Abstract: A Centralized logistical system for secured transmission of digital data including:-at least a means(1) for accessing a network(4) operatively connected to at least a means for sending a request for accessing a secured data(5), and to at least a centralized distribution server(3) having stored therein said secured data, said centralized distribution server(3) being adapted to substantially bar unauthorized access(2) to said secured data and /or unauthorized application of said data through said network.
A CENTRALIZED SECURED LOGISTICAL SYSTEM
FIELD OF THE INVENTION
The present invention, relates to a centralized logistical system and to a method for secured transmission of digital data through a network, applying the system and in particular, to an online security system for secured transmission of digital data to any part of the globe through a network, applying a centralized server, having a specially encrypted file system and to a method for such transmission.
BACKGROUND OF THE INVENTION
While the Internet vastly increases opportunities to sell products and services, it also creates new opportunities to steal software. Indeed, software theft and distribution threaten to undermine the tremendous innovation, jobs and revenue that the Internet promises. Until recently, unauthorized copying of software required physical exchange of floppy disks, CDs or other hard media. But, as the Internet continually gets easier, faster and less expensive, Digital piracy does the same.
The Internet allows products to move from computer to computer, with no hard media transaction and little risk of detection. Some piracy schemes may even involve computers without the owner's knowledge. Piracy that once required an understanding of complex computer codes can now be done with the click of a mouse. It is also a common trend to embrace the promise of new technologies, like peer-to-peer networking. The internet has made it easier for all to share information, however, observing ethics and principles are of prime importance in this regard.
Productivity, progress and professionalism are the hallmarks of the market system, now galloping across the world. The crucial element in this gallop is the ongoing march of the cyber world into all aspects of life. The delivery of software and services via the internet is the key to this progress. However, one crucial disturbance encountered by most people and companies these days is cyber crime such as piracy and counterfeiting.
Software Compliance Irregularity refers to legally purchased software licenses that are not being used appropriately, based on the software publisher's terms and conditions. It also refers to software which is being used without legally purchasing them, hence violating the software publisher's terms and conditions. Software piracy is an offence, leading an individual to arrest and criminal prosecution, with heavy financial penalty and imprisonment in almost, all parts of the globe.
To encounter the growing trend of software piracy and other cyber crimes, the software specialists and companies have installed innumerable security systems and the pertinent procedures as equipments, for detecting unauthorized use and users. However, it has been observed that such equipments have not been able to eradicate the cyber crimes to a substantial degree and such cyber crimes are in vogue, even though substantial time, money and labour are invested to develop equipments to eradicate cyber crimes. The security systems in vogue, have not been found to be that effective, in both online and offline protection of software and digital data. Furthermore, such systems were not able to function coherently, as a complete online license management (DRM) systems, particularly because of its deficiency in developing control over the licenses on any downloads, even without authentication methods. This also aggravated the deficiencies of such security systems, known in the art, to prevent the excess usage of licenses beyond authorized limits. Thus, total eradication of software piracy, counterfeiting, unauthorized duplication and other cyber crimes could not be achieved.
In addition to the aforesaid problems, the security systems for prevention of cyber crimes, known in the art, are not so effective in transmission of data in a secured manner, in the event of the centralized server being accessed by the user from a remote geographical location.
The US Publication No: US 2005/0267945 A1, for "Systems and methods for deterring internet file-sharing networks", discloses online content distribution security. The methods and systems are disclosed to prevent illegal sharing of digital content by deterring or disrupting file sharing activity. In embodiments, methods and systems are provided for responding to user queries in a file sharing network with information that allows users to attempt to download protected digital content but does not allow users access to the protected digital content. Online Content Security used in this prior-art is focused to block network from file-sharing activities.
The US Publication No: US 2006/0064605 A1, for "Digital content security system", discloses management by a Personal Digital Key Digital Content Security System. It is used to protect computers from unauthorized use and protect the digital content stored on computers from being wrongfully accessed, copied, and/or distributed. Digital content security system is based on a KEY principle and therefore restricted to just the identification of the key.
However, the inventions disclosed in the aforesaid prior specifications and the other systems known in the art, do not advocate substantial eradication of the drawbacks as described herein before
Accordingly, there was a long felt need to develop a centralized secured electronic logistical system, which does not have the aforesaid drawbacks so that cyber crimes like software piracy, counterfeiting, unauthorized duplication are substantially eradicated. Additionally, there was a long cherished requirement in the field, to develop a security system and procedure for stopping cyber crimes, which would employ a centralized server that can be directly accessed by the authorized user in a secured manner through the network, like for execution/viewing a particular software, without the need for installation of the software in the client system.
The present invention is aimed at meeting the aforesaid long felt needs.
Through out the specification, the words cyber crime has been used in the broadest sense of the word. It includes all possible cyber crimes and is not limited to the few examples, cited in the present specification, which are purely for the sake of understanding.
OBJECTS OF THE INVENTION
The principal object of the present invention is to provide a centralized logistical system for secured transmission of digital data to any part of the globe through a network, so that cyber crimes like software piracy, counterfeiting, unauthorized duplication are substantially eradicated.
Another object of the present invention is to provide a method for secured transmission of digital data to any part of the globe through a network, so that cyber crimes like software piracy, counterfeiting, unauthorized duplication are substantially eradicated.
Another object of the present invention is to provide a method for fabricating a centralized logistical system adapted to facilitate secured transmission of digital data to any part of the globe through a network, so that cyber crimes like software piracy, counterfeiting, unauthorized duplication are substantially eradicated.
Another object of the present invention is to provide a method for substantial eradication of cyber crimes like software piracy, counterfeiting, unauthorized duplication during transmission of digital data to any part of the globe through a network.
Yet another object of the present invention is to provide an online security system for secured transmission of digital data to any part of the globe through a network.
Further object of the present invention is to provide a centralized logistical system which applies a centralized server that can be accessed by the authorized user, effectively, from a remote geographical location.
Further object of the present invention is to provide a server system, which functions as a digital online logistics in a secured manner over the network.
Another object of the present invention is to provide a centralized distribution server which can store, move and deliver software, digital data and content securely, over the network.
Another object of the present invention is to provide both online and offline protection for software and digital data as it provides post delivery offline protection.
Further object of the present invention is to ensure control over licenses on any downloads, through a network, even without authentication methods.
Another object of the present invention is to provide a complete online license management (DRM) system for secured transmission of digital data through a network.
Further object of the present invention is to make all files and supporting files invisible and inactive for unauthorized activities both online and offline, both in centralized Server System and Client System.
Another object of the present invention is to provide the user to access software and other digital data, directly from the server without the need for installation in the client system.
Further object of the present invention is to prevent excess usage of licenses beyond authorized limits, thereby substantially eliminating cyber crimes like piracy, counterfeiting and unauthorized duplication.
Further object of the present invention is to provide an improved encryption technology, for encryption of the hard disc of a centralized server, incorporated in a centralized logistical system, for secured transmission of digital data to any part of the globe through a network.
SUMMARY OF THE INVENTION
Accordingly, the present invention provides a centralized logistical system for secured transmission of digital data including:-
- at least a means for accessing a network operatively connected to at least a means for sending a request for accessing a secured data, and to at least a centralized distribution server having stored therein said secured data, said centralized distribution server being adapted to substantially bar unauthorized access to said secured data and /or unauthorized application of said data through said network.
In accordance with preferred embodiments of the centralized logistical system of the present invention:
- said centralized distribution server is a web server in the form of any of a mainframe, a mobile server, a php server, a downloadable server, an unloadable server or any other server applicable for distribution of digital content.
-said server includes at least an encrypted hard-disc configured to store files secured from unauthorized access, said system being equipped with established viewer system adapted to display files from respective root structure.
-said means for accessing said network comprises an authorized client computer.
-said means for accessing said network comprises an unauthorized client computer.
-said system is adapted to prevent display of output file in the event of content download to said unauthorized computer.
-there is provided an interfacing medium in the form of any of a PC network, mobile network, built - in network, thick and thin client network and so on applicable for distribution of digital content.
-said network is in the form of a secure file transfer protocol protected system.
The present invention also provides a method for secured transmission of digital data to any part of the globe through a network, said method including:-
- accessing said network by a suitable means, by a user
- sending a request for accessing a secured data stored in a centralized distribution server, said server being adapted to substantially bar unauthorized assessed to said secured data through said network,
- processing of the request for accessing by said server for matching of system parameters with user parameters,
-displaying of output file of content download in the event of system parameters matching user parameters, for authorized activities, or
- preventing of display and an authorized activities of out put file of content
download in the event of system parameters not matching user parameters.
The present invention also provides a method for fabricating a centralized logical system adapted to facilitate secured transmission of digital data to any part of the globe through a network, said method including designing at least a centralized distribution server having a hard disc, said hard disc being configured to store files which are secured from unauthorized access, incorporating said centralized distribution server in said system and operatively connecting said centralized distribution server to at least a means for accessing said network and to at least a means for accessing secured data stored in said server.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS
The nature and scope of the present invention will be better understood from the accompanying drawings of some preferred embodiments, which are purely by way of understanding and illustration and not by way of any sort of limitation. In the accompanying drawings:-
Fig 1 illustrates a preferred embodiment of the centralized logistical system which includes Server and Client computer architecture in accordance with the invention.
Fig 2 illustrates a preferred embodiment of the centralized logistical system where the request is authenticated at the server and the content is sent to the Authorized client.
Fig 3 illustrates a preferred embodiment of the centralized logistical system where the content is processed and displayed but is barred from further distribution.
Fig 4 illustrates a preferred embodiment of the centralized logistical system, where the content cannot be re-distributed to another client system.
DETAILED DESCRIPTION OF THE INVENTION
The following describes some preferred embodiments of the present invention for the sake of understanding the present invention and not by way of any sort of limitation.
As explained aforesaid, the delivery of software and services via the internet is the key to modernization, in all fields. However, one crucial disturbance encountered by most people and companies these days is cyber crime such as piracy and counterfeiting. Attempts are on over the years, to eradicate cyber crime through installation of widespread security systems, for ensuring transmission of digital data through a network. However, such security systems have not been able to substantially eradicate cyber crimes due to various drawbacks as explained before. The present system aims at solving the drawbacks in the existing security systems, meant for eradication of cyber crimes. For this purpose, the present invention applies a unique technology, to make the files in the hard disk of the centralized server dependent on the content incorporated in a centralized logistical system of the present invention. Non-limiting examples of these computer files may be exe files, HTML files, JPEG files, and so on.
In the system according to the present invention, the content is being secured both by hardware and software parameters to bind the content to the server and the targeted Client Computer.
The system according to the present invention is based on the restriction on the complete content/ data from being duplicated using the hardware and software techniques parameters to bind the content to the server and the targeted client computer.
The centralized distribution server, in accordance with the present invention, on a specific request from the client system, delivers files such as HTML, .exe, JPEG, from the central server to the end user in a secured manner through the network, so that those computer files are disabled from unauthorized usage and duplication. Actually, the present invention provides an mechanism, to allow usage of the computer files effectively and securely, wherein unauthorized copying techniques such as breaking of distribution media, keys and passwords, hard drives, system fingerprinting, and other common privacy concerns are substantially eliminated.
All files in the Centralized Server are secured from unauthorized access. The hard disk of the server is encrypted in such a manner, such that all files within the hard disk are invisible and inactive to any unauthorized activities. When the user requests the server for files through the network, the required file is delivered to the authorized client system as a direct installer file. When the file is delivered to client system, the user can only use it for authorized activities and all other unauthorized activities of duplication, counterfeiting of the file are inactivated.
If the user requests the server for particular software, then the installer file of that particular software is directly given to the client system, through the network. Software can also be executed / viewed directly from the server, without installation. Any text or image within the file, received from the server to the authorized client system is copy protected.
Digital games can be played directly from the centralized server without the need for actual installation in the client system. This invention also provides the offline security to the files downloaded from the server to the client system.
The present invention handles complete online license management (DRM) system and it effectively prevents excess usage of licenses beyond authorized limits.
Precisely, the present invention provides a centralized server, which can function as a secured electronic logistics for distribution of digital data to any part of the globe though a network.
The centralized distribution server stores, moves and delivers software, digital data and content securely, over the network and effectively overcomes the cyber crimes like piracy, counterfeiting and unauthorized duplication.
The centralized electronic logistical system, according to the present invention establishes control over the licenses, on any software or computer game. The system also functions as a complete online license management (DRM) system and establishes control over the licenses on any downloads, even without authentication methods.
The present invention also provides both online and offline protection for all files and supporting files by making them invisible and inactive for unauthorized activities.
All confidential data are stored within the present invention server in a unique secured format which will be secured by using any of the encryption algorithms, Hardware locking system, etc.
The present invention provides a centralized logistical system for secured transmission of digital data to any part of the globe through a network, so that cyber crimes like software piracy, counterfeiting, unauthorized duplication are substantially eradicated, said system including a centralized distribution server having a hard disc incorporated therein, which is adapted to substantially bar unauthorized access to data stored therein through a network all over the globe.
The present invention also provides a method for secured transmission of digital data to any part of the globe through a network, so that cyber crimes like software piracy, counterfeiting, unauthorized duplication are substantially eradicated, said method including designing a centralized logistical system for its application in digital transmission of data, through a network through out the globe and accessing the network via the centralized logical system, so that unauthorized access to data is substantially barred.
The present invention also provides a method for fabricating a centralized logistical system adapted to facilitate secured transmission of digital data to any part of the globe through a network, said method including designing a centralized distribution server having a hard disc, said hard disc being configured to store files which are secured from unauthorized access and incorporating said centralized distribution server in said system.
The present invention also provides an improved encryption technology including encryption of the hard disc of a centralized server and incorporating the server in a centralized logistical system, for secured transmission of digital data to any part of the globe through a network.
How the system and the method in accordance with the present invention works will now be explained in greater details with reference to the accompanying figures 1, 2, 3 and 4.
As shown in the accompanying figure 1, by way of non-limiting exemplary illustration, the system in accordance with the present invention includes an authorized user (1) (authorized client computer), an anonymous user (2) (unauthorized client computer), a web server (3) and internet / intranet (4).
The first step involves sending request (5) to the web server (3) by the authorized user (1). The next step (6) involves portal accepting the request and making a path for the end user to access the requested data. This is illustrated in the accompanying figure 2. It illustrates precisely, that the request is authenticated at the server and the content is sent to the authorized client.
The third step (7) involves user viewing the data content downloaded to particular client machine according to the location dependencies. This is illustrated in accompanying figure 3. It also illustrates enlarged view of the content downloaded (8) in an authorized manner. Precisely, the accompanying figure 3 shows an eventuality where, the content downloaded is processed and displayed, but is barred from further distribution/application.
So, the system according to the present invention processes the request coming from the authorized client computer (1) in the secure web server (3) and delivery pursuant thereto is ensured using a secure network worked in the Server - Client mode. The logistical system delivers and controls the distribution channel only to its authorized client system and thereby restricts the unauthorized "Re-Distribution" of digital content. The latter is well illustrated in the accompanying figure 4 which shows junk file (9) viewed by the unauthorized client computer/ unauthorized user (2). Precisely, the accompanying figure 4 shows an eventuality, where the content can not be re-distributed to another client system.
The method for fabricating a centralized logical system adapted to facilitate secured transmission of digital data to any part of the globe through a network includes designing at least a centralized distribution server having a hard disc which is configured to store files which are secured from unauthorized access.
The centralized distribution server is incorporated in the system and operatively connected to at least a means for accessing said network and to at least a means for accessing secured data, stored in the server.
Preferred examples of the web-server according to the present invention are a Mainframe, a mobile server, a php server, any downloadable server, an unloadable sever and in general, any other server used for distribution of digital content.
Preferred examples of the interfacing medium may be a PC Network, Mobile Network, Built-in Network, Thick and Thin client Network and so on applicable for Distribution Digital Content as will be known to persons skilled in the art.
The network preferably, may be a secure file transfer protocol-protected system. The lines can be transferred via and E-Mail, Chat, Instant Messaging System and so on.
The authorized client is preferably machine dependent based on hardware parameters of the Computers such as Eternet ID, Hard-disc ID, Processor and other Hard-ware Credentials within a Control System of a Computer.
Clients without Authorization are treated as unauthorized client. The content download to such a control system does not display the output of the file, as the file remain corrupted till the system parameters are matched, as per the parameter of the authorized client agent.
The file in accordance with the present invention has an established viewer system that displays the file from its roof structure.
ADVANTAGES OF THE INVENTION
1. The present invention is effective in protecting Confidential Data from unauthorized duplication.
2. The present invention prevents unauthorized duplication of Confidential Data to a server and thereby restricted to the Usability management of a Computer Network.
3. The system can be adapted on a Client- Server Architecture.
4. This system can be integrated into a WAN & LAN.
5. The system can be configured as per the speed of Internet connectivity.
The present invention has been described with reference to some preferred embodiments and the accompanying drawing for the sake of understanding and not by way of any sort of limitation and it includes all legitimate developments, within the scope of what has been described hereinbefore and claimed in the appended claims.
We Claim:
1. A Centralized logistical system for secured transmission of digital data
including :-
at least a means for accessing a network operatively connected to at least a means for sending a request for accessing a secured data, and to at least a centralized distribution server having stored therein said secured data, said centralized distribution server being adapted to substantially bar unauthorized access to said secured data and /or unauthorized application of said data through said network.
2. The centralized logistical system as claimed in claim 1, wherein said centralized distribution server is a web server in the form of any of a mainframe, a mobile server, a php server, a downloadable server, an unloadable server or any other server applicable for distribution of digital content.
3. The centralized logistical system as claimed in claim 2, wherein said server includes at least an encrypted hard-disc configured to store files secured from unauthorized access, said system being equipped with established viewer system adapted to display files from respective root structure.
4. The centralized logistical system as claimed in claims 1 to 3, wherein said means for accessing said network comprises an authorized client computer.
5. The centralized logistical system as claimed in claims 1 to 3, wherein said means for accessing said network comprises an unauthorized client computer.
6. The centralized logistical system as claimed in claim 5, wherein said system is adapted to prevent display of output file in the event of content download to said unauthorized computer.
7. The centralized logistical system as claimed in claims 1 to 6, wherein there is provided an interfacing medium in the form of any of a PC network, mobile network, built - in network, thick and thin client network and so on applicable for distribution of digital content.
8. The centralized logistical system as claimed in claims 1 to 7, wherein said network is in the form of a secure file transfer protocol protected system.
9. A method for secured transmission of digital data to any part of the globe through a network, said method including :-
- accessing said network by a suitable means, by a user
- sending a request for accessing a secured data stored in a centralized distribution server, said server being adapted to substantially bar unauthorized assessed to said secured data through said network,
- processing of the request for accessing by said server for matching of system
- parameters with user parameters,
-displaying of output file of content download in the event of system parameters matching user parameters, for authorized activities, or
- preventing of display and an authorized activities of out put file of content
download in the event of system parameters not matching user parameters.
10.A method for fabricating a centralized logical system adapted to facilitate secured transmission of digital data to any part of the globe through a network, said method including designing at least a centralized distribution server having a hard disc, said hard disc being configured to store files which are secured from unauthorized access, incorporating said centralized distribution server in said system and operatively connecting said centralized distribution server to at least a means for accessing said network and to at least a means for accessing secured data stored in said server.
11. A centralized logistical system substantially as herein described, particularly with reference to the accompanying drawings.
12. A method for secured transmission of digital data, substantially as herein described, particularly with reference to the accompanying drawings.
13. A method for fabricating a centralized logistical system, substantially as herein described, particularly with reference to the accompanying drawings.
| # | Name | Date |
|---|---|---|
| 1 | 2570-CHE-2009-AbandonedLetter.pdf | 2017-12-20 |
| 1 | abs 2570-che-2009 abstract 23-10-2009.jpg | 2009-10-23 |
| 2 | 2570-che-2009 claims 23-10-2009.pdf | 2009-10-23 |
| 2 | 2570-CHE-2009-FER.pdf | 2017-05-03 |
| 3 | 2570-che-2009 form-5 23-10-2009.pdf | 2009-10-23 |
| 3 | 2570-che-2009 correspondence others 08-03-2011.pdf | 2011-03-08 |
| 4 | 2570-che-2009 form-3 23-10-2009.pdf | 2009-10-23 |
| 4 | 2570-che-2009 form-18 08-03-2011.pdf | 2011-03-08 |
| 5 | 2570-CHE-2009 ABSTRACT 22-09-2010.pdf | 2010-09-22 |
| 5 | 2570-che-2009 form-2 23-10-2009.pdf | 2009-10-23 |
| 6 | 2570-CHE-2009 CLAIMS 22-09-2010.pdf | 2010-09-22 |
| 6 | 2570-che-2009 form-1 23-10-2009.pdf | 2009-10-23 |
| 7 | 2570-CHE-2009 CORRESPONDENCE OTHERS 22-09-2010.pdf | 2010-09-22 |
| 7 | 2570-che-2009 drawings 23-10-2009.pdf | 2009-10-23 |
| 8 | 2570-CHE-2009 DESCRIPTION (COMPLETE) 22-09-2010.pdf | 2010-09-22 |
| 8 | 2570-CHE-2009 DESCRIPTION(PROVISIONAL) 23-10-2009.pdf | 2009-10-23 |
| 9 | 2570-che-2009 correspondence others 23-10-2009.pdf | 2009-10-23 |
| 9 | 2570-CHE-2009 FORM -1 22-09-2010.pdf | 2010-09-22 |
| 10 | 2570-che-2009 abstract 23-10-2009.pdf | 2009-10-23 |
| 10 | 2570-CHE-2009 FORM -2 22-09-2010.pdf | 2010-09-22 |
| 11 | 2570-CHE-2009 FORM -3 22-09-2010.pdf | 2010-09-22 |
| 11 | 2570-che-2009 form-5 21-01-2010.pdf | 2010-01-21 |
| 12 | 2570-CHE-2009 FORM -5 22-09-2010.pdf | 2010-09-22 |
| 12 | 2570-che-2009 form-3 21-01-2010.pdf | 2010-01-21 |
| 13 | 2570-che-2009 form-2 21-01-2010.pdf | 2010-01-21 |
| 13 | 2570-CHE-2009 POWER OF ATTORNEY 22-09-2010.pdf | 2010-09-22 |
| 14 | 2570-che-2009 description (complete) 21-01-2010.pdf | 2010-01-21 |
| 14 | 2570-che-2009 form-1 21-01-2010.pdf | 2010-01-21 |
| 15 | 2570-che-2009 description (complete) 21-01-2010.pdf | 2010-01-21 |
| 15 | 2570-che-2009 form-1 21-01-2010.pdf | 2010-01-21 |
| 16 | 2570-che-2009 form-2 21-01-2010.pdf | 2010-01-21 |
| 16 | 2570-CHE-2009 POWER OF ATTORNEY 22-09-2010.pdf | 2010-09-22 |
| 17 | 2570-che-2009 form-3 21-01-2010.pdf | 2010-01-21 |
| 17 | 2570-CHE-2009 FORM -5 22-09-2010.pdf | 2010-09-22 |
| 18 | 2570-CHE-2009 FORM -3 22-09-2010.pdf | 2010-09-22 |
| 18 | 2570-che-2009 form-5 21-01-2010.pdf | 2010-01-21 |
| 19 | 2570-che-2009 abstract 23-10-2009.pdf | 2009-10-23 |
| 19 | 2570-CHE-2009 FORM -2 22-09-2010.pdf | 2010-09-22 |
| 20 | 2570-che-2009 correspondence others 23-10-2009.pdf | 2009-10-23 |
| 20 | 2570-CHE-2009 FORM -1 22-09-2010.pdf | 2010-09-22 |
| 21 | 2570-CHE-2009 DESCRIPTION(PROVISIONAL) 23-10-2009.pdf | 2009-10-23 |
| 21 | 2570-CHE-2009 DESCRIPTION (COMPLETE) 22-09-2010.pdf | 2010-09-22 |
| 22 | 2570-che-2009 drawings 23-10-2009.pdf | 2009-10-23 |
| 22 | 2570-CHE-2009 CORRESPONDENCE OTHERS 22-09-2010.pdf | 2010-09-22 |
| 23 | 2570-che-2009 form-1 23-10-2009.pdf | 2009-10-23 |
| 23 | 2570-CHE-2009 CLAIMS 22-09-2010.pdf | 2010-09-22 |
| 24 | 2570-che-2009 form-2 23-10-2009.pdf | 2009-10-23 |
| 24 | 2570-CHE-2009 ABSTRACT 22-09-2010.pdf | 2010-09-22 |
| 25 | 2570-che-2009 form-3 23-10-2009.pdf | 2009-10-23 |
| 25 | 2570-che-2009 form-18 08-03-2011.pdf | 2011-03-08 |
| 26 | 2570-che-2009 form-5 23-10-2009.pdf | 2009-10-23 |
| 26 | 2570-che-2009 correspondence others 08-03-2011.pdf | 2011-03-08 |
| 27 | 2570-CHE-2009-FER.pdf | 2017-05-03 |
| 27 | 2570-che-2009 claims 23-10-2009.pdf | 2009-10-23 |
| 28 | abs 2570-che-2009 abstract 23-10-2009.jpg | 2009-10-23 |
| 28 | 2570-CHE-2009-AbandonedLetter.pdf | 2017-12-20 |
| 1 | search_03-05-2017.pdf |