AU2006238948A1 - Remote device access control method - Google Patents

Remote device access control method Download PDF

Info

Publication number
AU2006238948A1
AU2006238948A1 AU2006238948A AU2006238948A AU2006238948A1 AU 2006238948 A1 AU2006238948 A1 AU 2006238948A1 AU 2006238948 A AU2006238948 A AU 2006238948A AU 2006238948 A AU2006238948 A AU 2006238948A AU 2006238948 A1 AU2006238948 A1 AU 2006238948A1
Authority
AU
Australia
Prior art keywords
remote device
remote
user terminal
mobile video
pin
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU2006238948A
Other versions
AU2006238948B2 (en
Inventor
Francesco Pugliese
Chris Seal
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hutchison Whampoa Three G IP Bahamas Ltd
Original Assignee
Hutchison Whampoa Three G IP Bahamas Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hutchison Whampoa Three G IP Bahamas Ltd filed Critical Hutchison Whampoa Three G IP Bahamas Ltd
Publication of AU2006238948A1 publication Critical patent/AU2006238948A1/en
Application granted granted Critical
Publication of AU2006238948B2 publication Critical patent/AU2006238948B2/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Description

WO 2006/114629 PCT/GB2006/001537 1 REMOTE DEVICE ACCESS CONTROL METHOD The present invention relates to a method of controlling access to a remote device in mobile telephony in particular a remote video camera in a mobile telephone 5 handset. Background to the invention There are various known systems for transmitting video or still images and 10 audio from remote devices to a user terminal. For example, telephone systems enable users to receive audio or video signals from remote locations. In particular, mobile phones enable users to receive audio signals sent from a mobile telephone. Third generation mobile phone technology (3G) has brought video calling functionality to mobile phones and thus users are able to see each other during a call in addition to 15 hearing the usual audio signal. It is also known to connect video cameras to the Internet via personal computers. So called Web-cams, enable users to remotely view images captured by the Web-cam. US publication 2005/0181762 defines a method of transmitting images from a surveillance camera to a monitoring device, whereby the camera is capable of 20 triggering an alarm to a predefined wireless device. A problem with accessing video and audio information from remote devices is that without any restrictions, anyone may access them. This may not always be desirable and there is therefore a need for systems which restrict access to remote devices. There is also a need for systems which allow the restrictions to be easily 25 administered. US publication 2005/0091332 defines communication over a network wherein initiation of transfer, authentication of the communication and administration functions are performed by a central server that transmits instructions to slave terminals. 30 WO 2006/114629 PCT/GB2006/001537 2 US publication 2004/185925 discloses a technique whereby a mobile telephone may be remotely triggered to take a photograph , based on prior authentication information provided by a user. The user at the mobile terminal manages this authentication information, by keying in the required commands. 5 However the prior art does not facilitate administration control for managing a 'white list' from a remote location. Summary of the invention 10 In a first aspect, the present invention provides a method of generating a link between a user terminal and a remote device. A link request is sent from the user terminal to the remote device. An identifier is sent from the user terminal to the remote device. The remote device checks the identifier against at least one stored identifier and if there is a match, the link is established. 15 Thus, a user can only access information from a remote device if the identifier sent with the link request matches the at least one stored identifier. This prevents access by unauthorised users. Mobile phone technology, preferably cellular phone technology is used to establish the link, in which case the user device may be a first mobile video phone and 20 the remote device may be a second mobile video phone or device fitted with a camera having the required circuitry to communicate with the user device over the cellular network and is capable of being plugged in to a power circuit. The link request is a video telephone call from the first mobile video phone to the telephone number of the second mobile video phone and the first identifier is Caller Line Identification (CLI). 25 The at least one stored identifier is a list of telephone numbers of authorised users which is preferably stored on the SIM card of the second mobile video phone. Video images are sent from the second mobile video phone to the first mobile video phone if the CLI matches a telephone number stored on the SIM card. In a second aspect, the present invention provides a method of remotely 30 controlling access to the remote device of the first aspect of the present invention. The remote device has stored thereon a master identifier. The method comprises a step of WO 2006/114629 PCT/GB2006/001537 3 sending a message from a user terminal to the remote device with a command to update the at least one stored identifier. The message includes a master identifier. The command is only acted upon if the master identifier matches that which is stored on the remote device. 5 Thus, only the owner or administrator of the remote device having the master identifier can update the at least one stored identifier. Preferably, the master identifier is a PIN number and the message is an SMS text message. The user includes the PIN number and the command in the SMS text message in a predetermined format. The command is only acted upon if the PIN 10 number in the SMS matches the PIN number stored on the second mobile video phone. The command may be to add or remove a telephone number from the list of telephone numbers of authorised users. In a third aspect, the present invention provides a system, method and device to enable the first and the second aspects of the present invention. 15 The owner can self-administer access to the mobile video camera and in particular can remotely administer access to the mobile video camera. The system easy to use which helps keep support costs down. For example, there is no need to call a call-centre agent to invoke the changes. The system is very easy for of use by dial-in users. By pre-authorising users, 20 use of the service is simplified. The solution imposes a small amount of technical skill on the part of the owner of the camera (in composing syntactically correct commands via SMS) but dial-in users need only know how to make a video call. Brief description of the drawings 25 So that the present invention may be more readily understood, embodiments thereof will now be described by way of example only and with reference to the accompanying drawings in which: Figure 1 is a flow chart showing an embodiment of the present invention. 30 WO 2006/114629 PCT/GB2006/001537 4 Detailed description of the preferred embodiments In a first aspect the present invention provides a remote mobile video phone which can be dialled into by other mobile video phone users and which allows those 5 users to view images and/or hear sounds at the location of the remote mobile video phone. The remote mobile video phone has a SIM card and a telephone number as per a normal mobile phone. When a user wants to view images at the remote location, they make a video call to the remote mobile video phone in the same way they would make a call to any mobile video phone. 10 Approved dial-in users have their phone numbers stored in a white-list on the remote mobile video phone. Preferably, the white-list is the memory of the SIM card of the remote mobile video phone. When the user calls the remote mobile video phone, their number is established using, for example, CLI, and if their telephone number matches one in the white-list, the remote mobile video phone answers the call, 15 and images and/or sound captured by the remote mobile video phone are sent to the users mobile phone. No further authentication is required. Alternatively, for higher security, the dial-in user may be required to enter a user PIN. This would protect against use of the remote mobile video phone if the users mobile phone is stolen. The user PIN could be common to all dial-in users, defined for 20 each users, or even generated by the device (for example, upon being added the white list) and sent via SMS to that user. In lower security systems, it may be seen as desirable to allow access only by user PIN even when a dial-in user's phone number is not on the white-list. This would enable a user to call from abroad, in which case the dial-in user's phone 25 number is not always relayed through the mobile networks. (i.e. missing CLI). The user enters a user PIN and the remote mobile video phone cross-references this with a stored user PIN. The call is only answered if there is a match. Preferably, this lower security process of access by user PIN only could have time or count based rules associated therewith. In other words, the administrator or mobile video camera could 30 issue a user PIN that is valid for today only, or only valid for one dial-in call, for ten dial-in calls, etc.
WO 2006/114629 PCT/GB2006/001537 5 Figure 1 is a flow-chart showing one procedure for restricted access to the remote mobile enabled device. For the purposes of this example, access to the remote mobile video phone using the white-list is referred to as 'permanent access' and access to the remote mobile enabled device using a user PIN is referred to as 'call based 5 access'. A user initiates a video call to the telephone number of a remote mobile video phone. If 'free access' is enabled, then a video link is established and the remote mobile video phone begins sending video images to the users mobile phone. If 'free access' is not enabled, the remote mobile video phone checks whether or not 10 'permanent access' is enabled. If not the remote mobile video phone checks to see if 'call based access' is enabled as will be described below. If 'permanent access' is enabled, the remote mobile video phone checks the CLI against the telephone numbers stored in the white-list. If the user's telephone number is not in the white-list, then remote mobile video phone checks to see if 'call based access' is enabled as will be 15 described below. If the user's telephone number is in the white-list, the remote mobile video phone begins sending video images and/or sounds to the users mobile phone. If the remote mobile video phone is required to check if 'call based access' is enabled, it does so, and if not, access is denied to the remote mobile video phone. If 'call based access' is enabled, the remote mobile video phone, asks the user for a user 20 PIN. If the PIN is correct, the remote mobile video phone begins sending video images to the users mobile phone. If not, access is denied. In the case of 'call based access', while the call is being established, the remote mobile video phone sends to the user's telephone a predefined image which prompts the user to enter a user PIN. Alternatively, the remote mobile video phone sends a pre 25 recorded audio stream which informs the user that a PIN should to be entered. The remote mobile video phone may also be enabled to be controlled by the user during the video call. For example, the functions, rotate, zoom, switch camera, start/stop recording, etc, may all be enabled through key presses during the video call. So that video recording may be enabled, the remote mobile video phone may 30 be provided with a memory and preferably a removable external memory.
WO 2006/114629 PCT/GB2006/001537 6 In a second aspect, the present invention provides a method of remotely controlling access to the above-described remote mobile video phone. A master PIN is stored on the remote mobile video phone. The master PIN may be stored either on the SIM or on another memory in the remote phone. The owner may set the master PIN 5 themselves or the remote mobile video phone may be pre-set with a master PIN. This may be done at set-up or may be changed at any time. The owner or other approved administrator can send commands via Short Message Service (SMS) to the remote mobile video phone that instruct it to add or delete approved dial-in users from the white-list or perform other administrative 10 functions. The remote mobile video phone can respond with an SMS confirming how the requested command was acted upon. In certain situations, the camera in the remote mobile video phone can be configured to send alarm signals to another authorized mobile terminal. Eg: alarm 15 triggered due to certain movement caused at its location or if the mobile video phone itself is moved from its location. However, further circuitry needs to be incorporated in the mobile phone to allow this application. For higher security, the mobile video camera may also be enabled to require 20 that remote administration messages containing the master PIN also originate from one or more declared phone numbers, in order for the command or commands to be accepted. This may be in addition to or in place of the master PIN. Additionally, the message from the owner incorporating the master PIN may 25 be encrypted using existing ciphering techniques. This provides secure communication and prevents a third party from acquiring access to the master PIN, either intentionally or accidentally. A few encryption techniques that could be used include checksum methods (eg: Cyclic redundancy check- CRC), key based methods (eg: Pretty Good Privacy -PGP or Data Encryption Standard -DES ) or password 30 protection. The extent of ciphering will depend on the level of security desired by the owner of the mobile video phone.
WO 2006/114629 PCT/GB2006/001537 7 SMS is the preferred messaging protocol for remote administration as it works in all 2G and 3G radio conditions, but other messaging protocols may be used. Equally commands could be accepted via a digitally signed email, or if the remote 5 mobile video phone has packet connectivity (GPRS/UMTS) it could host a small web server on it so that it can be accessed via browsers (either on phones or via the Internet). However, commands could be sent via alternative messaging systems such as email, SIP, MMS, instant messaging, etc. All of these require that the remote mobile video phone has packet connectivity (i.e. internet protocol(IP)) and that the 10 mobile video camera is in GPRS or UMTS coverage. Use of SMS means that the mobile video camera need only be covered by a basic 2G GSM network for administrative control. The remote mobile video phone itself needs to be covered by a UMTS or equivalent network during a video call. However, UMTS cells can 'breathe' and may be heavily loaded, so it is possible that a UMTS camera is covered by patchy 15 UMTS cover for video-calls but consistent radio coverage for SMSs. Also for audio only mode, the solution can work in 2G cover. The text message commands are based on any suitable syntax. The remote mobile video phone is enabled to read the text content of the SMS message and interpret it in accordance with a pre-arranged syntax. The syntax can be made user 20 friendly by using words corresponding to the desired command. Although the present invention has been described above in the context of a mobile video phone, it will be appreciated that the authorisation and administration mechanisms described above could be applied to any remote phone. The remote phone 25 may be a mobile phone or a landline based phone and it may have audio or video capabilities or a combination of the two. The remote mobile video phone may be a 3G mobile video phone. Although the present invention has been described above in relation to restricted access, the remote mobile video phone may be switched to unrestricted 30 access, such that anyone may call the remote mobile video phone.
WO 2006/114629 PCT/GB2006/001537 8 The present invention has been described above in relation to CLI and PIN authorisation techniques. It will be appreciated that, other authorisation techniques may be used. In particular, voice recognition may be used. Although the present invention has been described in the context of a single 5 user dialling in to the remote mobile video phone, a Video Interactive Gateway (VIG) or corresponding technology may be used to allow more than one user to view images captured by the remote mobile video phone. In this case, a user dials the number of the VIG and the VIG connects the user through to the remote mobile video phone. The telephone number of the VIG is stored in the white-list so that the VIG can dial the 10 remote mobile video phone. In order that the VIG knows which users to allow access to the remote mobile video phone, the white-list may be transferred to the VIG. All the functionality described above may then be carried out by the VIG. Furthermore, if a normal voice call is already underway between the two mobile video phones, one-way video may be added during the call by setting up a 15 parallel data connection, using SIP for example. The remote mobile video phone may also be connected to a video recorder or data logger. The remote mobile video phone may then be instructed by a user to record an image being viewed. Alternatively, as video may be transmitted from the user's mobile to the remote mobile video phone, the video recorder may automatically 20 record this video so that there is a visual record of the user who has dialled into the remote mobile video phone. The data logger may make a record of all the users that have dialled into the remote mobile video phone. As mentioned above, the white-list may be stored on the SIM of the remote mobile video phone. It is possible for the network operator to amend the white-list of 25 initiate other commands using Over-the-Air (OTA) provisioning or corresponding technology. Thus, in the event that the administrator forgets their master PIN, they can contact their network operator and have the white-list or master PIN changed.

Claims (14)

1. A method of transferring media content between a user terminal and a remote device, both being capable of multi-media data transfer, comprising the steps of: 5 - initiating communication between the user terminal and the remote device by sending a request from the user terminal to the remote device; - establishing a communication link between the user terminal and the remote 10 device; - transferring media content from the remote device to the user terminal; wherein, 15 said step of transferring media content takes place only if the user terminal has been previously authorised for communication with the remote device.
2. The method as claimed in claim 1 wherein the user terminal is authorised for 20 communication with the remote device if an identifier embedded in the request sent from the user terminal is indicative of one of a plurality of authorized reference identifiers stored in a memory of the remote device.
3. The method as claimed in claiml1 and 2, wherein the contents of the plurality of 25 authorized reference identifiers stored in the remote device is controlled by the owner of the remote device from a remote location.
4. The method as claimed in claim 1 to 3 wherein identity of the owner of the remote device is established by the owner sending a message incorporating a unique 30 identification to the remote device. WO 2006/114629 PCT/GB2006/001537 10
5. The method as claimed in claims 3 and 4 wherein, if the unique identification sent corresponds to the unique identification that is stored in a memory of the remote 5 device, authorization is given to the owner of the remote device to add or delete an identifier from the plurality of reference identifiers stored in the remote device.
6. The method as claimed in claims 3 to 5 wherein the unique identification is the PIN of the remote device. 10
7. The method as claimed in claim 1 wherein the identifier sent in the request from the user terminal is the telephone number of the user terminal.
8. The method as claimed in claim 1 wherein the plurality of authorized 15 references identifiers stored in the remote device are telephone numbers.
9. The method as claimed in claim 1 wherein the identifier sent in the request from the user terminal is a PIN identifier. 20
10. The method as claimed in claim 1 wherein the plurality of authorized references identifiers stored in the remote device are PIN identifiers.
11. The method as claimed in claims 9 and 10 wherein the PIN identifiers are valid for a restricted period of time. 25
12. The method as claimed in claim 1 wherein the media content that is transferred between the user terminal and the remote devices is a video file.
13. The method as claimed in claim 1 wherein the user terminal and the remote 30 device are provided with camera's capable of capturing video and reproducing the same. WO 2006/114629 PCT/GB2006/001537 11
14. A system for transferring media content between a user terminal and a remote device, by the method claimed in any of the preceding claims.
AU2006238948A 2005-04-26 2006-04-26 Remote device access control method Ceased AU2006238948B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB0508454.6 2005-04-26
GBGB0508454.6A GB0508454D0 (en) 2005-04-26 2005-04-26 Remote device access control method
PCT/GB2006/001537 WO2006114629A2 (en) 2005-04-26 2006-04-26 Remote device access control method

Publications (2)

Publication Number Publication Date
AU2006238948A1 true AU2006238948A1 (en) 2006-11-02
AU2006238948B2 AU2006238948B2 (en) 2010-03-11

Family

ID=34640171

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2006238948A Ceased AU2006238948B2 (en) 2005-04-26 2006-04-26 Remote device access control method

Country Status (8)

Country Link
EP (1) EP1880526A2 (en)
AU (1) AU2006238948B2 (en)
GB (2) GB0508454D0 (en)
HK (1) HK1095687A1 (en)
IL (1) IL186760A (en)
NO (1) NO20075634L (en)
NZ (1) NZ562672A (en)
WO (1) WO2006114629A2 (en)

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956715A (en) * 1994-12-13 1999-09-21 Microsoft Corporation Method and system for controlling user access to a resource in a networked computing environment
WO2001099375A1 (en) * 2000-06-22 2001-12-27 Steven Low Method and system for communicating visual information
US20020065778A1 (en) * 2000-11-30 2002-05-30 Stephane Bouet Mehtod of and a system for distributing electronic content
US7421411B2 (en) 2001-07-06 2008-09-02 Nokia Corporation Digital rights management in a mobile communications environment
KR100713354B1 (en) * 2003-03-18 2007-05-04 삼성전자주식회사 mobile communication terminal with remote controllable camera and method for taking pictures thereof
US7305230B2 (en) 2003-07-01 2007-12-04 Nokia Corporation System, apparatus, and method for providing a mobile server
JP2005064885A (en) * 2003-08-13 2005-03-10 Hitachi Ltd Remote monitoring system
US7680484B2 (en) * 2004-02-13 2010-03-16 Edwin A. Kauppila System and method for performing wireless remote monitoring
EP1584898B1 (en) * 2004-04-08 2008-08-27 Accenture Global Services GmbH Method and system for remotely monitoring meters
US20060026649A1 (en) * 2004-07-12 2006-02-02 Shieh Peter F Remotely triggering multi-media data delivery in mobile communications devices

Also Published As

Publication number Publication date
GB2426414A (en) 2006-11-22
GB2426414B (en) 2009-11-04
WO2006114629A2 (en) 2006-11-02
NO20075634L (en) 2007-11-26
IL186760A (en) 2014-04-30
GB0608355D0 (en) 2006-06-07
NZ562672A (en) 2010-11-26
EP1880526A2 (en) 2008-01-23
IL186760A0 (en) 2008-02-09
AU2006238948B2 (en) 2010-03-11
GB0508454D0 (en) 2005-06-01
WO2006114629A3 (en) 2006-12-21
HK1095687A1 (en) 2007-05-11

Similar Documents

Publication Publication Date Title
US7689231B2 (en) Territorial enforcement of device functionality
US9743442B2 (en) Enabling combinational services in a communications network
US8805327B2 (en) Communication method and infrastructure supporting device security and tracking of mobile and portable multimedia devices
CN101227499A (en) System and method for implementing remote video control based on third generation mobile communication system
US9729696B2 (en) Method and system for tracking mobile communication device using MMS
KR20160145028A (en) Additional information on a caller
EP2107537A1 (en) Video surveillance and home security apparatus using the UMTS network and a method for the management of said apparatus
CN103179504A (en) Method and device for judging user legality, and method and system for accessing user to mailbox
WO2009003387A1 (en) A system and a method for video and audio monitoring
JP2012516089A (en) Emergency call handling
US20100223465A1 (en) Method for lending out electronic key and communication terminal
EP2088798B1 (en) A method for processing call and a service control device and a call processing system
WO2012075755A1 (en) Mobile terminal and anti-theft method thereof
CA2550865A1 (en) Mobile monitor-collecting terminal and communication system for realizing audio/video monitoring service and method therof
JP2000232680A (en) Mobile communication terminal, communication network and user authentication method
WO2012080763A1 (en) Communication apparatus and associated methods
JP2008048129A (en) Method of remotely controlling mobile terminal, radio communication system, mobile terminal and program
AU2006238948B2 (en) Remote device access control method
KR20070122379A (en) Method for tracking the stolen mobile communication terminal
KR100711097B1 (en) Apparatus and method for protecting private information on wireless telecommunication terminal and Apparatus and method for managing private information using remote control
KR100970350B1 (en) Method and Terminal of Processing One-Ring Spam
KR100968023B1 (en) Photograph method for camera type mobile communication device
JP4019059B2 (en) Data line terminator with authentication function and authentication method in data communication
KR20080026469A (en) A method and system for tracking a mobile communication device using mms
JP3774179B2 (en) Internet video phone system

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)
MK14 Patent ceased section 143(a) (annual fees not paid) or expired