(51) Int Cl.: H04L 29/06 ( )
|
|
|
- Dora Marshall
- 10 years ago
- Views:
Transcription
1 (19) (11) EP B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: Bulletin 11/16 (21) Application number: (22) Date of filing: (1) Int Cl.: H04L 29/06 (06.01) (86) International application number: PCT/US08/0739 (87) International publication number: WO 08/1124 ( Gazette 08/38) (4) METHOD FOR ESTABLISHING SECURE ASSOCIATIONS WITHIN A COMMUNICATION NETWORK VERFAHREN ZUR HERSTELLUNG SICHERER VERBINDUNGEN IN EINEM KOMMUNIKATIONSNETZ PROCÉDÉ D ÉTABLISSEMENT D ASSOCIATIONS SÉCURISÉES DANS UN RÉSEAU DE COMMUNICATION (84) Designated Contracting States: AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR () Priority: US P US 3747 (43) Date of publication of application: Bulletin 09/48 (73) Proprietor: Motorola Solutions, Inc. Schaumburg IL (US) (72) Inventors: BRASKICH, Anthony J. Palatine, IL (US) BARKER JR., Charles R. Olrando, FL 3283 (US) EMEOTT, Stephen P. Rolling Meadows, IL (US) STRUTT, Guenael T. Sanford, FL (US) (74) Representative: McLeish, Nicholas Alistair Maxwell Boult Wade Tennant Verulam Gardens 70 Gray s Inn Road London WC1X 8BT (GB) (6) References cited: WO-A-06/ US-A TONY BRASKICH ET AL: "Efficient Mesh Security and Link Establishment" IEEE /1470R3,, 1 November 06 ( ), pages 1-60, XP EP B1 Note: Within nine months of the publication of the mention of the grant of the European patent in the European Patent Bulletin, any person may give notice to the European Patent Office of opposition to that patent, in accordance with the Implementing Regulations. Notice of opposition shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention). Printed by Jouve, 7001 PARIS (FR)
2 1 EP B1 2 Description Field of the Invention [0001] The present invention relates generally to wireless communications and more particularly to establishing secure associations between devices operating within a communication network. Background [0002] An infrastructure-based wireless network typically includes a communication network with fixed and wired gateways. Many infrastructure-based wireless networks employ a mobile unit or host which communicates with a fixed base station that is coupled to a wired network. The mobile unit can move geographically while it is communicating over a wireless link to the base station. When the mobile unit moves out of range of one base station, it may connect or "handover" to a new base station and starts communicating with the wired network through the new base station. [0003] In comparison to infrastructure-based wireless networks, such as cellular networks or satellite networks, ad hoc networks are self-forming networks which can operate in the absence of any fixed infrastructure, and in some cases the ad hoc network is formed entirely of mobile nodes. An ad hoc network typically includes a number of geographically-distributed, potentially mobile units, sometimes referred to as "nodes," which are wirelessly connected to each other by one or more links (e.g., radio frequency communication channels). The nodes can communicate with each other over a wireless media without the support of an infrastructure-based or wired network. [0004] A wireless mesh network is a collection of wireless nodes or devices organized in a decentralized manner to provide range extension by allowing nodes to be reached across multiple hops. In a multi-hop network, communication packets sent by a source node can be relayed through one or more intermediary nodes before reaching a destination node. A large network can be realized using intelligent access points (IAP) which provide wireless nodes with access to a wired backhaul. [000] Wireless ad hoc networks can include both routable (meshed) nodes and non-routable (nonmeshed) nodes. Meshed or "routable" nodes are devices which may follow a standard wireless protocol such as Institute of Electrical and Electronics Engineers (IEEE) s or j. These devices are responsible for forwarding packets to/from the proxy devices which are associated with them. Non-meshed or "non-routable" nodes are devices following a standard wireless protocol such as IEEE 802:11 a, b, e, g or IEEE but not participating in any kind of routing. These devices are "proxied" by meshed devices which establish routes for them. [0006] As wireless communications networks become more prevalent, security continues to be a major concern to both communication network providers and end users. This is most evident when using a mobile wireless network where the security environment can offer the greatest challenges since data may be readily received and manipulated by many nodes. The radio links used in a wireless network expose the signaling and data traversing the network to eavesdroppers and/or would-be hackers. In a multi-hop wireless network, this requires each link in the meshed devices to have a unique security association established through the multi-hop authentication and key management process. Then, the air frames on the link can be protected with the established security associations. [0007] Today s security solutions typically establish a security association between an authentication server and a node joining the network. Unfortunately, it can take ten seconds for the node to complete authentication with an authentication server. When a node joins an ad hoc network and establishes a secure link with one of its neighbors, it is advantageous to provide an accelerated security mechanism enabling secure links between the node and other neighboring nodes that are also members of the network quickly. One example of secure link establishment is disclosed in TONY BRASKICH ET AL: "Efficient Mesh Security and link Establishment" IEEE /1470R3, 1 November 06. Brief Description of the Figures [0008] The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views and which together with the detailed description below are incorporated in and form part of the specification, serve to further illustrate various embodiments and to explain various principles and advantages all in accordance with the present invention. [0009] FIG. 1 is an example communication network for implementation of some embodiments of the present invention. [00] FIG. 2 illustrates a message flow diagram in accordance with some embodiments of the present invention. [0011] FIG. 3 illustrates more detail of the message flow diagram of FIG. 2 in accordance with some embodiments of the present invention. [0012] FIGs. 4,, and 6 are flowcharts illustrating example operations of a mesh point within the network of FIG. 1 in accordance with some embodiments of the present invention. [0013] Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of embodiments of the present invention. 2
3 3 EP B1 4 Detailed Description [0014] Before describing in detail embodiments that are in accordance with the present invention, it should be observed that the embodiments reside primarily in combinations of method steps and apparatus components related to establishing secure associations within an adhoc wireless network. Accordingly, the apparatus components and method steps have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein. [001] In this document, relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a nonexclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by "comprises... a" does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises the element. [0016] It will be appreciated that embodiments of the invention described herein may be comprised of one or more conventional processors and unique stored program instructions that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of establishing secure associations within an adhoc wireless network described herein. The non-processor circuits may include, but are not limited to, a radio receiver, a radio transmitter, signal drivers, clock circuits, power source circuits, and user input devices. As such, these functions may be interpreted as steps of a method to perform establishing secure associations within an adhoc wireless network. Alternatively, some or all functions could be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic. Of course, a combination of the two approaches could be used. Thus, methods and means for these functions have been described herein. Further, it is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation. [0017] Within ad hoc networks it is desirable, and many times necessary, to establish at least one, and in many cases several, peer links with one or more peer mesh point (MP). MPs will not transmit data frames or management frames other than the ones used for link establishment until the peer link has been established successfully. The MP drops such frames from a peer MP if it considers the link is not established. [0018] A MP must be able to establish at least one mesh link with a peer MP, and may be able to establish many such links simultaneously. It is possible that there are more candidate peer MPs than the device is capable of maintaining peer links with simultaneously. In this case, the MP selects which MPs to establish peer links with based on some measure of signal quality or other information received from candidate neighbor MPs. [0019] The MP starts the peer link establishment protocol, for example, in cases such as the two following scenarios. In each of these scenarios, the MP is issued a command by the IEEE station management entity (SME). In a first scenario, the MP has not reached the maximum number of neighbors and is willing to accept new connections. In this scenario, a Passive Open command causes the MP to start a link establishment protocol instance and listen to incoming connection requests. In an exemplary embodiment of the invention, the Passive Open command is a MLME-PassivePeer- LinkOpen().request primitive. In a second scenario, the MP agrees with the profile carried in a beacon or a probe response from a peer MP and it has not reached the maximum number of neighbors. An Active Open command is issued that causes the MP to initiate a link establishment protocol instance with the peer MP identified as peerid and actively send a connection request to this peer MP. In an exemplary embodiment of the invention, the Active Open command is a MLME-ActivePeerLinkOpen(peerId).request primitive. [00] The MP can also end the protocol instance, for example, as in three following scenarios. In a first scenario, the MP encounters failure during the peer link establishment procedure. As a result, the MP sends a connection close request. In a second case, the MP receives a connection close request from the peer MP. In a third case, the connection is closed because the MP receives a peer link cancel signal. The SME can issue a Peer Link Cancel command. In an exemplary embodiment of the invention, the Peer Link Cancel command is a MLME-CancelPeerLink().request primitive. This signal can be triggered by some internal event. For instance, the MP discovers the data transmission failure. [0021] The present invention provides an efficient means of establishing a peer link between two members of an adhoc wireless network via a peer link establishment handshake while simultaneously establishing a security association between the two. The objective is to define a handshake using the fewest number of messages possible while providing mutual authentication, se- 3
4 EP B1 6 curely transporting and deriving session keys, and ensuring predictable role negotiation. [0022] The present invention provides a method of performing a joint security association and peer link establishment handshake in an efficient mesh security association (EMSA) architecture. The method requires three messages, namely one peer link open, one peer link setup, and one peer link response, in the case that one of the two mesh points initiates the handshake, or four messages, namely two peer link open and two peer link confirms, in the event that a simultaneous open occurs. The method includes built-in support for security suite negotiation and an 802.1X role determination procedure, which provides improved support for cached keys, even in the event both parties cannot retrieve keys from an EMSA mesh key distributor (MKD). [0023] FIG. 1 illustrates an ad hoc wireless network 0 in accordance with some embodiments of the present invention. The ad hoc wireless network 0, for example, can be a mesh enabled architecture (MEA) network or an I network (i.e a, b, g, or s). It will be appreciated by those of ordinary skill in the art that the communication network 0 in accordance with the present invention can alternatively comprise any packetized communication network where packets are forwarded across multiple wireless hops. For example, the ad hoc wireless network 0 can be a network utilizing packet data protocols such as OFDMA (orthogonal frequency division multiple access), TDMA (time division multiple access), GPRS (General Packet Radio Service) and EGPRS (Enhanced GPRS). Additionally, each wireless hop of the packetized communication network 0 may either employ the same packet data protocol as the other hops, or a unique packet data protocol per hop. [0024] As illustrated in FIG. 1, the communication network 0 includes a plurality of mesh points 2-1 through 2-n (referred to also as nodes 2 or mobile nodes 2 or communication devices 2), and can, but is not required to, include a fixed network 4 having a plurality of intelligent access points (IAP) 6-1, 6-2,... 6-n (referred to generally as nodes 6 or access points 6), for providing mesh points 2 with access to the fixed network 4. The fixed network 4 can include, for example, a core local access network (LAN), and a plurality of servers and gateway routers to provide network nodes with access to other networks, such as other ad-hoc networks, a public switched telephone network (PSTN) and the Internet. The communication network 0 further can include a plurality of fixed or mobile routers 7-1 through 7-n (referred to generally as routers 7 or nodes 7 or communication devices 7) for routing data packets between other nodes 2, 6 or 7. It is noted that for purposes of this discussion, the nodes discussed above can be collectively referred to as "nodes 2, 6 and 7", or simply "nodes" or alternatively as "communication devices." [002] As can be appreciated by one skilled in the art, the nodes 2, 6 and 7 are capable of communicating with each other directly or indirectly. When communicating indirectly, one or more other nodes 2, 6 or 7, can operate as a router or routers for forwarding or relaying packets being sent between nodes. [0026] Efficient mesh security association services are used to establish link security between two Mesh Points (MPs) 2 in a wireless mesh network 0. EMSA services are provided through the use of a mesh key hierarchy, a hierarchy of derived keys that is established through the use of a Pre-Shared Key (PSK) or when a MP performs IEEE X authentication using an extensible authentication protocol (EAP) authentication method. [0027] The present invention includes an authentication mechanism supporting the efficient establishment of security associations between MPs. This mechanism can operate in either mesh supplicant or mesh authenticator roles, depending upon the capabilities and preferences of the MP and the capabilities and preferences of its neighbors. A mesh authenticator is a mesh point that provides authentication before allowing another mesh point to gain access to the network. In an exemplary embodiment of the present invention, the mesh authenticator is an 802.1X authenticator. A mesh supplicant is a mesh point that requests access to the network. It does this by associating with, and then authenticating itself to, an authenticator. In an exemplary embodiment of the present invention, the mesh supplicant is an 802.1X supplicant. [0028] When operating in the mesh authenticator role, a mesh point can allow supplicant mesh points to join a mesh and establish security associations with itself and other members of the network. During an EMSA handshake, one MP will play the role of 802.1X Supplicant, and the other will play the role of 802.1X Authenticator. The present invention further includes a 802.1X role determination procedure for determining during an EMSA handshake which roles are assigned to each MP. This procedure ensures that the role of mesh authenticator and mesh supplicant are uniquely assigned to a single MP prior to the completion of the EMSA handshake. [0029] FIG. 2 illustrates a message flow diagram 0 in accordance with some embodiments of the present invention. Specifically, FIG. 2 illustrates peer link establishment using the abbreviated EMSA handshake between two mesh points 2-1, 2-2 within the network 0. A MP that initiates the abbreviated EMSA handshake sends a peer link open message containing a Mesh Security Association information element (MSAIE), a Mesh Security Capability information element (MSCIE) and a robust security network information element (RSNIE), where the RSNIE contains a Pairwise Master Key identification (PMKID) list. The PMKID list contains one or two entries that identify the shared Mesh Authenticator Pairwise Master Key (PMK-MA) or Keys available to secure the peer link. The Peer Link Open message requests that a link be established between the 4
5 7 EP B1 8 Peer Link Open sender and the receiver. In the abbreviated EMSA handshake including the peer link setup message 2 and peer link response message 21 of the present invention, the determination of roles depends on the information exchanged in the peer link open message (s). The Abbreviated EMSA handshake allows a MP to establish a Pairwise transient key (PTK) with a mesh authenticator, by utilizing the mesh key hierarchy it established during Initial EMSA Authentication. [00] FIG. 3 illustrates more detail of the operation of mesh points 2-1 and 2-2 during a peer link establishment 0. As illustrated, the operation begins with block in which mesh point 2-1 determines that a peer link should be set up. It may occur after receiving a beacon, for example. At this point an Active Open command is issued to initiate peer link setup. Next, in block 3, mesh point 2-1 selects a nonce and cipher suite and identifies available master keys. More specifically, in block 3, Upon receiving an Active Open, the MP 2-1: (a) Selects a nonce (Local Nonce field of MSAIE); (b) Selects 1 pairwise ciphersuite from what the peer supports (MSAIE); (c) Determines if the local Mesh Authenticator (MA) function has a cached Mesh Authenticator PMK (PMK-MA) created by peer; and if so, inserts Mesh Key Distributor PMK (PMK-MKD) Name identifying a key that the cached PMK-MA is derived from into the RSNIE (PMKID List); (d) inserts the PMK-MKDName identifying a key created by this MP during Initial EMSA Authentication into the RSNIE (PMKID List) (Note: the PMKID list has either 1 or 2 entries.); and (e) constructs a peer link open message containing: MSCIE, MSAIE, & RSNIE. Mesh point 2-1 then sends a peer link open message to mesh point 2-2. [0031] Next, in block 31, mesh point 2-2, upon receiving the peer link open message : (a) examines RSNIE and MSCIE, and determines if it wants to set up a link with the peer 2-1; if not, mesh point 2-2 sends a peer link close message (not shown); (b) does a 802.1X role determination procedure (to be described hereinafter), this determines the PMK-MA to be used; (c) retrieves the PMK-MA if necessary and if acting in 802.1X authenticator role; and (d) selects a nonce and computes the PTK. [0032] Next, in block 3, mesh point 2-2 identifies the key used. After 802.1X role determination and computing the PTK, the mesh point 2-2: (a) constructs its RSNIE including the PMK-MAName in the PMKID list field; (b) constructs the MSAIE containing: both nonces, the identifier of the 802.1X authenticator, the suite selection (supplicant chooses) (note: if supplicant, it makes choice based on peer s capability; if authenticator, it echoes peer s choice from peer link open message), the encrypted group temporal key (GTK), the PMK-MKDName identifying PMK-MKD that the PMK-MA is derived from, and the message integrity code (MIC) over several information elements (IEs). Mesh Point 2-2 sends a peer link setup message 2 containing: MSCIE, RSNIE, and MSAIE to mesh point 2-1. The peer link setup message 2 is protected using the MIC. [0033] Next, in block 32, when mesh point 2-1 receives the peer link setup message 2, mesh point 2-1 verifies the 802.1X role using the 802.1X role determination procedure, computes the PTK, and verifies the MIC and message contents. Upon receiving the peer link setup message 2, mesh point 2-1: (a) if 802.1X authenticator and if necessary, retrieves the PMK-MA using the included PMK-MKDName; (b) computes the PTK using nonces and the PMK-MA; (c) verifies the MIC; (d) verifies the cipher suite selection is supported and was selected by the 802.1X supplicant; and (f) decrypts the GTK. If any components are not verified, then mesh point 2-1 sends a peer link close message (not shown). The Peer Link Close message tries to close the connection between the two MPs. [0034] Otherwise, next, in block 3, mesh point 2-1 constructs and sends back a peer link response message 21 similar to the peer link setup message 2 and opens a port for communication with mesh point 2-2. Specifically, after verifying the peer link setup message 2, mesh point 2-1: (a) constructs its RSNIE including the PMK-MAName in the PMKID list field; (b) constructs the MSAIE containing: both nonces, the identifier of the 802.1X authenticator, the supplicant s cipher suite selection, the encrypted GTK, the PMK-MKDName identifying the PMK-MKD that the PMK-MA is derived from, and the MIC over several IEs. Mesh point 2-1 sends a peer link response 21 containing: MSCIE, RSNIE, and MSAIE. Mesh point 2-1 also installs PTK and GTK. Mesh point 2-1 then opens an 802.1X port for communication with peer mesh point 2-2. [003] To complete the establishment, in block 33, upon receiving the peer link response 21, mesh point 2-2 verifies the MIC, verifies the RSNIE and the MSCIE match those previously received (in the peer link open message ), verifies the cipher/ authentication and key management (AKM) suite selections are supported and are those selected by 802.1X supplicant, and decrypts the GTK. If any components are not verified, mesh point 2-2 sends a peer link close message (not shown). Mesh point 2-2 then installs PTK and GTK. Mesh point 2-2 then opens a 802.1X port for communication with peer 2-1. In one embodiment (not shown), mesh point 2-2 may send an additional peer link acknowledge message to mesh point 2-1 upon receiving a peer link response message 21 and verifying the contents. One of ordinary skill in the art recognizes that the presence or absence of such an acknowledgement message does not alter the scope of the present invention. [0036] The handshake process described with respect to FIGs. 2 and 3 provides a unique 802.1X role determination procedure. The handshake permits use of cached keys in all scenarios. The handshake utilizes EMSA de-
6 9 EP B1 rived key hierarchy being in place. The handshake provides flexible protocol startup options. [0037] FIG. 4 is a flowchart illustrating an example operation of a mesh point 2 in accordance with some embodiments of the present invention. Specifically, FIG. 4 illustrates an active open scenario 0 in which a mesh point 2 sends a peer link open message to actively establish a link with a peer. [0038] As illustrated in FIG. 4, the operation 0 begins with Step with an Active Open command for neighbor A. Next, in Step 4, the mesh point sends a peer link open message containing MSAIE and RSNIE to neighbor A. Next, in Step 41, the mesh point waits to receive a message from neighbor A. In one embodiment (not shown) a timeout process is included to ensure the robustness of the process. After the MP has sent a Peer Link Open message, but has not received a corresponding Peer Link Setup message, a timer, MessageTimer, is set. If the MP has not received the Peer Link Setup when the timer expires, the MP sends a Peer Link Close message to close the link. (not shown) [0039] The neighbor MP may reject the Peer Link Close message if it carries a mismatched instance identifier. The received instance identifier is considered a mismatch in three cases. In case one, the MP does not have a record of instance identifier for the peer MP yet. In case two, the message carries the random value in the Local Link ID field, but it does not match the PeerLinkID recorded locally. In case three, the value in the Peer Link ID field (if it is not null) does not match the local record of LocalLinkID. In the rest of the cases, the instance identifier is considered a match, and the MP accepts the message. Doing so, the MP records the link ID from the peer MP. [00] Next, in Step 4, the mesh point determines whether a received message is a peer link open message. When the message is a peer link open message, the operation continues with Step 42 in which the mesh point processes the message including verifying the message contents. In one embodiment, the mesh point also does 802.1X role determination. In some embodiments, the MP rejects the Peer Link Open message if it carries a mismatched instance identifier or the configuration parameters in the received message are not acceptable by the MP. The instance identifier carried in the Peer Link Open contains only the link ID provided by the peer. It is considered a mismatch when the MP has the local record of the PeerLinkID and it does not match the received value in the Local Link ID field. Besides the instance identifier, the Peer Link Open message contains configuration parameters. The MP can reject the message if these parameters do not match the local configuration and policy. In other embodiments, the MP accepts the message and records the received configurations that are useful for operations once the link has been established. The mesh point can also store the received value in the Local Link ID field as PeerLinkID if the mesh point does not have a record yet [0041] Next, in Step 4, the mesh point derives PTK. Next, in Step 43, the mesh point sends a peer link confirm message protected using the PTK. Next, in Step 4, the mesh point waits for a peer link confirm message from Neighbor A (i.e. peer). In one embodiment (not shown) a timeout process is included. After the MP has sent a Peer Link Confirm message, but has not received a corresponding Peer Link Confirm message, a timer, MessageTimer, is set. If the MP has not received the Peer Link Confirm when the timer expires, the MP shall send a Peer Link Close message to close the link. (not shown) [0042] Next, in Step 44, the mesh point determines whether the MIC and contents of the peer link confirm message are valid. If not, the operation cycles back to Step 4. The MP may reject the Peer Link Confirm message if it carries a mismatched instance identifier or the configuration parameters in the received message are not acceptable by the MP. It is considered a mismatch of the instance identifier if the value in the Peer Link ID field of the received message does not match the locally recorded LocalLinkID, or the value in the Local Link ID field of the received message does not match the locally recorded PeerLinkID (if the MP has a local record of Peer- LinkID). Besides the instance identifier, the Peer Link Confirm message contains configuration parameters as well. The MP may reject the message if the received parameters do not match the local configuration and policy, or if they are not consistent with the parameters received in an earlier message. [0043] If the MIC and contents are valid, the operation continues to Step in which the mesh point installs PTK and GTK; and opens a port for communication with neighbor A. The operation then ends. [0044] Returning to Step 4, when the message is not a peer link open message, the operation continues to Step 4 in which the mesh point determines whether the message is a peer link setup message. If the message is not a peer link setup message, the operation cycles back to Step 41. If the message is a peer link setup message, the operation continues to Step 460 in which the mesh point derives PTK if needed. Next, in Step 46, the mesh point determines if the MIC and contents of the peer link setup message are valid. If not valid, the operation cycles back to Step 41. If valid, the operation continues to Step 470 in which the mesh point sends a peer link response message protected by the PTK. Next, in Step, the mesh point installs PTK and GTK and opens a port for communication with neighbor A. The operation then ends. [004] FIG. is a flowchart illustrating an example operation of a mesh point 2 in accordance with some embodiments of the present invention. Specifically, FIG. illustrates a passive open scenario 00 in which a mesh point 2 listens for a peer link open message, and responds in order to set up a link. [0046] As illustrated in FIG., the operation 00 begins with Step 0 in which the mesh point receives a peer 6
7 11 EP B1 12 link open message from neighbor A. Next, in Step, the mesh point processes the peer link open message including verifying its contents. In some embodiments, the mesh point also does 802.1X role determination. Next, in Step 1, the mesh point selects a local nonce and derives PTK. Next, in Step, the mesh point sends a peer link setup message protected using the PTK. Next, in Step 2, the mesh point waits for a peer link response message from neighbor A (i.e. peer). In one embodiment (not shown) a timeout process is included to ensure the robustness of the process. After the MP has sent a Peer Link Setup message, but has not received a corresponding Peer Link Response message, a timer, MessageTimer, is set. If the MP has not received the Peer Link Response when the timer expires, the MP shall send a Peer Link Close message to close the link. (not shown) [0047] Next, in Step, the mesh point verifies the MIC and other message contents of a received peer link response message. Next, in Step 3, it is determined whether or not the contents were verified. When the contents are not verified, the operation cycles back to Step 2. When the contents are verified, the operation continues to Step in which the mesh point installs PTK and GTK and opens a port for communication with neighbor A. The operation then ends. [0048] In accordance with some embodiments of the present invention, in the operations of FIGs. 4 and, when the message processing encounters any error or the MP makes the local decision to close the link, the MP sends a Peer Link Close message to close the link. The MP waits for some time to close the link completely. This graceful time period can be governed by a timer-canceltimer. Before the CancelTimer expires, the MP continues to respond to any additional Peer Link Open message from the peer MP by sending back the Peer Link Close message. When the CancelTimer expires, the MP eventually closes the link by releasing the local resource allocated for the link instance. This mechanism allows the process to recover from failure quickly. [0049] FIG. 6 is a flowchart illustrating an example operation 600 of a mesh point 2 in accordance with some embodiments of the present invention. Specifically, FIG. 6 illustrates an 802.1X role determination procedure 600 within a mesh point in accordance with some embodiments of the present invention. The operation 600 of FIG. 6 can be included, for example, as further detail of Steps 31 and 32 of FIG. 3, Step 42 of FIG. 4, and Step of FIG. as described previously herein X role determination assigns the roles of 802.1X authenticator and 802.1X supplicant to the MPs based on the presence of cached keys and the configuration of the MPs. It also determines the PMK-MA to be used to secure the link. [000] As illustrated in FIG. 6, the operation 600 begins with Step 60 in which the mesh point determines whether at least one mesh point can be a mesh authenticator (MA) (i.e. a mesh authenticator bit is set). If no mesh point can be a mesh authenticator, the operation continues to Step 6 in which the mesh point sends a peer link close message. The operation then ends. [001] When at least one mesh authenticator is identified in step 60, the operation continues to Step 61 in which the mesh point determines whether the local PM- KID is valid. To determine if the local PMKID is valid, the mesh point examines the PMKID List received from a peer MP in a peer link open message. If the PMKID List contains two entries, and an entry corresponds to a PMK- MA that was created by the mesh point during Initial EM- SA Authentication, then the local PMKID is valid. When the local PMKID is not valid, or when the PMKID List received from a peer MP contains only a single entry, the operation continues to Step 6 in which the mesh point determines whether a cached peer key exists. To determine if a cached peer key exists, the mesh point examines the PMKID List received from a peer MP in a peer link open message. If the entry that corresponds to a PMK-MA that was created by the peer MP during its Initial EMSA Authentication identifies a key that is locally cached at the mesh point, then the cached peer key exists. When a cached peer key exists, the operation continues to Step 62 in which the processing mesh point is identified as the 802.1X authenticator. The operation then ends. [002] Returning to Step 61, when the local PMKID is valid, the operation continues to Step 6 in which the mesh point determines whether a cached peer key exists. When no cached peer key exists, the operation continues to Step 63 in which the peer MP is identified as the 802.1X authenticator. The operation then ends. [003] Returning to Step 6, when no cached peer key exists, the operation continues to Step 6 in which the mesh point determines whether the peer is connected to a MKD. When the peer is connected to the MKD, the operation continues to Step 64 in which the mesh point determines whether it is connected to the MKD. When the mesh point is also connected to the MKD, the operation continues to Step 60 in which the mesh point compares the peer Media Access Control (MAC) to its local MAC. When the peer MAC is less than the local MAC, the operation continues with Step 6 in which the processing mesh point is identified as the 802.1X authenticator. Alternatively, when the peer MAC is greater than the local MAC, the operation continues with Step 660 in which the peer mesh point is identified as the 802.1X authenticator. After both Steps 6 and 660, the operation ends. [004] Returning to Step 64, when the processing mesh point is not connected to the MKD, the operation continues to Step 66 in which the peer mesh point is identified as the 802.1X authenticator. The operation then ends. [00] Returning to Step 6, when the peer is not connected to the MKD, the operation continues to Step 670 in which it is determined whether the processing mesh point is connected to the MKD. When the processing mesh point is connected to the MKD, the operation continues to Step 680 in which the processing mesh point 7
8 13 EP B1 14 is identified as the 802.1X authenticator. The operation then ends. [006] When, in Step 670, the processing mesh point is not connected to the MKD, the operation continues to Step 6 in which the mesh point sends a peer link close message. The operation then ends. [007] The present invention as described herein provides a method within an adhoc mesh network for two devices to quickly determine roles (i.e. which is the authenticator and which is the supplicant) while establishing a security association. The invention provides for the inclusion of cached key information in the role determination process and the application of role determination to a shortened three-way handshake. [008] In the foregoing specification, specific embodiments of the present invention have been described. However, one of ordinary skill in the art appreciates that various modifications and changes can be made without departing from the scope of the present invention. Accordingly, the specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of present invention. Claims 1. A method of operation of a mesh point for establishing secure associations within a communication network comprising: 1 2 verifying the response message contents; deriving the PTK; sending a peer link confirm message protected using the PTK; receive a neighbor node peer link confirm message from the neighbor node; determining whether the message integrity code, MIC, and contents of the neighbor node peer link confirm message are valid; and continuing to the installing PTK and GTK step when the message integrity code, MIC, and contents of the peer link confirm message are valid. 4. A method as claimed in Claim 1, wherein the second operation comprises: deriving the PTK when needed; determining whether the message integrity code, MIC, and contents of the peer link setup message are valid; and when the MIC and contents of the peer link set up message are valid: sending a peer link response message protected by the PTK; and continuing to the installing PTK and GTK step.. A method as claimed in Claim 1, further comprising prior to the receiving step: sending a peer link open message to a neighbor node; receiving a response message from the neighbor node; characterised by : processing the response message using a first operation when the response message is a peer link open message; processing the response message using a second operation when the response message is a peer link setup message; installing a pairwise transient key, PTK, and an encrypted group temporal key, GTK as a result of either the first operation or the second operation; and opening a port for communication with the neighbor node. 2. A method as claimed in Claim 1, wherein the peer link open message includes a mesh security association information element, MSAIE, and a robust security network information element, RSNIE. 3. A method as claimed in Claim 1, wherein the first operation comprises: processing the response message including waiting to receive the response message from the neighbor node for a period of time; and sending a peer link close message to close the link when no response message is received during the period of time. 6. A method as claimed in Claim 3, wherein the processing step further comprises: performing an 802.1X role determination including: assigning a role of an 802.1X authenticator and a role of an 802.1X supplicant to each of the mesh point and the neighbor node based on the presence of one or more cached keys and a configuration of each of the mesh point and the neighbor node. 7. A method as claimed in Claim 6, wherein the assigning a role of an 802.1X authenticator and a role of an 802.1X supplicant to the mesh points based on the presence of one or more cached keys comprises: assigning the role of the 802.1X authenticator to the neighbor node when a local Pairwise Master Key identification, PMKID, is valid and a peer 8
9 1 EP B1 16 key is not cached; and assigning the role of the 802.1X authenticator to the mesh point when the local PMKID is not valid and the peer key is cached. 8. A method as claimed in Claim 7 further comprising: Patentansprüche 1. Verfahren zum Betrieb einer Stützstelle bzw. eines Mesh-Points zur Herstellung sicherer Verbindungen innerhalb eines Kommunikationsnetzwerks, wobei das Verfahren die folgenden Schritte aufweist: determining that the local PMKID is valid by: examining a PMKID List received from the neighbor node in a peer link open message; and when the PMKID List contains two entries, and an entry corresponds to a PMK-MA that was created by the mesh point during Initial EMSA Authentication, then the local PMKID is valid. 9. A method as claimed in Claim 7, wherein the mesh point determines whether the cached peer key exists by: examining a PMKID List received from the neighbor node in a peer link open message; and when the entry that corresponds to a Mesh Authenticator Pairwise Master Key, PMK-MA, that was created by the neighbor node during its initial efficient mesh security association, EMSA, authentication identifies a key that is locally cached at the mesh point, then the cached peer key exists.. A method as claimed in Claim 6, wherein the assigning a role of an 802.1X authenticator and a role of an 802.1X supplicant to the mesh points based on the configuration of each of the mesh points comprises: assigning the 802.1X authenticator role to the mesh point when the neighbor node is not connected to a mesh key distributor, MKD, and the mesh point is connected to the MKD; assigning the 802.1X authenticator role to the neighbor node when the neighbor node is connected to the MKD and the mesh point is not connected to the MKD; assigning the 802.1X authenticator role to the mesh point when the neighbor node and the mesh point are connected to the MKD and the local MAC is greater than the neighbor node MAC; and assigning the 802.1X authenticator role to the neighbor node when the neighbor node and the mesh point are connected to the MKD and the local MAC is less than the neighbor node MAC Senden einer Peer Link Open Message bzw. Benachrichtigung, dass eine gleichrangige Verbindung offen ist, an einen Nachbarknoten; Empfang einer Antwortnachricht von dem Nachbarknoten; gekennzeichnet durch: Verarbeitung der Antwortnachricht unter Verwendung einer ersten Operation, wenn die Antwortnachricht eine Peer Link Open Message ist; Verarbeitung der Antwortnachricht unter Verwendung einer zweiten Operation, wenn die Antwortnachricht eine Peer Link Setup- bzw. Aufbaunachricht ist; Installation eines paarweisen Übergangsschlüssels bzw. Pairwise Transient Key, PTK, und eines temporalen Schlüssels für eine verschlüsselte Gruppe bzw. Encrypted Group Temporal Key, GTK, als Ergebnis entweder der ersten Operation oder der zweiten Operation; und Öffnung eines Ports zur Kommunikation mit dem Nachbarknoten. 2. Verfahren nach Anspruch 1, dadurch gekennzeichnet, dass die Peer Link Open Message ein Mesh Security Association-Informationselement, MSAIE, sowie ein Robustes Security Network-Informationselement, RSNIE, einschließt. 3. Verfahren nach Anspruch 1, dadurch gekennzeichnet, dass die erste Operation die folgenden Schritte aufweist: Verarbeitung der Antwortnachricht einschließlich Verifizierung der Anwortnachrichteninhalte; Ableitung des PTK; Senden einer Peer Link-Bestätigungsnachricht, welche durch Verwendung des PTK geschütz ist; Empfang einer Nachbarknoten-Peer Link-Bestätigungsnachricht von dem Nachbarknoten; Bestimmung, ob der Nachrichten-Integritätsbzw. Unversehrtheitscode, MIC, sowie Inhalte der Nachbarknoten-Peer Link-Bestätigungsnachricht gültig sind; und Fortfahren mit dem Installationsschritt des PTK und GTK, wenn der Nachrichten-Integritätscode bzw. Message Integrity Code, MIC, sowie Inhalte der Peer Link-Bestätigungsnachricht gültig 9
10 17 EP B1 18 sind. erfasst wird. 4. Verfahren nach Anspruch 1, dadurch gekennzeichnet, dass die zweite Operation Folgendes aufweist: Ableitung des PTK wenn erforderlich; Bestimmung, ob der Nachrichten-Integritätsbzw. Unversehrtheitscode, MIC, sowie Inhalte der Peer Link-Setup- bzw. Aufbaunachricht gültig sind; und wenn der MIC sowie Inhalte der Peer Link-Setup- bzw. Aufbaunachricht gültig sind, Senden einer durch den PTK geschützten Peer Link- Antwortnachricht; und Fortfahren mit dem Schritt der Installation des PTK und GTK.. Verfahren nach Anspruch 1, welches vor dem Empfangsschritt die folgenden Schritte aufweist: Warten über einen Zeitraum auf den Empfang der Antwortnachricht von dem Nachbarknoten; und Senden einer Peer Link Close Message zum Schließen der Verbindung, wenn während des Zeitraums keine Antwort erhalten wird. 6. Verfahren nach Anspruch 3, dadurch gekennzeichnet, dass der Verarbeitungsschritt des Weiteren Folgendes aufweist: Ausführung einer 802.1X-Funktionsbestimmung, welche Folgendes einschließt: Zuweisung einer Funktion eines X- Authenticator und einer Funktion eines 802.1X-Supplicant an jeden Mesh-Point und Nachbarknoten basierend auf dem Vorhandensein eines oder mehrerer erfasster Schlüssel und einer Konfiguration eines jeden Mesh-Points und dem Nachbarknoten. 7. Verfahren nach Anspruch 6, dadurch gekennzeichnet, dass die Zuweisung einer Funktion eines 802.1X-Authenticator und einer Funktion eines X-Supplicant zu den Mesh-Points basierend auf dem Vorhandensein eines oder mehrerer erfasster Schlüssel die folgenden Schritte aufweist: Zuweisung der Funktion des X-Authenticators zu dem Nachbarknoten, wenn eine lokale Pairwise Master Key Indentifizierung, PMKID, gültig ist, und wenn ein Peer-Schlüssel nicht erfasst wird; und Zuweisung der Funktion des X-Authenticators zu dem Mesh-Point, wenn die lokale PM- KID nicht gültig ist und wenn der Peer-Schlüssel Verfahren nach Anspruch 7, welches des Weiteren die folgenden Schritte aufweist: Bestimmung, dass die lokale PMKID gültig ist, indem: eine PMKID-Liste, welche von dem Nachbarknoten in einer Peer Link Open Message empfangen wird, überprüft wird; und wenn die PMKID-Liste zwei Einträge aufweist, und wenn ein Eintrag einer PMK-KA entspricht, welche von dem Mesh-Point während einer Initial EMSA-Authentifizierung erzeugt worden ist, dann die lokale PMKID gültig ist. 9. Verfahren nach Anspruch 7, dadurch gekennzeichnet, dass der Mesh Point bestimmt, ob der erfasste Peer-Schlüssel existiert, indem: er eine von dem Nachbarknoten in einer Peer Link Open Message empfangene PMKID-Liste überprüft; und wenn der Eintrag, welcher einem Mesh Authenticator Pairwise Master Key, PMK-MA entspricht, welcher von dem Nachbarknoten während seiner anfänglichen Efficient Mesh Security Association-, EMSA,-Authentifizierung erzeugt worden ist, einen Schlüssel identifiziert, welcher lokal an dem Mesh-Point erfasst wird, dann der erfasste Peer-Schlüssel existiert.. Verfahren nach Anspruch 6, dadurch gekennzeichnet, dass die Zuweisung einer Funktion eines X-Authenticator und einer Funktion eines 802.1X-Supplicant zu den Mesh-Points basierend auf der Konfiguration eines jeden Mesh-Points Folgendes aufweist: Zuweisung der X-Authenticatorfunktion zu dem Mesh-Point, wenn der Nachbarknoten nicht mit einer Mesh-Schlüsselverteilungseinrichtung bzw. einem Mesh Key Distributor, MKD, verbunden ist und wenn der Mesh-Point mit dem MKD verbunden ist; Zuweisung der X-Authenticatorfunktion zu dem Nachbarknoten, wenn der Nachbarknoten mit dem MKD verbunden ist und wenn der Mesh-Point nicht mit dem MKD verbunden ist; Zuweisung der X-Authenticatorfunktion zu dem Mesh-Point, wenn der Nachbarknoten und der Mesh-Point mit dem MKD verbunden sind, und wenn die lokale Medienzugriffssteuerung bzw. Media Access Control, MAC, größer ist als die Nachbarknoten-MAC; und Zuweisung der 802.1X-Authenticatorfunktion zu
11 19 EP B1 dem Nachbarknoten, wenn der Nachbarknoten und der Mesh-Point mit dem MKD verbunden sind, und wenn die lokale MAC geringer ist als die Nachbarknoten MAC. Revendications message de confirmation de liaison homologue de noeud voisin sont valides; et poursuivre avec l étape d installation des clés PTK et GTK lorsque le code d intégrité du message MIC et le contenu du message de confirmation de liaison homologue de noeud voisin sont valides. 1. Procédé de fonctionnement d un point de maillage pour l établissement d associations sécurisées dans un réseau de communication comprenant les étapes consistant à: envoyer un message d ouverture de liaison homologue à un noeud voisin; recevoir un message de réponse du noeud voisin; caractérisé par les étapes consistant à: traiter le message de réponse à l aide d une première opération lorsque le message de réponse est un message d ouverture de liaison homologue; traiter le message de réponse à l aide d une seconde opération lorsque le message de réponse est un message d établissement de liaison homologue; installer une clé de coupure partagée PTK (Pairwise Transient Key) et une clé de groupe temporaire chiffrée GTK (Group Temporal Key) en conséquence de l une ou l autre de la première opération et de la seconde opération; et ouvrir un port pour une communication avec le noeud voisin. 2. Procédé tel que revendiqué dans la revendication 1, dans lequel le message d ouverture de liaison homologue comprend un élément d information d association de sécurité de maillage, MSAIE (Mesh Security Association Information Element) et un élément d information de réseau sécurisé robuste RS- NIE (Robust Security Network Information Elément). 3. Procédé tel que revendiqué dans la revendication 1, dans lequel la première opération comprend les étapes consistant à: traiter le message de réponse en incluant de vérifier le contenu du message de réponse; dériver la clé PTK; envoyer un message de confirmation de liaison homologue protégé à l aide de la clé PTK; recevoir un message de confirmation de liaison homologue de noeud voisin depuis le noeud voisin; déterminer si le code d intégrité du message MIC (Message Integrity Code) et le contenu du Procédé tel que revendiqué dans la revendication 1, dans lequel la seconde opération comprend les étapes consistant à: dériver la clé PTK lorsque nécessaire; déterminer si le code d intégrité du message MIC et le contenu du message de confirmation de liaison homologue de noeud voisin sont valides; et lorsque le code d intégrité du message MIC et le contenu du message de confirmation de liaison homologue de noeud voisin sont valides: envoyer un message de réponse de liaison homologue protégé par la clé PTK; et poursuivre avec l étape d installation des clés PTK et GTK.. Procédé tel que revendiqué dans la revendication 1, comprenant en outre, avant l étape de réception, les étapes consistant à: attendre de recevoir le message de réponse depuis le noeud voisin pendant une certaine période de temps; et envoyer un message de fermeture de liaison homologue pour fermer la liaison lorsqu aucun message de réponse n est reçu au cours de la période de temps. 6. Procédé tel que revendiqué dans la revendication 3, dans lequel l étape de traitement comprend en outre l étape consistant à: effectuer une détermination de rôle 802.1X comprenant: d affecter un rôle d un authentifiant 802.1X et un rôle d un suppliant 802.1X à chacun du point de maillage et du noeud voisin sur la base de la présence d une ou plusieurs clés en mémoire cache et d une configuration de chacun du point de maillage et du noeud voisin. 7. Procédé tel que revendiqué dans la revendication 6, dans lequel l affectation d un rôle d un authentifiant 802.1X et d un rôle d un suppliant 802.1X aux points de maillage sur la base de la présence d une ou plusieurs clés en mémoire cache comprend les étapes consistant à: 11
12 21 EP B1 22 affecter le rôle de l authentifiant 802.1X au noeud voisin lorsqu une identification locale de clé maître, PMKID (Pairwise Master Key Identification), est valide et qu une clé homologue ne se trouve pas en mémoire cache; et affecter le rôle de l authentifiant 802.1X au point de maillage lorsque l identification locale PMKID n est pas valide et que la clé homologue se trouve en mémoire cache. 8. Procédé tel que revendiqué dans la revendication 7, comprenant en outre l étape consistant à: affecter le rôle de l authentifiant 802.1X au point de maillage lorsque le noeud voisin n est pas connecté à un distributeur de clés de maillage, MKD (Mesh Key Distributor), et que le point de maillage est connecté au MKD; affecter le rôle de l authentifiant 802.1X au noeud voisin lorsque le noeud voisin est connecté au MKD et que le point de maillage n est pas connecté au MKD; affecter le rôle de l authentifiant 802.1X au point de maillage lorsque le noeud voisin et le noeud de maillage sont connectés au MKD et que la MAC locale est supérieure à la MAC du noeud voisin; et affecter le rôle de l authentifiant 802.1X au noeud voisin lorsque le noeud voisin et le noeud de maillage sont connectés au MKD et que la MAC locale est inférieure à la MAC du noeud voisin. déterminer que l identification locale PMKID est valide en: 1 examinant une liste PMKID reçue du noeud voisin dans un message d ouverture de liaison homologue; et lorsque la liste PMKID contient deux entrées, et qu une entrée correspond à une PMK-MA qui a été créée par le point de maillage lors de l authentification initiale EMSA, alors l identification PMKID est valide Procédé tel que revendiqué dans la revendication 7, dans lequel le point de maillage détermine si la clé homologue existe en mémoire cache en: examinant une liste PMKID reçue du noeud voisin dans un message ouvert de liaison homologue; et lorsque l entrée qui correspond à une clé maître d authentifiant de maillage, PMK-MA (Mesh Authentificator Pairwise Master Key), qui a été créée par le noeud voisin lors de son authentification initiale d association de sécurité de maillage efficace, EMSA (Efficient Mesh Security Association), identifie une clé qui est localement située en mémoire cache au niveau du point de maillage, alors la clé homologue existe en mémoire cache. 3. Procédé tel que revendiqué dans la revendication 6, dans lequel l affectation d un rôle d un authentifiant 802.1X et d un rôle d un suppliant 802.1X aux points de maillage sur la base de la configuration de chacun des points de maillage comprend les étapes consistant à:
13 EP B1 13
14 EP B1 14
15 EP B1 1
16 EP B1 16
17 EP B1 17
18 EP B1 18
19 EP B1 REFERENCES CITED IN THE DESCRIPTION This list of references cited by the applicant is for the reader s convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard. Non-patent literature cited in the description TONY BRASKICH et al. Efficient Mesh Security and link Establishment. IEEE /1470R3, 01 November 06 [0007] 19
(51) Int Cl.: G06F 21/00 (2006.01) H04L 29/06 (2006.01)
(19) TEPZZ_8Z_7 _B_T (11) EP 1 801 721 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 16.06. Bulletin /24 (1) Int Cl.: G06F 21/00 (06.01) H04L 29/06
TEPZZ_768 7_B_T EP 1 768 371 B1 (19) (11) EP 1 768 371 B1 (12) EUROPEAN PATENT SPECIFICATION. (51) Int Cl.: H04M 19/04 (2006.01)
(19) TEPZZ_768 7_B_T (11) EP 1 768 371 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 1.01.2014 Bulletin 2014/03 (1) Int Cl.: H04M 19/04 (2006.01)
*EP001173363B1* EP 1 173 363 B1 (19) (11) EP 1 173 363 B1 (12) EUROPEAN PATENT SPECIFICATION
(19) Europäisches Patentamt European Patent Office Office européen des brevets *EP001173363B1* (11) EP 1 173 363 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of
(51) Int Cl.: G06F 13/38 (2006.01) G06F 1/16 (2006.01)
(19) TEPZZ 9777B_T (11) EP 2 97 77 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 1.07.1 Bulletin 1/29 (1) Int Cl.: G06F 13/38 (06.01) G06F 1/16 (06.01)
(51) Int Cl.: H04W 4/14 (2009.01)
(19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 2 184 897 B1 (4) Date of publication and mention of the grant of the patent: 14.03.12 Bulletin 12/11 (21) Application number: 087774.3 (22) Date of filing:
(51) Int Cl.: B29C 41/20 (2006.01) F21S 4/00 (2006.01) H05K 3/28 (2006.01)
(19) TEPZZ 68698B_T (11) EP 2 68 698 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 18.11.201 Bulletin 201/47 (21) Application number: 11808612.3
(51) Int Cl.: H04L 29/06 (2006.01) G06F 9/445 (2006.01) G06F 13/00 (2006.01)
(19) TEPZZ_7486_6B_T (11) EP 1 748 616 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 03.09.2014 Bulletin 2014/36 (1) Int Cl.: H04L 29/06 (2006.01)
(51) Int Cl.: H04L 12/58 (2006.01)
(19) (11) EP 1 628 448 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 21.11.07 Bulletin 07/47 (1) Int Cl.: H04L 12/8 (06.01) (21) Application number:
(51) Int Cl.: G05F 3/26 (2006.01) G05F 3/24 (2006.01)
(19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 280 033 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 31.0.2006
(51) Int Cl.: G06F 9/455 (2006.01) G06F 9/50 (2006.01)
(19) TEPZZ 6987 B_T (11) EP 2 698 711 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 0.08.1 Bulletin 1/32 (21) Application number: 118777.8 (22) Date
(51) Int Cl.: G10L 15/26 (2006.01)
(19) TEPZZ Z 8B_T (11) EP 2 023 338 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 28.0.14 Bulletin 14/22 (1) Int Cl.: GL /26 (06.01) (21) Application
(51) Int Cl.: H04N 7/16 (2011.01)
(19) TEPZZ_796 89B_T (11) EP 1 796 389 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 04.03.1 Bulletin 1/ (1) Int Cl.: H04N 7/16 (11.01) (21) Application
EP 2 455 926 A1 (19) (11) EP 2 455 926 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 23.05.2012 Bulletin 2012/21
(19) (12) EUROPEAN PATENT APPLICATION (11) EP 2 4 926 A1 (43) Date of publication: 23.0.2012 Bulletin 2012/21 (21) Application number: 11190024.7 (1) Int Cl.: G08B 2/14 (2006.01) G08B 2/00 (2006.01) G0B
TEPZZ 68575_A_T EP 2 685 751 A1 (19) (11) EP 2 685 751 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.
(19) TEPZZ 687_A_T (11) EP 2 68 71 A1 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 3(4) EPC (43) Date of publication:.01.14 Bulletin 14/03 (21) Application number: 1278849.6 (22)
(51) Int Cl.: H04L 29/06 (2006.01) H04M 15/00 (2006.01)
(19) TEPZZ 7Z 74 B_T (11) EP 2 702 742 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.04. Bulletin /16 (21) Application number: 1171674.6 (22) Date
(51) Int Cl.: H04L 12/56 (2006.01)
(19) (11) EP 1 779 90 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 28.12.11 Bulletin 11/2 (21) Application number: 0783482.2 (22) Date of filing:
(51) Int Cl.: H04L 12/56 (2006.01) H04L 12/28 (2006.01) H04M 7/00 (2006.01)
(19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 129 0 B1 (4) Date of publication and mention of the grant of the patent: 09.04.08 Bulletin 08/1 (21) Application number: 9996836.2 (22) Date of filing:
(51) Int Cl.: H04L 29/06 (2006.01) H04Q 7/24 (2006.01) H04L 12/66 (2006.01)
(19) (11) EP 1 314 291 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:..07 Bulletin 07/41 (21) Application number: 0194907.2 (22) Date of filing: 06.07.01
(51) Int Cl.: H04L 12/24 (2006.01)
(19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 487 11 B1 (4) Date of publication and mention of the grant of the patent: 01.07.09 Bulletin 09/27 (1) Int Cl.: H04L 12/24 (06.01) (21) Application number:
TEPZZ 6_Z76 A_T EP 2 610 763 A1 (19) (11) EP 2 610 763 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.:
(19) TEPZZ 6_Z76 A_T (11) EP 2 6 763 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 03.07.2013 Bulletin 2013/27 (51) Int Cl.: G06F 17/30 (2006.01) (21) Application number: 12192220.7 (22)
TEPZZ 5Z _9_B_T EP 2 502 191 B1 (19) (11) EP 2 502 191 B1 (12) EUROPEAN PATENT SPECIFICATION
(19) TEPZZ Z _9_B_T (11) EP 2 02 191 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 17.06.1 Bulletin 1/2 (21) Application number: 787872.0 (22) Date
(51) Int Cl.: H04M 3/42 (2006.01) H04Q 3/00 (2006.01)
(19) (11) EP 1 696 646 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 07.03.12 Bulletin 12/ (1) Int Cl.: H04M 3/42 (06.01) H04Q 3/00 (06.01) (21)
The Advantialer and Its Advantages
(19) TEPZZ Z B_T (11) EP 2 0 113 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 16.09.1 Bulletin 1/38 (21) Application number: 07809477.8 (22) Date
TEPZZ 9 Z5A_T EP 2 922 305 A1 (19) (11) EP 2 922 305 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.
(19) TEPZZ 9 ZA_T (11) EP 2 922 A1 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 13(4) EPC (43) Date of publication: 23.09.1 Bulletin 1/39 (21) Application number: 1386446.2 (22) Date
(51) Int Cl.: H04L 12/58 (2006.01) H04L 29/06 (2006.01)
(19) TEPZZ_986 8 B_T (11) EP 1 986 382 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 19.02.14 Bulletin 14/08 (1) Int Cl.: H04L 12/8 (06.01) H04L
TEPZZ 87_546A T EP 2 871 546 A2 (19) (11) EP 2 871 546 A2 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: G05B 19/05 (2006.01)
(19) TEPZZ 87_46A T (11) EP 2 871 46 A2 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 13.0.1 Bulletin 1/ (1) Int Cl.: G0B 19/0 (06.01) (21) Application number: 14188238.1 (22) Date of filing:
(51) Int Cl.: H04L 9/24 (2006.01) G06Q 10/00 (2012.01)
(19) TEPZZ_4Z 68ZB_T (11) EP 1 2 680 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 01.04.1 Bulletin 1/14 (21) Application number: 02741722.9 (22)
(51) Int Cl.: H04M 3/50 (2006.01)
(19) TEPZZ_Z48_64B_T (11) EP 1 048 164 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 07.01.1 Bulletin 1/02 (21) Application number: 9893133.0 (22)
(51) Int Cl. 7 : G06F 11/22
(19) Europäisches Patentamt European Patent Office Office européen des brevets *EP00084463B1* (11) EP 0 844 63 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of
(51) Int Cl.: G06F 1/00 (2006.01)
(19) (11) EP 0 972 234 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 0.09.07 Bulletin 07/36 (21) Application number: 98913219.6 (22) Date of filing:
(51) Int Cl.: H04L 12/26 (2006.01)
(19) TEPZZ 84 8B_T (11) EP 2 84 338 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 23.09.1 Bulletin 1/39 (1) Int Cl.: H04L 12/26 (06.01) (21) Application
(51) Int Cl.: G08B 21/02 (2006.01) H04M 11/04 (2006.01)
(19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 224 642 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 1.03.06
(51) Int Cl.: H05K 1/02 (2006.01)
(19) (11) EP 1 229 767 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 20.01.2010 Bulletin 2010/03 (1) Int Cl.: H0K 1/02 (2006.01) (21) Application
EP 2 365 669 A1 (19) (11) EP 2 365 669 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 14.09.2011 Bulletin 2011/37
(19) (12) EUROPEAN PATENT APPLICATION (11) EP 2 36 669 A1 (43) Date of publication: 14.09.11 Bulletin 11/37 (1) Int Cl.: H04L 12/8 (06.01) (21) Application number: 00243.6 (22) Date of filing:.03. (84)
(51) Int Cl.: H04L 29/06 (2006.01) H04M 3/56 (2006.01) H04M 3/44 (2006.01) H04L 12/18 (2006.01)
(19) TEPZZ Z9 79B_T (11) EP 2 091 179 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 17.12.14 Bulletin 14/1 (21) Application number: 07817029.7 (22)
(51) Int Cl.: H04L 9/32 (2006.01)
(19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 17 038 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 19.07.06
(51) Int Cl.: H04L 12/24 (2006.01)
(19) TEPZZ_8_9Z96B_T (11) EP 1 819 096 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 24..12 Bulletin 12/43 (21) Application number: 0818628.9 (22)
(51) Int Cl.: H04L 12/56 (2006.01) H04L 12/24 (2006.01) H04L 29/06 (2006.01) H04L 29/08 (2006.01)
(19) (11) EP 2 184 89 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 16.03.11 Bulletin 11/11 (1) Int Cl.: H04L 12/6 (06.01) H04L 12/24 (06.01) H04L
TEPZZ 69 49A_T EP 2 693 349 A1 (19) (11) EP 2 693 349 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: G06F 17/30 (2006.01)
(19) TEPZZ 69 49A_T (11) EP 2 693 349 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 0.02.2014 Bulletin 2014/06 (1) Int Cl.: G06F 17/30 (2006.01) (21) Application number: 13160696.4 (22)
(51) Int Cl.: H04L 29/06 (2006.01) (56) References cited:
(19) (11) EP 1 4 48 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 06.08.08 Bulletin 08/32 (21) Application number: 02776379.6 (22) Date of filing:..02
(51) Int Cl.: H04B 3/23 (2006.01)
(19) (11) EP 0 983 638 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 21.03.12 Bulletin 12/12 (21) Application number: 989232.7 (22) Date of filing:
(51) Int Cl.: C08K 5/523 (2006.01) C08K 5/521 (2006.01) C08K 5/52 (2006.01) C08G 64/00 (2006.01)
(19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 0 78 966 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 01.03.06
(51) Int Cl. 7 : G03G 15/00
(19) Europäisches Patentamt European Patent Office Office européen des brevets *EP001179B1* (11) EP 1 17 9 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the
(51) Int Cl.: H04L 12/10 (2006.01) H04L 12/40 (2006.01)
(19) TEPZZ 4799 B_T (11) EP 2 479 92 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 14.0.14 Bulletin 14/ (1) Int Cl.: H04L 12/ (06.01) H04L 12/ (06.01)
(51) Int Cl.: H04W 8/16 (2009.01) H04L 29/12 (2006.01) H04W 8/18 (2009.01)
(19) TEPZZ 474_77B_T (11) EP 2 474 177 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 0.11.14 Bulletin 14/4 (21) Application number: 747648.3 (22)
TEPZZ 65Z79 A_T EP 2 650 793 A1 (19) (11) EP 2 650 793 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.
(19) TEPZZ 65Z79 A_T (11) EP 2 650 793 A1 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 153(4) EPC (43) Date of publication: 16.10.2013 Bulletin 2013/42 (21) Application number: 12818771.3
(51) Int Cl.: H04L 29/08 (2006.01) H04L 29/06 (2006.01)
(19) TEPZZ_897 6B_T (11) EP 1 897 336 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 12.08.1 Bulletin 1/33 (21) Application number: 06779738.1 (22)
(51) Int Cl.: H04L 29/06 (2006.01) H04L 12/26 (2006.01) H04M 3/22 (2006.01) H04M 7/00 (2006.01)
(19) TEPZZ 48786B_T (11) EP 2 48 786 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 23.03.16 Bulletin 16/12 (21) Application number: 806012.0 (22)
TEPZZ 87657ZA_T EP 2 876 570 A1 (19) (11) EP 2 876 570 A1 (12) EUROPEAN PATENT APPLICATION
(19) TEPZZ 8767ZA_T (11) EP 2 876 70 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 27.0.201 Bulletin 201/22 (21) Application number: 14189809.8 (1) Int Cl.: G06F 21/34 (2013.01) G08B 13/196
(51) Int Cl.: G08G 1/14 (2006.01) G07B 15/02 (2006.01) G10L 15/28 (2006.01)
(19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 862 986 B1 (4) Date of publication and mention of the grant of the patent: 14.07. Bulletin /28 (1) Int Cl.: G08G 1/14 (06.01) G07B 1/02 (06.01) GL 1/28
TEPZZ_9 6Z46B_T EP 1 926 046 B1 (19) (11) EP 1 926 046 B1 (12) EUROPEAN PATENT SPECIFICATION. (51) Int Cl.:
(19) TEPZZ_9 6Z46B_T (11) EP 1 926 046 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 21.08.13 Bulletin 13/34 (1) Int Cl.: G06F 19/00 (11.01) (21)
TEPZZ_98 47ZB_T EP 1 982 470 B1 (19) (11) EP 1 982 470 B1 (12) EUROPEAN PATENT SPECIFICATION
(19) TEPZZ_98 47ZB_T (11) EP 1 982 470 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.04.14 Bulletin 14/18 (21) Application number: 077168.0 (22)
(51) Int Cl.: G06F 17/00 (2006.01) G06F 11/20 (2006.01)
(19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 388 08 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 29.11.06
(51) Int Cl.: H04L 29/06 (2006.01) H04L 12/22 (2006.01)
(19) (11) EP 0 998 091 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 31.01.07 Bulletin 07/0 (1) Int Cl.: H04L 29/06 (06.01) H04L 12/22 (06.01) (21)
TEPZZ_57 7_9B_T EP 1 573 719 B1 (19) (11) EP 1 573 719 B1 (12) EUROPEAN PATENT SPECIFICATION
(19) TEPZZ_7 7_9B_T (11) EP 1 73 719 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.11.13 Bulletin 13/47 (21) Application number: 0277098.3 (22) Date
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
(51) Int Cl.: G06F 9/46 (2006.01) H04L 12/56 (2006.01)
(19) (11) EP 1 611 23 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 21.0.08 Bulletin 08/21 (21) Application number: 0471948.2 (22) Date of filing:
(51) Int Cl.: H04L 29/06 (2006.01) H04L 12/24 (2006.01)
(19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 231 74 B1 (4) Date of publication and mention of the grant of the patent: 16.03.11 Bulletin 11/11 (1) Int Cl.: H04L 29/06 (06.01) H04L 12/24 (06.01) (21)
(51) Int Cl.: H04N 7/15 (2006.01) H04N 7/18 (2006.01)
(19) TEPZZ_4967ZZB_T (11) EP 1 496 700 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 1.01.14 Bulletin 14/03 (1) Int Cl.: H04N 7/1 (06.01) H04N 7/18
(51) Int Cl.: G06Q 20/00 (2006.01) G06F 21/00 (2006.01)
(19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 24 008 B1 (4) Date of publication and mention of the grant of the patent: 29.12. Bulletin /2 (21) Application number: 00992990.2 (22) Date of filing: 31..00
(51) Int Cl.: H04L 29/06 (2006.01) H04L 29/12 (2006.01)
(19) TEPZZ_8 Z _9B_T (11) EP 1 8 319 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 17.06.1 Bulletin 1/2 (21) Application number: 08163. (22) Date
(51) Int Cl.: H04L 12/26 (2006.01) H04L 12/24 (2006.01)
(19) TEPZZ 4 686 B_T (11) EP 2 426 862 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 12.08.1 Bulletin 1/33 (21) Application number: 769368.1 (22)
(51) Int Cl.: H04L 9/32 (2006.01) H04B 7/00 (2006.01) A61N 1/37 (2006.01)
(19) TEPZZ_4977B_T (11) EP 1 49 77 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.12.14 Bulletin 14/0 (21) Application number: 03723989.4 (22) Date
(51) Int Cl.: H04L 29/12 (2006.01) H04L 12/56 (2006.01)
(19) (11) EP 1 993 266 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 04.07.12 Bulletin 12/27 (1) Int Cl.: H04L 29/12 (06.01) H04L 12/6 (06.01) (21)
(51) Int Cl. 7 : H04B 7/185, H04B 1/40. (56) References cited: WO-A-00/03494
(19) Europäisches Patentamt European Patent Office Office européen des brevets *EP001363412B1* (11) EP 1 363 412 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of
TEPZZ 96 A_T EP 2 961 111 A1 (19) (11) EP 2 961 111 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.
(19) TEPZZ 96 A_T (11) EP 2 961 111 A1 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 13(4) EPC (43) Date of publication:.12.1 Bulletin 1/3 (21) Application number: 147426.7 (22) Date
EP 1 976 249 B1 (19) (11) EP 1 976 249 B1 (12) EUROPEAN PATENT SPECIFICATION
(19) (11) EP 1 976 249 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 11.03.09 Bulletin 09/11 (1) Int Cl.: H04M 1/72 (06.01) G06F 9/44 (06.01) H04W
(51) Int Cl.: H04L 12/24 (2006.01) H04L 12/26 (2006.01)
(19) (11) EP 1 3 219 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 03.01.07 Bulletin 07/01 (1) Int Cl.: H04L 12/24 (06.01) H04L 12/26 (06.01) (21)
(51) Int Cl.: H04L 12/46 (2006.01) H04L 29/14 (2006.01) H04L 29/12 (2006.01)
(19) (11) EP 1 342 344 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 03.06.09 Bulletin 09/23 (21) Application number: 019639.0 (22) Date of filing:.08.01
(51) Int Cl.: H04N 7/52 (2011.01)
(19) TEPZZ_9776 B_T (11) EP 1 977 611 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 16.01.13 Bulletin 13/03 (21) Application number: 0683819.1 (22)
TEPZZ 94Z968A_T EP 2 940 968 A1 (19) (11) EP 2 940 968 A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: H04L 29/08 (2006.01)
(19) TEPZZ 94Z968A_T (11) EP 2 940 968 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: 04.11.20 Bulletin 20/4 (1) Int Cl.: H04L 29/08 (2006.01) (21) Application number: 1430649.7 (22) Date
Title (fr) SOURCE IONIQUE INTERNE DOUBLE POUR PRODUCTION DE FAISCEAU DE PARTICULES AVEC UN CYCLOTRON
Title (en) A TWIN INTERNAL ION SOURCE FOR PARTICLE BEAM PRODUCTION WITH A CYCLOTRON Title (de) DOPPELTE INTERNE IONENQUELLE FÜR PARTIKELSTRAHLHERSTELLUNG MIT EINEM ZYKLOTRON Title (fr) SOURCE IONIQUE INTERNE
(51) Int Cl.: H04L 12/24 (2006.01) G06F 9/445 (2006.01)
(19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 978 672 B1 (4) Date of publication and mention of the grant of the patent: 01.09. Bulletin /3 (1) Int Cl.: H04L 12/24 (06.01) G06F 9/44 (06.01) (21) Application
(51) Int Cl.: G06F 12/14 (2006.01) G06F 17/00 (2006.01) H04M 1/66 (2006.01) G06F 1/00 (2006.01)
(19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 221 098 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 07.06.06
(51) Int Cl.: H04L 9/00 (2006.01) H04K 1/00 (2006.01) G06F 1/04 (2006.01) G06F 1/06 (2006.01) G06F 1/08 (2006.01) G07F 7/10 (2006.
(19) (12) EUROPEAN PATENT SPECIFICATION (11) EP 1 481 3 B1 (4) Date of publication and mention of the grant of the patent: 24.03. Bulletin /12 (21) Application number: 0371602.6 (22) Date of filing: 12.02.03
(51) Int Cl.: H04N 5/225 (2006.01)
(19) TEPZZ_94 66_B_T (11) EP 1 942 661 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 17.09.2014 Bulletin 2014/38 (1) Int Cl.: H04N /22 (2006.01)
EP 1 368 959 B1 (19) (11) EP 1 368 959 B1 (12) EUROPEAN PATENT SPECIFICATION
(19) Europäisches Patentamt European Patent Office Office européen des brevets (11) EP 1 368 99 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent:.11.06
EP 2 492 881 A2 (19) (11) EP 2 492 881 A2 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 29.08.2012 Bulletin 2012/35
(19) (12) EUROPEAN PATENT APPLICATION (11) EP 2 492 881 A2 (43) Date of publication: 29.08.2012 Bulletin 2012/35 (51) Int Cl.: G08B 13/16 (2006.01) G08B 25/08 (2006.01) (21) Application number: 12386006.6
