TEPZZ 4_888 B_T EP B1 (19) (11) EP B1 (12) EUROPEAN PATENT SPECIFICATION. (51) Int Cl.: H04W 12/00 ( )

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "TEPZZ 4_888 B_T EP 2 418 883 B1 (19) (11) EP 2 418 883 B1 (12) EUROPEAN PATENT SPECIFICATION. (51) Int Cl.: H04W 12/00 (2009.01)"

Transcription

1 (19) TEPZZ 4_888 B_T (11) EP B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: Bulletin 14/17 (21) Application number: (22) Date of filing: (1) Int Cl.: H04W 12/00 (09.01) (86) International application number: PCT/CN09/ (87) International publication number: WO /11326 (14.. Gazette /41) (4) WIRELESS LOCAL AREA NETWORK TERMINAL PRE-AUTHENTICATION METHOD AND WIRELESS LOCAL AREA NETWORK SYSTEM VORAUTHENTIFIZIERUNGSVERFAHREN FÜR ENDGERÄTE EINES DRAHTLOSEN LOKALEN NETZWERKS UND SYSTEM EINES DRAHTLOSEN LOKALEN NETZWERKS MÉTHODE DE PRÉ-AUTHENTIFICATION D UN TERMINAL DE RÉSEAU LOCAL SANS FIL ET SYSTÈME DE RÉSEAU LOCAL SANS FIL (84) Designated Contracting States: AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR () Priority: CN (43) Date of publication of application: Bulletin 12/07 (73) Proprietor: ZTE Corporation Guangdong Province 1807 (CN) (72) Inventors: LIU, Jiabing Shenzhen Guangdong 1807 (CN) SHI, Yuanqing Shenzhen Guangdong 1807 (CN) LIANG, Jiehui Shenzhen Guangdong 1807 (CN) (74) Representative: Zerbi, Guido Maria et al Murgitroyd & Company Piazza Borromeo, Milano (IT) (6) References cited: WO-A1-0/9771 WO-A2-03/0990 WO-A2-06/04421 WO-A2-06/04421 CN-A CN-A CN-A HASSAN J ET AL: "Trust-Based Fast Authentication for Multiowner Wireless Networks", IEEE TRANSACTIONS ON MOBILE COMPUTING, IEEE SERVICE CENTER, LOS ALAMITOS, CA, US, vol. 7, no. 2, 1 February 08 ( ), pages , XP , ISSN: , DOI:.19/TMC EP B1 Note: Within nine months of the publication of the mention of the grant of the European patent in the European Patent Bulletin, any person may give notice to the European Patent Office of opposition to that patent, in accordance with the Implementing Regulations. Notice of opposition shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention). Printed by Jouve, 7001 PARIS (FR)

2 1 EP B1 2 Description Technical Field [0001] The present invention relates to the wireless local area network (WLAN) field, and particularly, to a method for pre-authenticating a wireless local network terminal which supports the WLAN Authentication and Privacy Infrastructure (WAPI) and a wireless local area network system. Background of the Related Art [0002] At present, the wireless network security mainly adopts the security mechanism in the wireless local area network standard (IEEE ) constituted by the Institute of Electrical and Electronics Engineers (IEEE). This mechanism adopts the Wired Equivalent Privacy (WEP), and this mechanism has been widely proved that it does not have the security equivalent to the wired network, and brings huge hidden danger in security to the wireless local area network. [0003] In this situation, China has put forward a wireless local area network national standard GB in May, 03, which introduced a brand new security mechanism, namely the Wireless Local Area Network Authentication and Privacy Infrastructure (WAPI) to enhance the security of the wireless local area network, and has published an improved national standard (GB /XG1-06) in 06. [0004] The WAPI is comprised of the WLAN Authentication Infrastructure (WAI) and the WLAN Privacy Infrastructure (WPI), wherein the WAI adopts the ellipticcurve-based public key certificate system. The wireless station (STA) and access point (AP) carry out bidirectional identity authentication (certificate authentication) through the Authentication Server (AS). For the security of the transmission data, the WPI adopts the symmetric cryptographic algorithm SMS4 provided by the State Commercial Secret code Regulatory Commission Office in China for encryption and decryption to ensure the security of the data transmission. [000] The WAPI mechanism mainly relates to following three entities: a wireless station (STA), a wireless access point (AP) and an authentication server. To set up association with an AP and securely transmit data, STA should complete two parts of works: one is to complete the certificate authentication process, and generate a basic key in this process; and the other is to negotiate keys based on the basic key, including unicast key negotiation and the multicast key notification. As shown in FIG. 1, the following steps are comprised: [0006] 1: the AP sends an authentication activation packet to the STA to start the certificate authentication process; [0007] The authentication activation packet includes fields such as: an AP certificate, ECDH (Elliptic Curve Diffie-Hellman) parameters and so on [0008] 2: after receiving the authentication activation packet, the STA saves the AP certificate which is used to verify the signature of the AP in the subsequent operations, and generates a temporary private key sx and a temporary public key px which are used in the ECDH exchange. [0009] 3: the STA generates an access authentication request packet, and sends the access authentication request packet to the AP; [00] The access authentication request packet includes fields such as a temporary public key px, the STA certificate and so on, and a signature value signed on above fields by the STA. [0011] 4: after receiving the access authentication request packet, the AP verifies the signature of the STA (using the public key included in the STA certificate), and if the verification is unsuccessful, this access authentication request packet is discarded; or else the AP generates a certificate authentication request packet, and sends the certificate authentication request packet to the authentication server; [0012] The certificate authentication request packet includes: the STA certificate and the AP certificate. [0013] : after receiving the certificate authentication request packet, the authentication server verifies the STA certificate and the AP certificate; [0014] 6: the authentication server constructs an certificate authentication response packet, which includes the verification results of the STA certificate and the AP certificate and attaches a signature of the authentication server, and sends the certificate authentication response packet to the AP; [001] 7: the AP verifies the signature of the authentication server, and after the verification is successful, further verifies the verification result of the STA certificate verified by the authentication server, and after the verification is successful, the following operations are carried out: [0016] 7a: a temporary private key sy and a temporary public key py used for ECDH exchange are generated; [0017] 7b: ECDH calculation is carried out using the temporary public key px sent by the STA and the temporary private key sy generated locally to generate a basic key (BK). [0018] 8: the AP sends an access authentication response packet to the STA; [0019] The access authentication response packet includes: a temporary public key py, a certificate verification result, a signature of the authentication server, and a signature signed on above fields by the AP. [00] 9: after receiving the access authentication response packet, the STA verifies the signature of the AP, the signature of the authentication server, and the certificate verification result, and if both of the signatures of the AP and the authentication server are correct, and the authentication server verifies the AP certificate successfully, the STA carries out the ECDH calculation using 2

3 3 EP B1 4 the temporary public key py and temporary private key sx to generate the BK. [0021] It should be noted that according the principal of the ECDH, the BKs generated by the STA and the AP are the same. [0022] Through above processes, the STA and AP complete the bidirectional identity authentication (namely the certificate authentication), and set up the Base Key Security Association (BKSA). The BKSA includes parameters such as a BK, and a base key identifier (BKID) and so on. [0023] 1: the AP sends a unicast key negotiation request packet to the STA; [0024] The unicast key negotiation request packet includes parameters such as the BKID, ADDID, and N 1 and so on, wherein [002] The BKID is the identifier of the BK obtained from the previous negotiation of the AP and STA; [0026] ADDID is comprised of the Media Access Control (MAC) addresses of the AP and STA; [0027] N 1 is a random number generated by the AP. [0028] 111: after receiving the unicast key negotiation request packet, the STA generates a random number N 2, and then calculates: Key=KD-HMAC-SHA26(BK, ADDIDiNiN 1 istring); wherein BK is the base key identified by the above BKID; KD- HMAC-SHA26 is the Hashed Message Authentication Code (HMAC) algorithm based on the SHA26 algorithm, namely a HASH algorithm with a key; String is a preset character string, which is "pairwise key expansion for unicast and additional keys and nonce" in the current standard; "i" denotes a string concatenation operation, and "ADDIDiN 1 in 2 istring" is the character parameter used by the KD-HMAC- SHA26 algorithm. [0029] After calculating to obtain the Key, the STA extracts 64 bytes therein as the unicast session key (USK), including: 16 bytes unicast encryption key, 16 bytes unicast integrity check key, 16 bytes message authentication key, and 16 bytes key encryption key. [00] 112: the STA sends a unicast key negotiation response packet to the AP; [0031] The unicast key negotiation response packet includes parameters such as: the BKID, random number N 2 and so on. [0032] 113: after receiving the unicast key negotiation response packet, the AP makes the following calculates: Key=KD-HMAC-SHA26(BK, ADDIDiN 1 in 2 istring), and extracts the USK therein. [0033] 114: the AP sends a unicast key negotiation confirmation packet to the STA; [0034] So far, the AP and STA complete the unicast session key negotiation flow, and set up the unicast session key security association (USKSA). [003] 11: the AP sends a multicast key notification packet to the STA; [0036] The multicast key notification packet includes fields such as: the ADDID, key data, message authentication code and so on. [0037] The key data field is the cryptograph generated by encrypting the notification master key by the AP using the key encryption key and the algorithm chosen in the negotiation of the AP and the STA. The notification master key is a 16 bytes random number generated by the AP. [0038] The message authentication code is data resulting from calculation on all the protocol data fields before this field by the AP using the message authentication key and the HMAC-SHA26 algorithm. [0039] 116: after receiving the multicast key notification packet, the STA verifies the message authentication code, and after the verification is passed, the STA decrypts key data to obtain the notification master key, and expands the notification master key using the KD-HMAC- SHA26 algorithm to obtain the multicast key. [00] 117: the STA sends the multicast key response packet to the AP to complete the multicast key notification process. [0041] In the wireless local area network, there may be a plurality of APs existing. If the STA wants to handoff from the current AP to the destination AP, the STA requires carrying out the certificate authentication process and the key negotiation process with the destination AP over again. These processes will spend a lot of time, resulting in the handoff delay, and even breaking off the communication. Therefore, the WAPI puts forward the pre-authentication method. [0042] In the WAPI mechanism, if the destination AP supports pre-authentication, after completing unicast session key negotiation with the current associated AP and installing the key, the STA can start the pre-authentication process. The authentication unit of the STA sends a pre-authentication start packet to active the preauthentication process. The destination address (DA) of this packet is the Basic Service Set ID (BSSID) of the destination AP, and the source address (RA) is the BSSID of the current associated AP. The destination AP should use own BSSID as the Media Access Control (MAC) of the AP authentication unit. The current associated AP bridges the pre-authentication packet sent by the STA to the Distribution System (DS). The destination AP receiving the pre-authentication packet through the DS starts the certificate authentication process with the corresponding STA. If the certificate authentication process of the WAI is successful, the result of the pre-authentication is the Base Key Security Association (BKSA). After associating with the destination AP which completes the pre-authentication, the STA can use the BKSA to carry out the unicast key negotiation and the multicast key notification processes. [0043] It can be seen from above description that the 3

4 EP B1 6 existing pre-authentication method in the WAPI is that the STA and AP carry out the identity authentication and key negotiation for each other in advance to reduce the handoff delay. [0044] However, the current pre-authentication method has the following drawbacks: when the STA and the destination AP carry out the pre-authentication, the whole certificate authentication process and key negotiation process are still required to be carried out, and the preauthentication process is rather complex; and when the STA requires carrying out pre-authentication with a plurality of APs, more time is spent, and more bandwidth resources are occupied, and the handoff delay of the STA is increased indirectly. [004] CN11396A discloses a station switching method, including steps of a station executing a pre-authentication process with a destination access point through a currently connected access point; after completing the pre-authentication process, the station sending a pre-key negotiation packet to the destination access point through the currently connected access point, and the destination access point executing a pre-key negotiation process after receiving the pre-key negotiation packet; the station disconnecting from the currently connected access point, and switching to the destination access point after unicast key negotiation and multicast key negotiation processes are completed. Summary of the Invention [0046] The technical problem to be solved in the present invention is to overcome the drawbacks in the prior art, and to provide a pre-authentication method and a wireless local area network system, which can quickly complete the pre-authentication of the wireless local area network terminal and occupies less bandwidth resources. [0047] In order to solve the above problem, the present invention provides a method for pre-authenticating a wireless local area network terminal, comprising: after a current access point (AP) which has set up security association with a station (STA) receiving a pre-authentication start packet sent by the STA, the current AP interacting with a destination AP to verify certificates of the current AP and the destination AP for each other; and if a certificate of the destination AP is verified to be valid, the current AP sending key information of the security association set up with the STA by the current AP to the destination AP, and the destination AP saving the key information; the key information including a basic key generated by negotiation between the STA and the current AP. [0048] In addition, the current AP and destination AP adopt the following way to verify certificates thereof for each other: the current AP sends a pre-authentication initiation packet to the destination AP, and the pre-authentication initiation packet includes a certificate of the current AP and a signature of the current AP; after receiving the pre-authentication initiation packet, the destination AP verifies the signature of the current AP, and after the verification is successful, the destination AP sends a certificate authentication request packet to an authentication server, and the certificate authentication request packet includes the certificate of the current AP, the certificate of the destination AP and a signature of the destination AP; and after receiving the certificate authentication request packet, the authentication server verifies the signature of the destination AP, and after the signature is verified successfully, the authentication server verifies the certificates of the current AP and the destination AP, and sending a certificate authentication response packet including certificate verification results and a signature of the authentication server to the destination AP and the current AP. [0049] In addition, the key information further includes a unicast session key generated by negotiation between the STA and the current AP; after receiving the key information, the destination AP also uses the unicast session key to negotiate with the STA to generate a multicast key. [000] In addition, if the certificate of the destination AP is verified to be invalid, the current AP releases a link relationship of the current AP and the destination AP, and informs the STA that the destination AP is illegal. [001] The present invention also provides a wireless local area network system, and the system comprises a STA, a current AP which has set up security association with the STA, and a destination AP which supports a preauthentication function, wherein the current AP is used for, after receiving a pre-authentication start packet sent by the STA, interacting with the destination AP to verify certificates of the current AP and the destination AP for each other; and if the certificate of the destination AP is verified to be valid, the current AP is further used for sending key information of the security association set up with the STA by the current AP to the destination AP; the destination AP saves the key information; the key information includes a basic key generated by negotiation between the STA and the current AP. [002] In addition, the system further comprises an authentication server; the current AP and destination AP adopt the following way to verify certificates of the current AP and the destination AP for each other: 4

5 7 EP B1 8 the current AP sending a pre-authentication initiation packet to the destination AP, the pre-authentication initiation packet including a certificate of the current AP and a signature of the current AP; after receiving the pre-authentication initiation packet, the destination AP verifies the signature of the current AP, and after the verification is successful, the destination AP sends a certificate authentication request packet to the authentication server, the certificate authentication request packet including the certificate of the current AP, the certificate of the destination AP and a signature of the destination AP; and after receiving the certificate authentication request packet, the authentication server verifies the signature of the destination AP, and after the verification is successful, the authentication server verifies the certificates of the current AP and the destination AP, and sends a certificate authentication response packet including certificate verification results and a signature of the authentication server to the destination AP and the current AP. [003] In addition, the key information further includes a unicast session key generated by negotiation between the STA and the current AP; the destination AP is further used for, after receiving the key information, using the unicast session key to negotiate with the STA to generate a multicast key. [004] As a conclusion, the present invention is based on the WAPI three-element security frame idea, makes use of the security association that has been set up to carry out the identity authentication (certificate verification) on the untrusted AP. And after the identity authentication is completed, the current AP sends the key information (mainly a base key) to the destination AP. Through this optimized pre-authentication method, in a precondition of not reducing the system security performance, the interaction processes between each network element are reduced, and the aim of quickly pre-authenticating wireless local area network terminal is achieved. Brief Description of Drawings [00] FIG. 1 is a flow chart of the certificate authentication process and the key negotiation process in the prior art; FIG. 2 is a flow chart of the method for pre-authenticating the wireless local area network terminal according to an example of the present invention; FIG. 3 is a schematic diagram of the format of the pre-authentication packet; FIG. 4 is structural schematic diagram of the wireless local area network system which can implement the above method of the present invention. Preferred Embodiments of the Present Invention [006] The core idea of the present invention is: after an AP which has set up a security association with a STA (called the current AP for short) receives a pre-authentication start packet sent by the STA, the current AP verifying the destination AP certificate through the authentication server, and after the certificate is verified successfully, the current AP sending the key information of the security association set up with the STA to the destination AP; and the destination AP saving said key information, thereby completing the pre-authentication. [007] Below it will describe the present invention with reference to the figures and examples in detail. [008] FIG. 2 is a flow chart of the method for preauthenticating a wireless local area network terminal according to an example of the present invention, including the following steps: [009] 1: after setting up the security association with the current AP, the STA starts to scan APs actively or passively if the signal intensity of the current AP is lower than a preset threshold when the STA moves in the Extended Service Set (ESS),. [0060] 2: the STA judges whether the scanned APs support pre-authentication according to the WAPI information element field in the Beacon frame or the Probe Response frame, and establishes an AP priority list according to the signal intensity of the APs which support the pre-authentication; takes an AP with the highest priority as a destination AP, and then sends a pre-authentication start packet to the current AP. [0061] The pre-authentication packet adopts the format defined in the WAPI protocol, as shown in FIG. 3, and the particular content can see the GB /XG1-06, wherein the length of the ADDID field is 12 bytes, and the value of this field is comprised of the MAC address of the initiator STA and the MAC address of the destination AP. [0062] 3: after receiving the pre-authentication start packet, the current AP sends a pre-authentication initiation packet to the destination AP through the Distributed System (DS) to active the certificate authentication process. [0063] The pre-authentication initiation packet includes information such as: the current AP certificate, the MAC addresses of the STA and the current AP, and the signature of the current AP and so on. [0064] 4: after receiving the pre-authentication initiation packet, the destination AP verifies the signature of the current AP, and after the verification is successful, the destination AP sends a certificate authentication request packet to the authentication server to carry out the identity authentication. [006] The certificate authentication request packet in-

6 9 EP B1 cludes information such as: the MAC address of the destination AP, the MAC address of the current AP, the destination AP certificate and the current AP certificate and so on. [0066] : after receiving the certificate authentication request packet, the authentication server verifies the destination AP certificate and the current AP certificate, and includes the verification results of the destination AP certificate and the current AP certificate into a certificate authentication response packet, and attaches a signature of the authentication server, and then sends the certificate authentication response packet to the destination AP. [0067] 6: after receiving the certificate authentication response packet, the destination AP verifies the signature of the authentication server, and if the signature is wrong, discards this certificate authentication response packet, or checks the verification result of the certificate of the current AP, and if the current AP certificate is valid, constructs a pre-authentication response packet, and sends the pre-authentication response packet to the current AP. [0068] The pre-authentication response packet includes information such as: the signature of the destination AP, the signature of the authentication server, and the verification result of the destination AP certificate and so on. [0069] 7: after receiving the pre-authentication response packet, the current AP verifies whether the signature of the destination AP and the signature of the authentication server are correct, and if any one of the signatures is wrong, discards this packet; or else checks whether the destination AP certificate is valid according to the verification result of the destination AP certificate, and if it is invalid, releases the link relationship between two APs and informs the STA that the destination AP is illegal; and if all of above checks are passed, the current AP sends the key information of the security association set up with the STA to the destination AP through DS; [0070] Above key information includes BKSA parameters such as: a base key identifier (BKID), base key (BK) and so on; besides, the key information can further include USKSA parameters such as the unicast session key identifier (USKID), unicast session key (USK) and so on. [0071] 8: after receiving the above key information, the destination AP uses the key encryption key (KEK) in the unicast session key to encrypt the notification master key (NMK) to generate the key data, and uses the message authentication key to calculate the message authentication code, and includes the key data and message authentication code into a multicast key notification packet and sends the multicast key notification packet to the STA. [0072] 9: after receiving the multicast key notification packet, the STA checks the message authentication code, and after the check is passed, decrypts the key data to obtain the notification master key, and uses the KD-HMAC-SHA26 algorithm to expand the notification master key, and generates the multicast key (which includes 16 bytes multicast encryption key and 16 bytes integrity check key). [0073] 2: the STA sends a multicast key response packet to the destination AP to complete the multicast key notification process. [0074] 211: the destination AP sends a pre-authentication completion packet to the current AP through the DS to inform the current AP that the pre-authentication has been completed. [007] According to the basic principle of the present invention, above examples can also have a plurality of transformations, such as: (1) in the step 7, the current AP can only send the BKSA parameters to the destination AP, and the destination AP uses the BK in the BKSA to negotiate with the STA to generate a new USK. Certainly, the negotiation of the unicast session key can also be carried out after STA is switched to be the destination AP. (2) the destination AP and the STA may not carry out the multicast key negotiation during the pre-authentication process until the STA is switched to be the destination AP. (3) in the step 4, after receiving the pre-authentication initiation packet, the destination AP can directly sends a pre-authentication response packet including the destination AP certificate to the current AP, and the current AP sends a certificate authentication request packet including the current AP certificate and the destination AP certificate to the authentication server, and the authentication server verifies the current AP certificate and the destination AP certificate, and sends the verification result together with the key information to the destination AP. (4) if both the destination AP and the current AP have the public key of the authentication server, the destination AP and the current AP can use this public key to verify the certificate of the other party, without sending the certificate to the authentication server. Certainly, in this situation, it cannot verify whether the certificate of the other party is revoked. [0076] FIG. 4 is structural schematic diagram of the wireless local area network system which can implement the above method of the present invention. As shown in FIG. 4, this system includes: a STA, a current AP which has set up security association with said STA, and a destination AP which supports a pre-authentication function. Wherein: said current AP is use for, after receiving a pre-authentication start packet sent by said STA, interacting with said destination AP to verify certificates of the two parties 6

7 11 EP B1 12 for each other; [0077] If the certificate of the destination AP is verified to be valid, said current AP is also used for sending the key information of the security association set up with said STA to said destination AP; said destination AP stores said key information; [0078] Said key information includes a basic key generated by negotiation between the STA and the AP. [0079] The detailed functions and the connection relationships (interactive messaging relationship) of each network element in the system shown in FIG. 4 have been introduced in the description of the flow shown in FIG. 2, and herein it will not be described repeatedly. Industrial Applicability [0080] The present invention is based on the WAPI three-element security frame idea, makes use of the security association that has been set up to carry out the identity authentication (certificate verification) on the untrusted AP. And after the identity authentication completes, the current AP sends the key information (mainly a base key) to the destination AP. Through this optimized pre-authentication method, in a precondition of not reducing the system security performance, the interaction processes between each network element are reduced, and the aim of quickly pre-authenticating the wireless local area network terminal is achieved. Claims 1. A method for pre-authenticating a wireless local area network terminal, characterized in that the method comprises: a current access point (AP) setting up security association with a station (STA) (1); the current access point (AP) receiving a preauthentication start packet sent by the station (STA) (2); the current access point (AP) interacting with a destination access point to verify authentication certificates of the current access point (AP) and the destination access point for each other (3, 4, ); and if the certificate of the destination access point is verified to be valid, the current access point (AP) sending key information of the security association set up with the station (STA) by the current access point (AP) to the destination access point (6, 7), and the destination access point saving the key information; wherein the key information includes a basic key generated by negotiation between the station (STA) and the current access point (AP). 2. The method as claimed in claim 1, wherein, the step of the current access point (AP) interacting with the destination access point to verify certificates of the current access point (AP) and the destination access point for each other comprises: the current access point (AP) sending a pre-authentication initiation packet to the destination access point, the pre-authentication initiation packet including a certificate of the current access point (AP) and a signature of the current access point (3); the destination access point receiving the preauthentication initiation packet and verifying the signature of the current access point (AP); after the verification is successful, the destination access point sending a certificate authentication request packet to an authentication server, the certificate authentication request packet including the certificate of the current access point (AP), the certificate of the destination access point and a signature of the destination access point (4); and the authentication server receiving the certificate authentication request packet and verifying the signature of the destination access point; after the signature is verified successfully, the authentication server verifying the certificates of the current access point (AP) and the destination access point, and sending a certificate authentication response packet including certificate verification results and a signature of the authentication server to the destination access point and the current access point (AP) (). 3. The method as claimed in claim 1, wherein, the key information further includes a unicast session key generated by negotiation between the station (STA) and the current access point (AP); and the method further comprises: the destination access point receiving the key information, and then the destination access point using the unicast session key to negotiate with the station (STA) to generate a multicast key (8, 9). 4. The method as claimed in claim 1, further comprising: if the certificate of the destination access point is verified to be invalid, the current access point (AP) releasing a link relationship between the current access point (AP) and the destination access point, and informing the station that the destination access point is illegal (6, 7).. A wireless local area network system, the system comprising a station (STA), a current access point (PA) which has set up security association with the station (STA), and a destination access point which 7

8 13 EP B1 14 supports a pre-authentication function, characterized in that: the current access point (AP) is configured to receive a pre-authentication start packet sent by the station (STA), and then interact with the destination access point to verify authentication certificates of the current access point (AP) and the destination access point for each other; and if the certificate of the destination access point is verified to be valid, the current access point (AP) is further configured to send key information of the security association set up with the station (STA) by the current access point (AP) to the destination access point; the destination access point is configured to save the key information; wherein the key information includes a basic key generated by negotiation between the station and the current access point (AP). 6. The system as claimed in claim, wherein, the system further comprises an authentication server; the current access point (AP) is further configured to send a pre-authentication initiation packet to the destination access point, the pre-authentication initiation packet including a certificate of the current access point (AP) and a signature of the current access point (AP); the destination access point is further configured to receive the pre-authentication initiation packet and verify the signature of the current access point (AP), and after the verification is successful, to send a certificate authentication request packet to the authentication server, the certificate authentication request packet including the certificate of the current access point (AP), the certificate of the destination access point and a signature of the destination access point; and the authentication server is configured to receive the certificate authentication request packet, and verify the signature of the destination access point, and after the verification is successful, to verify the certificates of the current access point (AP) and the destination access point, and send a certificate authentication response packet including certificate verification results and a signature of the authentication server to the destination access point and the current access point (AP). 7. The system as claimed in claim, wherein, the key information further includes a unicast session key generated by negotiation between the station and the current access point (AP); the destination access point is further configured to receive the key information, and then use the unicast session key to negotiate with the station to generate a multicast key Patentansprüche 1. Ein Verfahren zum Vorauthentifizieren eines Endgeräts eines drahtlosen lokalen Netzwerks, dadurch gekennzeichnet, dass das Verfahren Folgendes beinhaltet: einen aktiven Zugangspunkt (AP), der eine Sicherheitsassoziation mit einer Station (STA) (1) aufbaut; wobei der aktive Zugangspunkt (AP) ein durch die Station (STA) (2) gesendetes Vorauthentifizierungsstartpaket empfängt; wobei der aktive Zugangspunkt (AP) mit einem Zielzugangspunkt interagiert, um Authentifizierungszertifikate des aktiven Zugangspunkts (AP) und des Zielzugangspunks füreinander zu verifizieren (3, 4, ); und wenn das Zertifikat des Zielzugangspunkts als gültig verifiziert ist, der aktive Zugangspunkt (AP) Schlüsselinformationen der Sicherheitsassoziation, aufgebaut mit der Station (STA) durch den aktiven Zugangspunkt (AP), an den Zielzugangspunkt (6, 7) sendet, und wobei der Zielzugangspunkt die Schlüsselinformationen speichert; wobei die Schlüsselinformationen einen Basisschlüssel umfassen, erzeugt durch Verhandlung zwischen der Station (STA) und dem aktiven Zugangspunkt (AP). 2. Verfahren gemäß Anspruch 1, wobei der Schritt des Interagierens des aktiven Zugangspunkts (AP) mit dem Zielzugangspunkt, um Zertifikate des aktiven Zugangspunkts (AP) und des Zielzugangspunkts füreinander zu verifizieren, Folgendes beinhaltet: Senden eines Vorauthentifizierungsinitialisierungspakets durch den aktiven Zugangspunkt (AP) an den Zielzugangspunkt, wobei das Vorauthentifizierungsinitialisierungspaket ein Zertifikat des aktiven Zugangspunkts (AP) und eine Signatur des aktiven Zugangspunkts (3) umfasst; Empfangen des Vorauthentifizierungsinitialisierungspakets durch den Zielzugangspunkt und Verifizieren der Signatur des aktiven Zugangspunkts (AP); nachdem die Verifizierung erfolgreich ist, Senden eines Zertifikatauthentifizierungsanfragepakets durch den Zielzugangspunkt an einen Authentifizierungsserver, wobei das Zertifikatauthentifizierungsanfragepaket das Zertifikat des aktiven Zugangspunkts (AP), das Zertifikat des Zielzugangspunkts und eine Signatur des Zielzugangspunkts (4) umfasst; und Empfangen des Zertifikatauthentifizierungsanfragepakets durch den Authentifizierungsserver 8

9 1 EP B1 16 und Verifizieren der Signatur des Zielzugangspunkts; nachdem die Signatur erfolgreich verifiziert ist, Verifizieren der Zertifikate des aktiven Zugangspunkts (AP) und des Zielzugangspunkts durch den Authentifizierungsserver und Senden eines Zertifikatauthentifizierungsantwortpakets einschließlich Zertifikatverifizierungsergebnissen und einer Signatur des Authentifizierungsservers an den Zielzugangspunkt und den aktiven Zugangspunkt (AP) (). 3. Verfahren gemäß Anspruch 1, wobei die Schlüsselinformationen ferner einen Unicastsitzungsschlüssel, erzeugt durch Verhandlung zwischen der Station (STA) und dem aktiven Zugangspunkt (AP), umfassen; und das Verfahren ferner Folgendes beinhaltet: Empfangen der Schlüsselinformationen durch den Zielzugangspunkt und dann Verwenden des Unicastsitzungsschlüssels durch den Zielzugangspunkt, um mit der Station (STA) zu verhandeln, um einen Multicastschlüssel (8, 9) zu erzeugen. 4. Verfahren gemäß Anspruch 1, das ferner Folgendes beinhaltet: wenn das Zertifikat des Zielzugangspunkts als ungültig verifiziert ist, Freigeben einer Verbindungsbeziehung zwischen dem aktiven Zugangspunkt (AP) und dem Zielzugangspunkt durch den aktiven Zugangspunkt (AP) und Informieren der Station, dass der Zielzugangspunkt illegal (6, 7) ist.. Ein drahtloses lokales Netzwerksystem, wobei das System eine Station (STA), einen aktiven Zugangspunkt (PA), der eine Sicherheitsassoziation mit der Station (STA) aufgebaut hat, und einen Zielzugangspunkt, der eine Vorauthentifizierungsfunktion unterstützt, beinhaltet, dadurch gekennzeichnet, dass: der aktive Zugangspunkt (AP) konfiguriert ist, um ein Vorauthentifizierungsstartpaket, gesendet durch die Station (STA), zu empfangen, und dann mit dem Zielzugangspunkt zu interagieren, um Authentifizierungszertifikate des aktiven Zugangspunkts (AP) und des Zielzugangspunkts füreinander zu verifizieren; und wenn das Zertifikat des Zielzugangspunkts als gültig verifiziert ist, der aktive Zugangspunkt (AP) ferner konfiguriert ist, um Schlüsselinformationen der Sicherheitsassoziation, aufgebaut mit der Station (STA) durch den aktiven Zugangspunkt (AP), an den Zielzugangspunkt zu senden; der Zielzugangspunkt konfiguriert ist, um die Schlüsselinformationen zu speichern; wobei die Schlüsselinformationen einen Basisschlüssel umfassen, erzeugt durch Verhandlung zwischen der Station und dem aktiven Zugangspunkt (AP). 6. System gemäß Anspruch, wobei das System ferner einen Authentifizierungsserver beinhaltet; wobei der aktive Zugangspunkt (AP) ferner konfiguriert ist, um ein Vorauthentifizierungsinitialisierungspaket an den Zielzugangspunkt zu senden, wobei das Vorauthentifizierungsinitialisierungspaket ein Zertifikat des aktiven Zugangspunkts (AP) und eine Signatur des aktiven Zugangspunkts (AP) umfasst; wobei der Zielzugangspunkt ferner konfiguriert ist, um das Vorauthentifizierungsinitialisierungspaket zu empfangen und die Signatur des aktiven Zugangspunkts (AP) zu verifizieren, und nachdem die Verifizierung erfolgreich ist, ein Zertifikatauthentifizierungsanfragepaket an den Authentifizierungsserver zu senden, wobei das Zertifikatauthentifizierungsanfragepaket das Zertifikat des aktiven Zugangspunkts (AP), das Zertifikat des Zielzugangspunkts und eine Signatur des Zielzugangspunkts umfasst; und wobei der Authentifizierungsserver konfiguriert ist, um das Zertifikatauthentifizierungsanfragepaket zu empfangen und die Signatur des Zielzugangspunkts zu verifizieren, und nachdem die Verifizierung erfolgreich ist, die Zertifikate des aktiven Zugangspunkts (AP) und des Zielzugangspunkts zu verifizieren und ein Zertifikatauthentifizierungsantwortpaket einschließlich Zertifikatverifizierungsergebnissen und einer Signatur des Authentifizierungsservers an den Zielzugangspunkt und den aktiven Zugangspunkt (AP) zu senden. 7. System gemäß Anspruch, wobei die Schlüsselinformationen ferner einen Unicastsitzungsschlüssel, erzeugt durch Verhandlung zwischen der Station und dem aktiven Zugangspunkt (AP), umfassen; wobei der Zielzugangspunkt ferner konfiguriert ist, um die Schlüsselinformationen zu empfangen und dann den Unicastsitzungsschlüssel zum Verhandeln mit der Station zu verwenden, um einen Multicastschlüssel zu erzeugen. Revendications 1. Une méthode pour pré-authentifier un terminal de réseau local sans fil, caractérisée en ce que la méthode comprend : l établissement par un point d accès courant (AP) d une association de sécurité avec une station (STA) (1) ; la réception par le point d accès courant (AP) d un paquet de début de pré-authentification en- 9

10 17 EP B1 18 voyé par la station (STA) (2) ; l interaction du point d accès courant (AP) avec un point d accès de destination pour qu ils vérifient des certificats d authentification du point d accès courant (AP) et du point d accès de destination l un pour l autre (3, 4, ) ; et si le certificat du point d accès de destination est vérifié et donné comme valide, l envoi par le point d accès courant (AP) d informations de clé de l association de sécurité établie avec la station (STA) par le point d accès courant (AP) au point d accès de destination (6, 7), et la sauvegarde des informations de clé par le point d accès de destination ; dans laquelle les informations de clé incluent une clé de base générée par négociation entre la station (STA) et le point d accès courant (AP). 2. La méthode telle que revendiquée dans la revendication 1, dans laquelle l étape d interaction du point d accès courant (AP) avec le point d accès de destination pour qu ils vérifient des certificats du point d accès courant (AP) et du point d accès de destination l un pour l autre comprend : l envoi par le point d accès courant (AP) d un paquet d initiation de pré-authentification au point d accès de destination, le paquet d initiation de pré-authentification incluant un certificat du point d accès courant (AP) et une signature du point d accès courant (3) ; la réception par le point d accès de destination du paquet d initiation de pré-authentification et la vérification de la signature du point d accès courant (AP) ; une fois que la vérification a abouti avec succès, l envoi par le point d accès de destination d un paquet de requête d authentification de certificats à un serveur d authentification, le paquet de requête d authentification de certificats incluant le certificat du point d accès courant (AP), le certificat du point d accès de destination et une signature du point d accès de destination (4) ; et la réception par le serveur d authentification du paquet de requête d authentification de certificats et la vérification de la signature du point d accès de destination ; une fois que la vérification de la signature a abouti avec succès, la vérification par le serveur d authentification des certificats du point d accès courant (AP) et du point d accès de destination, et l envoi d un paquet de réponse d authentification de certificats incluant des résultats de vérification de certificats et une signature du serveur d authentification au point d accès de destination et au point d accès courant (AP) () La méthode telle que revendiquée dans la revendication 1, dans laquelle les informations de clé incluent en sus une clé de session monodiffusion générée par négociation entre la station (STA) et le point d accès courant (AP) ; et la méthode comprend en sus : la réception par le point d accès de destination des informations de clé, puis l utilisation par le point d accès de destination de la clé de session monodiffusion pour négocier avec la station (STA) afin de générer une clé multidiffusion (8, 9). 4. La méthode telle que revendiquée dans la revendication 1, comprenant en sus : si le certificat du point d accès de destination est vérifié et donné comme invalide, la libération par le point d accès courant (AP) d une relation de liaison entre le point d accès courant (AP) et le point d accès de destination, et l information de la station que le point d accès de destination est illégal (6, 7).. Un système de réseau local sans fil, le système comprenant une station (STA), un point d accès courant (PA) qui a établi une association de sécurité avec la station (STA), et un point d accès de destination qui supporte une fonction de pré-authentification, caractérisé en ce que : le point d accès courant (AP) est configuré pour recevoir un paquet de début de pré-authentification envoyé par la station (STA), puis interagir avec le point d accès de destination pour qu ils vérifient des certificats d authentification du point d accès courant (AP) et du point d accès de destination l un pour l autre ; et si le certificat du point d accès de destination est vérifié et donné comme valide, le point d accès courant (AP) est en sus configuré pour envoyer des informations de clé de l association de sécurité établie avec la station (STA) par le point d accès courant (AP) au point d accès de destination ; le point d accès de destination est configuré pour sauvegarder les informations de clé ; dans lequel les informations de clé incluent une clé de base générée par négociation entre la station et le point d accès courant (AP). 6. Le système tel que revendiqué dans la revendication, dans lequel le système comprend en sus un serveur d authentification ; le point d accès courant (AP) est en sus configuré pour envoyer un paquet d initiation de pré-authentification au point d accès de destination, le paquet d initiation de pré-authentification incluant un certificat du point d accès courant (AP) et une signature

11 19 EP B1 du point d accès courant (AP) ; le point d accès de destination est en sus configuré pour recevoir le paquet d initiation de pré-authentification et vérifier la signature du point d accès courant (AP), et une fois que la vérification a abouti avec succès, pour envoyer un paquet de requête d authentification de certificats au serveur d authentification, le paquet de requête d authentification de certificats incluant le certificat du point d accès courant (AP), le certificat du point d accès de destination et une signature du point d accès de destination ; et le serveur d authentification est configuré pour recevoir le paquet de requête d authentification de certificats, et vérifier la signature du point d accès de destination, et une fois que la vérification a abouti avec succès, pour vérifier les certificats du point d accès courant (AP) et du point d accès de destination, et envoyer un paquet de réponse d authentification de certificats incluant des résultats de vérification de certificats et une signature du serveur d authentification au point d accès de destination et au point d accès courant (AP) Le système tel que revendiqué dans la revendication, dans lequel les informations de clé incluent en sus une clé de session monodiffusion générée par négociation entre la station et le point d accès courant (AP) ; le point d accès de destination est en sus configuré pour recevoir les informations de clé, puis utiliser la clé de session monodiffusion pour négocier avec la station afin de générer une clé multidiffusion

12 EP B1 12

13 EP B1 13

14 EP B1 14

15 EP B1 REFERENCES CITED IN THE DESCRIPTION This list of references cited by the applicant is for the reader s convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard. Patent documents cited in the description GB A [0003] CN A [004] 1

(51) Int Cl.: G06F 13/38 (2006.01) G06F 1/16 (2006.01)

(51) Int Cl.: G06F 13/38 (2006.01) G06F 1/16 (2006.01) (19) TEPZZ 9777B_T (11) EP 2 97 77 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 1.07.1 Bulletin 1/29 (1) Int Cl.: G06F 13/38 (06.01) G06F 1/16 (06.01)

More information

(51) Int Cl.: H04W 4/14 (2009.01)

(51) Int Cl.: H04W 4/14 (2009.01) (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 2 184 897 B1 (4) Date of publication and mention of the grant of the patent: 14.03.12 Bulletin 12/11 (21) Application number: 087774.3 (22) Date of filing:

More information

TEPZZ 9 Z5A_T EP 2 922 305 A1 (19) (11) EP 2 922 305 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

TEPZZ 9 Z5A_T EP 2 922 305 A1 (19) (11) EP 2 922 305 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art. (19) TEPZZ 9 ZA_T (11) EP 2 922 A1 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 13(4) EPC (43) Date of publication: 23.09.1 Bulletin 1/39 (21) Application number: 1386446.2 (22) Date

More information

(51) Int Cl.: G10L 15/26 (2006.01)

(51) Int Cl.: G10L 15/26 (2006.01) (19) TEPZZ Z 8B_T (11) EP 2 023 338 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 28.0.14 Bulletin 14/22 (1) Int Cl.: GL /26 (06.01) (21) Application

More information

(51) Int Cl.: B29C 41/20 (2006.01) F21S 4/00 (2006.01) H05K 3/28 (2006.01)

(51) Int Cl.: B29C 41/20 (2006.01) F21S 4/00 (2006.01) H05K 3/28 (2006.01) (19) TEPZZ 68698B_T (11) EP 2 68 698 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 18.11.201 Bulletin 201/47 (21) Application number: 11808612.3

More information

(51) Int Cl.: G06F 21/00 (2006.01) H04L 29/06 (2006.01)

(51) Int Cl.: G06F 21/00 (2006.01) H04L 29/06 (2006.01) (19) TEPZZ_8Z_7 _B_T (11) EP 1 801 721 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 16.06. Bulletin /24 (1) Int Cl.: G06F 21/00 (06.01) H04L 29/06

More information

(51) Int Cl.: H04L 9/32 (2006.01) G09C 1/00 (2006.01) G06F 21/33 (2013.01) H04L 29/06 (2006.01)

(51) Int Cl.: H04L 9/32 (2006.01) G09C 1/00 (2006.01) G06F 21/33 (2013.01) H04L 29/06 (2006.01) (19) TEPZZ Z48B_T (11) EP 2 2 048 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 13.0. Bulletin / (21) Application number: 1179238.6 (22) Date of

More information

(51) Int Cl.: H04N 7/16 (2011.01)

(51) Int Cl.: H04N 7/16 (2011.01) (19) TEPZZ_796 89B_T (11) EP 1 796 389 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 04.03.1 Bulletin 1/ (1) Int Cl.: H04N 7/16 (11.01) (21) Application

More information

(51) Int Cl.: G06F 9/455 (2006.01) G06F 9/50 (2006.01)

(51) Int Cl.: G06F 9/455 (2006.01) G06F 9/50 (2006.01) (19) TEPZZ 6987 B_T (11) EP 2 698 711 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 0.08.1 Bulletin 1/32 (21) Application number: 118777.8 (22) Date

More information

(51) Int Cl.: H04L 12/24 (2006.01)

(51) Int Cl.: H04L 12/24 (2006.01) (19) TEPZZ_8_9Z96B_T (11) EP 1 819 096 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 24..12 Bulletin 12/43 (21) Application number: 0818628.9 (22)

More information

*EP001173363B1* EP 1 173 363 B1 (19) (11) EP 1 173 363 B1 (12) EUROPEAN PATENT SPECIFICATION

*EP001173363B1* EP 1 173 363 B1 (19) (11) EP 1 173 363 B1 (12) EUROPEAN PATENT SPECIFICATION (19) Europäisches Patentamt European Patent Office Office européen des brevets *EP001173363B1* (11) EP 1 173 363 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of

More information

TEPZZ_768 7_B_T EP 1 768 371 B1 (19) (11) EP 1 768 371 B1 (12) EUROPEAN PATENT SPECIFICATION. (51) Int Cl.: H04M 19/04 (2006.01)

TEPZZ_768 7_B_T EP 1 768 371 B1 (19) (11) EP 1 768 371 B1 (12) EUROPEAN PATENT SPECIFICATION. (51) Int Cl.: H04M 19/04 (2006.01) (19) TEPZZ_768 7_B_T (11) EP 1 768 371 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 1.01.2014 Bulletin 2014/03 (1) Int Cl.: H04M 19/04 (2006.01)

More information

(51) Int Cl.: H04L 29/06 (2006.01) G06F 9/445 (2006.01) G06F 13/00 (2006.01)

(51) Int Cl.: H04L 29/06 (2006.01) G06F 9/445 (2006.01) G06F 13/00 (2006.01) (19) TEPZZ_7486_6B_T (11) EP 1 748 616 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 03.09.2014 Bulletin 2014/36 (1) Int Cl.: H04L 29/06 (2006.01)

More information

TEPZZ 68575_A_T EP 2 685 751 A1 (19) (11) EP 2 685 751 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

TEPZZ 68575_A_T EP 2 685 751 A1 (19) (11) EP 2 685 751 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art. (19) TEPZZ 687_A_T (11) EP 2 68 71 A1 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 3(4) EPC (43) Date of publication:.01.14 Bulletin 14/03 (21) Application number: 1278849.6 (22)

More information

EP 2 455 926 A1 (19) (11) EP 2 455 926 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 23.05.2012 Bulletin 2012/21

EP 2 455 926 A1 (19) (11) EP 2 455 926 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 23.05.2012 Bulletin 2012/21 (19) (12) EUROPEAN PATENT APPLICATION (11) EP 2 4 926 A1 (43) Date of publication: 23.0.2012 Bulletin 2012/21 (21) Application number: 11190024.7 (1) Int Cl.: G08B 2/14 (2006.01) G08B 2/00 (2006.01) G0B

More information

(51) Int Cl.: H04L 29/06 (2006.01) H04M 15/00 (2006.01)

(51) Int Cl.: H04L 29/06 (2006.01) H04M 15/00 (2006.01) (19) TEPZZ 7Z 74 B_T (11) EP 2 702 742 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.04. Bulletin /16 (21) Application number: 1171674.6 (22) Date

More information

(51) Int Cl.: H04L 29/06 (2006.01) H04M 3/56 (2006.01) H04M 3/44 (2006.01) H04L 12/18 (2006.01)

(51) Int Cl.: H04L 29/06 (2006.01) H04M 3/56 (2006.01) H04M 3/44 (2006.01) H04L 12/18 (2006.01) (19) TEPZZ Z9 79B_T (11) EP 2 091 179 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 17.12.14 Bulletin 14/1 (21) Application number: 07817029.7 (22)

More information

(51) Int Cl.: H04L 12/56 (2006.01)

(51) Int Cl.: H04L 12/56 (2006.01) (19) (11) EP 1 779 90 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 28.12.11 Bulletin 11/2 (21) Application number: 0783482.2 (22) Date of filing:

More information

(51) Int Cl.: H04L 29/06 (2006.01)

(51) Int Cl.: H04L 29/06 (2006.01) (19) TEPZZ Z9 96 B_T (11) EP 2 093 962 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 19.12.12 Bulletin 12/1 (21) Application number: 08800984.0 (22)

More information

(51) Int Cl.: G05F 3/26 (2006.01) G05F 3/24 (2006.01)

(51) Int Cl.: G05F 3/26 (2006.01) G05F 3/24 (2006.01) (19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 280 033 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 31.0.2006

More information

TEPZZ 87_546A T EP 2 871 546 A2 (19) (11) EP 2 871 546 A2 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: G05B 19/05 (2006.01)

TEPZZ 87_546A T EP 2 871 546 A2 (19) (11) EP 2 871 546 A2 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: G05B 19/05 (2006.01) (19) TEPZZ 87_46A T (11) EP 2 871 46 A2 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 13.0.1 Bulletin 1/ (1) Int Cl.: G0B 19/0 (06.01) (21) Application number: 14188238.1 (22) Date of filing:

More information

(51) Int Cl.: G06F 1/00 (2006.01)

(51) Int Cl.: G06F 1/00 (2006.01) (19) (11) EP 0 972 234 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 0.09.07 Bulletin 07/36 (21) Application number: 98913219.6 (22) Date of filing:

More information

(51) Int Cl.: H04L 12/58 (2006.01)

(51) Int Cl.: H04L 12/58 (2006.01) (19) (11) EP 1 628 448 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 21.11.07 Bulletin 07/47 (1) Int Cl.: H04L 12/8 (06.01) (21) Application number:

More information

(51) Int Cl.: H04L 29/06 (2006.01) H04Q 7/24 (2006.01) H04L 12/66 (2006.01)

(51) Int Cl.: H04L 29/06 (2006.01) H04Q 7/24 (2006.01) H04L 12/66 (2006.01) (19) (11) EP 1 314 291 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:..07 Bulletin 07/41 (21) Application number: 0194907.2 (22) Date of filing: 06.07.01

More information

(51) Int Cl.: H04L 9/32 (2006.01)

(51) Int Cl.: H04L 9/32 (2006.01) (19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 17 038 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 19.07.06

More information

EP 2 365 669 A1 (19) (11) EP 2 365 669 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 14.09.2011 Bulletin 2011/37

EP 2 365 669 A1 (19) (11) EP 2 365 669 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 14.09.2011 Bulletin 2011/37 (19) (12) EUROPEAN PATENT APPLICATION (11) EP 2 36 669 A1 (43) Date of publication: 14.09.11 Bulletin 11/37 (1) Int Cl.: H04L 12/8 (06.01) (21) Application number: 00243.6 (22) Date of filing:.03. (84)

More information

(56) References cited:

(56) References cited: (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 371 26 B1 (4) Date of publication and mention of the grant of the patent: 21.01.09 Bulletin 09/04 (21) Application number: 02711612.8 (22) Date of filing:

More information

TEPZZ 57_ A_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: H04L 29/06 ( )

TEPZZ 57_ A_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: H04L 29/06 ( ) (19) TEPZZ 57_ A_T (11) EP 2 571 223 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 20.03.2013 Bulletin 2013/12 (51) Int Cl.: H04L 29/06 (2006.01) (21) Application number: 11181229.3 (22)

More information

Title (fr) SOURCE IONIQUE INTERNE DOUBLE POUR PRODUCTION DE FAISCEAU DE PARTICULES AVEC UN CYCLOTRON

Title (fr) SOURCE IONIQUE INTERNE DOUBLE POUR PRODUCTION DE FAISCEAU DE PARTICULES AVEC UN CYCLOTRON Title (en) A TWIN INTERNAL ION SOURCE FOR PARTICLE BEAM PRODUCTION WITH A CYCLOTRON Title (de) DOPPELTE INTERNE IONENQUELLE FÜR PARTIKELSTRAHLHERSTELLUNG MIT EINEM ZYKLOTRON Title (fr) SOURCE IONIQUE INTERNE

More information

TEPZZ 974846A_T EP 2 974 846 A1 (19) (11) EP 2 974 846 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

TEPZZ 974846A_T EP 2 974 846 A1 (19) (11) EP 2 974 846 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art. (19) TEPZZ 974846A_T (11) EP 2 974 846 A1 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 153(4) EPC (43) Date of publication: 20.01.2016 Bulletin 2016/03 (21) Application number: 14874187.9

More information

(51) Int Cl.: H04L 12/58 (2006.01) H04L 29/06 (2006.01)

(51) Int Cl.: H04L 12/58 (2006.01) H04L 29/06 (2006.01) (19) TEPZZ_986 8 B_T (11) EP 1 986 382 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 19.02.14 Bulletin 14/08 (1) Int Cl.: H04L 12/8 (06.01) H04L

More information

TEPZZ 96 A_T EP 2 961 111 A1 (19) (11) EP 2 961 111 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

TEPZZ 96 A_T EP 2 961 111 A1 (19) (11) EP 2 961 111 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art. (19) TEPZZ 96 A_T (11) EP 2 961 111 A1 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 13(4) EPC (43) Date of publication:.12.1 Bulletin 1/3 (21) Application number: 147426.7 (22) Date

More information

TEPZZ 84 587A_T EP 2 843 587 A1 (19) (11) EP 2 843 587 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: G06F 21/64 (2013.01)

TEPZZ 84 587A_T EP 2 843 587 A1 (19) (11) EP 2 843 587 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: G06F 21/64 (2013.01) (19) TEPZZ 84 87A_T (11) EP 2 843 87 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 04.03.201 Bulletin 201/ (1) Int Cl.: G06F 21/64 (2013.01) (21) Application number: 13181902.1 (22) Date

More information

(51) Int Cl.: H04L 9/24 (2006.01) G06Q 10/00 (2012.01)

(51) Int Cl.: H04L 9/24 (2006.01) G06Q 10/00 (2012.01) (19) TEPZZ_4Z 68ZB_T (11) EP 1 2 680 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 01.04.1 Bulletin 1/14 (21) Application number: 02741722.9 (22)

More information

(51) Int Cl.: H04Q 3/00 (2006.01) H04M 1/72 (2006.01)

(51) Int Cl.: H04Q 3/00 (2006.01) H04M 1/72 (2006.01) (19) TEPZZ Z B_T (11) EP 2 0 113 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 16.09.1 Bulletin 1/38 (21) Application number: 07809477.8 (22) Date

More information

TEPZZ 6_Z76 A_T EP 2 610 763 A1 (19) (11) EP 2 610 763 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.:

TEPZZ 6_Z76 A_T EP 2 610 763 A1 (19) (11) EP 2 610 763 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: (19) TEPZZ 6_Z76 A_T (11) EP 2 6 763 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 03.07.2013 Bulletin 2013/27 (51) Int Cl.: G06F 17/30 (2006.01) (21) Application number: 12192220.7 (22)

More information

(51) Int Cl.: H04W 8/16 (2009.01) H04L 29/12 (2006.01) H04W 8/18 (2009.01)

(51) Int Cl.: H04W 8/16 (2009.01) H04L 29/12 (2006.01) H04W 8/18 (2009.01) (19) TEPZZ 474_77B_T (11) EP 2 474 177 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 0.11.14 Bulletin 14/4 (21) Application number: 747648.3 (22)

More information

TEPZZ 8898 7A_T EP 2 889 827 A1 (19) (11) EP 2 889 827 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: G06Q 40/04 (2012.01)

TEPZZ 8898 7A_T EP 2 889 827 A1 (19) (11) EP 2 889 827 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: G06Q 40/04 (2012.01) (19) TEPZZ 8898 7A_T (11) EP 2 889 827 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 01.07.201 Bulletin 201/27 (1) Int Cl.: G06Q 40/04 (2012.01) (21) Application number: 14199864.1 (22)

More information

(51) Int Cl.: H04L 29/06 (2006.01)

(51) Int Cl.: H04L 29/06 (2006.01) (19) (11) EP 2 07 816 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 04.0.11 Bulletin 11/18 (21) Application number: 07804833.7 (22) Date of filing:

More information

TEPZZ A_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION

TEPZZ A_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION (19) TEPZZ 89949A_T (11) EP 2 899 49 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 29.07.201 Bulletin 201/31 (21) Application number: 111986. (1) Int Cl.: G01R 1/08 (2006.01) G01R 19/27

More information

TEPZZ 5Z _9_B_T EP 2 502 191 B1 (19) (11) EP 2 502 191 B1 (12) EUROPEAN PATENT SPECIFICATION

TEPZZ 5Z _9_B_T EP 2 502 191 B1 (19) (11) EP 2 502 191 B1 (12) EUROPEAN PATENT SPECIFICATION (19) TEPZZ Z _9_B_T (11) EP 2 02 191 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 17.06.1 Bulletin 1/2 (21) Application number: 787872.0 (22) Date

More information

(51) Int Cl.: H04L 29/06 (2006.01) H04L 12/26 (2006.01) H04M 3/22 (2006.01) H04M 7/00 (2006.01)

(51) Int Cl.: H04L 29/06 (2006.01) H04L 12/26 (2006.01) H04M 3/22 (2006.01) H04M 7/00 (2006.01) (19) TEPZZ 48786B_T (11) EP 2 48 786 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 23.03.16 Bulletin 16/12 (21) Application number: 806012.0 (22)

More information

(51) Int Cl.: G06F 1/00 (2006.01)

(51) Int Cl.: G06F 1/00 (2006.01) (19) TEPZZ_4 Z4ZB_T (11) EP 1 433 040 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 11.11.201 Bulletin 201/46 (21) Application number: 0277267.9

More information

TEPZZ 65Z79 A_T EP 2 650 793 A1 (19) (11) EP 2 650 793 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

TEPZZ 65Z79 A_T EP 2 650 793 A1 (19) (11) EP 2 650 793 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art. (19) TEPZZ 65Z79 A_T (11) EP 2 650 793 A1 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 153(4) EPC (43) Date of publication: 16.10.2013 Bulletin 2013/42 (21) Application number: 12818771.3

More information

(51) Int Cl.: C08K 5/523 (2006.01) C08K 5/521 (2006.01) C08K 5/52 (2006.01) C08G 64/00 (2006.01)

(51) Int Cl.: C08K 5/523 (2006.01) C08K 5/521 (2006.01) C08K 5/52 (2006.01) C08G 64/00 (2006.01) (19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 0 78 966 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 01.03.06

More information

(51) Int Cl.: H04L 12/00 (2006.01)

(51) Int Cl.: H04L 12/00 (2006.01) (19) (11) EP 2 119 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 14.12.11 Bulletin 11/0 (21) Application number: 0789037.9 (22) Date of filing: 14.12.07

More information

(51) Int Cl.: H04L 29/12 (2006.01)

(51) Int Cl.: H04L 29/12 (2006.01) (19) (11) EP 1 4 260 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.09.08 Bulletin 08/37 (1) Int Cl.: H04L 29/12 (06.01) (21) Application number:

More information

TEPZZ ZZ _5ZA_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: B60L 15/20 ( ) B60W 30/18 (2012.

TEPZZ ZZ _5ZA_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: B60L 15/20 ( ) B60W 30/18 (2012. (19) TEPZZ ZZ _ZA_T (11) EP 3 002 0 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 06.04.2016 Bulletin 2016/14 (1) Int Cl.: B60L /20 (2006.01) B60W 30/18 (2012.01) (21) Application number:

More information

EP 1 368 959 B1 (19) (11) EP 1 368 959 B1 (12) EUROPEAN PATENT SPECIFICATION

EP 1 368 959 B1 (19) (11) EP 1 368 959 B1 (12) EUROPEAN PATENT SPECIFICATION (19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 368 99 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.11.06

More information

(51) Int Cl.: H04N 7/52 (2011.01)

(51) Int Cl.: H04N 7/52 (2011.01) (19) TEPZZ_9776 B_T (11) EP 1 977 611 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 16.01.13 Bulletin 13/03 (21) Application number: 0683819.1 (22)

More information

EP 2 492 881 A2 (19) (11) EP 2 492 881 A2 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 29.08.2012 Bulletin 2012/35

EP 2 492 881 A2 (19) (11) EP 2 492 881 A2 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 29.08.2012 Bulletin 2012/35 (19) (12) EUROPEAN PATENT APPLICATION (11) EP 2 492 881 A2 (43) Date of publication: 29.08.2012 Bulletin 2012/35 (51) Int Cl.: G08B 13/16 (2006.01) G08B 25/08 (2006.01) (21) Application number: 12386006.6

More information

(51) Int Cl.: G06Q 20/00 (2006.01) G06F 21/00 (2006.01)

(51) Int Cl.: G06Q 20/00 (2006.01) G06F 21/00 (2006.01) (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 24 008 B1 (4) Date of publication and mention of the grant of the patent: 29.12. Bulletin /2 (21) Application number: 00992990.2 (22) Date of filing: 31..00

More information

(51) Int Cl.: G08B 21/02 (2006.01) H04M 11/04 (2006.01)

(51) Int Cl.: G08B 21/02 (2006.01) H04M 11/04 (2006.01) (19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 224 642 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 1.03.06

More information

(51) Int Cl.: H04L 12/56 (2006.01) H04L 12/28 (2006.01) H04M 7/00 (2006.01)

(51) Int Cl.: H04L 12/56 (2006.01) H04L 12/28 (2006.01) H04M 7/00 (2006.01) (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 129 0 B1 (4) Date of publication and mention of the grant of the patent: 09.04.08 Bulletin 08/1 (21) Application number: 9996836.2 (22) Date of filing:

More information

(51) Int Cl.: H04L 29/06 (2006.01) H04L 12/22 (2006.01)

(51) Int Cl.: H04L 29/06 (2006.01) H04L 12/22 (2006.01) (19) (11) EP 0 998 091 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 31.01.07 Bulletin 07/0 (1) Int Cl.: H04L 29/06 (06.01) H04L 12/22 (06.01) (21)

More information

EP 2 133 666 A1 (19) (11) EP 2 133 666 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 16.12.2009 Bulletin 2009/51

EP 2 133 666 A1 (19) (11) EP 2 133 666 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 16.12.2009 Bulletin 2009/51 (19) (12) EUROPEAN PATENT APPLICATION (11) EP 2 133 666 A1 (43) Date of publication: 16.12.2009 Bulletin 2009/51 (21) Application number: 08104321.8 (51) Int Cl.: G01F 1/075 (2006.01) G01F 1/115 (2006.01)

More information

(51) Int Cl.: H05K 1/02 (2006.01)

(51) Int Cl.: H05K 1/02 (2006.01) (19) (11) EP 1 229 767 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 20.01.2010 Bulletin 2010/03 (1) Int Cl.: H0K 1/02 (2006.01) (21) Application

More information

TEPZZ_9 6Z46B_T EP 1 926 046 B1 (19) (11) EP 1 926 046 B1 (12) EUROPEAN PATENT SPECIFICATION. (51) Int Cl.:

TEPZZ_9 6Z46B_T EP 1 926 046 B1 (19) (11) EP 1 926 046 B1 (12) EUROPEAN PATENT SPECIFICATION. (51) Int Cl.: (19) TEPZZ_9 6Z46B_T (11) EP 1 926 046 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 21.08.13 Bulletin 13/34 (1) Int Cl.: G06F 19/00 (11.01) (21)

More information

(51) Int Cl.: H04M 3/50 (2006.01)

(51) Int Cl.: H04M 3/50 (2006.01) (19) TEPZZ_Z48_64B_T (11) EP 1 048 164 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 07.01.1 Bulletin 1/02 (21) Application number: 9893133.0 (22)

More information

(51) Int Cl.: H04B 3/23 (2006.01)

(51) Int Cl.: H04B 3/23 (2006.01) (19) (11) EP 0 983 638 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 21.03.12 Bulletin 12/12 (21) Application number: 989232.7 (22) Date of filing:

More information

TEPZZ 69 49A_T EP 2 693 349 A1 (19) (11) EP 2 693 349 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: G06F 17/30 (2006.01)

TEPZZ 69 49A_T EP 2 693 349 A1 (19) (11) EP 2 693 349 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: G06F 17/30 (2006.01) (19) TEPZZ 69 49A_T (11) EP 2 693 349 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 0.02.2014 Bulletin 2014/06 (1) Int Cl.: G06F 17/30 (2006.01) (21) Application number: 13160696.4 (22)

More information

(51) Int Cl.: H04M 3/42 (2006.01) H04Q 3/00 (2006.01)

(51) Int Cl.: H04M 3/42 (2006.01) H04Q 3/00 (2006.01) (19) (11) EP 1 696 646 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 07.03.12 Bulletin 12/ (1) Int Cl.: H04M 3/42 (06.01) H04Q 3/00 (06.01) (21)

More information

TEPZZ_57 7_9B_T EP 1 573 719 B1 (19) (11) EP 1 573 719 B1 (12) EUROPEAN PATENT SPECIFICATION

TEPZZ_57 7_9B_T EP 1 573 719 B1 (19) (11) EP 1 573 719 B1 (12) EUROPEAN PATENT SPECIFICATION (19) TEPZZ_7 7_9B_T (11) EP 1 73 719 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.11.13 Bulletin 13/47 (21) Application number: 0277098.3 (22) Date

More information

(51) Int Cl.: H04L 9/32 (2006.01) H04B 7/00 (2006.01) A61N 1/37 (2006.01)

(51) Int Cl.: H04L 9/32 (2006.01) H04B 7/00 (2006.01) A61N 1/37 (2006.01) (19) TEPZZ_4977B_T (11) EP 1 49 77 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.12.14 Bulletin 14/0 (21) Application number: 03723989.4 (22) Date

More information

(51) Int Cl.: G06F 11/20 (2006.01)

(51) Int Cl.: G06F 11/20 (2006.01) (19) TEPZZ 66_ B_T (11) EP 2 366 13 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 13.0.201 Bulletin 201/20 (21) Application number: 08878183.6 (22)

More information

(51) Int Cl. 7 : G06F 11/22

(51) Int Cl. 7 : G06F 11/22 (19) Europäisches Patentamt European Patent Office Office européen des brevets *EP00084463B1* (11) EP 0 844 63 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of

More information

(51) Int Cl.: H04L 29/06 (2006.01) H04L 12/24 (2006.01)

(51) Int Cl.: H04L 29/06 (2006.01) H04L 12/24 (2006.01) (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 231 74 B1 (4) Date of publication and mention of the grant of the patent: 16.03.11 Bulletin 11/11 (1) Int Cl.: H04L 29/06 (06.01) H04L 12/24 (06.01) (21)

More information

(51) Int Cl.: H04L 29/06 (2006.01)

(51) Int Cl.: H04L 29/06 (2006.01) (19) (11) EP 2 122 991 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.04.11 Bulletin 11/16 (21) Application number: 087313.2 (22) Date of filing:

More information

EP 1 976 249 B1 (19) (11) EP 1 976 249 B1 (12) EUROPEAN PATENT SPECIFICATION

EP 1 976 249 B1 (19) (11) EP 1 976 249 B1 (12) EUROPEAN PATENT SPECIFICATION (19) (11) EP 1 976 249 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 11.03.09 Bulletin 09/11 (1) Int Cl.: H04M 1/72 (06.01) G06F 9/44 (06.01) H04W

More information

TEPZZ ZZ 766A_T EP 3 002 766 A1 (19) (11) EP 3 002 766 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: H01F 5/02 (2006.01) H01F 5/04 (2006.

TEPZZ ZZ 766A_T EP 3 002 766 A1 (19) (11) EP 3 002 766 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: H01F 5/02 (2006.01) H01F 5/04 (2006. (19) TEPZZ ZZ 766A_T (11) EP 3 002 766 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 06.04.16 Bulletin 16/14 (1) Int Cl.: H01F /02 (06.01) H01F /04 (06.01) (21) Application number: 1186712.4

More information

(51) Int Cl.: H04L 12/46 (2006.01) H04L 29/14 (2006.01) H04L 29/12 (2006.01)

(51) Int Cl.: H04L 12/46 (2006.01) H04L 29/14 (2006.01) H04L 29/12 (2006.01) (19) (11) EP 1 342 344 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 03.06.09 Bulletin 09/23 (21) Application number: 019639.0 (22) Date of filing:.08.01

More information

(51) Int Cl.: H04L 12/56 (2006.01) H04L 12/24 (2006.01) H04L 29/06 (2006.01) H04L 29/08 (2006.01)

(51) Int Cl.: H04L 12/56 (2006.01) H04L 12/24 (2006.01) H04L 29/06 (2006.01) H04L 29/08 (2006.01) (19) (11) EP 2 184 89 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 16.03.11 Bulletin 11/11 (1) Int Cl.: H04L 12/6 (06.01) H04L 12/24 (06.01) H04L

More information

(56) References cited:

(56) References cited: (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 04 B1 (4) Date of publication and mention of the grant of the patent: 26.12.07 Bulletin 07/2 (21) Application number: 03742391.0 (22) Date of filing: 02.07.03

More information

(51) Int Cl.: G06F 12/14 (2006.01) G06F 17/00 (2006.01) H04M 1/66 (2006.01) G06F 1/00 (2006.01)

(51) Int Cl.: G06F 12/14 (2006.01) G06F 17/00 (2006.01) H04M 1/66 (2006.01) G06F 1/00 (2006.01) (19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 221 098 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 07.06.06

More information

TEPZZ 69 _ZA T EP 2 692 310 A2 (19) (11) EP 2 692 310 A2. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

TEPZZ 69 _ZA T EP 2 692 310 A2 (19) (11) EP 2 692 310 A2. (12) EUROPEAN PATENT APPLICATION published in accordance with Art. (19) TEPZZ 69 _ZA T (11) EP 2 692 3 A2 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 13(4) EPC (43) Date of publication: 0.02.14 Bulletin 14/06 (21) Application number: 1276632.0 (22)

More information

(51) Int Cl.: G06F 11/14 (2006.01)

(51) Int Cl.: G06F 11/14 (2006.01) (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 08 414 B1 (4) Date of publication and mention of the grant of the patent: 04.03.09 Bulletin 09/ (1) Int Cl.: G06F 11/14 (06.01) (21) Application number:

More information

(51) Int Cl.: G01C 21/36 (2006.01)

(51) Int Cl.: G01C 21/36 (2006.01) (19) TEPZZ_ 678B_T (11) EP 1 26 78 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.09.14 Bulletin 14/37 (1) Int Cl.: G01C 21/36 (06.01) (21) Application

More information

EP 1 719 355 B1 (19) (11) EP 1 719 355 B1 (12) EUROPEAN PATENT SPECIFICATION

EP 1 719 355 B1 (19) (11) EP 1 719 355 B1 (12) EUROPEAN PATENT SPECIFICATION (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 719 3 B1 (4) Date of publication and mention of the grant of the patent: 29.09. Bulletin /39 (21) Application number: 03796738.7 (22) Date of filing: 26.11.03

More information

(51) Int Cl.: H04L 29/08 (2006.01) H04L 29/06 (2006.01)

(51) Int Cl.: H04L 29/08 (2006.01) H04L 29/06 (2006.01) (19) TEPZZ_897 6B_T (11) EP 1 897 336 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 12.08.1 Bulletin 1/33 (21) Application number: 06779738.1 (22)

More information

TEPZZ_ 8_69B_T EP 1 338 169 B1 (19) (11) EP 1 338 169 B1 (12) EUROPEAN PATENT SPECIFICATION

TEPZZ_ 8_69B_T EP 1 338 169 B1 (19) (11) EP 1 338 169 B1 (12) EUROPEAN PATENT SPECIFICATION (19) TEPZZ_ 8_69B_T (11) EP 1 338 169 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 27.03.13 Bulletin 13/13 (21) Application number: 01997179. (22)

More information

(51) Int Cl.: H04L 12/24 (2006.01)

(51) Int Cl.: H04L 12/24 (2006.01) (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 487 11 B1 (4) Date of publication and mention of the grant of the patent: 01.07.09 Bulletin 09/27 (1) Int Cl.: H04L 12/24 (06.01) (21) Application number:

More information

(51) Int Cl.: H04L 12/10 (2006.01) H04L 12/40 (2006.01)

(51) Int Cl.: H04L 12/10 (2006.01) H04L 12/40 (2006.01) (19) TEPZZ 4799 B_T (11) EP 2 479 92 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 14.0.14 Bulletin 14/ (1) Int Cl.: H04L 12/ (06.01) H04L 12/ (06.01)

More information

(51) Int Cl.: G06F 11/14 (2006.01) G06F 17/30 (2006.01)

(51) Int Cl.: G06F 11/14 (2006.01) G06F 17/30 (2006.01) (19) TEPZZ_97799B_T (11) EP 1 97 799 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 06.0. Bulletin /19 (1) Int Cl.: G06F 11/14 (06.01) G06F 17/ (06.01)

More information

(51) Int Cl.: H04L 9/00 (2006.01) H04K 1/00 (2006.01) G06F 1/04 (2006.01) G06F 1/06 (2006.01) G06F 1/08 (2006.01) G07F 7/10 (2006.

(51) Int Cl.: H04L 9/00 (2006.01) H04K 1/00 (2006.01) G06F 1/04 (2006.01) G06F 1/06 (2006.01) G06F 1/08 (2006.01) G07F 7/10 (2006. (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 481 3 B1 (4) Date of publication and mention of the grant of the patent: 24.03. Bulletin /12 (21) Application number: 0371602.6 (22) Date of filing: 12.02.03

More information

(51) Int Cl.: H04L 12/26 (2006.01) H04L 12/24 (2006.01)

(51) Int Cl.: H04L 12/26 (2006.01) H04L 12/24 (2006.01) (19) TEPZZ 4 686 B_T (11) EP 2 426 862 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 12.08.1 Bulletin 1/33 (21) Application number: 769368.1 (22)

More information

*EP001520563A1* EP 1 520 563 A1 (19) (11) EP 1 520 563 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 06.04.2005 Bulletin 2005/14

*EP001520563A1* EP 1 520 563 A1 (19) (11) EP 1 520 563 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 06.04.2005 Bulletin 2005/14 (19) Europäisches Patentamt European Patent Office Office européen des brevets *EP001520563A1* (11) EP 1 520 563 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 06.04.2005 Bulletin 2005/14

More information

(51) Int Cl.: G08G 1/14 (2006.01) G07B 15/02 (2006.01) G10L 15/28 (2006.01)

(51) Int Cl.: G08G 1/14 (2006.01) G07B 15/02 (2006.01) G10L 15/28 (2006.01) (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 862 986 B1 (4) Date of publication and mention of the grant of the patent: 14.07. Bulletin /28 (1) Int Cl.: G08G 1/14 (06.01) G07B 1/02 (06.01) GL 1/28

More information

(51) Int Cl.: H04L 12/26 (2006.01)

(51) Int Cl.: H04L 12/26 (2006.01) (19) TEPZZ 84 8B_T (11) EP 2 84 338 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 23.09.1 Bulletin 1/39 (1) Int Cl.: H04L 12/26 (06.01) (21) Application

More information

(51) Int Cl.: G06F 17/00 (2006.01) G06F 11/20 (2006.01)

(51) Int Cl.: G06F 17/00 (2006.01) G06F 11/20 (2006.01) (19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 388 08 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 29.11.06

More information

TEPZZ 87657ZA_T EP 2 876 570 A1 (19) (11) EP 2 876 570 A1 (12) EUROPEAN PATENT APPLICATION

TEPZZ 87657ZA_T EP 2 876 570 A1 (19) (11) EP 2 876 570 A1 (12) EUROPEAN PATENT APPLICATION (19) TEPZZ 8767ZA_T (11) EP 2 876 70 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 27.0.201 Bulletin 201/22 (21) Application number: 14189809.8 (1) Int Cl.: G06F 21/34 (2013.01) G08B 13/196

More information

EP 1 675 420 A1 (19) (11) EP 1 675 420 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 28.06.2006 Bulletin 2006/26

EP 1 675 420 A1 (19) (11) EP 1 675 420 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 28.06.2006 Bulletin 2006/26 (19) Europäisches Patentamt European Patent Office Office européen des brevets (12) EUROPEAN PATENT APPLICATION (11) EP 1 67 4 A1 (43) Date of publication: 28.06.06 Bulletin 06/26 (1) Int Cl.: H04Q 7/34

More information

(51) Int Cl.: H04L 29/12 (2006.01) H04L 12/56 (2006.01)

(51) Int Cl.: H04L 29/12 (2006.01) H04L 12/56 (2006.01) (19) (11) EP 1 993 266 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 04.07.12 Bulletin 12/27 (1) Int Cl.: H04L 29/12 (06.01) H04L 12/6 (06.01) (21)

More information

(51) Int Cl.: G06F 11/14 (2006.01) G06F 12/08 (2006.01)

(51) Int Cl.: G06F 11/14 (2006.01) G06F 12/08 (2006.01) (19) TEPZZ 488949B_T (11) EP 2 488 949 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 07.0.14 Bulletin 14/19 (21) Application number: 76367.4 (22)

More information

(51) Int Cl.: H04L 29/06 (2006.01) H04L 29/12 (2006.01)

(51) Int Cl.: H04L 29/06 (2006.01) H04L 29/12 (2006.01) (19) TEPZZ_8 Z _9B_T (11) EP 1 8 319 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 17.06.1 Bulletin 1/2 (21) Application number: 08163. (22) Date

More information

(51) Int Cl.: H04L 29/06 (2006.01)

(51) Int Cl.: H04L 29/06 (2006.01) (19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 146 711 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 13.09.06

More information

(51) Int Cl.: H04L 12/66 (2006.01)

(51) Int Cl.: H04L 12/66 (2006.01) (19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 73 43 B1 (4) Date of publication and mention of the grant of the patent: 18.01.12 Bulletin 12/03 (21) Application number: 02792. (22) Date of filing: 26.12.02

More information

TEPZZ ZZ5974A_T EP A1 (19) (11) EP A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

TEPZZ ZZ5974A_T EP A1 (19) (11) EP A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art. (19) TEPZZ ZZ974A_T (11) EP 3 00 974 A1 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 13(4) EPC (43) Date of publication: 13.04.16 Bulletin 16/1 (21) Application number: 1480372.8

More information

*EP000961991B1* EP 0 961 991 B1 (19) (11) EP 0 961 991 B1 (12) EUROPEAN PATENT SPECIFICATION

*EP000961991B1* EP 0 961 991 B1 (19) (11) EP 0 961 991 B1 (12) EUROPEAN PATENT SPECIFICATION (19) Europäisches Patentamt European Patent Office Office européen des brevets *EP000961991B1* (11) EP 0 961 991 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of

More information

TEPZZ_98 47ZB_T EP 1 982 470 B1 (19) (11) EP 1 982 470 B1 (12) EUROPEAN PATENT SPECIFICATION

TEPZZ_98 47ZB_T EP 1 982 470 B1 (19) (11) EP 1 982 470 B1 (12) EUROPEAN PATENT SPECIFICATION (19) TEPZZ_98 47ZB_T (11) EP 1 982 470 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.04.14 Bulletin 14/18 (21) Application number: 077168.0 (22)

More information

Our patent and trade mark attorneys are here to help you protect and profit from your ideas, making sure they re working every bit as hard as you do.

Our patent and trade mark attorneys are here to help you protect and profit from your ideas, making sure they re working every bit as hard as you do. Our patent and trade mark attorneys are here to help you protect and profit from your ideas, making sure they re working every bit as hard as you do. Our people work with everyone from multi-nationals

More information