The present application relates to applications entitled “System, Method and Article of Manufacture for Preventing the Proliferation of Unwanted Electronic Messages”, “Electronic Message Payload for Interfacing with Text Contained in the Message”, “Method and Article of Manufacture for Delaying Advertisement Execution in a Geometric Electronic Media Distribution Framework”, “Textual Hyperlink Capable of Inputting Text as a Parameter while Executing an Associated Link”, and “Method and Apparatus for the Production, Delivery, and Receipt of Enhanced E-Mail” which were filed concurrently herewith and are incorporated herein in their entirety.
The present invention relates to e-Commerce and more particularly to attaching objects to electronic messages distributed over a network.
Electronic mail, or “e-mail”, has become a popular way for people to communicate using networks of various types such as the Internet. Using e-mail, a person can send messages and other information as attachments electronically to other e-mail users. Such attachments normally include pictures, sound recordings, formatted documents, etc. that are in digital form, and which are executable independent of the opening and reading of the message included with the e-mail.
When using e-mail to communicate, a user will typically create a message using an e-mail program running on a computer that is or can be connected by a network to other computers. The message will include the e-mail address of the intended recipient along with the message and/or attachment. When the user has finished entering the message, the user will “send” the message and/or attachment to the intended recipient. The recipient, also using an e-mail program running on a computer connected to the computer network, can then read the received message and/or attachment.
In the case where the e-mail includes a personalized message from a known person, a recipient is very likely to open and view the message and any attachments. If such attachment is of particular interest, the recipient tends to send such attachment to others who, in turn, do the same. As a result, the attachment may be propagated over the network in a geometric manner, thus incurring widespread exposure.
The recent explosion in the popularity of the Internet has provided tremendous potential for marketing goods and services. However, for most small to mid-sized companies, advertising their wares and services through a web-site on the Internet has not proven to be very effective. One of the difficulties with advertising on the Internet is directing consumers to visit a particular web-site. The overabundance of web-site locations has created an information overload for many consumers.
E-mail is one possible solution for advertisers. Despite its allure, however, promotional e-mail is still frowned upon, and at present its content is generally limited to unformatted text without graphics which is often not personalized. Accordingly, promotional e-mail is often disregarded, and in almost all cases, is not propagated by the recipients themselves.
In efforts to harness the phenomenon of geometric propagation of certain attachments and personalized messages in a manner to solve the foregoing problems, one prior art system employs a web-site where a user may enter a message for being sent to others, and select an attachment. Based on this selection, the message is sent with a URL of the web-site and a code representative of the selected attachment. Upon receipt, the message is displayed along with the URL and the associated code which together may be used to manually return to the web-site. Advertisements are also included on the web-site. The present system is flawed in various aspects, however, since it requires manual intervention to access the attachment. Such complexity, in turn, tends to thwart propagation in the desired geometric manner.
The present invention includes a method and article of manufacture for communicating via an application program included as a payload of an electronic message received over a network. First, the application program is initialized after a first electronic message is selected by a first user on an electronic mail browser. After initialization, the application program of the first electronic message is executed. Such execution includes displaying text included with the first electronic message, changing a non-textual aspect of the first electronic message based on the input from the first user, allowing entry of text, and sending the entered text and the application program over the network in a second electronic message to a second user.
In one aspect of the present invention, the application program may be initialized automatically upon being selected by the user. In one embodiment, the application programs may include an applet. The execution of the application program may include retrieving code from a server which may in turn be executed on a network browser. In order to send the entered text and the application program over the network in the second electronic message, an email server address may be retrieved from a computer of the first user for sending the entered text and the application program over the network in the second electronic message.
In another aspect of the present invention, the execution of the application program may include a functionality based on the text included with the first electronic message. Further, the execution of the application program may include displaying streaming video, running an advertisement, and/or automatically linking to a site on the network upon selection of the indicia.
In yet another aspect of the present invention, the electronic message that is provided for being accessed by an electronic mail browser executed on a computer includes a data object including text and an application program object adapted for being automatically initialized after the electronic message is selected using an electronic mail browser. The application program object is executed after the initialization thereof with the execution of the application program object including: displaying text of the data object, displaying indicia, allowing entry of text, and sending the entered text and the application program object over the network in a second electronic message to a second user upon selection of the indicia.
In still yet another aspect of the present invention, a first application program is initialized after a first electronic message is selected by a first user. Such first application program is received with the first electronic message over a network. After the initialization, the first application program is executed for displaying a first indicia and text included with the first electronic message.
Thereafter, a second application program is executed upon selection of the first indicia. The execution of the second application program includes displaying a second indicia and allowing the entry of text by the second application program. The entered text and at least the first application program is sent over the network in a second electronic message to a second user upon selection of the second indicia.
In one embodiment, the first application program includes an un-signed application program. In yet another embodiment, the second application program includes a signed application program. Further, the execution of at least one of the application programs may include outputting an advertisement, or automatically linking to a site on the network.
These and other advantages of the present invention will become apparent to those skilled in the art upon a reading of the following descriptions of the invention and a study of the several figures of the drawing.
The foregoing aspects are better understood from the following detailed description of one embodiment of the invention with reference to the drawings, in which:
For example, such execution may include displaying text included with the first electronic message, displaying indicia, allowing entry of text, and sending the entered text and the application program over a network in a second electronic message to a second user upon selection of the indicia. In one embodiment, a code segment may be executed which includes as a parameter at least a portion of the text included with the electronic message, thus incorporating the text with any type of functionality, i.e. graphic, etc. Still yet, other features may be included such as an advertisement that is displayed only after the electronic message is forwarded a predetermined number of instances. Also, the text included with the electronic message may constitute a hyperlink which, when selected, links to a site and enters the text as a parameter upon such linking.
As will become apparent, the personal text of the electronic message may induce the user to open the mail while the functionality may serve as an inducement to send the electronic message to another user. This in turn may be used to incur visits to a particular site on the network. In the alternative, it may serve to afford widespread exposure of advertisements or any other feature that supports e-Commerce.
The hardware configuration typically has resident thereon an operating system such as the Microsoft Windows NT or Windows/98/2000 Operating System (OS), the IBM OS/2 operating system, the MAC OS, or UNIX operating system. Those skilled in the art will appreciate that the present invention may also be implemented on platforms and operating systems other than those mentioned.
As shown in operation 400 of
Initialization of the first application program may include determining various variables and other parameters required to execute the application program, or any other “pre-execution” duties. For example, one of such parameters may comprise the body of text included with the first electronic message.
In one embodiment, hypertext markup language may be included with the first electronic message to contain the parameters and call another portion of the first application program such as a JAVA APPLET located at another site on the network. It should be noted, however, that the hypertext markup language itself or any other computer or markup language included with first electronic message may constitute a component or an entirety of the first application program. In other words, any desired portion (including no portion) of the first application program may be positioned at a separate location on the network.
Following is an example of hypertext markup language for containing the parameters and calling another portion of the first application program. In the present embodiment, a portion of the first application program is called using a URL on the network.
In operation 402 of
Thereafter, in operation 404, a particular key string parameter is retrieved in addition to the entire body of text. The key string parameter may include a particular string of text that is included in the body of text. In one embodiment, the word “I” may be retrieved as the key string parameter. In still other embodiments, any other letter, expression, word, phrase, pattern, format, etc. may be used as a key string parameter.
Next, each word and/or phrase of the body of text is retrieved in operation 405, and compared with the key string parameter to determine whether there is a match in decision 406. To accomplish this, a parser such as ANTLR may be employed to identify the designated letter, expression, word, phrase, pattern, format, etc. If it is determined that a match does not exist, a convention label is instantiated for simply displaying the current word and/or phrase in operation 408. On the other hand, if it is determined that a match does indeed exist, a functionality is instantiated which incorporates the key string parameter in operation 410. It is then determined in decision 412 whether all of the words and/or phrases of the body of text have been compared. If not, the process operations 405-410 are repeated.
Programs that execute the foregoing eyeball graphic feature are commonly known to those of ordinary skill. Such programs commonly use atan2 in order to compute the angle between the eyeball and the mouse cursor. An example of a code segment that executes the mouse listener feature, and that calls the eyeball graphic feature is as follows:
bin/linkrd?_lang=&hm——action=http%3a%2f%2fwww%2eneostar%2e-
com”);
It should be noted that any type of functionality may be incorporated during the execution of the first application program. For example, advertisements may be displayed, etc.
In particular, it will be assumed in the present description that the “NEW” icon has been selected. It should be noted, however, that given the present description it would be well within the ability of one of ordinary skill to implement the “FORWARD” and “REPLY” functions. With respect to the “REPLY” icon, there may be a need for a mechanism of transferring the body of text from the first application program to the second application program. This may be accomplished by a “cookie” or similar metadata-type information.
As shown in
Similar to the first application program, initialization of the second application program may include determining various variables, and other parameters required to execute the application program. Next, in operation 702, text fields are installed for allowing entry of text by the first user.
If it is determined by decision 903 that the verification of operation 902 fails, a complaint is issued in operation 904. Such complaint may take the form of a pop-up window or the like, and may describe the nature of any defects. On the other hand, if the verification of operation 902 succeeds and all of the necessary fields are filled, information associated with an electronic mail server of the first user is retrieved in operation 905. This may be accomplished by accessing a hard drive of a computer of the first user which is running the network browser and electronic mail browser. The purpose of obtaining this information is to identify a server from which the information in the text fields 801 may be sent in the form of a second message. In the alternative, a single designated server may be automatically identified by the second application program, thus obviating the need to access the hard drive of the computer of the first user.
Upon identifying a server from which the second message is to be sent, the second electronic message may be formatted and sent to a second user in operation 906. Upon being sent, another verification may be executed in decision 908 in order to ensure that the second electronic message was sent in a satisfactory manner. If successful transmittal of the message is not verified, a complaint may be issued in a manner similar to that discussed hereinabove with respect to operation 904.
If, on the other hand, successful transmittal of the message is verified in decision 908, the second application program may optionally link the first user to a site on the network in operation 910. Such site may be identified by the second application program. This feature may thus be used to increase a number of visits, or “hits”, on a particular site which in itself may warrant substantial consideration.
<PARAM NAME=info VALUE=“ . . . body of text . . . ”>
<PARAM NAME=keystring VALUE=“I”>
Note: multiple key strings and adaptive keys may be used to identify the letter, expression, word, phrase, pattern, format, etc.
</APPLET>
</BODY>
</HTML>
With continuing reference to
One example of functionality that may be implemented by the first application program was shown in
In various embodiments, the functionality may include the incorporation of an image, video, a specific graphic feature, or any other type of object for that matter. For example, any type of theme such as rabbits, earthquakes, time, popular icons and trademarks may be employed during the display of the text associated with the electronic message. As an option, such graphics may in some way interact with the text of the electronic message.
For example, where the theme is earthquakes, the text may be shown to shutter or the like. Or, where the theme is rabbits, the rabbits may be shown hopping from word to word. Still yet another example includes dressing or undressing an icon in various attire or providing any other type of feedback based on user input. Further, where the theme is time, a format of a time, i.e. “7:00”, may be detected in order to replace the same with an analog clock graphic which corresponds with the detected time.
As an option, the selection of the graphic or icon may initiate a link to a predetermine site on the network. Still yet, the application program may be adapted to allow the object to be substituted with any of the strings of the text while it is being shown. This may be accomplished with a select and “drag” feature.
In another embodiment, the execution of the first application program may include linking a string of the text of the first electronic message with a site on the network. In other words, such string constitutes a hyperlink. In such embodiment, the execution of the first application program may further include automatically inputting the string as a parameter to the site on the network upon selection of the hyperlink for various purposes. In the case where the site is a search engine, the string may be automatically entered as a search term in the search engine upon the selection of the hyperlink, thus prompting immediate reaction by the search engine. One example of an implementation of this concept is as follows:
http://www.search_engine.com/?MT=keystring&SM=MC&DV=0&LG=any&DC=10&DE=2&_v=2&OPs=MDRTP
In still another embodiment, the functionality associated with the electronic messages provides an inducement for sending them to additional users. With this exposure, the present invention may be used to propagate advertisements over the network. First, the electronic message is provided with the application program attached thereto which is capable of displaying an advertisement. As the message is communicated over the network, each instance of such communication is detected.
As such, the number of the instances that the electronic message is communicated over the network may be traced. The advertisement is then displayed after a predetermined number of the instances greater than one has been tracked. By employing this technique, the users will not be thwarted from forwarding the electronic message until after a predetermined geometric propagation has already taken place. It should be noted that the foregoing tracking ability may also be used to base a determination of compensation from the advertiser.
As an option, the predetermined number may be based on a Fibonacci sequence for optimized perpetuance of the electronic message. Further, the predetermined number may be based on a generation of the electronic message. As an option, the advertisement may be displayed by automatically linking to a site on the network.
To facilitate this, each message that is received by the user is assigned a unique identifier by the server by way of a common gateway interface (CGI) or the like. In one embodiment, such identifier may include a domain name. In yet another embodiment, the identifier may be a number that is randomly generated, but large enough to ensure uniqueness. This number may be stored in the first application as a parameter, or incorporated into the HTML associated with generating the “unwanted electronic message” icon 1200.
Upon selection of the “unwanted electronic message” icon 1200, the identifier of the electronic message is communicated on the network to a designated server. For reasons that will soon become apparent, content of the electronic message may optionally also be sent.
Thereafter, in decision 1306, a number of identifiers identifying the same unwanted message or messages from the same source (domain name) is tracked for the purpose of determining whether a tolerance has been exceeded. In other words, it is determined whether such occurrences have exceeded a predetermined level. If not, the identifiers are continuously tracked.
If, however, the tolerance has been exceeded, the unwanted electronic message is reported in operation 1308 for preventing proliferation of the electronic message, similar messages, and/or messages from a similar source. In addition to reporting the message, the server itself may even take active measures to filter or eliminate the electronic message, similar messages, and/or messages from a similar source.
As an option, the content of the electronic message may also be reported in operation 1310 to the list, thus allowing the prevention of transmission of any subsequent electronic messages having content substantially similar to the received content. It should be noted that “lists” are commonly known as a means of preventing the proliferation of already identified unwanted electronic messages. Still yet another option may include sending the user a notice that the report has been received.
While this invention has been described in terms of several preferred embodiments, it is contemplated that alternatives, modifications, permutations, and equivalents thereof will become apparent to those skilled in the art upon a reading of the specification and study of the drawings.
It is therefore intended that the true spirit and scope of the present include all such alternatives, modifications, permutations, and equivalents.
Number | Name | Date | Kind |
---|---|---|---|
5297143 | Fridrich et al. | Mar 1994 | A |
5396588 | Froessl | Mar 1995 | A |
5428784 | Cahill, Jr. | Jun 1995 | A |
5513126 | Harkins et al. | Apr 1996 | A |
5548745 | Egan et al. | Aug 1996 | A |
5557320 | Krebs | Sep 1996 | A |
5572648 | Bibayan | Nov 1996 | A |
5619648 | Canale et al. | Apr 1997 | A |
5634005 | Matsuo | May 1997 | A |
5659729 | Nielsen | Aug 1997 | A |
5694616 | Johnson et al. | Dec 1997 | A |
5724521 | Dedrick | Mar 1998 | A |
5740252 | Minor et al. | Apr 1998 | A |
5740374 | Raffali-Schreinemachers | Apr 1998 | A |
5774170 | Hite et al. | Jun 1998 | A |
5774534 | Mayer | Jun 1998 | A |
5781901 | Kuzma | Jul 1998 | A |
5790789 | Suarez et al. | Aug 1998 | A |
5793972 | Shane | Aug 1998 | A |
5806043 | Toader | Sep 1998 | A |
5809242 | Shaw et al. | Sep 1998 | A |
5815830 | Anthony | Sep 1998 | A |
5818447 | Wolf et al. | Oct 1998 | A |
5825865 | Oberlander et al. | Oct 1998 | A |
5826023 | Hall et al. | Oct 1998 | A |
5826062 | Fake, Jr. et al. | Oct 1998 | A |
5832208 | Chen et al. | Nov 1998 | A |
5832502 | Durham et al. | Nov 1998 | A |
5838790 | McAuliffe et al. | Nov 1998 | A |
5848397 | Marsh et al. | Dec 1998 | A |
5856825 | Yumoto et al. | Jan 1999 | A |
5859636 | Pandit | Jan 1999 | A |
5870549 | Bobo, II | Feb 1999 | A |
5884246 | Boucher et al. | Mar 1999 | A |
5897635 | Torres et al. | Apr 1999 | A |
5903269 | Poreh et al. | May 1999 | A |
5909545 | Frese, II et al. | Jun 1999 | A |
5918014 | Robinson | Jun 1999 | A |
5937162 | Funk et al. | Aug 1999 | A |
5937392 | Alberts | Aug 1999 | A |
5948061 | Merriman et al. | Sep 1999 | A |
5950215 | Tabuchi | Sep 1999 | A |
5956486 | Hickman et al. | Sep 1999 | A |
5983200 | Slotznick | Nov 1999 | A |
6002393 | Hite et al. | Dec 1999 | A |
6009462 | Birrell et al. | Dec 1999 | A |
6011537 | Slotznick | Jan 2000 | A |
6014502 | Moraes | Jan 2000 | A |
6014688 | Venkatraman et al. | Jan 2000 | A |
6014689 | Budge et al. | Jan 2000 | A |
6014698 | Griffiths | Jan 2000 | A |
6016520 | Facq et al. | Jan 2000 | A |
6021427 | Spagna et al. | Feb 2000 | A |
6023729 | Samuel et al. | Feb 2000 | A |
6026437 | Muschett et al. | Feb 2000 | A |
6035104 | Zahariev | Mar 2000 | A |
6049778 | Walker et al. | Apr 2000 | A |
6055510 | Henrick et al. | Apr 2000 | A |
6061698 | Chadha et al. | May 2000 | A |
6061719 | Bendinelli et al. | May 2000 | A |
6067570 | Kreynin et al. | May 2000 | A |
6073167 | Poulton et al. | Jun 2000 | A |
6078320 | Dove et al. | Jun 2000 | A |
6092104 | Kelly | Jul 2000 | A |
6101532 | Horibe et al. | Aug 2000 | A |
6108709 | Shinomura et al. | Aug 2000 | A |
6134243 | Jones et al. | Oct 2000 | A |
6138149 | Ohmura | Oct 2000 | A |
6141684 | McDonald et al. | Oct 2000 | A |
6144987 | Niemi | Nov 2000 | A |
6154764 | Nitta et al. | Nov 2000 | A |
6157721 | Shear et al. | Dec 2000 | A |
6161130 | Horvitz et al. | Dec 2000 | A |
6167395 | Beck et al. | Dec 2000 | A |
6167434 | Pang | Dec 2000 | A |
6173337 | Akhond et al. | Jan 2001 | B1 |
6185605 | Kowaguchi | Feb 2001 | B1 |
6199103 | Sakaguchi et al. | Mar 2001 | B1 |
6199106 | Shaw et al. | Mar 2001 | B1 |
6205432 | Gabbard et al. | Mar 2001 | B1 |
6212554 | Roskowski | Apr 2001 | B1 |
6219054 | Komoda et al. | Apr 2001 | B1 |
6223213 | Cleron et al. | Apr 2001 | B1 |
6225993 | Lindblad et al. | May 2001 | B1 |
6233317 | Homan et al. | May 2001 | B1 |
6233600 | Salas et al. | May 2001 | B1 |
6249805 | Fleming, III | Jun 2001 | B1 |
6253231 | Fujii | Jun 2001 | B1 |
6256663 | Davis | Jul 2001 | B1 |
6272493 | Pasquali | Aug 2001 | B1 |
6272593 | Dujari | Aug 2001 | B1 |
6275849 | Ludwig | Aug 2001 | B1 |
6301710 | Fujiwara | Oct 2001 | B1 |
6327612 | Watanabe | Dec 2001 | B1 |
6332156 | Cho et al. | Dec 2001 | B1 |
6336216 | Curtis et al. | Jan 2002 | B1 |
6351763 | Kawanaka | Feb 2002 | B1 |
6353926 | Parthesarathy et al. | Mar 2002 | B1 |
6356937 | Montville et al. | Mar 2002 | B1 |
6360221 | Gough et al. | Mar 2002 | B1 |
6366949 | Hubert | Apr 2002 | B1 |
6381634 | Tello et al. | Apr 2002 | B1 |
6385644 | Devine et al. | May 2002 | B1 |
6389455 | Fuisz | May 2002 | B1 |
6393465 | Leeds | May 2002 | B2 |
6252588 | Dawson | Jun 2002 | B1 |
6400810 | Skladman et al. | Jun 2002 | B1 |
6405243 | Nielsen | Jun 2002 | B1 |
6405244 | Bando et al. | Jun 2002 | B1 |
6415332 | Tuel, Jr. | Jul 2002 | B1 |
6427164 | Reilly | Jul 2002 | B1 |
6438583 | McDowell et al. | Aug 2002 | B1 |
6442600 | Anderson | Aug 2002 | B1 |
6449635 | Tilden, Jr. et al. | Sep 2002 | B1 |
6449657 | Stanbach et al. | Sep 2002 | B2 |
6463463 | Godfrey et al. | Oct 2002 | B1 |
6499108 | Johnson | Dec 2002 | B1 |
6510438 | Hasegawa | Jan 2003 | B2 |
6516351 | Borr | Feb 2003 | B2 |
6529936 | Mayo et al. | Mar 2003 | B1 |
6529946 | Yokono et al. | Mar 2003 | B2 |
6549612 | Gifford et al. | Apr 2003 | B2 |
6593973 | Sullivan et al. | Jul 2003 | B1 |
6609196 | Dickinson et al. | Aug 2003 | B1 |
6611812 | Hurtado et al. | Aug 2003 | B2 |
6636888 | Bookspan et al. | Oct 2003 | B1 |
6651087 | Dennis | Nov 2003 | B1 |
6654779 | Tsuei | Nov 2003 | B1 |
6654787 | Aronson et al. | Nov 2003 | B1 |
6668278 | Yen et al. | Dec 2003 | B1 |
6684332 | Douglas | Jan 2004 | B1 |
6697842 | Smith et al. | Feb 2004 | B1 |
6721784 | Leonard et al. | Apr 2004 | B1 |
6731314 | Cheng et al. | May 2004 | B1 |
6732149 | Kephart | May 2004 | B1 |
6745226 | Guedalia | Jun 2004 | B1 |
6757714 | Hansen | Jun 2004 | B1 |
6760750 | Boneh et al. | Jul 2004 | B1 |
6769130 | Getsin et al. | Jul 2004 | B1 |
6775689 | Raghunandan | Aug 2004 | B1 |
6779178 | Lloyd et al. | Aug 2004 | B1 |
6785867 | Shaffer et al. | Aug 2004 | B2 |
6873982 | Bates et al. | Mar 2005 | B1 |
6944621 | Collart | Sep 2005 | B1 |
6964012 | Zirngibl et al. | Nov 2005 | B1 |
7051019 | Land et al. | May 2006 | B1 |
7222159 | Miller et al. | May 2007 | B2 |
7356332 | Pell et al. | Apr 2008 | B2 |
7493390 | Bobde et al. | Feb 2009 | B2 |
20020007356 | Rice et al. | Jan 2002 | A1 |
20020032738 | Foulger et al. | Mar 2002 | A1 |
20020056123 | Liwerant et al. | May 2002 | A1 |
20020059347 | Shaffer et al. | May 2002 | A1 |
20020075305 | Beaton et al. | Jun 2002 | A1 |
20020112005 | Namias | Aug 2002 | A1 |
20020138588 | Leeds | Sep 2002 | A1 |
20020152272 | Yairi | Oct 2002 | A1 |
20020188683 | Lytle et al. | Dec 2002 | A1 |
20030018816 | Godfrey et al. | Jan 2003 | A1 |
20030095642 | Cloutier et al. | May 2003 | A1 |
20030126215 | Udell et al. | Jul 2003 | A1 |
20030135567 | Reilly | Jul 2003 | A1 |
20030135853 | Goldman et al. | Jul 2003 | A1 |
20030217005 | Drummond et al. | Nov 2003 | A1 |
20050081059 | Bandini et al. | Apr 2005 | A1 |
20050204011 | Velayudham | Sep 2005 | A1 |
20050228899 | Wendkos et al. | Oct 2005 | A1 |
20050246752 | Liwerant et al. | Nov 2005 | A1 |
20050256929 | Bartol et al. | Nov 2005 | A1 |
20060026438 | Stern et al. | Feb 2006 | A1 |
20080133716 | Rao et al. | Jun 2008 | A1 |
20080195953 | Sen | Aug 2008 | A1 |
Number | Date | Country |
---|---|---|
0 631 419 | Mar 1996 | EP |
0 340 039 | Oct 1996 | EP |
0 816 090 | Jan 1998 | EP |
7-325827 | Dec 1995 | JP |
10-171727 | Jun 1998 | JP |
2001111601 | Apr 2001 | JP |
WO 9858321 | Dec 1998 | WO |
WO 9858332 | Dec 1998 | WO |