The present invention relates to efficiently routing messages. In particular, this invention pertains to routing messages while handling protocol conversions, encryption conversions, message payload conversions, and archiving, so that message originators need not be concerned with the protocol, encryption method, and message payload format used by their destination(s).
With reference to
In conventional arrangements, because the LOBs 101, 102, 103 often are unaware of what other LOBs are doing, each LOB 101, 102, 103 would establish its own proprietary connection 105 with the external entity 104. However, because fees are associated with each proprietary connection 105, such conventional arrangements are fiscally inefficient. Accordingly, a way to reduce the number of proprietary connections 105 is needed in the art.
This problem is addressed and a technical solution is achieved in the art by a system and a method for routing messages according to the present invention. In an embodiment of the present invention, a hub-and-spoke communication arrangement is provided, in which the “hub” includes a server computer system, and the “spokes” are other computers that act as message originators and/or destinations. All internal-to-external messages, and vice versa, are routed through the “hub,” such that the server computer system acts as a funnel through which all messages pass. Therefore, a fewer number of proprietary connections between the “hub” and the external entities are required.
The present invention also provides an all-inclusive routing functionality that limits the amount of logic required by the “spoke” computers. In particular, various embodiments of the present invention provide protocol conversion, message payload conversion, encryption conversion, message broadcast, and/or message archival functionality, so that the “spoke” computers need not be concerned with providing such functionality on their own.
For instance, according to an embodiment of the present invention, a server computer system, which may include one or more computers, is programmed to receive a message via a protocol. The server computer system determines a destination for the message and what protocol is needed to communicate with the destination. Thereafter, the server computer system transmits the message to the destination via the protocol required by the destination. The protocols may be, without limitation, HTTP, SOAP, MQ, TCP/IP, SNA, GPRS (“General Packet Radio Service”), etc. The message may be an IBM Websphere™ MQ message, a SonicMQ™ message, and a Tibco™ EMS message, for example.
According to another embodiment of the present invention, the message has a data payload in a first format, and the server computer system determines whether the first format of the data payload is to be converted to a second format. If so, the server computer system converts the data payload from the first format to the second format, and transmits the message to the destination in the second format. The first and/or second format(s) may be, without limitation, a Microsoft Word format, a Microsoft Excel™ format, a Microsoft Powerpoint™ format, a WordPerfect™ format, a Portable Document Format (“PDF”) format, a text-based format, an XML or XML-based format, an ebXML format, a SWIFT format, a FIX format, an ATM format, a CHIP format, an ACH format, an EDI format, an image file format (JPEG, BMP, TIF, etc.), or a video file format (MOV, MPG, AVI, etc.).
According to a further embodiment of the present invention, the server computer system includes encryption conversion functionality. For instance, the server computer system determines whether the message is to be encrypted and what encryption process is to be used prior to transmission of the message to the destination. If the message is to be encrypted, the message is encrypted according to the pertinent encryption process. If the message was received by the server computer system in an encrypted format, the message may be decrypted prior to encrypting the message according to the pertinent encryption process and prior to transmission to the destination. Encryption processes may include, without limitation, SSL, MQ Secure, etc.
According to still another embodiment of the present invention, message-broadcast functionality is provided by the server computer system. In particular, the message identifies a plurality of destinations, and the server computer system determines the protocol(s), payload format(s), and encryption format(s) required by each of the destinations. The server computer system then performs any required protocol conversions, payload conversions, and encryption conversions prior to sending the message to its destinations.
According to yet another embodiment of the present invention, message archival functionality is provided by the server computer system. In this instance, the message may include information specifying that the message is to be archived or “persistent.”
The present invention will be more readily understood from the detailed description of preferred embodiments presented below considered in conjunction with the attached drawings, of which:
It is to be understood that the attached drawings are for purposes of illustrating the concepts of the invention and may not be to scale.
With reference to
In addition to reducing the number of proprietary connections 105 needed, the present invention also provides an all-inclusive routing functionality that limits the amount of logic required by the “spoke” computers. In particular, various embodiments of the present invention provide protocol conversion, message payload conversion, encryption conversion, message broadcast, and/or message archival functionality, so that the “spoke” computers need not be concerned with providing such functionality on their own.
The term “computer” is intended to include any data processing device, such as a desktop computer, a laptop computer, a mainframe computer, a personal digital assistant, a Blackberry, and/or any other device for processing data, whether implemented with electrical and/or magnetic and/or optical and/or biological components, or otherwise.
In the embodiment of
The EMB server computer 301 communicates using any of the protocols required by the client computers 302 to 306. For example, because the client computer A 302 communicates using protocol A 307, the EMB server computer 301 communicate with the client computer A 302 using protocol A 312, the same protocol as protocol A 307. Correspondingly, the EMB server computer 301 communicates with the client computer B 303 using protocol B 313 to match protocol B 308. Similarly, the EMB server computer 301 communicates with the client computer C 304 using protocol C 314, with the client computer D 305 using protocol D 315, and with the client computer E 306 using protocol E 316.
To facilitate the routing of messages between the client computers 302 to 306, the EMB server computer 301 manages and references data stored in a data storage system 317, which is communicatively connected to the EMB server computer 301. The phrase “communicatively connected” is intended to include any type of connection, whether wired, wireless, or both, between devices and/or programs in which data may be communicated. Further, the phrase “communicatively connected” is intended to include a connection between devices and/or programs within a single computer, a connection between devices and/or programs located in different computers, or a connection between devices not located in computers at all. In this regard, although the data storage system 317 is shown separately from the ENB server computer 301, one skilled in the art will appreciate that the data storage system 317 may be stored completely or partially within the EMB server computer 301.
The data storage system 317 stores, among other things, routing information 318. The routing information 318 includes information specifying the protocol(s) used by each of the client computers 302 to 306. When the EMB server computer 301 receives a message, it accesses the routing information 318 to determine what protocol to use to send the message to the message's destination. Such determination is referred to herein as “protocol conversion,” whereby the EMB server computer 301 receives a message according to a first protocol, determines a second protocol used by a destination computer using the routing information 318, and transmits the message to the destination computer using the second protocol. By storing the routing information 318 in the data storage system 317, the client computers 302 to 306 do not have to be concerned with what protocols are used by the other client computers.
In addition to performing protocol conversions, the EMB server computer 301 is configured to perform message payload conversions, according to an embodiment of the present invention. A message, according to an aspect of the present embodiment, has administrative information, such as destination information, and a payload, which is the actual substantive data to be transmitted. For example, if a portable document format (“PDF”) file, which is known in the art, is to be transmitted to the client computer E 306, the message's administrative information specifies that the client computer E 306 is the destination, and the payload is the PDF file.
The administrative information in the message also may specify that the payload is to be converted from one format to another prior to being sent to the destination. For example, a message transmitting a Microsoft Word document to the client computer E 306, may specify in its administrative information that the Word document is to be converted to the PDF format prior to being transmitted to the client computer E 306. In this scenario, the EMB server computer 301, upon reading the administrative information included in the message, performs payload conversion on the message's payload by converting the Word document to a document in the PDF format prior to transmitting the message to the client computer E 306. Payload conversions may also include, without limitation, a Microsoft Word format, a Microsoft Excel format, a Microsoft Powerpoint format, a WordPerfect format, a Portable Document Format (“PDF”) format, a text-based format, an XML or XML-based format, an ebXML format, a SWIFT format, a FIX format, an ATM format, a CHIP format, an ACH format, an EDI format, an image file format (JPEG, BMP, TIF, etc.), or a video file format (MOV, MPG, AVI, etc.). One skilled in the art will appreciate, however, that payload conversions involving other formats are included within the scope of the invention.
According to an embodiment of the present invention, the routing information 318 includes payload conversion information in addition to or in lieu of the administrative information in the messages. In particular, the routing information 318 may specify a default payload conversion format for one or more of the client computers 302 to 306. For example, the routing information may specify that, by default, any message with a payload having a Microsoft Word format going to the client computer E 306 is to be converted to the PDF format. If, at the same time, the administrative information in an incoming message specifies that the payload is not to be converted or is to be converted to a format other than the PDF format, the EMB server computer 301 adheres to the instructions in the administrative information in the message over the default instructions in the routing information 318.
According to an embodiment of the present invention, the EMB server computer 301 is configured to perform encryption conversions. The phrase “encryption conversion” is intended to include the process of encrypting an unencrypted message, decrypting an encrypted message, and/or decrypting an encrypted message and encrypting the decrypted message using the same or a different encryption technique. The routing information 318 may specify whether messages are to be encrypted, what types of messages require encryption, and what encryption technique(s) is/are to be used when sending messages to particular client computers. For example, the routing information 318 may specify that all messages transmitted to the client computer E 306 are to be encrypted using MQ Secure, which is known in the art. Another example is that the routing information 318 may specify that only messages transmitted to the client computer D 305 originating from the client computer C are to be encrypted using Secure Socket Layer (“SSL”) encryption. Yet another example is that the routing information 318 may specify that all messages beginning with the word “confidential,” when transmitted to the client computer C 304, are to be encrypted using SSL encryption. When the EMB server computer 301 receives a message, it accesses the routing information 318 to determine whether and how to encrypt the message before transmitting the message to its destination(s).
By performing message encryption with the EMB server computer 301, only the EMB server computer 301 needs to operate software and storage capacity required to perform such encryptions. To elaborate, the EMB server computer 301 is configured to store a repository of encryption software that is available for all of the client computers 302 to 306 to use without those computers having to store their own repositories of encryption software. This arrangement reduces the amount of software and storage capacity required by the client computers 302 to 306 and, consequently, reduces costs and may reduce licensing fees associated with such encryption software. For example, if the client computer A 302 requires that all messages transmitted to it be encrypted according to a proprietary encryption technique, only the EMB server 301 needs to use the proprietary encryption technique. If the client computer E 306 wants to send a message to the client computer A 302, the client computer E 306 transmits the message to the EMB server computer 301 using a no-cost encryption technique (or without any encryption). Upon receipt, the EMB server computer 301 decrypts the message using the no-cost encryption technique, if necessary, and then encrypts the message using the proprietary encryption technique before forwarding the message to the client computer A 302. That is, only a single copy of the software for the proprietary encryption technique is required.
According to an embodiment of the present invention, the administrative information in a message may specify that the message is to be a broadcast message. A broadcast, or multi-cast, message is a message that is sent to a plurality of client computers without having to specifically identify every destination computer. The routing information 318 may include information specifying groups of client computers, and the administrative information in the message need only specify a group name to send the message to the client computers in the group. For example, the EMB server computer 301 may receive a message specifying that the destination of the message is “all users.” In such a circumstance, the EMB server computer 301 accesses the routing information 318 to determine the addresses of all of the client computers 302-306, and transmits the message to all client computers, with the exception of the originating client computer, if desired.
According to an embodiment of the present invention, the EMB server computer 301 performs message archiving. To implement such functionality, the EMB server computer searches for an indication in the administrative information in an incoming message that the message is to be archived. According to an aspect of this embodiment, the administrative information indicates that the message is to be a persistent message. Upon receipt of a message including such an indication, the EMB server computer 301 stores the message in a message archive 319 within the data storage system 317. An advantage of this arrangement is that a client computer may instruct the EMB server computer 301 to resend an archived message to the same or a different destination without having to retransmit the message to the EMB server computer 301.
According to another embodiment of the present invention, the EMB Server 301 is configured to compile messaging statistics used for billing, resource planning, marketing, and/or general reporting purposes, according to the system and method described in U.S. patent application Ser. No. 11/113,752, titled “System and Method for Measuring Communication-System Infrastructure Usage,” by Vincent Sethi, Philip J. DiStefano, and Thomas J. Connelly, filed concurrently herewith, which application is hereby incorporated herein by reference.
At step S402, the EMB server computer 501 accesses the routing information 518 to determine the characteristics of the destination computer(s). In this example, the routing information 518 may include the information shown in Table II.
The information shown in Table II is used for illustration purposes only. One skilled in the art will appreciate that the routing information 518 may include different types of information and/or may specify information in different formats for each destination computer. For example, the routing information 518 may further include a preferred message payload format, which may be overridden based upon a format specified in a message's administrative information. Also, the routing information 518 may specify different encryption techniques depending upon characteristics of the message, such as the type of message payload, the name of the message, and/or the originator of the message. Further, the routing information 518 may specify different preferred payload formats depending upon characteristics of the message. Further still, the routing information 518 may specify that particular payload formats are not acceptable and that such messages are to be rejected.
At step S403, the EMB server computer 501 converts the message's payload format, if necessary, based upon the message's administrative information. In this example, the message's administrative information in Table I specifies that the message's payload is currently in Word format and that the message's payload is to be converted to the PDF format. Accordingly, the EMB server computer 301 converts the message's payload format from Word format to the PDF format, at step S403.
At step S404, the EMB server computer 501 decrypts and/or encrypts the message, if necessary, based upon the received routing information 518. In this example, the routing information 518 shown in Table II specifies that messages transmitted to the client computer E 506 are to be encrypted according to the MQ Secure encryption program. Accordingly, the EMB server computer 301 runs the MQ Secure encryption program to encrypt the message at step S404.
At step S405, the EMB server computer 501 archives the message, if necessary, based upon the message's administrative information. In this example, the message's administrative information in Table I specifies that the message is to be persistent. Accordingly, the EMB server computer 501 stores the message in the message archive 519, at step S405.
At step S406, the ENB server computer 501 transmits the message using the protocol required by the destination(s), as specified by the routing information 518. In this example, the routing information in Table II indicates that the client computer E 506 uses the SNA protocol, which is known in the art. Accordingly, the EMB server computer 501 transmits the message using the SNA protocol 511, 516 to the client computer E 506, at step S406.
Although
The EMB server computer system 601 also includes redundancy provided with synchronous mirroring, which is known in the art, with respect to data storage systems 604, 605. One skilled in the art, however, will appreciate that redundancy may be provided with solutions other than synchronous mirroring. The data storage systems 604, 605 are similar, if not identical, data storage systems storing the data described with respect to the data storage system 317. The data storage systems 604, 605 are preferably stored at different locations. The data storage system 604 may be designated as a primary data storage system that provides data to the EMB server application 602 or the EMB server application 603, whichever is currently controlling the functionality of the EMB server computer system 601. If the data storage system 604 fails, the data storage system 605 takes over. Although only two identical EMB server applications 602, 603 and only two identical data storage systems 604, 605 are shown in
It is to be understood that the exemplary embodiments are merely illustrative of the present invention and that many variations of the above-described embodiments can be devised by one skilled in the art without departing from the scope of the invention. It is therefore intended that all such variations be included within the scope of the following claims and their equivalents.
This application claims the benefit of U.S. Provisional Application No. 60/565,490, filed Apr. 26, 2004, the entire disclosure of which is hereby incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4751702 | Beier et al. | Jun 1988 | A |
5027269 | Grant et al. | Jun 1991 | A |
5301320 | McAtee et al. | Apr 1994 | A |
5325527 | Cwikowski et al. | Jun 1994 | A |
5339434 | Rusis | Aug 1994 | A |
5499371 | Henninger et al. | Mar 1996 | A |
5539885 | Ono et al. | Jul 1996 | A |
5553235 | Chen et al. | Sep 1996 | A |
5566297 | Devarakonda et al. | Oct 1996 | A |
5594863 | Stiles | Jan 1997 | A |
5630047 | Wang | May 1997 | A |
5630173 | Oprescu | May 1997 | A |
5673403 | Brown et al. | Sep 1997 | A |
5689698 | Jones et al. | Nov 1997 | A |
5692181 | Anand et al. | Nov 1997 | A |
5712971 | Stanfill et al. | Jan 1998 | A |
5717925 | Harper et al. | Feb 1998 | A |
5732262 | Gillespie et al. | Mar 1998 | A |
5734887 | Kingberg et al. | Mar 1998 | A |
5737592 | Nguyen et al. | Apr 1998 | A |
5761499 | Sonderegger | Jun 1998 | A |
5768119 | Havekost et al. | Jun 1998 | A |
5784557 | Oprescu | Jul 1998 | A |
5790809 | Holmes | Aug 1998 | A |
5801689 | Huntsman | Sep 1998 | A |
5802367 | Held et al. | Sep 1998 | A |
5806075 | Jain et al. | Sep 1998 | A |
5815415 | Bentley et al. | Sep 1998 | A |
5845292 | Bohannon et al. | Dec 1998 | A |
5889992 | Koerber | Mar 1999 | A |
5899990 | Maritzen et al. | May 1999 | A |
5926637 | Cline et al. | Jul 1999 | A |
5930768 | Hooban | Jul 1999 | A |
5937198 | Nelson et al. | Aug 1999 | A |
5937402 | Pandit | Aug 1999 | A |
5946458 | Austin et al. | Aug 1999 | A |
5949412 | Huntsman | Sep 1999 | A |
5960200 | Eager et al. | Sep 1999 | A |
5960445 | Tamori et al. | Sep 1999 | A |
5987247 | Lau | Nov 1999 | A |
5999179 | Kekic et al. | Dec 1999 | A |
6003075 | Arendt et al. | Dec 1999 | A |
6009274 | Fletcher et al. | Dec 1999 | A |
6009405 | Leymann et al. | Dec 1999 | A |
6011916 | Moore et al. | Jan 2000 | A |
6041123 | Colvin, Sr. | Mar 2000 | A |
6046742 | Chari | Apr 2000 | A |
6052456 | Huang | Apr 2000 | A |
6065009 | Leymann et al. | May 2000 | A |
6083276 | Davidson et al. | Jul 2000 | A |
6101489 | Lannert et al. | Aug 2000 | A |
6101601 | Matthews et al. | Aug 2000 | A |
6108698 | Tenev et al. | Aug 2000 | A |
6148296 | Tabbara | Nov 2000 | A |
6163776 | Periwal | Dec 2000 | A |
6173439 | Carlson et al. | Jan 2001 | B1 |
6178409 | Weber et al. | Jan 2001 | B1 |
6184996 | Gase | Feb 2001 | B1 |
6185613 | Lawson et al. | Feb 2001 | B1 |
6195676 | Spix et al. | Feb 2001 | B1 |
6226684 | Sung et al. | May 2001 | B1 |
6230319 | Britt, Jr. et al. | May 2001 | B1 |
6246410 | Bergeron et al. | Jun 2001 | B1 |
6249877 | Kawakami et al. | Jun 2001 | B1 |
6253193 | Ginter et al. | Jun 2001 | B1 |
6272556 | Gish | Aug 2001 | B1 |
6282698 | Baker et al. | Aug 2001 | B1 |
6288790 | Yellepeddy et al. | Sep 2001 | B1 |
6289336 | Melton et al. | Sep 2001 | B1 |
6292933 | Bahrs et al. | Sep 2001 | B1 |
6298353 | Apte | Oct 2001 | B1 |
6304871 | Gajda et al. | Oct 2001 | B1 |
6314430 | Chang | Nov 2001 | B1 |
6317738 | Lohman et al. | Nov 2001 | B1 |
6324525 | Kramer et al. | Nov 2001 | B1 |
6324619 | Raverdy et al. | Nov 2001 | B1 |
6332161 | Sasson | Dec 2001 | B1 |
6353820 | Edwards et al. | Mar 2002 | B1 |
6363363 | Haller et al. | Mar 2002 | B1 |
6363499 | Delo et al. | Mar 2002 | B1 |
6381609 | Breitbart et al. | Apr 2002 | B1 |
6430556 | Goldberg et al. | Aug 2002 | B1 |
6438749 | Chamberlain | Aug 2002 | B1 |
6442533 | Hinkle | Aug 2002 | B1 |
6442748 | Bowman-Amuah | Aug 2002 | B1 |
6453127 | Wood et al. | Sep 2002 | B2 |
6463343 | Emens et al. | Oct 2002 | B1 |
6463439 | Dahlberg | Oct 2002 | B1 |
6467079 | Ettritch et al. | Oct 2002 | B1 |
6470384 | O'Brian et al. | Oct 2002 | B1 |
6473786 | Scouras et al. | Oct 2002 | B1 |
6477580 | Bowman-Amuah | Nov 2002 | B1 |
6477590 | Habusha et al. | Nov 2002 | B1 |
6480860 | Monday | Nov 2002 | B1 |
6480894 | Courts et al. | Nov 2002 | B1 |
6484310 | Przbylski et al. | Nov 2002 | B1 |
6502095 | Breitbart et al. | Dec 2002 | B2 |
6502207 | Itoh et al. | Dec 2002 | B1 |
6505238 | Tran | Jan 2003 | B1 |
6510352 | Badavas et al. | Jan 2003 | B1 |
6518983 | Grohmann et al. | Feb 2003 | B1 |
6526571 | Aizikowitz et al. | Feb 2003 | B1 |
6539337 | Provan et al. | Mar 2003 | B1 |
6546419 | Humpleman et al. | Apr 2003 | B1 |
6553428 | Ruehle et al. | Apr 2003 | B1 |
6557039 | Leong et al. | Apr 2003 | B1 |
6571282 | Bowman-Amuah | May 2003 | B1 |
6571389 | Spyker et al. | May 2003 | B1 |
6578068 | Bowman-Amuah | Jun 2003 | B1 |
6584497 | Case et al. | Jun 2003 | B1 |
6590587 | Wichelman et al. | Jul 2003 | B1 |
6615258 | Barry et al. | Sep 2003 | B1 |
6643679 | Erickson et al. | Nov 2003 | B1 |
6654784 | Wei | Nov 2003 | B1 |
6657625 | Chik et al. | Dec 2003 | B1 |
6675228 | Bahrs et al. | Jan 2004 | B1 |
6725231 | Hu et al. | Apr 2004 | B2 |
6928488 | de Jong et al. | Aug 2005 | B1 |
20010020255 | Hofmann et al. | Sep 2001 | A1 |
20010029604 | Dreyband et al. | Oct 2001 | A1 |
20020010867 | Schaefer et al. | Jan 2002 | A1 |
20020046239 | Stawikowski et al. | Apr 2002 | A1 |
20020055804 | Betawar et al. | May 2002 | A1 |
20020062440 | Akama | May 2002 | A1 |
20020062475 | Iborra et al. | May 2002 | A1 |
20020065814 | Okamoto et al. | May 2002 | A1 |
20020069156 | Adam et al. | Jun 2002 | A1 |
20020069192 | Aegerter | Jun 2002 | A1 |
20020078115 | Poff et al. | Jun 2002 | A1 |
20020103725 | Martin et al. | Aug 2002 | A1 |
20020103835 | Kearney | Aug 2002 | A1 |
20020109718 | Mansour et al. | Aug 2002 | A1 |
20020111995 | Mansour et al. | Aug 2002 | A1 |
20020111999 | Andersson | Aug 2002 | A1 |
20020116205 | Ankireddipally et al. | Aug 2002 | A1 |
20020120685 | Srivastava et al. | Aug 2002 | A1 |
20020124113 | Gargya et al. | Sep 2002 | A1 |
20020129096 | Mansour et al. | Sep 2002 | A1 |
20020133579 | Bernhardt et al. | Sep 2002 | A1 |
20020143721 | Charlet et al. | Oct 2002 | A1 |
20020143819 | Han et al. | Oct 2002 | A1 |
20020144101 | Wang et al. | Oct 2002 | A1 |
20020147857 | Sanchez II, et al. | Oct 2002 | A1 |
20020178191 | Sielken | Nov 2002 | A1 |
20020178434 | Fox et al. | Nov 2002 | A1 |
20020188765 | Fong et al. | Dec 2002 | A1 |
20020188928 | Szpak et al. | Dec 2002 | A1 |
20030009323 | Adeli | Jan 2003 | A1 |
20030028555 | Young et al. | Feb 2003 | A1 |
20030033121 | Chen et al. | Feb 2003 | A1 |
20030033159 | Altomare | Feb 2003 | A1 |
20030036809 | Landman et al. | Feb 2003 | A1 |
20030046317 | Cseri et al. | Mar 2003 | A1 |
20030050897 | Altomare | Mar 2003 | A1 |
20030069907 | Moreau et al. | Apr 2003 | A1 |
20030084067 | Obiaya | May 2003 | A1 |
20030093574 | Fablet et al. | May 2003 | A1 |
20030097383 | Smirnov et al. | May 2003 | A1 |
20030160813 | Raju | Aug 2003 | A1 |
20030217033 | Sandler et al. | Nov 2003 | A1 |
20040107183 | Mangan | Jun 2004 | A1 |
20040230587 | Doddington | Nov 2004 | A1 |
20050030555 | Phenix et al. | Feb 2005 | A1 |
Number | Date | Country |
---|---|---|
0135209 | May 2001 | WO |
0163529 | Aug 2001 | WO |
0246916 | Jun 2002 | WO |
0246980 | Jun 2002 | WO |
03001373 | Jan 2003 | WO |
Number | Date | Country | |
---|---|---|---|
20060031586 A1 | Feb 2006 | US |
Number | Date | Country | |
---|---|---|---|
60565490 | Apr 2004 | US |