EP2055082A1 - Method of managing a secure transfer session through an address translation device, corresponding server and computer program - Google Patents
Method of managing a secure transfer session through an address translation device, corresponding server and computer programInfo
- Publication number
- EP2055082A1 EP2055082A1 EP07786843A EP07786843A EP2055082A1 EP 2055082 A1 EP2055082 A1 EP 2055082A1 EP 07786843 A EP07786843 A EP 07786843A EP 07786843 A EP07786843 A EP 07786843A EP 2055082 A1 EP2055082 A1 EP 2055082A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- server
- address
- session
- stun
- transport
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
- H04L61/2575—NAT traversal using address mapping retrieval, e.g. simple traversal of user datagram protocol through session traversal utilities for NAT [STUN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2521—Translation architectures other than single NAT servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2521—Translation architectures other than single NAT servers
- H04L61/2532—Clique of NAT servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
- H04L61/2589—NAT traversal over a relay server, e.g. traversal using relay for network address translation [TURN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
Definitions
- a method of managing a secure transfer session through an address translation device, server and corresponding computer program is a method of managing a secure transfer session through an address translation device, server and corresponding computer program.
- the present invention relates to the field of connections between local area networks and communication networks based on the IP protocol.
- the present invention relates more particularly to the connection of networks called "domestic", integrating communication means such as computers, mobile phones, multimedia consoles and the Internet, in the framework of sharing or exchange in networks. peer-to-peer networks.
- a device responsible for linking the local network to the Internet integrates, most of the time, one or more NAT devices. Address Translation "for" Translation of Network Addresses ") that allow to” share "a public Internet address (IP) between several devices in the home network.
- IP Internet address
- IP IP
- home router such as a STB
- connection information can be: the address and the public ports allocated by the NAT, the type of NAT (symmetrical, port restricted, ...) for example.
- the STUN algorithm applied by the client has several tests to determine the NAT device type. In one of these tests, the LAN STUN client will ask the STUN server to respond to it from an IP address different from the one from which it has responded so far. The objective of this test is to enable the client, by interpreting the reception or not of a response to this request, to know if the NAT device to which it is connected blocks a packet coming from an IP address with which it is connected. never communicated.
- a STUN server In the current state of the art techniques, a STUN server must, to be able to respond to this type of request, have two different IP addresses. So, when a C STUN client wants to address a STUN A server, he starts by establishing a TLS / TCP connection (encrypted connection) and sends on this connection a SHARED-SECRET-REQUEST request to exchange a shared secret. The STUN A server responds with a SHARED-SECRET-RESPONSE message with a username and password attribute. All subsequent requests, issued using the User Datagram Protocol (UDP) for "User Datagram Exchange Protocol", include a field recalling the user name and other integrity field. message (message integrity) which constitutes a signature of the message using the previously exchanged password.
- UDP User Datagram Protocol
- message message integrity
- a STUN server On receipt of any STUN request of the "Binding-Request" type, a STUN server must announce the other address it has (attribute CHANGED-ADDRESS) and from which it is able to respond if the client C STUN request to reply from a different address ⁇ (see ⁇ 11.2.3 of RFC 3489 STUN)
- STUN servers as described by the standard are extremely difficult to deploy in P2P networks.
- the functions of STUN servers are hosted at a central server.
- such a method comprises: a step of obtaining at least a second datagram sending address from at least one second transfer session management server; so that said client terminal can transfer datagrams to said first server using at least said two addresses.
- the invention is based on a new and inventive approach to the management of secure datagram transfer sessions by obtaining the IP addresses necessary for the communication session to be carried out with other servers.
- the second address used in the communication session is that of a second server, which allows the first server to not have two addresses and overcomes a lack of IP addresses.
- said method comprises the following phases: request to open said secure transfer session sent by said client terminal to said first server; opening said secure transfer session by said first server, engaging said step of obtaining said at least one second address; maintaining said transfer session by said first server, allowing management of transfers from said at least one second address.
- the management of the communication session comprises successive phases allowing the establishment and maintenance of the session:
- the terminal requires opening a session to the first server
- the first server commits to obtaining the second address necessary for the execution of the session with a second server;
- the first server maintains the session all the time necessary, thus allowing the transfer of data from the second address, and therefore the second server.
- said opening phase of said session comprises the following steps: transfer, by said first server, of said opening request to said second server; generating said transfer session by said second server; transmitting at least a first piece of information representative of said transfer session to said first server, by said second server; storing, by said first server, said at least one piece of information representative of said transfer session; transferring at least a second piece of information representative of said transfer session to said client, by said first server.
- obtaining the second address is achieved by a sequence of steps that are initiated by the first server. Indeed, the latter does not open the session, but transmits the opening request to the second server. This second server therefore opens a communication session from which it transmits representative information to the first server so that they can communicate together through this session.
- the representative information transmitted may either contain the second address, or information allowing to know this second address.
- the first server then stores the representative information of this session and then transmits a second piece of information representative of this session to the client who requested the opening of the session.
- This second piece of information representative of the session can either contain the address of the second server, or other information making it possible to acquaint with this second address.
- said maintenance phase comprises the following steps: transmission, by said client terminal, of a user datagram transfer request using said at least two addresses, to said first server; transmitting said transfer request, by said first server, to said second server, specifying a response address of said client; said first server qualifies a first communication configuration between said client and said first server; said second server qualifying a second communication configuration between said client and said second server, using said response address.
- the client terminal having obtained a second communication address through the first server, uses one or other of these addresses to communicate with the first server.
- the client terminal therefore sends a request to the first server indicating as response address (the response address is the address from which it expects to receive the requested information) either of the these addresses.
- the first server transmits, to the second server, the requests that are intended for this second server.
- the first server qualifies a first communication configuration with the client that allows the latter to communicate with the first server.
- the second server qualifies a second configuration of communication with the client.
- said transfer session comprises at least one session code taking into account at least one of the parameters belonging to the group comprising at least: information representative of an identifier of a user of said client terminal ; information representative of a password of a user of said client terminal.
- the invention also relates to a server for managing a session for securely transferring user datagrams of a client terminal, said session containing a first datagram sending address and at least one second datagram issuing address, distinct from said first address,
- such a server comprises: means for obtaining at least a second datagram sending address from at least one second transfer session management server; so that said client terminal can transfer datagrams to said first server using at least said two addresses.
- such a server comprises means for: opening said secure transfer session by said first server following a request sent by said client terminal, engaging said means for obtaining said at least one second address; - Maintaining said transfer session by said first server, for managing transfers from said at least one second address.
- such a management server complies with the STUN protocol.
- the invention also relates to a computer program product downloadable from a communication network and / or stored on a computer readable medium and / or executable by a microprocessor.
- such a computer program product comprises program code instructions for executing the method of managing a session for securely transferring user datagrams of a client terminal. as previously described. 4 LIST OF FIGURES
- FIG. 1 shows an example of architecture of a local area network connected to
- FIG. 2 presents the principle of obtaining a second datagram transmission address according to the invention, in the architecture presented in FIG. 1;
- FIG. 3 illustrates the establishment of a secure communication session using the STUN protocol in the architecture of FIG. 1;
- - Figure 4 shows a simplified hardware architecture of a client
- Figure 5 shows a simplified hardware architecture of a server
- the invention therefore proposes to substitute the use of a STUN server having two IP addresses, by the use of STUN servers having only one IP address.
- the invention makes it possible to deploy large-scale peer-to-peer applications.
- the general principle of the invention is based on a new and inventive implementation of the specifications of the STUN protocol. Indeed, the invention does not require modification of the existing STUN protocol. It is based on a new implementation of this protocol. Thus, one can deploy many STUN servers, without these being in the obligation to have two different IP addresses.
- the invention therefore goes against current techniques of the prior art which are content not to relocate the features related to the server STUN.
- STUN in a local network type "domestic" connected to the Internet through a home router. It is clear however that the invention is not limited to this particular application, but can also be implemented in many other fields, and for example in any application where it is desired to deploy STUN servers without it being desired that they have several addresses and more generally in all cases where the characteristics listed later are interesting.
- client should be understood here and in the remainder of the presentation as designating an entity that requests the resources of another entity to execute a task, a client that can be materialized by an autonomous server, a group of servers or by various elements separately distributed within various means of communication included in the system.
- a STUN client that requires the establishment of a secure transfer session to a STUN server can also act as a STUN server for another client also requesting the establishment of another transfer session. secured.
- each of these two servers has an IP address. They are located outside the local area network (LOC N ) of the user and are accessible through the Internet (I Net )
- LOC N local area network
- I Net Internet
- a STUN C STUN client is located within a local area network. It can be a personal computer, a mobile phone, or other multimedia equipment that has a network interface to connect to that local network. This client C STUN communicates on the Internet through a NAT NAT NAT address translation gateway.
- the servers STUN A and STUN B are able to manage a session for the secure transfer of user datagrams according to the invention.
- the proposed solution consists in using two STUN servers mono address to honor this type of request.
- This is transparent from the point of view of the STUN C client that can remain standard, with session support being performed at the server level STUN A.
- the principle implemented in this embodiment consists in transferring any request requiring a response from a different address to a second server STUN B mono address which is responsible for responding to the client.
- the principle of obtaining an IP address from a second server is presented.
- the client C STUN requests (201) the establishment of a session at the server STUN A , which communicates (202) with the server STUN B.
- This server generates (203) a session from which it sends (204) the elements to STUN A which stores them (205) and furnishes (206) where appropriate a part to CSTUN-
- CST U N requests (301) a session code from STUNA (through the P NAT elements and from the Internet). To do, the C STUN client sends,
- STUN A relays (302) the request of the session code to STUN B This operation is performed by the server STUN A which sends a message
- STUN B generates (303) the access codes and returns them to STUN A. To do this, the STUN server B responds to the STUN server A with a SHARED-SECRET-RESPONSE message including attributes including a username and a password. past ;
- STUN A stores (304) the access codes (username and password) and sends them to CST U N stuna
- the server therefore meets the customer CST U N (still TLS) using SHARED-SECRET Message -RESPONSE including attributes including username and password previously stored.
- This first communication phase makes it possible to establish a secure session between a STUN client C and a STUN server A , which is then considered by the client C STUN as being a genuine STUN server having two IP addresses.
- a second communication phase according to a first use case that does not require communication between C STUN and STUN B :
- C STUN wishes to communicate (305) only with STUN A , securely by its session code.
- the C STUN client sends (via the UDP protocol) a BINDING-REQUEST message to the STUN A server without the CHANGE-REQUEST flag; - STUN A communicates (306) with C STUN to qualify the configuration, securely by its session code.
- STUN A responds to the client with a BINDING-RESPONSE message by announcing in the CHANGED-ADDRESS attribute the IP address and the STUN port of the STUN B server.
- CST U N communicates (307) with STUNA to obtain a response from STUNB, securely by its session code.
- the C STUN client sends (via the UDP protocol) a BINDING-REQUEST message to the STUN A server with the address change flag set
- STUN A then sends (308) to STUN B the context of its communication with CST U N.
- the STUNA server transfers the request to STUNB by specifying the address of the client where the response must be made (RESPONSE-ADDRESS then takes the IP address and client port);
- STUN B uses (309) the session code to communicate with C STUN and qualify the configuration. To do this, the server STUN B (after verifying that the message-integrity is correct) sends the response to the client C STUN - (This from its IP address which is different from that of STUNA).
- C STUN - This from its IP address which is different from that of STUNA.
- This embodiment is based on the secret sharing between the STUN server A and the server STUN B and the generation, by this second server STUN B , the access codes necessary for the establishment of the session.
- Those skilled in the art will have no difficulty in understanding that this implementation allows a recursive allocation of IP addresses. Indeed, if a client requests a server to assign more than two IP addresses, the method according to the invention is able to provide them through the establishment of a new session between for example the server STUN B and another server STUN C adapted to implement the method according to the invention.
- the client is an entity that solicits resources or information from another entity.
- the servers STUN A and the server STUN B can quite be also STUN clients.
- Hardware architecture of the client and the server according to the invention The hardware structure of the client is described, in a very simplified manner, in relation to FIG. 4. It comprises a memory 41, and a processing unit 40 which is equipped with a microprocessor, which is controlled by a computer program (or application) 42, responsible inter alia for the transmission of requests for establishing communication sessions, and requests for data transfer.
- the processing unit 40 receives as input, via a network input interface module 43, responses to its requests 44, which the microprocessor processes, according to the instructions of the program 42, in response to the requests for establishing the sessions. communication, and data transfer requests 46, which are transmitted via a network output interface module 45.
- the hardware structure of the server is described, in a very simplified manner, in relation with FIG. 5. It comprises a memory 51, and a processing unit 50 which is equipped with a microprocessor, which is controlled by a computer program ( or application) 52, responsible inter alia for sending requests for establishing communication sessions to a second server, and requests for data transfer, in particular IP addresses.
- a computer program or application
- the processing unit 50 receives, via a network input interface module 53, responses to its requests 54, which the microprocessor processes, in accordance with the instructions of the program 52, in response to the requests for establishing the sessions. communication from a client, and data transfer requests 56, which are transmitted via a network output interface module 55.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0607449 | 2006-08-22 | ||
PCT/EP2007/056362 WO2008022829A1 (en) | 2006-08-22 | 2007-06-26 | Method of managing a secure transfer session through an address translation device, corresponding server and computer program |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2055082A1 true EP2055082A1 (en) | 2009-05-06 |
Family
ID=37719418
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07786843A Withdrawn EP2055082A1 (en) | 2006-08-22 | 2007-06-26 | Method of managing a secure transfer session through an address translation device, corresponding server and computer program |
Country Status (3)
Country | Link |
---|---|
US (1) | US9413590B2 (en) |
EP (1) | EP2055082A1 (en) |
WO (1) | WO2008022829A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6952060B2 (en) | 2016-06-21 | 2021-10-20 | オラクル・インターナショナル・コーポレイション | User Resolver, an interactive messaging system in natural language hosted in the Internet cloud |
CN109155748B (en) | 2016-06-21 | 2021-06-08 | 甲骨文国际公司 | Internet cloud hosted natural language interactive messaging system server collaboration |
US10498674B2 (en) | 2016-06-21 | 2019-12-03 | Oracle International Corporation | Internet cloud-hosted natural language interactive messaging system sessionizer |
WO2018052544A1 (en) | 2016-09-16 | 2018-03-22 | Oracle International Corporation | Internet cloud-hosted natural language interactive messaging system with virtual database |
CN109600671B (en) * | 2018-12-13 | 2021-02-19 | 四川九州电子科技股份有限公司 | System and method for rapidly upgrading network set top box |
CN112543239B (en) * | 2020-12-23 | 2022-06-24 | 杭州安司源科技有限公司 | Progressive NAT (network Address translation) penetration method |
US11924288B2 (en) * | 2020-12-30 | 2024-03-05 | Arris Enterprises Llc | Methods and systems for transferring a user session between devices |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6615357B1 (en) * | 1999-01-29 | 2003-09-02 | International Business Machines Corporation | System and method for network address translation integration with IP security |
US7441270B1 (en) * | 2000-07-06 | 2008-10-21 | Intel Corporation | Connectivity in the presence of barriers |
US7302496B1 (en) * | 2002-11-12 | 2007-11-27 | Cisco Technology, Inc. | Arrangement for discovering a localized IP address realm between two endpoints |
US7899932B2 (en) * | 2003-01-15 | 2011-03-01 | Panasonic Corporation | Relayed network address translator (NAT) traversal |
US8539552B1 (en) * | 2003-09-25 | 2013-09-17 | Hewlett-Packard Development Company, L.P. | System and method for network based policy enforcement of intelligent-client features |
US7643412B1 (en) * | 2003-10-30 | 2010-01-05 | Nortel Networks Limited | Media proxy able to detect blocking |
TWI257217B (en) * | 2003-11-10 | 2006-06-21 | Inst Information Industry | Method to detect the form of network address translation |
CN100399768C (en) * | 2003-12-24 | 2008-07-02 | 华为技术有限公司 | Method for implementing NAT traversing and system thereof |
US7457293B2 (en) * | 2004-04-05 | 2008-11-25 | Panasonic Corporation | Communication apparatus, method and program for realizing P2P communication |
US8089972B2 (en) * | 2004-05-03 | 2012-01-03 | Level 3 Communications, Llc | Registration redirect server |
EP1613024A1 (en) * | 2004-06-29 | 2006-01-04 | Alcatel Alsthom Compagnie Generale D'electricite | Method and call server for establishing a bidirectional peer-to-peer communication link |
US8571011B2 (en) * | 2004-08-13 | 2013-10-29 | Verizon Business Global Llc | Method and system for providing voice over IP managed services utilizing a centralized data store |
US8838771B2 (en) * | 2004-09-27 | 2014-09-16 | Alcatel Lucent | Enabling VoIP calls to be initiated when a call server is unavailable |
US7543064B2 (en) * | 2004-09-30 | 2009-06-02 | Logitech Europe S.A. | Multiplayer peer-to-peer connection across firewalls and network address translators using a single local port on the local host |
US7483393B2 (en) * | 2004-12-07 | 2009-01-27 | Cisco Technology, Inc. | Method and apparatus for discovering internet addresses |
US8713132B2 (en) * | 2005-03-16 | 2014-04-29 | Icontrol Networks, Inc. | Device for data routing in networks |
US7515549B2 (en) * | 2005-06-07 | 2009-04-07 | Cisco Technology, Inc. | Managing devices across NAT boundaries |
US20070011731A1 (en) * | 2005-06-30 | 2007-01-11 | Nokia Corporation | Method, system & computer program product for discovering characteristics of middleboxes |
US20070022289A1 (en) * | 2005-07-20 | 2007-01-25 | Mci, Inc. | Method and system for providing secure credential storage to support interdomain traversal |
US7983254B2 (en) * | 2005-07-20 | 2011-07-19 | Verizon Business Global Llc | Method and system for securing real-time media streams in support of interdomain traversal |
US8019986B2 (en) * | 2005-08-12 | 2011-09-13 | Comcast Cable Holdings, Llc | Method and system for booting, provisioning and activating hardware and software clients |
US20080119165A1 (en) * | 2005-10-03 | 2008-05-22 | Ajay Mittal | Call routing via recipient authentication |
US20070153812A1 (en) * | 2005-12-29 | 2007-07-05 | John Kemp | Dynamic discovery of a network service on a mobile device |
WO2007125530A2 (en) * | 2006-04-27 | 2007-11-08 | D.S.P. Group Ltd. | Routing path optimization between si p endpoints according to nat topology |
-
2007
- 2007-06-26 WO PCT/EP2007/056362 patent/WO2008022829A1/en active Application Filing
- 2007-06-26 EP EP07786843A patent/EP2055082A1/en not_active Withdrawn
- 2007-06-26 US US12/438,490 patent/US9413590B2/en not_active Expired - Fee Related
Non-Patent Citations (1)
Title |
---|
See references of WO2008022829A1 * |
Also Published As
Publication number | Publication date |
---|---|
US20100131631A1 (en) | 2010-05-27 |
WO2008022829A1 (en) | 2008-02-28 |
US9413590B2 (en) | 2016-08-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7125788B2 (en) | System and method for communicating between secure and unsecure devices using proxies | |
EP2271054B1 (en) | Method of controlling an entity of a remote network from a local network | |
EP2055082A1 (en) | Method of managing a secure transfer session through an address translation device, corresponding server and computer program | |
EP2051477B1 (en) | Method to cross an equipment of translation of addresses for SIP signalling messages by temporaly using transport protocol TCP | |
EP2936782B1 (en) | Method for treatment of access requests, and web browser | |
EP3694146B1 (en) | Method for processing audio and video stream in multi-party conference, corresponding devices, system and program | |
EP1994724A2 (en) | Method and system for characterising heterogeneous communication nodes | |
EP3476108B1 (en) | Method, computer program and device for providing an address by a device to be managed of a network | |
EP2210396B1 (en) | System of interconnection between at least one communication apparatus and at least one remote information system and interconnection method | |
WO2018202985A1 (en) | Technique for executing a service in a local area network through a wide area communication network | |
EP2258097B1 (en) | Setting up a conference with a communication stream mixing policy | |
FR3063858A1 (en) | COMMUNICATION METHOD FOR MAINTAINING AN APPLICATION SESSION BETWEEN TERMINAL AND APPLICATION SERVER | |
EP2266279A1 (en) | Multimedia content sharing via audio-video communication | |
EP2504957B1 (en) | Referenced content access from a content server | |
EP3506555B1 (en) | Method for end-to-end securing of interceptable communication | |
EP1432213B1 (en) | Mediation platform and message transport network | |
EP3149902A1 (en) | Technique for obtaining a policy for routing requests emitted by a software module running on a client device | |
FR2906097A1 (en) | Secured data e.g. video, exchanging method for e.g. source device such as network access point, involves authenticating connection to exchange information in frame when another connection is active and after event detection | |
WO2011121236A1 (en) | Method and device for notification of a terminal in a network | |
FR2919140A1 (en) | METHOD FOR EXCHANGING MESSAGES BETWEEN SESSION DATA SERVER AND CLIENT SERVICES | |
WO2017089710A1 (en) | Method for distributing rights to a service and service platform | |
FR2915651A1 (en) | Media session e.g. audio recording, flow continuity ensuring method for e.g. computer, involves placing component in terminals, where component interacts with server and another component to control session switching to ensure continuity | |
EP2469768A1 (en) | Interfacing method of UPnP devices | |
FR2999047A1 (en) | Method for accessing remote service platform of broadband network by e.g. smart phone of home network, involves managing communication of messages between terminal and remote service platform based on protocol of local area network | |
FR2930700A1 (en) | Applicative data i.e. simulation data, transmitting method for integration of sensor in aircraft, involves initializing and configuring memory of communicating element for storing logical and physical addresses of other element |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20090202 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR MK RS |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: GORGES, DIDIER Inventor name: BREARD, GAEL Inventor name: BAILLY, MARC |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: BAILLY, MARC Inventor name: GORGES, DIDIER Inventor name: BREARD, GAEL |
|
DAX | Request for extension of the european patent (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ORANGE |
|
17Q | First examination report despatched |
Effective date: 20161201 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20170412 |