![]() Security device managed access to information
专利摘要:
In an information delivery system, a security device (SD) manages an access to information (INF). The security device (SD) is capable of providing a pointer (PO) which indicates a location (LO) from which additional data (ADA) may be obtained. The additional data (ADA) may be a description of the information (INF) which is offered. For example, in a pay TV system, the information (INF) may be a particular movie of which the description is “James Bond, Dr. No, action category, 12 year and older, broadcast April 19, at 20H30.” In that case, the pointer (PO) may be used to inform a subscriber that his security device (SD) allows him to watch this particular movie. However, the additional data (ADA) contained in the location (LO) indicated by the pointer (PO), may also be software for various purposes such as, for example, playing games or configuring a receiver (REC) which co-operates with the security device (SD). 公开号:US20010005901A1 申请号:US08/851,304 申请日:1997-05-05 公开日:2001-06-28 发明作者:Franciscus L. A. J. Kamperman;Frank Bosveld 申请人:US Philips Corp; IPC主号:H04N7-1675
专利说明:
[0001] The invention relates to management of access to information by means of a security device. The information may be provided in a scrambled form. In that case, the security device may allow or may not allow descrambling depending on whether or not it contains data objects which represent an entitlement to access the information. [0001] [0002] U.S. Pat. No. 5,235,415 describes an arrangement for allowing fee paying subscribers to access TV or radio programs. Data describing the program fees and the account status is contained in a subscriber held security processor such as a smart card. The arrangement includes a keyboard for requesting messages concerning the programs. As a function of the content of the requests, a module converts the data contained in the security processor into intelligible messages by using transcoding tables transmitted regularly within the television and/or radio signals. [0002] [0003] The invention seeks, inter alia, to provide management of access to information by means of a security device which, with respect to the background art, allows greater flexibility. Claims [0003] 1, 5, 6 and 7 define a security device, a receiver, a data stream, a method of operating an information delivery access system, respectively, in accordance with the invention. Additional features, which may be optionally used to implement the invention to advantage, are defined in the dependent claims. [0004] The invention takes the following aspects into consideration. An information provider may want to provide his subscribers with a new type of security device at a certain point in time. In practice, it will not be feasible to make all subscribers change their old security device for the new one at the exactly same moment. Thus, there will be a transitional period in which the both the old security device and the new security device may be used. [0004] [0005] In the background art, certain practical problems will arise if, in the new security device, a new code and/or format is used for the data which is contained therein. For example, the information provider will have to transmit two different types of transcoding tables, namely one transcoding table for transcribing the data in the old code into intelligible messages, and an another transcoding table for transcribing the data in the new code. Transmission of two different types of transcoding tables requires additional transmission capacity, which may be difficult to find or which may even not be present at all. [0005] [0006] In accordance with the invention, there is provided, in a security device, a pointer indicating a location from which additional data may be obtained. The additional data may be a description of the information which is offered. For example, in a pay TV system, the information may be a particular movie of which the description is “James Bond, Dr. No, action category, 12 year and older, broadcast April 19, at 20H30.” Such descriptions will be available in an intelligible form because information providers will want to inform the public on what they are offering to stimulate purchase. The pointer may be used to inform a subscriber that his security device allows him to watch this particular movie. Transcoding tables are not required for that purpose. Consequently, the inventions allows greater flexibility than the background art. [0006] [0007] Other advantages of the invention are as follows. In contradistinction with the background art, the invention does not require a dedicated module for transcoding the data contained in the security device on the basis of transcoding tables. In the invention, any hardware and/or software for obtaining the additional information from the location indicated by the pointer, will be relatively simple in most cases. Moreover, such hardware and/or software may be wholly or partially used for other functions which involve data retrieval and/or data representation like, for example, an electronic program guide (EPG) function. Consequently, the invention also allows a relatively cost-effective implementation. [0007] [0008] The additional data, which may be obtained from the location indicated by the pointer, may be any type of data. For example, it may be software which may have or may not have a certain relationship with the information to which the access is controlled by means of the security device. The additional data may also be software for providing an interface between the security device and a device to which it may be coupled. Thus, the invention also allows to complement the functionality of the security device itself, as well as to enhance the functionality of an arrangement of which the security device may form part. [0008] [0009] The invention and additional features, which may be optionally used to implement the invention to advantage, are be apparent from and will be elucidated with reference to the drawings described hereinafter. [0009] [0010] In the drawings, [0010] [0011] FIG. 1 is a conceptual diagram illustrating basic features of the invention; [0011] [0012] FIGS. [0012] 2 to 4 are conceptual diagrams illustrating additional features which may optionally be used to implement the invention to advantage; and [0013] FIG. 5 is a block diagram of an example of a pay TV system in accordance to the invention. [0013] [0014] First, some remarks will be made on the use of reference signs. Similar entities are denoted with an identical lettercode throughout the drawings. In a single drawing, various similar entities may be shown. In that case, a numeral is added to the lettercode, to distinguish similar entities from each other. The numeral will be between parentheses if the number of similar entities is a running parameter. In the description and the claims, any numeral in a reference sign may be omitted if this is appropriate. [0014] [0015] FIG. 1 illustrates basic features of the invention in some its various aspects, namely with regard to a security device SD, a receiver REC and a data stream DS. The security device SD manages an access to information INF. It is capable of providing a pointer PO indicating a location LO from which additional data ADA may be obtained. The receiver REC co-operates with the security device SD. It includes a circuit CON for retrieving the additional data ADA from the location LO by the pointer PO. The location LO is preferably outside the secure device SD. The information INF may be supplied to the receiver REC in the form of a data stream DS. In that case, the pointer PO may have been transmitted to the security device SD for storage therein via the data stream DS. [0015] [0016] In principle, the additional data ADA may be any kind of data. Three different types of additional data will be given by way of example. [0016] [0017] First, the additional data ADA may be a description of the information INF which is offered. For example, in a pay TV system, the information INF may comprise a particular movie of which the description is “James Bond, Dr. No, action category, 12 year and older, broadcast April 19, at 20H30.” The pointer PO may be used to inform the subscriber that his security device SD contains a data object which allows him to watch this movie. To this end, the pointer PO may be associated with this data object or it may even form a part of it, which will be discussed in greater detail hereinafter. [0017] [0018] Secondly, the additional data ADA may be software for providing an interface between the security device SD and the receiver REC which need to co-operate. For example, the receiver REC may be a universal settop box which is capable of co-operating with different types of security devices belonging to, for example, different pay TV system operators. To this end, the settop box may be provided with a universal interface which needs to be configured to provide a communication link between the universal settop box and a particular security device. In that case, the pointer PO may indicate a location which contains software for configuring the universal interface such that the security device and the settop box may co-operate in a desired fashion. [0018] [0019] Thirdly, the additional data ADA may be software for enhancing the functionality at the subscriber's end. Such software may have a certain relationship with the information INF to which the access is controlled by the security device SD. For example, the additional data ADA may be software for playing a game which may relate to a certain program or event in a pay TV system. [0019] [0020] FIG. 2 illustrates the following additional feature. The pointer PO comprises at least one element LB which identifies a data stream DS[0020] 1 of which the additional data ADA forms part. The FIG. 2 feature takes the following aspects into consideration. At a certain moment, a subscriber may want to obtain additional data ADA associated to a certain data object contained in his security device SD. At that moment, his receiver REC may very well be tuned to a data stream DS2 which is not the one of which the desired additional data ADA forms part. The FIG. 2 feature allows the receiver REC to automatically tune to the data stream DS1 which contains the desired additional data ADA in order to subsequently retrieve the desired additional ADA data from the data stream DS1. Thus, the FIG. 2 feature contributes to user-friendliness. [0021] FIG. 3 illustrates the following additional feature. The pointer PO comprises the following elements: [0021] [0022] a label LB[0022] 1 for identifying an information delivery system or network NO; [0023] a label LB[0023] 2 for identifying an original information delivery system or original network ONW; [0024] a label LB[0024] 3 for identifying a data stream DS1 from any other data stream DS2 provided by the information delivery system; and [0025] a label LB[0025] 4 for identifying a service SV1 from any other service SV2 within the data stream. A service is a collection of various pieces of information offered by an information provider. For example, in a pay TV system, a collection of sports programs may be a service. [0026] The FIG. 3 feature allows to create a backward link from a data object in the security device concerning an entitlement, to service information in a data stream of the MPEG type, MPEG being an abbreviation for Moving Pictures Expert Group. [0026] [0027] FIG. 4 illustrates the following additional feature. The pointer PO forms part of a data object DO contained in the security device SD. This allows efficient use of available data storage capacity in the security device SD and an easy access to the pointer PO. Nevertheless, the FIG. 4 feature may seem strange because, on the one hand, the pointer PO is uncoded and public whereas, on the other hand, the security of data objects is essential to the inviolability of the access management. However, it is taken into consideration that data objects need not be coded in their entirety in order for the access management to be inviolable. What matters is that no one other than the relevant information provider is able to store data objects in the security device. To this end, a secret check code may be added to the pointer PO so as to form the data object. The check code may be generated on the basis of the pointer PO itself in combination with a secret key which is in the possession of the service provider and which is also stored in the security device. If a data object is supplied to the security device SD, it checks if the secret code which is added to the pointer is correct. If so, it will store the data object, if not it will reject the data object. [0027] [0028] FIG. 5 illustrates an example of an pay TV system in accordance with the invention. It comprises the following main elements: an operator service centre OSC and, at a subscriber's end, a settop box STB, a user interface UIF, and a security device in the form of a smart card SC. The settop box STB includes a front-end FRE, a data filter FIL, a descrambler DES, a controller CON, and a memory MEM which includes EPG software. The settop box STB may be coupled to a picture display device, not shown in FIG. 5. [0028] [0029] The FIG. 5 system operates as follows. The operator service centre OSC transmits, in a scrambled form, television programs to the settop box STB by means of an MPEG data stream DS. The MPEG data stream DS includes entitlement messages EMM concerning entitlements of a subscriber, or a group of subscribers, to watch certain programs. The MPEG data stream DS also includes service information data SID, for example, as specified in the European Telecommunication Standard 300 468. The service information data SID comprises, amongst other things, descriptions of the following: the program provider, the programs, and the scheduling/timing of these programs. The description of different programs are distinguished by unique identifiers ID([0029] 1) . . ID(N). Furthermore, the service information data SID also contains identifiers IDS to uniquely identify the MPEG data stream DS and its origin. [0030] At the subscriber's end, the front-end FRE is tuned to the MPEG data stream DS. The filter FIL extracts the service information data SID and the entitlement messages EMM from the MPEG data stream DS. The controller CON may process the service information data SID using the EPG software, so as to provide visual presentations which inform the subscriber on current and future programs. The controller CON may also transfer the entitlement messages EMM to the smart card SC. The entitlement messages EMM are processed in the smart card SC so as to obtain entitlement data objects EDO([0030] 1) . . EDO(N) which, subsequently, are stored in the smart card SC. An entitlement data objects EDO may be regarded as controlling a switch which enables or disables the descrambler DES when a certain program is provided. Thus, access to programs depends on the entitlement data objects EDO contained in the smart card SC. To inform the subscriber whether or not he can watch a particular program, the entitlement data objects EDO(1) . . EDO(N) also comprise pointers PO(l)..PO(N). These pointers may have been transmitted, for example, by means of the entitlement messages EMM. [0031] The subscriber may obtain an overview of all programs he is entitled to watch, in the following manner. He may order such an overview via the user interface UIF. In response, the controller CON will examine the smart card SC by reading all pointers PO([0031] 1) . . PO(N) contained therein. Next, the controller CON will check if the front-end FRE is tuned to the desired MPEG data stream DS on the basis of the identifiers IDS which uniquely identify data streams. If the front-end FRE were not tuned to the MPEG data stream DS, the controller CON would tune the front-end FRE in accordance with the pointers PO(1) . . PO(N) which contain a data element indicating the desired MPEG data stream DS. Once the front-end FRE has been correctly tuned, the controller CON will connect the pointers PO(1) . . PO(N) and the service information data SID by means of the identifiers ID(1) . . ID(N) contained therein. Accordingly, it will read those portions of the service information data SID pertaining to the programs which the subscriber is entitled to watch. The EPG software is used to visualize those portions in the service information data SID such that the subscriber obtains the overview he has ordered. [0032] The drawings and their description hereinbefore, illustrate rather than limit the invention. Evidently, there are numerous alternatives which fall within the scope of the appended claims. In that respect, the following closing remarks are made. [0032] [0033] There are numerous ways of physically spreading functions or functional elements over various units. In this respect, the drawings are very diagrammatic and respectively represent only one possible embodiment of the invention. As an example, with reference to FIG. 1, the security device SD may form an integral part of the receiver REC. [0033] [0034] Any type of information INF accessed by means of the secure device SD. For example, the information INF may be music or software. It may also be a combination of, for example, video, music and software. [0034] [0035] Any manner may be used to make the information INF and the additional data ADA available to a user. For example, the information INF may be stored in a database which can be accessed via Internet or any other means. It may also be stored on a carrier, such as a CD-ROM for example, which the user may purchase or get for free. Of course, the aforementioned also applies with regard to the additional data ADA. [0035] [0036] Any type of receiver REC may be used to co-operate with the security device SD. For example, the receiver REC may be a computer terminal connected to a network via which data can be transmitted such as, for example, a telephone network. [0036] [0037] Any number of elements may constitute the pointer PO. For example, with reference to the FIG. 3 feature, the pointer PO may additionally include a further label LB[0037] 5 which identifies a program from any other program within the service SV1. [0038] Any reference signs between parentheses shall not be construed as limiting the claim concerned. [0038]
权利要求:
Claims (7) [1" id="US-20010005901-A1-CLM-00001] 1. A security device (SD) for managing an access to information (INF), characterized in that the security device (SD) is arranged to provide a pointer (PO) indicating location (LO) from which additional information (ADA) may be obtained. [2" id="US-20010005901-A1-CLM-00002] 2. A security device (SD) as claimed in claim 1 , characterized in that the pointer (PO) comprises at least one element LB which identifies a data stream (DS1) of which the additional data (ADA) forms part. [3" id="US-20010005901-A1-CLM-00003] 3. A security device (SD) as claimed in claim 1 , characterized in that the pointer (PO) comprises the following data elements: a label (LB)1 for identifying an information delivery system or network (NW); a label (LB2) for identifying an original information delivery system or original network (ONW); a label (LB3) for identifying a data stream (DS1) from any other data stream (DS2) provided by the information delivery system; and a label (LB4) for identifying a service (SV1) from any other service (SV2) within the data stream. [4" id="US-20010005901-A1-CLM-00004] 4. A security device (SD) as claimed in claim 1 , characterized in that the pointer (PO) forms part of a data object (DO) for managing an access to the information. [5" id="US-20010005901-A1-CLM-00005] 5. A receiver (REC) arranged for co-operating with a security device (SD) as claimed in claim 1 , characterized in that the receiver (REC) comprises a circuit (CON) for retrieving the additional information (ADA) as indicated by the pointer. [6" id="US-20010005901-A1-CLM-00006] 6. A data stream (DS) comprising information (INF) to which an access is manageable by means of a security device (SD), characterized in that the data stream (DS) includes a pointer (PO) for storage in the security device (SD), the pointer indicating a location (LO) from which additional data (ADA) may be obtained. [7" id="US-20010005901-A1-CLM-00007] 7. A method of operating an information delivery system which includes at least one security device (SD) for managing an access to information (INF), characterized in that said method comprises the step of providing the security device (SD) with a pointer (PO) indicating a location (LO) from which additional data (ADA) may be obtained.
类似技术:
公开号 | 公开日 | 专利标题 US20050034149A1|2005-02-10|Security device managed access to information CN100356790C|2007-12-19|Recording and playback system KR100629413B1|2006-09-27|Smartcard for use with a receiver of encrypted broadcast signal, and receiver KR100262845B1|2000-08-01|Digital broadcasting system using virtual channel US5144662A|1992-09-01|Public communication system comprising distributed stations, and station and sub-station for use in such a communication system EP1447976B1|2019-06-19|Method of controlling descrambling of a plurality of program transport streams, receiver system and portable secure device KR100589447B1|2006-06-13|Signal generation and broadcasting JP2008154253A|2008-07-03|Multimedia terminal and method for realizing multimedia reception CN1643873B|2011-04-20|Device for secure transmission, recording and visualisation of audiovisual programmes JP2004193920A|2004-07-08|Program delivering system and receiving apparatus WO2002013044A1|2002-02-14|Method and system for program guide delivery EP0696141A2|1996-02-07|System for controlling different conditional access systems sending video, audio and data services and a receiver to be used in the system JP2002057645A|2002-02-22|Method for data transfer and mobile unit server EP0382296A1|1990-08-16|Public communication system comprising distributed stations, and station and sub-station for use in such a communication system AU766265B2|2003-10-09|Method and apparatus for providing an interactive program guide with headend processing JPH0697787B2|1994-11-30|Subscriber TV charge calculation method MXPA01002170A|2003-03-27|A copy protection system for home networks. KR20010098507A|2001-11-08|Business management method, business management apparatus and data broadcast delivery method KR20010080022A|2001-08-22|Television system adapted to function as server for distributing broadcasted stand-alone applications CN1278556C|2006-10-04|Method and apparatus for permitting unconfirmed viewing time with addressable pay TV CA2415866A1|2002-01-31|System and method for facilitating subscriber access to web enabled services KR20040013541A|2004-02-14|Introducing Information Constructing for IPPV Service in Digital Cable Broadcasting and its Transmitting Method KR100969467B1|2010-07-14|System and method for automatic broadcasting schedule distribution KR20000076400A|2000-12-26|Broadcast and Reception System, and Conditional Access System therefor US20020049982A1|2002-04-25|Integrated book-marking system for existing set-top boxes including those without browsing capabilities and those unable to expand to support browsing or interactive linking
同族专利:
公开号 | 公开日 KR19990028744A|1999-04-15| DE69739602D1|2009-11-12| US20050034149A1|2005-02-10| EP0856226A2|1998-08-05| KR100540300B1|2006-03-07| CN1190516A|1998-08-12| WO1997042762A2|1997-11-13| WO1997042762A3|1997-12-11| MY128336A|2007-01-31| EP1833251A2|2007-09-12| EP0856226B1|2009-09-30| JPH11510021A|1999-08-31| EP1833251A3|2012-05-02| US6951029B2|2005-09-27| ES2333997T3|2010-03-03| CN1199463C|2005-04-27| JP4033493B2|2008-01-16|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US5737026A|1995-02-28|1998-04-07|Nielsen Media Research, Inc.|Video and data co-channel communication system|US20020138837A1|2001-03-24|2002-09-26|Fries Robert M.|Electronic program guide hardware card| DE102004057490B4|2004-11-29|2007-02-22|Infineon Technologies Ag|Device and method for processing a program code| US7409310B1|2005-01-21|2008-08-05|Z Microsystems, Inc.|System and method for tracking operational data in a distributed environment|US6937729B2|1995-04-03|2005-08-30|Scientific-Atlanta, Inc.|Representing entitlements to service in a conditional access system| FR2656489B1|1989-12-22|1995-08-04|France Etat|DEVICE FOR INTELLIGIBLE CONSULTATION OF THE NATURE OF RIGHTS OF ACCESS TO A TELEVISION AND / OR PAID RADIO SERVICE.| US5537473A|1991-07-08|1996-07-16|Amstrad Public Limited Company|Video recorder system| US5317391A|1991-11-29|1994-05-31|Scientific-Atlanta, Inc.|Method and apparatus for providing message information to subscribers in a cable television system| ES2105021T3|1992-09-14|1997-10-16|Thomson Multimedia Sa|ACCESS CONTROL METHOD.| US5442389A|1992-12-28|1995-08-15|At&T Corp.|Program server for interactive television system| CA2127347A1|1993-07-07|1995-01-08|Donald F. Hooper|Segmented video on-demand system| US5594726A|1993-09-17|1997-01-14|Scientific-Atlanta, Inc.|Frequency agile broadband communications system| AU1265195A|1993-12-06|1995-06-27|Telequip Corporation|Secure computer memory card| US5880769A|1994-01-19|1999-03-09|Smarttv Co.|Interactive smart card system for integrating the provision of remote and local services| US5594493A|1994-01-19|1997-01-14|Nemirofsky; Frank R.|Television signal activated interactive smart card system| CA2146472C|1994-04-22|2007-10-09|Kevin Elliott Bridgewater|Packet video signal inverse transport processor with memory address circuitry| US5852290A|1995-08-04|1998-12-22|Thomson Consumer Electronics, Inc.|Smart-card based access control system with improved security| MY125706A|1994-08-19|2006-08-30|Thomson Consumer Electronics|High speed signal processing smart card| US5734589A|1995-01-31|1998-03-31|Bell Atlantic Network Services, Inc.|Digital entertainment terminal with channel mapping| FR2730372A1|1995-02-08|1996-08-09|Philips Electronics Nv|PAY TELEVISION METHOD| US5870474A|1995-12-04|1999-02-09|Scientific-Atlanta, Inc.|Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers| US5602918A|1995-12-22|1997-02-11|Virtual Open Network Environment Corp.|Application level security system and method| DE69739602D1|1996-05-06|2009-11-12|Irdeto Eindhoven B V|SAFETY DEVICE CONTROLLED ACCESS TO INFORMATION|DE69739602D1|1996-05-06|2009-11-12|Irdeto Eindhoven B V|SAFETY DEVICE CONTROLLED ACCESS TO INFORMATION| US6052780A|1996-09-12|2000-04-18|Open Security Solutions, Llc|Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information| ES2274557T3|1998-08-31|2007-05-16|Irdeto Access B.V.|SYSTEM TO PROVIDE ENCRYPTED DATA, SYSTEM TO DESCRIBE ENCRYPTED DATA AND METHOD TO PROVIDE A COMMUNICATIONS INTERFACE IN SUCH DESCRIBER SYSTEM.| US7017188B1|1998-11-16|2006-03-21|Softricity, Inc.|Method and apparatus for secure content delivery over broadband access networks| US6763370B1|1998-11-16|2004-07-13|Softricity, Inc.|Method and apparatus for content protection in a secure content delivery system| US7370071B2|2000-03-17|2008-05-06|Microsoft Corporation|Method for serving third party software applications from servers to client computers| EP1067720A1|1999-07-05|2001-01-10|CANAL+ Société Anonyme|Method and apparatus for transmitting and receiving messages, in particular in broadcast transmissions| EP1500272A2|2002-04-19|2005-01-26|Koninklijke Philips Electronics N.V.|Conditional access system and apparatus| JP2006512793A|2002-06-12|2006-04-13|コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ|Conditional access apparatus and method| PL376502A1|2002-12-03|2005-12-27|Nagracard S.A.|Method of managing the display of event specifications with conditional access| EP1705906A1|2005-03-04|2006-09-27|Nagravision S.A.|Method for processing a program grid broadcasted by a provider| US7555288B2|2006-04-28|2009-06-30|Sony Ericsson Mobile Communications Ab|Mobile device control of mobile television broadcast signals from broadcaster| JP4582653B2|2006-05-09|2010-11-17|ソフトバンクモバイル株式会社|Content download system|
法律状态:
1997-10-20| AS| Assignment|Owner name: U.S. PHILIPS CORPORATON, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAMPERMAN, FRANCISCUS L.A.J.;BOSVELD, FRANK;REEL/FRAME:008755/0417;SIGNING DATES FROM 19970618 TO 19970620 | 2005-03-24| AS| Assignment|Owner name: KONINKLIJKE PHILIPS ELECTRONICS N.V., NETHERLANDS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:U.S. PHILIPS CORPORATION;REEL/FRAME:015957/0473 Effective date: 20050224 | 2008-06-12| AS| Assignment|Owner name: IRDETO EINDHOVEN B.V., NETHERLANDS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KONINKLIJKE PHILIPS ELECTRONICS N.V.;REEL/FRAME:021076/0780 Effective date: 20080509 Owner name: IRDETO EINDHOVEN B.V.,NETHERLANDS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KONINKLIJKE PHILIPS ELECTRONICS N.V.;REEL/FRAME:021076/0780 Effective date: 20080509 | 2009-04-06| REMI| Maintenance fee reminder mailed| 2009-09-27| LAPS| Lapse for failure to pay maintenance fees| 2009-10-26| STCH| Information on status: patent discontinuation|Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 | 2009-11-17| FP| Expired due to failure to pay maintenance fee|Effective date: 20090927 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 EP96201239.9||1996-05-06|| EP96201239||1996-05-06||US10/931,841| US20050034149A1|1996-05-06|2004-09-01|Security device managed access to information| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|