- the display 17 may be, for example, a case where a display device such as a liquid crystal display is directly attached to the surface of the casing of the main body, or may be an external display device, and displays a processing result and various information by the CPU 11. It has been made to be.
- the media drive 19 is, for example, a CD drive for reproducing a CD and a drive for reproducing a Memory Stick (registered trademark) composed of a flash memory or the like. Later, the signal is output from a two-channel speaker 25.
- the CPU 11 can also store the data on the hard disk drive 21 as an audio data file.
- the CPU 11 reads out a plurality of still images stored on the Memory Stick (registered trademark) by the media drive 19 and sequentially displays them as a slide show on the display 17 via the display processing unit 16. You can also. Further, the CPU 11 can read out a plurality of music pieces stored in the hard disk drive 21 by random access, and can reproduce and output the music pieces in a user-desired order like a jukebox.
- the tuner unit 27 is, for example, an AM or FM radio tuner.
- the tuner unit 27 demodulates a broadcast signal received by the antenna 26 under the control of the CPU 11, and outputs the result as a broadcast sound through the audio data processing unit 24 to the speaker 25. Output from
- the communication processing unit 22 encodes transmission data based on the control of the CPU 11 and transmits the encoded data to the external network compatible device ⁇ via the network 2 via the network interface 23, or via the network interface 23. It decodes received data received from an external network compatible device and transfers it to the CPU 11.
- the CPU 11 of the terminal device 4 manages the content stored in the hard disk drive 21 in a directory configuration shown in FIG.
- the “fo 1 der” directory is created so as to correspond to, for example, a genre belonging to the genre to which the content belongs. '
- the directory management for such "content” is performed by a database file stored in the hard disk drive 21.
- the program module of the terminal device 4 is designed to run on an OS, and as a server constituting the service providing server 3, a CD seller server 31 that sells CDs, an Internet radio server 32, Music distribution management server 33, Comprehensive service server 34, Related information providing server Exchanges with KS and other various servers.
- HTTP (HyperTetTransferProtocol) message program 36 is a CD sales server 31, an Internet radio server 32, a music distribution management server 33, a comprehensive service server 34 that provides various integrated services, and related services Information providing server Exchanges data with various servers such as KS by HTTP communication.
- the communicator program 37 is a program module that exchanges data with the HTTP message program 36.
- the upper communicator program 37, a content reproduction module 38 reproduces interprets codec of a content, located copyright protection information management module 3 9 handling information on copyright protection, the content reproduction module 3 8, copyright Internet radio channel selection reproduction module 4 3, music purchase reproduction module 44 which controls the reproduction of the music purchase and listen song performs tuning ⁇ Pi playing Internet radio is located respectively protection information management module 3 9.
- An XML (extensible Marque Language) browser 50 is located above the Internet radio channel selection and playback module 43 and the music purchase and playback module 44, and interprets XML files from various servers and displays them on the display 17. On the screen display.
- the music selected by the user via the XML browser 50 is purchased by the music purchase / playback module 44 and written to the hard disk drive 21 (FIG. 3) via the hard disk content controller 42.
- An authentication library 47A of a library 47 is connected to the communicator program 37, and the authentication service of the integrated service server 34 and other various servers is performed by the authentication library .47A.
- a database access module 40 a content data access module 41, and a node disk content controller 42 are located above the communicator program 37.
- the database access module 40 accesses various databases built on the hard disk drive 21, the content data access module 41 accesses content stored on the hard disk drive 21, and the hard disk content controller 42 operates on the hard disk drive 21.
- the content stored in the drive 21 is managed.
- the hard disk content controller 42 is a related information display module 45 for displaying the title and artist name of a song broadcast by a radio station (not shown), and selecting a radio station or the radio station concerned. Of songs received from Tuner tuning playback that records the content on the hard disk drive 21 Z recording module 46 is located.
- music received from a radio station selected via the audio user interface (UI) 51 is written to the hard disk drive 21 via the content data access module 41.
- the related information display module 45 uses the tuner selection reproduction / recording module 46 to set the title and artist name of the music currently being broadcast by the radio station as related information and to send an HTTP message from the related information providing server KS. This is received via the audio user interface 51 and is displayed on the display 17 via the audio user interface 51.
- the related information displayed on the display 17 via the audio user interface 51 is a tulip library of the library 47. 4 7 B, which can be temporarily stored, and finally stored in the hard disk drive 21 via the database access module 40 in accordance with an instruction from the user.
- the CD playback module 48 for playing CDs and the hard disk drive 21 It is included and HDD reproduction module 49 for raw, audio playback results, and outputs via the Odeta processing unit 24 and the speaker 25.
- the terminal device 4 stores various information on the user and the terminal device 4 in the hard disk drive 21, the RAM 20, and the flash memory 28 according to the type.
- the terminal device 4 stores, in the hard disk drive 21, the device name set by the user to identify the terminal device 4, and the URL (Un a bookmark that stores ifo rm Resource Locator), and service provision information in which the user has selected a genre that matches the user's preference among various information provided to the user in this service. , And stores the FEP learning information of the front-end processor (FEP) used to perform Kana-Kanji conversion when the user enters Japanese.
- FEP front-end processor
- the terminal device 4 stores and updates these device names, bookmarks, service provision information, and FEP learning information (hereinafter collectively referred to as user usage information) in accordance with user operations, etc. In addition, the usability of the terminal device 4 can be improved.
- the terminal device 4 stores, in the hard disk drive 21, network use settings such as the host name of the provider when the terminal device 4 is connected to the Internet 2, and features and the like when the user performs key input in a predetermined manner.
- the key input pattern learned by the processing is automatically stored as needed.
- the terminal device 4 automatically stores and updates the network use settings and key input patterns (hereinafter referred to as user identification information) to acquire the characteristics of the user / network without making the user aware. It is possible to detect a change in the user-to-network by comparing the newly obtained user identification information with the already stored user identification information.
- user identification information the network use settings and key input patterns
- the terminal device 4 stores the user authentication information (user ID and password) in the RAM 20, and automatically acquires the user authentication information when acquiring the content data from the service providing server 3. It is designed to be able to send and save the user's input.
- the terminal device 4 stores the information such as the device name stored in the nonvolatile hard disk drive 21 until it is deleted by a predetermined deletion process.
- the volatile RAM 20 When the power supply from the outside is cut off, the user authentication information stored in the RAM 20 is erased.
- the terminal device 4 is configured to store the user usage information, the user identification information, and the user authentication information.
- the terminal device 4 stores or stores various information on the user and the terminal device 4.
- the process of deleting (deleting) will be described.
- step SP1 the CPU 11 of the terminal device 4 accepts a predetermined service enrollment operation by the user, and proceeds to the next step SP2.
- step SP2 the CPU 11 receives the user's desired user ID and the password (ie, the user authentication information) specified by the user in response to the user's operation, and the next step. Move to SP3.
- the password ie, the user authentication information
- step SP3 the CPU 11 transmits the user authentication information to the service providing server 3 via the Internet 2 via the communication processing unit 22 and the network interface 23.
- SSL Secure Socket Layer
- step SP 21 the control unit 60 of the service providing server 3 receives the user authentication information transmitted from the terminal device 4 by the data communication processing unit 64 (FIG. 2), and Move to 2'2.
- step SP22 the control unit 60 determines whether or not the user ID included in the received user authentication information overlaps with another user's user ID registered in the hard disk drive 63. If a negative result is obtained here, this indicates that the user ID can be registered in this service, and at this time, the control unit 60 proceeds to the next step SP23.
- step SP 22 If a positive result is obtained in step SP 22, this indicates that the entered user ID has already been registered as another user's user ID.
- the control unit 60 of the service providing server 3 informs the terminal device 4 of the duplication of the user ID, and in response, the CPU 11 of the terminal device 4 executes step SP 4 In step, the user is prompted to enter another user ID again, and the process returns to step SP2 again.
- step SP23 the control unit 60 stores the user ID and password received from the terminal device 4 in the hard disk drive 63, completes registration, transmits registration completion information to the terminal device 4, and then proceeds to step SP23.
- the process proceeds to 24, and the service enrollment process in the control unit 60 ends.
- the CPU 11 of the terminal device 4 receives the registration completion information transmitted from the service providing server 3 in step SP5, and proceeds to the next step SP6.
- the CPU 11 gives a storage instruction for storing the user authentication information to the RAM 20, and in step SP11, stores the user authentication information in the RAM 20, and proceeds to the next step SP7.
- step SP7 the CPU 11 displays on the display 17 that the user ID has been registered and notifies the user, and proceeds to the next step SP8 to end the service enrollment process.
- the user who has joined the service needs to operate the terminal device 4 to login to the service when using the service.
- the service login process at this time will be described. .
- step SP31 the CPU 11 of the terminal device 4 accepts a predetermined service port login operation by the user, and proceeds to the next step SP32. '
- step SP32 the CPU 11 gives a read instruction to read the user authentication information to the RAM 20, causes the user authentication information to be read in step SP41, and proceeds to the next step SP33.
- step SP33 the CPU 11 sends the user authentication information to the service providing service. Send to BA3.
- control unit 60 of the service providing server 3 receives the user authentication information transmitted from the terminal device 4 in step SP51, and proceeds to the next step SP52.In step SP52, the control unit 60 Then, it is determined whether or not the user ID and the password included in the received user authentication information match the user ID and the password registered in the hard disk drive 63.
- step SP52 If a negative result is obtained in step SP52, this indicates that the user authentication information is incorrect. At this time, the control unit 60 transmits to the terminal device 4 that the user authentication has failed. In response to this, the CPU 11 of the terminal device 4 displays on the display 17 that the user authentication has failed in step SP34 to notify the user, and in the next step SP35, notifies the user. Enter the correct user ID and password, and return to step SP33 again.
- control section 60 moves to next step SP 53.
- the control unit 60 performs a predetermined login process, transmits mouth login completion information indicating that the login process has been completed to the terminal device 4, and then proceeds to the next step SP54. Then, the service port login process in the service providing server 3 ends.
- step SP36 when the CPU 11 of the terminal device 4 receives the login processing information from the service providing server 3 in step SP36, the CPU 11 displays this on the display 17 to notify the user, and then proceeds to step SP3. The process proceeds to step 7, and the service exit login process ends.
- the terminal device 4 is configured such that the user sets an arbitrary device name for each terminal device 4 as described above, and the service providing server 3 also identifies each terminal device 4 using this device name. ing.
- the CPU 11 of the terminal device 4 receives a predetermined device name registration operation by the user in step SP61, the CPU 11 performs the above-described service login process, logs in to the service, and Move on to the next step SP62.
- step SP 62 the CPU 11 prompts the user to input the device name, and proceeds to the next step SP 63. '
- step SP63 the CPU 11 gives a storage instruction for storing the device name input to the hard disk drive 21 to the user, and in step SP71, the device name is given to the hard disk drive 21. And proceed to the next step SP64.
- step SP64 the CPU 11 transmits the device name to the service providing server 3.
- control unit 60 of the service providing server 3 receives the device name from the terminal device 4 in step SP81, and proceeds to the next step SP82.
- step SP82 the control unit 60 registers the received device name in the hard disk drive 63, transmits registration completion information indicating that the registration has been completed to the terminal device 4, and proceeds to the next step SP.83. Then, the device name registration process in the control unit 60 is completed.
- the service providing server 3 manages the user ID in association with the device name, the device names of a plurality of terminal devices 4 owned by a certain user are not allowed to be duplicated. However, device names of the terminal devices 4 owned by different users are allowed to be duplicated.
- the CPU 11 of the terminal device 4 receives the registration completion information in step SP 65 and displays the completion of the registration of the device name on the display 17 to notify the user, and the next step SP The process moves to 6 to end the device name registration process.
- the CPU 11 of the terminal device 4 performs a predetermined bookmark registration operation by the user in step SP 101 in a state where the user selects a web page for which a bookmark is to be registered on the web browser. Is accepted, and the process proceeds to the next step SP102.
- step SP102 the CPU 11 instructs the hard disk drive 21 1 to register the selected web page title, URL, etc. as a bookmark, and receives this in step SP111.
- the process proceeds to the next step SP 103 to end the bookmark registration sequence.
- the service provision information in which the genre is selected is registered in advance. Describe the service provision information registration process.
- the CPU 11 of the terminal device 4 selects a genre for which information is desired to be received by a predetermined operation of the user in step SP 121, and proceeds to the next step SP 122.
- step SP122 the CPU 11 instructs the hard disk drive 21 to register service provision information of the selected genre.
- step SP131 the received hard disk drive receives the instruction. After the service provision information is stored in 21, the process proceeds to the next step SP 123, and the service provision information registration sequence ends.
- step SP 141 the CPU 11 of the terminal device 4 automatically obtains a conversion pattern when the user inputs Japanese as FEP learning information, and proceeds to the next step SP 142. Move on to
- step SP142 the CPU 11 gives an instruction to register the FEP learning information to the hard disk drive 21.
- step SP151 the CPU 11 stores the FEP learning information in the received hard disk drive 21. After that, the flow moves to the next step, SP 143, to end this FEP learning information registration sequence.
- step SP201 When receiving a predetermined service unsubscribing operation by the user in step SP201, the PU 11 performs the above-described service login process, logs in to the service, and proceeds to the next step SP202.
- step SP202 the CPU 11 gives the hard disk drive 21 a write instruction of a withdrawal preparation start flag indicating that preparation for service withdrawal has been started, and in step SP231, the hard disk drive 21 Preparing to withdraw, write the start flag, and-'Go to the next step SP 203.
- the terminal device 4 uses the withdrawal preparation start flag and the withdrawal preparation completion flag described later, so that even if the power of the terminal device 4 is interrupted during the service withdrawal process, etc.
- the service can be withdrawn from the service later. .
- step SP203 the CPU 11 gives an instruction to delete the user usage information (equipment name, bookmark, service provision information, FEP learning information, etc.) registered in the hard disk drive 21. Delete the user usage information from the disk drive 21 and proceed to the next step SP 2 Move on to 04.
- the user usage information equipment name, bookmark, service provision information, FEP learning information, etc.
- step SP204 the CPU 11 gives the hard disk drive 21 a write instruction of a withdrawal preparation completion flag indicating that preparation for service withdrawal has been completed, and in step SP233, the hard disk drive 21 After the termination preparation completion flag is written, the process proceeds to the next step SP205.
- step SP 205 the CPU 11 sends a request to delete the user authentication information registered in the service providing server 3 to the service providing server 3.
- control unit 60 of the service providing server 3 receives the request to delete the user authentication information transmitted from the terminal device 4 in step SP241, and the user authentication information (user ID and password) authenticated by the service login process. Then, the information about the terminal device 4 such as the device name registered in association with the user ID is deleted, and the routine goes to next step SP242.
- step SP242 the control unit 60 transmits deletion completion information indicating that the deletion of the user authentication information has been completed to the terminal device 4, and proceeds to the next step SP243 to terminate the service withdrawal process in the service providing server 3. I do.
- the CPU 11 of the terminal device 4 receives the deletion completion information from the service providing server 3 in step SP 206 and moves to the next step SP 207.
- step SP 207 the CPU 11 An instruction to erase the stored withdrawal completion flag is given to the hard disk drive 21, and in step SP 234, the hard disk drive 21 is made to erase the withdrawal completion flag, and the flow advances to next step SP 208. .
- step SP208 the CPU 11 gives an instruction to erase the user authentication information stored in the RAM 20, and in step SP221, causes the RAM 20 to erase the user authentication information, and proceeds to the next step SP209. .
- step SP 209 the CPU 11 notifies the user by displaying on the display 17 that the service has been canceled, and proceeds to the next step SP 210. This service withdrawal process is terminated.
- a terminal deletion process for excluding only the terminal device 4 from the service while the user continues to subscribe to the service, such as transferring one of the terminal devices 4 owned by the user to another user, for example, explain.
- step SP 2 51 when the CPU 11 of the terminal device 4 receives a predetermined terminal deletion operation by the user in step SP 2 51, the CPU 11 performs the service login process described above and logs in to the service. Move to step SP 2 52.
- step SP 2 52 the CPU 11 gives the hard disk drive 2 1 a write instruction of a deletion preparation start flag indicating that preparation for terminal deletion has started, and in step SP 28 1, Write the deletion preparation start flag in 1 and move to the next step, SP 2 53.
- step SP 2 53 the CPU 11 gives an instruction to delete the user usage information (device name, bookmark, service provision information, FEP learning information, etc.) registered in the hard disk drive 21, and in step SP 28 In step 2, the user information is erased from the hard disk drive 21 and the procedure moves to the next step SP254.
- the user usage information device name, bookmark, service provision information, FEP learning information, etc.
- step SP 254 the CPU 11 gives the hard disk drive 21 a write instruction of a deletion preparation completion flag indicating that preparation for terminal deletion has been completed, and in step SP 283, the hard disk drive 2 The deletion preparation completion flag is written in 1 and the process proceeds to the next step SP255.
- step SP 255 the CPU 11 sends a request to delete the device name registered in the service providing server 3 to the service providing server 3.
- control unit 60 of the service providing server 3 receives the device name deletion request transmitted from the terminal device 4 in step SP 291, and the device name of the terminal device 4 registered in the hard disk drive 63. And proceed to the next step, SP 292.
- control unit 60 transmits device name deletion completion information indicating that the device name has been deleted to the terminal device 4, and proceeds to the next step SP293 to delete the terminal in the service providing server 3. The process ends.
- the CPU 11 of the terminal device 4 receives the device name deletion completion information from the service providing server 3 in step SP256, and proceeds to the next step SP257.
- step SP257 the CPU 11 gives the hard disk drive 21 an instruction to delete the deletion preparation completion flag, and in step SP284, the hard disk drive 21 deletes the deletion preparation completion flag. Move on to the next step, SP258.
- step SP258 the CPU 11 gives an instruction to erase the user authentication information stored in the RAM 20, and in step SP271, causes the RAM 20 to erase the user authentication information. Move to 9.
- step SP259 the CPU 11 displays on the display 17 that the terminal deletion has been completed, notifies the user, and moves to step SP260 to end the terminal deletion processing.
- the terminal device 4 detects a change in the user by detecting a change in the key input pattern, the key input pattern for deleting the user information stored (registered) in the terminal device 4 and the service providing server 3.
- the change handling process will be described.
- the CPU 11 of the terminal device 4 accepts a key input accompanying various operations by the user in step SP301, and proceeds to the next step SP302.
- step SP302 the CPU 11 extracts the key input pattern based on the predetermined processing, gives a storage instruction to store the key input pattern to the hard disk drive 21, and in step SP321, The key input pattern is stored, and the routine proceeds to next step SP303.
- step SP303 the CPU 11 accepts various operations such as key input by the user, and proceeds to the next step SP304.
- step SP304 the CPU 11 extracts a new key input pattern based on a predetermined process, and proceeds to the next step SP305.
- step SP305 the CPU 11 gives an instruction to read the past key input pattern stored in the hard disk drive 21, and in step SP322, reads the past key input pattern to the hard disk drive 21. And proceed to the next step SP306.
- step SP306 the CPU 11 determines whether the new key input pattern matches the past key input pattern. If a positive result is obtained here, this indicates that the current user matches the past user, that is, there is no need to delete the user information, and the CPU 11 then proceeds to step SP 3 10 To end the key input pattern change handling process.
- step SP 306 if a negative result is obtained in step SP 306, this indicates that the user information registered for the past user needs to be deleted because the current user does not match the past user. At this time, the CPU 11 proceeds to the next step SP 307.
- step SP307 the CPU 11 gives an erasure instruction to erase the user authentication information to the RAM 4, and in step SP311, causes the RAM4 to erase the user authentication information. Move on.
- step SP308 the CPU 11 gives an erasure instruction to turn off the hard disk drive 21 to erase the user usage information, and in step SP323, causes the hard disk drive 21 to erase the user usage information. Move on to step SP 309.
- the CPU 11 also deletes the key input pattern stored in the hard disk drive 21.
- step SP309 the CPU 11 transmits a request to delete the user authentication information registered in the service providing server 3 to the service providing server 3, and proceeds to the next step SP310, in which the terminal The key input pattern change correspondence processing in the device 4 ends.
- the control unit 60 of the service providing server 3 receives the device name deletion request transmitted from the terminal device 4 in step S P. 331, and the terminal device 4 registered in the hard disk drive 63 Then, the process moves to the next step, SP 3 32, and ends the key input pattern change handling process.
- the CPU 11 of the terminal device 4 performs the network setting based on the user's operation and the like in step SP3401. And proceed to the next step, SP 3 4 2.
- step SP354 the CPU 11 gives a storage instruction to store the network use setting in the hard disk drive 21 and in step SP361, stores the network use setting in the hard disk drive 21. Go to step SP 3 4 3.
- step SP3443 the CPU 11 resets the network use setting based on the user's operation or the like, and proceeds to the next step SP3444.
- step SP 364 the CPU 11 gives an instruction to read the past network use setting stored in the hard disk drive 21, and in step SP 364, the past network use setting is given to the hard disk drive 21. Read it out, and move on to the next step SP 345.
- step SP345 the CPU 11 determines whether the network use setting and the past network use setting match. Here is a positive result This indicates that it is highly likely that the current location of the terminal device 4 has not changed and that the user has not changed either, and that the CPU 11 executes step SP 346. To end the network change handling process.
- step SP345 if a negative result is obtained in step SP345, this indicates that the current location of the terminal device 4 is likely to be different from the past location, and that the current user is likely to be different from the past user. This indicates that the user information registered for the past user needs to be erased, and the CPU 11 moves to the next step SP 307 at this time.
- the CPU 11 executes the processing of the above-described steps SP 307—SP 308—SP 309—SP 3 10 and steps SP 311, SP 323, SP 331, and SP 332 to obtain the RAM 20 user.
- the authentication information is deleted, the user usage information and the network usage setting of the hard disk drive 21 are deleted, the device name registered in the service providing server 3 is deleted, and the network change handling process ends.
- the terminal device 4 stores the user ID and the password as the user authentication information in the RAM 20, and stores the device name, the bookmark, the service providing information, and the FEP learning information as the user use information in the hard disk drive 21.
- the device 4 automatically stores the key input pattern and the network use setting as user identification information in the hard disk drive 21 and compares the user identification information with past user identification information as needed to determine whether the user has changed. Is determined.
- the terminal device 4 deletes the user authentication information stored in the RAM 20 when detecting that the user has changed based on the user identification information, and when accepting a service withdrawal operation or a terminal deletion operation by the user.
- the user usage information and user identification information stored in the hard disk drive 21 are erased, and the service A request is made to delete the device name of the terminal device 4 registered in the providing server 3, and the device name is deleted.
- the terminal device 4 receives the user information (user use information and user authentication information) based on the user's operation. Can be reliably deleted.
- the terminal device 4 can detect that the user has changed by storing the user identification information as needed and comparing it with the past user identification information.
- the stored user information can be automatically deleted.
- the terminal device 4 can further delete the device name of the terminal device 4 registered in the service providing server 3, thereby preventing unauthorized use of the service by the terminal device 4.
- the terminal device 4 intentionally stores the user authentication information, which is important information, in the volatile RAM 20, so that if the terminal device 4 is stolen, the power supply is always cut off. Therefore, the user authentication information can be securely deleted. -According to the above configuration, the terminal device 4 can detect a change in the user based on the user identification information, and can reliably erase the user authentication information and the user information when the change in the user is detected. Thus, leakage of user information can be prevented.
- the present invention is not limited to this, and the user authentication information may be stored in the volatile RAM 20.
- the data may be stored in the nonvolatile flash memory 28 or the hard disk drive 21.
- the device name and the present invention is not limited to this, and other information unique to the user, such as another user's e-mail address, may be used. May be stored.
- a case has been described in which a key input pattern / network use setting is stored as needed in order to detect a user change, and a user change is issued by detecting the change.
- the present invention is not limited to this, and the user change detecting means may be realized by other methods, for example, by detecting the characteristics of the user's voice, storing and comparing them, and detecting the change of the user. .
- the case where the user usage information is stored in the hard disk drive 21 has been described (FIG. 6).
- the present invention is not limited to this, and the user usage information is stored in the flash memory. Storage on another non-volatile storage medium such as 28, or on a volatile storage medium such as RAM 20 or other hard disk drive 63 of the service providing server 3.
- the information may be stored in the device. '
- the present invention is not limited to this, and a built-in battery may be used as a power supply. When the battery is removed, the user authentication information stored in RAM 20 can be erased.
- control unit 60 of the service providing server 3 deletes the registered user authentication information and the device name of the terminal device 4 on condition ⁇ in the service unsubscribing process.
- the present invention is not limited to this, and when a user has registered a plurality of terminal devices 4, the control unit 60 of the service providing server 3 may delete the terminal of all other terminal devices 4, for example.
- Various processes are performed, such as prompting the user to perform the service unsubscribe process after the process is completed, or automatically performing terminal deletion process of another terminal device 4 by the service unsubscribe process. Is also good. .
- the key input pattern change correspondence processing and the network Although a case has been described where only a device name registered in the service providing server 3 is deleted when a user change is detected in the network change handling process, the present invention is not limited to this. At the time of detection, if the user has only one terminal device 4, other processing such as deleting all information related to the user, such as user authentication information registered in the service providing server 3, etc. In this case, the service providing server 3 can more reliably prevent information leakage.
- the CPU 11 expands the service use program stored in the ROM 13 in advance on the RAM 20, and performs the above-described service enrollment processing according to the service use program. Performs service login processing, device name registration processing, bookmark registration processing, service provision information registration processing, FEP learning information registration processing, service unsubscription processing, terminal deletion processing, key input pattern change response processing, and network change response processing As described above, the present invention is not limited to this.
- a program storage medium storing a service use program in the terminal device 4 a service joining process, a service login process, and a device name are performed. Registration process, bookmark registration process, service offer ⁇ , information registration process, FE P learning information registration processing, service unsubscription processing, terminal deletion processing,
- the key input pattern change correspondence processing and the network change correspondence processing may be executed.
- various processes in the above-described embodiment can be executed by the hardware configuration shown in FIGS. 2 and 3, but can also be executed by software.
- the program constituting the software is installed via a network or a recording medium on a general-purpose personal computer or the like that can execute a process corresponding to the program by installing the program. Thereby, the various processes described above are executed.
- the recording medium is, for example, a magnetic disk (hard disk, floppy disk, etc.), a magnetic tape, an optical disk (DVD, DVD-RAM, CD-ROM, CD-R (R ecordable) / RW (R writable), etc.). ), A magneto-optical disk (MO (magnet o-optical disk), etc.), a semiconductor memory, and the like.
- the radio broadcast broadcast from the radio station is applied as the receivable broadcast to the terminal device 4.
- the present invention is not limited to this. Radio broadcasts are received and related information (radio broadcast information) is obtained, or a television broadcast received from a television broadcast station is received, and various types of broadcast information on television programs of the television broadcast are received. May be obtained from a server on the network.
- the present invention is not limited to this. It may be mounted on various terminals other than the terminal device 4 such as a personal computer, a personal computer, and the like, and the terminal equipped with these can execute the same processing as the terminal device 4 described above.
- the communication processing unit 22 as a transmitting unit and a receiving unit, the RAM 20, the hard disk drive 21 and the flash memory 28 as a storage unit, and the CPU as a user change detecting unit and an erasing unit
- the transmitting means, the receiving means, the storing means, the user change detecting means, The service using device may be configured by the erasing means.
- the present invention uses various terminal devices in addition to the terminal device that receives the content. Applicable to service utilization systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Social Psychology (AREA)
- Tourism & Hospitality (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020067005201A KR101123093B1 (ko) | 2003-09-29 | 2004-08-06 | 서비스 이용 장치 |
JP2005514160A JP4697541B2 (ja) | 2003-09-29 | 2004-08-06 | サービス利用装置 |
US10/571,458 US7639794B2 (en) | 2003-09-29 | 2004-08-06 | Service use device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2003-338916 | 2003-09-29 | ||
JP2003338916 | 2003-09-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005031585A1 true WO2005031585A1 (ja) | 2005-04-07 |
Family
ID=34386175
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/011645 WO2005031585A1 (ja) | 2003-09-29 | 2004-08-06 | サービス利用装置 |
Country Status (5)
Country | Link |
---|---|
US (1) | US7639794B2 (ja) |
JP (1) | JP4697541B2 (ja) |
KR (1) | KR101123093B1 (ja) |
CN (1) | CN100483381C (ja) |
WO (1) | WO2005031585A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8037269B2 (en) | 2005-11-07 | 2011-10-11 | Panasonic Corporation | Portable auxiliary storage device |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9558341B1 (en) | 2004-10-07 | 2017-01-31 | Sprint Communications Company L.P. | Integrated user profile administration tool |
US8006298B1 (en) * | 2006-07-11 | 2011-08-23 | Sprint Communications Company L.P. | Fraud detection system and method |
US20100024015A1 (en) * | 2006-12-21 | 2010-01-28 | Sxip Identity Corp. | System and method for simplified login using an identity manager |
US8695097B1 (en) * | 2007-08-28 | 2014-04-08 | Wells Fargo Bank, N.A. | System and method for detection and prevention of computer fraud |
JP2009259198A (ja) * | 2008-03-27 | 2009-11-05 | Hitachi Ltd | 情報処理制限システム、情報処理制限装置、および情報処理制限プログラム |
CN102301378B (zh) * | 2009-01-28 | 2016-02-03 | 日本电气株式会社 | 瘦客户端-服务器***、瘦客户端终端、数据管理方法和计算机可读记录介质 |
US8195819B1 (en) | 2009-07-13 | 2012-06-05 | Sprint Communications Company L.P. | Application single sign on leveraging virtual local area network identifier |
US8443429B1 (en) | 2010-05-24 | 2013-05-14 | Sprint Communications Company L.P. | Integrated sign on |
KR101851658B1 (ko) | 2011-08-18 | 2018-04-25 | 에스프린팅솔루션 주식회사 | 화상형성장치 및 그 화상형성장치의 정보 관리 방법 |
US9059987B1 (en) | 2013-04-04 | 2015-06-16 | Sprint Communications Company L.P. | Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network |
US20150066762A1 (en) * | 2013-08-28 | 2015-03-05 | Geoffrey W. Chatterton | Authentication system |
JP6376913B2 (ja) * | 2014-09-10 | 2018-08-22 | キヤノン株式会社 | 電子機器 |
US10719408B2 (en) * | 2016-08-03 | 2020-07-21 | Microsoft Technology Licensing, Llc | Retain locally deleted content at storage service |
US10614042B2 (en) | 2016-08-08 | 2020-04-07 | Microsoft Technology Licensing, Llc | Detection of bulk operations associated with remotely stored content |
US10616210B2 (en) | 2016-08-19 | 2020-04-07 | Microsoft Technology Licensing, Llc | Protection feature for data stored at storage service |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10269182A (ja) * | 1997-03-26 | 1998-10-09 | Oki Electric Ind Co Ltd | 利用者認証方法および利用者認証システム |
JPH11184756A (ja) * | 1997-12-25 | 1999-07-09 | Toshiba Corp | 携帯情報端末におけるセキュリティ制御方法ならびにシステム及び同方法がプログラムされ記録される記録媒体 |
JP2001092783A (ja) * | 1999-09-27 | 2001-04-06 | Hitachi Software Eng Co Ltd | 個人認証方法およびシステム、記録媒体 |
JP2002007937A (ja) * | 2000-06-22 | 2002-01-11 | Mizuki Takayama | 認証仲介システム及び認証仲介方法並びに認証仲介用ソフトウェアを記録した記録媒体 |
JP2002014930A (ja) * | 2000-06-29 | 2002-01-18 | Matsushita Electric Ind Co Ltd | 情報管理システム |
JP2002024105A (ja) * | 2000-07-11 | 2002-01-25 | Casio Comput Co Ltd | グループ管理方法及び記憶媒体 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2675602B1 (fr) * | 1991-04-16 | 1995-04-14 | Hewlett Packard Co | Procede et dispositif de protection d'un systeme informatique. |
US6480096B1 (en) * | 1998-07-08 | 2002-11-12 | Motorola, Inc. | Method and apparatus for theft deterrence and secure data retrieval in a communication device |
JP2002216099A (ja) * | 2001-01-16 | 2002-08-02 | Joho Net:Kk | 携帯型データ記録端末 |
JP2003219473A (ja) * | 2002-01-22 | 2003-07-31 | Citizen Watch Co Ltd | 携帯型情報装置、個人認証システムおよびデータ管理方法 |
JP4518768B2 (ja) | 2003-09-16 | 2010-08-04 | ソニー株式会社 | 通信システム、通信方法およびクライアント機器 |
JP2005092477A (ja) | 2003-09-17 | 2005-04-07 | Sony Corp | コンテンツ配信方法、コンテンツ取得装置および方法、並びにプログラム |
-
2004
- 2004-08-06 US US10/571,458 patent/US7639794B2/en not_active Expired - Fee Related
- 2004-08-06 WO PCT/JP2004/011645 patent/WO2005031585A1/ja active Application Filing
- 2004-08-06 CN CNB2004800282036A patent/CN100483381C/zh not_active Expired - Fee Related
- 2004-08-06 JP JP2005514160A patent/JP4697541B2/ja not_active Expired - Fee Related
- 2004-08-06 KR KR1020067005201A patent/KR101123093B1/ko not_active IP Right Cessation
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10269182A (ja) * | 1997-03-26 | 1998-10-09 | Oki Electric Ind Co Ltd | 利用者認証方法および利用者認証システム |
JPH11184756A (ja) * | 1997-12-25 | 1999-07-09 | Toshiba Corp | 携帯情報端末におけるセキュリティ制御方法ならびにシステム及び同方法がプログラムされ記録される記録媒体 |
JP2001092783A (ja) * | 1999-09-27 | 2001-04-06 | Hitachi Software Eng Co Ltd | 個人認証方法およびシステム、記録媒体 |
JP2002007937A (ja) * | 2000-06-22 | 2002-01-11 | Mizuki Takayama | 認証仲介システム及び認証仲介方法並びに認証仲介用ソフトウェアを記録した記録媒体 |
JP2002014930A (ja) * | 2000-06-29 | 2002-01-18 | Matsushita Electric Ind Co Ltd | 情報管理システム |
JP2002024105A (ja) * | 2000-07-11 | 2002-01-25 | Casio Comput Co Ltd | グループ管理方法及び記憶媒体 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8037269B2 (en) | 2005-11-07 | 2011-10-11 | Panasonic Corporation | Portable auxiliary storage device |
Also Published As
Publication number | Publication date |
---|---|
JPWO2005031585A1 (ja) | 2006-12-07 |
US20070044020A1 (en) | 2007-02-22 |
KR101123093B1 (ko) | 2012-03-16 |
JP4697541B2 (ja) | 2011-06-08 |
CN1860462A (zh) | 2006-11-08 |
US7639794B2 (en) | 2009-12-29 |
CN100483381C (zh) | 2009-04-29 |
KR20060126938A (ko) | 2006-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10991032B2 (en) | Information communication terminal, information distribution apparatus, information distribution system, content management method, broadcast reception method, information distribution method, programs and storage medium | |
KR100707326B1 (ko) | 정보 처리 시스템, 정보 처리 장치 및 정보 처리 방법 | |
KR20070014171A (ko) | 콘텐츠 취득 방법, 콘텐츠 취득 장치 및 콘텐츠 취득프로그램 | |
JP4697541B2 (ja) | サービス利用装置 | |
JP2005351994A (ja) | コンテンツ配信サーバ,コンテンツ配信方法,プログラム | |
JP4465577B2 (ja) | 情報処理装置および方法、情報処理システム、記録媒体、並びにプログラム | |
KR20060088546A (ko) | 속성정보 취득 방법 | |
JP4433290B2 (ja) | コンテンツ提示装置、コンテンツ提示方法及びコンテンツ提示プログラム | |
WO2005006203A1 (ja) | サービス利用方法及び管理方法 | |
WO2005029496A1 (ja) | データ記録制御装置 | |
JP4582417B2 (ja) | コンテンツ取得方法、属性情報提供方法、コンテンツ取得装置、属性情報提供装置、コンテンツ取得プログラム及び属性情報提供プログラム | |
JP4582394B2 (ja) | 端末装置、コンテンツデータ提供装置、コンテンツデータ取得プログラム及びコンテンツデータ提供プログラム | |
JP2002318745A (ja) | 情報処理装置および方法、記録媒体、並びにプログラム | |
KR20070017456A (ko) | 콘텐츠 데이터 재생장치 | |
JP4232102B2 (ja) | コンテンツ記録保持端末 | |
JP4666199B2 (ja) | 記録再生装置、記録再生方法及び記録再生プログラム | |
JP2006004332A (ja) | コンテンツ記憶方法 | |
KR20070018929A (ko) | 콘텐츠 제시장치, 콘텐츠 제시 방법 및 콘텐츠 제시프로그램 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200480028203.6 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005514160 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007044020 Country of ref document: US Ref document number: 10571458 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020067005201 Country of ref document: KR |
|
122 | Ep: pct application non-entry in european phase | ||
WWP | Wipo information: published in national office |
Ref document number: 1020067005201 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 10571458 Country of ref document: US |