EP1999886A1 - Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifs - Google Patents

Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifs

Info

Publication number
EP1999886A1
EP1999886A1 EP07731206A EP07731206A EP1999886A1 EP 1999886 A1 EP1999886 A1 EP 1999886A1 EP 07731206 A EP07731206 A EP 07731206A EP 07731206 A EP07731206 A EP 07731206A EP 1999886 A1 EP1999886 A1 EP 1999886A1
Authority
EP
European Patent Office
Prior art keywords
data
transmission
processing
hash function
aircraft
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP07731206A
Other languages
German (de)
English (en)
French (fr)
Inventor
Agnès LECLERCQ
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Airbus Operations SAS
Original Assignee
Airbus Operations SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Airbus Operations SAS filed Critical Airbus Operations SAS
Publication of EP1999886A1 publication Critical patent/EP1999886A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18502Airborne stations
    • H04B7/18506Communications with or from aircraft, i.e. aeronautical mobile service
    • H04B7/18508Communications with or from aircraft, i.e. aeronautical mobile service with satellite system used as relay, i.e. aeronautical mobile satellite service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/30Compression, e.g. Merkle-Damgard construction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the invention relates to methods for transmitting and receiving data, in particular for secure exchanges between an aircraft and a base on the ground, corresponding devices and an aircraft equipped with such devices.
  • the algorithms implementing these processes (generally software executed by microprocessors at the transmitter or receiver level) must be sufficiently robust (and therefore developed and tested with particularly strong constraints) and include detection and treatment of malfunctions, which makes them complex and expensive to develop. It is therefore necessary in practice to choose for the processing of data to exchange software with a high level of certification.
  • the invention proposes a data transmission method, characterized by the steps of: - determining a data authentication word;
  • processing data to obtain processed data comprising a compression step
  • the authentication word is thus relative to the data before processing, in particular before compression, which makes it possible in particular to verify, during the verification of the authentication implemented at the reception, the absence of error in the processing carried out. at the show as at the reception.
  • the determination step includes for example the application of a hash function to the data; the mathematical properties of hash functions are thus used, whereby any modification in the data implies a change in the result, that is to say the authentication word (or fingerprint).
  • the application of the hash function can furthermore use a cryptographic key, which makes it possible to improve the security of the system.
  • the aforementioned processing further includes, for example, an encryption step (possibly applied to the data and the authentication word) and / or a step of converting words from 8 bits into 6-bit words, or from a stream binary (in English "bitstream") in transmittable characters.
  • the transmission channel is a data exchange channel between an aircraft and a ground base.
  • the invention also proposes a method for receiving data, characterized by the following steps:
  • processing of the received data comprising a decompression step
  • the authentication verification being applied to the processed data (in particular, uncompressed), it will in particular ensure the accuracy of the processing performed.
  • the verification step comprises for example in practice the following steps: - calculation of a fingerprint of at least part of the processed data;
  • the step of calculating the imprint may include a step of applying a hash function to said data portion, in a manner corresponding to what was evoked on transmission and with the same advantages.
  • the application of the hash function can then also use a cryptographic key.
  • the received print is in general the result of an application, on transmission, of the hash function to data to be transmitted.
  • the processing may further comprise a decryption step and / or a step of deconversion of 6-bit words into 8-bit words, or characters received in a bit stream.
  • the invention also proposes a data transmission device characterized by means for determining a data authentication word, data processing means for obtaining processed data, the processing means comprising compression means, and means for transmitting data processed on a transmission channel.
  • the invention proposes a device for receiving data characterized by means for receiving data on a transmission channel, means for processing the data received, the processing means comprising decompression means, and means for receiving data. verification of an authentication of the processed data.
  • These devices may have optional characteristics corresponding to the steps and characteristics envisaged above for the transmission and reception processes. These devices can equip for example an aircraft.
  • FIG. 1 represents the general context of the invention
  • FIG. 2 represents the main steps of a data transmission method according to the invention
  • FIG. 3 represents the main steps of a method of receiving the data transmitted by the method of FIG. 2.
  • FIG. 1 represents the general context in which the invention is implemented.
  • a ground base B communicates with an aircraft A by means of a link that allows the exchange of data in digital form (that is to say according to the English term "data HnK 1 ) and which notably involves a ground link -air C A.
  • the connection between the ground base B and the aircraft A may also involve other devices and links.
  • the ground base B communicates with a relay R (also located on the ground T) by means of a terrestrial communication network C ⁇ ; the relay R transmits the information to and from the aircraft A via a satellite S.
  • relay R is relatively common because the information exchanged between the ground base B and the aircraft A are conventionally routed by the relay R and the satellite S under the responsibility of a supplier of service. As a variant, provision could be made for the information to be exchanged directly between the aircraft A and the ground base B.
  • FIG. 2 represents an example of a data transmission method which represents, for example, a message M in digital form.
  • the device transmitting the message M can be a communication device of the ground base B or a communication device of the aircraft A. It is considered that example that the message M is represented in binary form by a sequence of bytes (or 8-bit word). Other types of coding than 8-bit coding are naturally conceivable for the message M.
  • the transmitting device then proceeds (for example within a microprocessor controlled by software implementing the steps of FIG. 2) to the determination of an authentication word (or imprint) E of the message
  • a hash function of the SHA2 type is used.
  • the footprint E resulting from the application of the hash function to the message M, has a predetermined length, for example 256 bits.
  • the mathematical properties of the hash functions are such that any modification of the message M would result in a modification of the fingerprint obtained by applying the hash function.
  • the comparison of the E-pattern of the message M obtained on transmission, on the print calculated at the reception thus makes it possible to verify that the message M has not been altered, and consequently to verify its integrity.
  • the use of the cryptographic key K present on both the sending and the receiving side, will allow, as described below, the receiver to verify that the imprint E has been obtained by a system holding the cryptographic key K , which makes it possible to check the origin of the message M, and thus to protect itself from an attack on the communication link.
  • the footprint E attached to the message M as indicated in the following, therefore allows the authentication thereof.
  • the transmission device then proceeds to encrypt the set formed by the message M and the print E during a step E22, which forms an encrypted message D.
  • an encryption algorithm of the AES type is used. .
  • the footprint E is therefore integrated in the entire message to be transmitted before the encryption step E22.
  • this footprint could however be integrated for transmission at a later stage.
  • the encrypted message D is then compressed into a compressed message F by means of a compression algorithm, for example of the ZLIB type (step E24).
  • the transmitting device finally proceeds to the conversion of the compressed message F into a message G to be transmitted coded on 6 bits during a step E26.
  • This conversion step makes it possible to transmit, with transmission devices working on 6-bit words, the compressed message F initially coded on 8 bits.
  • FIG. 3 represents the main steps of the method of reception of the transmitted message, which thus aims at restoring the initial message M from the raw data received (referenced G 'in the following) and which therefore comprises steps substantially complementary to those of the receiving process and in reverse order.
  • a message (or set of data) G 'in the form of 6-bit words is first received.
  • the received message G ' is identical to the message sent G.
  • the receiving device i.e., in general, a microprocessor of the receiving device acting under the control of software
  • step E34 of decompression of the message F 'in order to obtain an encrypted message D' equal to the encrypted message D in the event of normal operation.
  • the decompression algorithm used is the inverse of the compression algorithm of step E24 mentioned above.
  • the receiving device then proceeds to decrypt the encrypted message D 'during a step E36, which makes it possible to reconstruct a message M' and a print E ', identical respectively to the message M transmitted and to the print E determined in FIG. step E20 under normal operating circumstances.
  • each of the following causes causes an output of normal operation and could therefore introduce a difference between the message M and the print E at the time of transmission, and the message M 'and the print E'. obtained in step E36: an error in the processing of these elements by the transmitting device, in particular during the algorithms implemented in the steps E22 to E26 described above;
  • the authentication of the received message M ' is checked by means of the received fingerprint (or authentication word received) E '.
  • the receiving device proceeds during a step E38 to the calculation of the fingerprint E "of the received message M 'by applying it to the latter.
  • the message M 1 is equal to the message M; the footprint calculated at the reception E "is therefore equal to the footprint calculated at the emission E and consequently at the received footprint E ', which has, by hypothesis, been processed and transmitted without error.
  • step E40 it is verified for authentication in step E40 that the received fingerprint E 1 is equal to the fingerprint calculated at the reception E ": it is considered in case of equality (step E42) that the message received and processed M 1 is in accordance with the message M emitted by the transmitting device.
  • the message received is not taken into account, and it is possible to request its retransmission by the transmitting device, and it is also noted that, thanks to the use of the known cryptographic key, only the devices authorized to be exchanged messages, it is impossible for an attacker to provide the receiving device with a fingerprint E 'which would be the result of the application of the hash function to a modified message and which would be the only one likely to authenticate the message m modified by the receiving device.
  • Authentication thus makes it possible to ensure the origin and the integrity of the message, and thereby to verify the accuracy of the processing carried out after the authentication on transmission and before the authentication on reception.
  • These treatments will therefore not require a maximum level of safety; in practice, the algorithms that implement these processes may have a certification level lower than that required for the entire process, the certification being then provided by the authentication algorithm.
  • the example which has just been described represents only one possible embodiment of the invention.
  • the example described uses a mechanism authentication using a symmetric key K, but one could alternatively consider using other authentication mechanisms, for example private key systems and public key.
  • other types of function than the hash function can be used to provide the authentication mechanism.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Facsimile Transmission Control (AREA)
  • Small-Scale Networks (AREA)
EP07731206A 2006-03-29 2007-03-27 Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifs Withdrawn EP1999886A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0651086A FR2899408B1 (fr) 2006-03-29 2006-03-29 Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifs
PCT/FR2007/000524 WO2007110509A1 (fr) 2006-03-29 2007-03-27 Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifs

Publications (1)

Publication Number Publication Date
EP1999886A1 true EP1999886A1 (fr) 2008-12-10

Family

ID=37421129

Family Applications (1)

Application Number Title Priority Date Filing Date
EP07731206A Withdrawn EP1999886A1 (fr) 2006-03-29 2007-03-27 Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifs

Country Status (9)

Country Link
US (1) US8572390B2 (zh)
EP (1) EP1999886A1 (zh)
JP (1) JP2009531904A (zh)
CN (1) CN101573911A (zh)
BR (1) BRPI0707036A2 (zh)
CA (1) CA2643989A1 (zh)
FR (1) FR2899408B1 (zh)
RU (1) RU2481716C2 (zh)
WO (1) WO2007110509A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8171567B1 (en) 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
FR2912578B1 (fr) * 2007-02-13 2009-05-22 Airbus France Sas Methode d'authentification d'un document electronique et methode de verification d'un document ainsi authentifie.
FR2926692B1 (fr) * 2008-01-23 2010-02-19 Airbus France Procedes et dispositifs pour ameliorer la fiabilite de communication entre un aeronef et un systeme distant
TWI716169B (zh) * 2010-12-03 2021-01-11 美商杜比實驗室特許公司 音頻解碼裝置、音頻解碼方法及音頻編碼方法
US8881294B2 (en) * 2011-02-18 2014-11-04 Honeywell International Inc. Methods and systems for securely uploading files onto aircraft
US9799229B2 (en) * 2012-12-13 2017-10-24 The Boeing Company Data sharing system for aircraft training
EP2768275B1 (en) * 2013-02-13 2018-01-10 The Boeing Company Secure transmission of an aircraft trajectory
US10964226B2 (en) 2015-01-19 2021-03-30 The Boeing Company Instructional assessment system for a vehicle
WO2017017984A1 (ja) 2015-07-29 2017-02-02 株式会社日立製作所 移動体識別システムおよび識別方法

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2040117C1 (ru) * 1992-12-07 1995-07-20 Центральный Научно-Исследовательский Институт Связи Способ передачи и приема с обеспечением подлинности и конфиденциальности сообщения
US5915018A (en) * 1996-11-05 1999-06-22 Intel Corporation Key management system for DVD copyright management
US5907619A (en) * 1996-12-20 1999-05-25 Intel Corporation Secure compressed imaging
JP3994466B2 (ja) * 1997-03-26 2007-10-17 ソニー株式会社 ユーザ端末及び携帯再生装置
JP4447668B2 (ja) * 1997-03-26 2010-04-07 ソニー株式会社 データ送受信方法及び装置
JP3796883B2 (ja) 1997-03-26 2006-07-12 ソニー株式会社 受信方法及び受信装置
JPH10269291A (ja) * 1997-03-26 1998-10-09 Sony Corp ディジタルコンテンツ配付管理システム
US6816968B1 (en) * 1998-07-10 2004-11-09 Silverbrook Research Pty Ltd Consumable authentication protocol and system
US6629150B1 (en) 1999-06-18 2003-09-30 Intel Corporation Platform and method for creating and using a digital container
JP2003510706A (ja) * 1999-09-21 2003-03-18 ディスカバリー・コミニュケーションズ・インコーポレーテッド 電子書籍のセキュリティ及び著作権保護システム
US7798417B2 (en) * 2000-01-03 2010-09-21 Snyder David M Method for data interchange
JP2002057662A (ja) * 2000-08-07 2002-02-22 Sony Corp 情報処理装置、情報処理方法、並びに記録媒体
JP4296698B2 (ja) * 2000-08-17 2009-07-15 ソニー株式会社 情報処理装置、情報処理方法、並びに記録媒体
US7987510B2 (en) * 2001-03-28 2011-07-26 Rovi Solutions Corporation Self-protecting digital content
EP1271896B1 (de) * 2001-06-18 2004-07-28 Swisscom Mobile AG Verfahren und System für mobile IP-Nodes in heterogenen Netzwerken
WO2004047405A2 (en) * 2001-08-09 2004-06-03 Honeywell International Inc. Secure aircraft communications addressing and reporting system (acars)
US20030037238A1 (en) * 2001-08-16 2003-02-20 Warner Gregory Rade Paperless records in aircraft maintenance
US7636724B2 (en) * 2001-08-31 2009-12-22 Peerify Technologies LLC Data storage system and method by shredding and deshredding
US6885863B2 (en) 2001-08-31 2005-04-26 The Boeing Company Precoordination of return link for hand-off between coverage areas being traversed by a mobile transceiver platform
US7912999B2 (en) 2002-07-03 2011-03-22 Freescale Semiconductor, Inc. Buffering method and apparatus for processing digital communication signals
EP1552464B1 (en) * 2002-07-09 2017-01-11 Neology, Inc. System and method for providing secure identification solutions
US8171567B1 (en) * 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
US7320076B2 (en) * 2003-03-05 2008-01-15 Sun Microsystems, Inc. Method and apparatus for a transaction-based secure storage file system
CN101241735B (zh) * 2003-07-07 2012-07-18 罗威所罗生股份有限公司 重放加密的视听内容的方法
US7558954B2 (en) * 2003-10-31 2009-07-07 Hewlett-Packard Development Company, L.P. Method and apparatus for ensuring the integrity of data
JP2006031097A (ja) * 2004-07-12 2006-02-02 Matsushita Electric Ind Co Ltd 通信システムならびにそれに用いられる通信端末、認証情報管理方法、認証情報管理プログラムおよび認証情報管理プログラムを格納する記録媒体
US8135362B2 (en) * 2005-03-07 2012-03-13 Symstream Technology Holdings Pty Ltd Symbol stream virtual radio organism method and apparatus
US20080028464A1 (en) * 2006-07-25 2008-01-31 Michael Paul Bringle Systems and Methods for Data Processing Anomaly Prevention and Detection
US20090099761A1 (en) * 2007-10-11 2009-04-16 Genpower, Inc. Wireless, battery-powered, photovoltaically charged and monitored runway-based aircraft identification system and method
US20120070002A1 (en) * 2009-07-19 2012-03-22 Angel Secure Networks, Inc. Protecting information in an untethered asset
US8811616B2 (en) * 2010-04-12 2014-08-19 Flight Focus Pte. Ltd. Secure aircraft data channel communication for aircraft operations

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2007110509A1 *

Also Published As

Publication number Publication date
RU2008142767A (ru) 2010-05-10
BRPI0707036A2 (pt) 2011-04-12
CN101573911A (zh) 2009-11-04
CA2643989A1 (en) 2007-10-04
RU2481716C2 (ru) 2013-05-10
WO2007110509A1 (fr) 2007-10-04
FR2899408A1 (fr) 2007-10-05
JP2009531904A (ja) 2009-09-03
FR2899408B1 (fr) 2008-07-18
US8572390B2 (en) 2013-10-29
US20090138716A1 (en) 2009-05-28

Similar Documents

Publication Publication Date Title
EP1999886A1 (fr) Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifs
EP2720199B1 (fr) Procédé sécurisé de commande d'ouverture de dispositifs de serrure à partir de messages mettant en oeuvre un cryptage symétrique
EP1351440B1 (fr) Dispositif pour la multidiffusion sécurisée
US20030078058A1 (en) Method for transmission of secure messages in a telecommunications network
US8792642B2 (en) Apparatus, system and method for detecting a loss of key stream system synchronization in a communication system
EP1072124A2 (fr) Procede de verification de l'usage de cles publiques engendrees par un systeme embarque
WO1993015581A1 (fr) Procede, appareil et dispositif de chiffrement de messages transmis entre reseaux interconnectes
EP1758337B1 (fr) Procédé de transmission securisée de données, via des reseaux, par échange d'informations d'encryptage, et dispositif d'encryptage/decryptage correspondant
FR2941584A1 (fr) Procede de traitement de flux de donnees recues par un appareil de communication sans fil et necessitant au moins en partie des traitements cryptographiques et appareil correspondant
WO2007101945A1 (fr) Procedes et dispositifs d'emission et de reception d'un message a echanger entre un aeronef et une base au sol, et aeronef equipe de tels dispositifs
EP3840324B1 (fr) Liaison série asynchrone sécurisée
EP0929169B1 (fr) Procédé de sécurisation de transmissions d'information réalisées par l'intermédiaire d'un réseau de télécommunications ouvert
EP2286541B1 (fr) Procédé et dispositif d'émission de messages pour garantir l'authenticité d'un système et procédé et dispositif de vérification de l'authenticité d'un tel système
US20020138732A1 (en) Methods, systems and computer program products for providing digital signatures in a network environment
WO2021074527A1 (fr) Procede de gestion d'une base de donnees de cles publiques, procede d'authentification de cles publiques, et dispositifs serveur et client mettant en oeuvre ces procedes
JP4543570B2 (ja) 検証システム
WO2021245364A1 (fr) Procede et systeme pour echanger des informations securisees entre un ou plusieurs satellites et une station d'emission et/ou de reception terrestre
EP3340508B1 (fr) Procédé de réception, récepteur, émetteur et système de communication associés
WO2007135274A2 (fr) Dispositif de reception de messages, en particulier dans le cadre d'echanges securises de donnees, aeronef et procede associes
WO2009071589A2 (fr) Procede de synchro-trame a base de logarithme discret
WO2021116603A1 (fr) Procédé d'appairage sécurisé entre un capteur et un concentrateur embarqués et distants
EP1992104B1 (fr) Authentification d'un dispositif informatique au niveau utilisateur
WO2007042664A1 (fr) Vérification d'un message reçu en mode de multidiffusion dans un réseau de communications
EP4406184A1 (fr) Système et méthode de génération de clé secrète sûre
FR3117655A1 (fr) Système de tachygraphe, dispositif de tachygraphe et procédé de fonctionnement d’un système de tachygraphe

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20080924

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: AIRBUS OPERATIONS

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20161129

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20170411