EP1999886A1 - Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifs - Google Patents
Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifsInfo
- Publication number
- EP1999886A1 EP1999886A1 EP07731206A EP07731206A EP1999886A1 EP 1999886 A1 EP1999886 A1 EP 1999886A1 EP 07731206 A EP07731206 A EP 07731206A EP 07731206 A EP07731206 A EP 07731206A EP 1999886 A1 EP1999886 A1 EP 1999886A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- transmission
- processing
- hash function
- aircraft
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/18502—Airborne stations
- H04B7/18506—Communications with or from aircraft, i.e. aeronautical mobile service
- H04B7/18508—Communications with or from aircraft, i.e. aeronautical mobile service with satellite system used as relay, i.e. aeronautical mobile satellite service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/30—Compression, e.g. Merkle-Damgard construction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the invention relates to methods for transmitting and receiving data, in particular for secure exchanges between an aircraft and a base on the ground, corresponding devices and an aircraft equipped with such devices.
- the algorithms implementing these processes (generally software executed by microprocessors at the transmitter or receiver level) must be sufficiently robust (and therefore developed and tested with particularly strong constraints) and include detection and treatment of malfunctions, which makes them complex and expensive to develop. It is therefore necessary in practice to choose for the processing of data to exchange software with a high level of certification.
- the invention proposes a data transmission method, characterized by the steps of: - determining a data authentication word;
- processing data to obtain processed data comprising a compression step
- the authentication word is thus relative to the data before processing, in particular before compression, which makes it possible in particular to verify, during the verification of the authentication implemented at the reception, the absence of error in the processing carried out. at the show as at the reception.
- the determination step includes for example the application of a hash function to the data; the mathematical properties of hash functions are thus used, whereby any modification in the data implies a change in the result, that is to say the authentication word (or fingerprint).
- the application of the hash function can furthermore use a cryptographic key, which makes it possible to improve the security of the system.
- the aforementioned processing further includes, for example, an encryption step (possibly applied to the data and the authentication word) and / or a step of converting words from 8 bits into 6-bit words, or from a stream binary (in English "bitstream") in transmittable characters.
- the transmission channel is a data exchange channel between an aircraft and a ground base.
- the invention also proposes a method for receiving data, characterized by the following steps:
- processing of the received data comprising a decompression step
- the authentication verification being applied to the processed data (in particular, uncompressed), it will in particular ensure the accuracy of the processing performed.
- the verification step comprises for example in practice the following steps: - calculation of a fingerprint of at least part of the processed data;
- the step of calculating the imprint may include a step of applying a hash function to said data portion, in a manner corresponding to what was evoked on transmission and with the same advantages.
- the application of the hash function can then also use a cryptographic key.
- the received print is in general the result of an application, on transmission, of the hash function to data to be transmitted.
- the processing may further comprise a decryption step and / or a step of deconversion of 6-bit words into 8-bit words, or characters received in a bit stream.
- the invention also proposes a data transmission device characterized by means for determining a data authentication word, data processing means for obtaining processed data, the processing means comprising compression means, and means for transmitting data processed on a transmission channel.
- the invention proposes a device for receiving data characterized by means for receiving data on a transmission channel, means for processing the data received, the processing means comprising decompression means, and means for receiving data. verification of an authentication of the processed data.
- These devices may have optional characteristics corresponding to the steps and characteristics envisaged above for the transmission and reception processes. These devices can equip for example an aircraft.
- FIG. 1 represents the general context of the invention
- FIG. 2 represents the main steps of a data transmission method according to the invention
- FIG. 3 represents the main steps of a method of receiving the data transmitted by the method of FIG. 2.
- FIG. 1 represents the general context in which the invention is implemented.
- a ground base B communicates with an aircraft A by means of a link that allows the exchange of data in digital form (that is to say according to the English term "data HnK 1 ) and which notably involves a ground link -air C A.
- the connection between the ground base B and the aircraft A may also involve other devices and links.
- the ground base B communicates with a relay R (also located on the ground T) by means of a terrestrial communication network C ⁇ ; the relay R transmits the information to and from the aircraft A via a satellite S.
- relay R is relatively common because the information exchanged between the ground base B and the aircraft A are conventionally routed by the relay R and the satellite S under the responsibility of a supplier of service. As a variant, provision could be made for the information to be exchanged directly between the aircraft A and the ground base B.
- FIG. 2 represents an example of a data transmission method which represents, for example, a message M in digital form.
- the device transmitting the message M can be a communication device of the ground base B or a communication device of the aircraft A. It is considered that example that the message M is represented in binary form by a sequence of bytes (or 8-bit word). Other types of coding than 8-bit coding are naturally conceivable for the message M.
- the transmitting device then proceeds (for example within a microprocessor controlled by software implementing the steps of FIG. 2) to the determination of an authentication word (or imprint) E of the message
- a hash function of the SHA2 type is used.
- the footprint E resulting from the application of the hash function to the message M, has a predetermined length, for example 256 bits.
- the mathematical properties of the hash functions are such that any modification of the message M would result in a modification of the fingerprint obtained by applying the hash function.
- the comparison of the E-pattern of the message M obtained on transmission, on the print calculated at the reception thus makes it possible to verify that the message M has not been altered, and consequently to verify its integrity.
- the use of the cryptographic key K present on both the sending and the receiving side, will allow, as described below, the receiver to verify that the imprint E has been obtained by a system holding the cryptographic key K , which makes it possible to check the origin of the message M, and thus to protect itself from an attack on the communication link.
- the footprint E attached to the message M as indicated in the following, therefore allows the authentication thereof.
- the transmission device then proceeds to encrypt the set formed by the message M and the print E during a step E22, which forms an encrypted message D.
- an encryption algorithm of the AES type is used. .
- the footprint E is therefore integrated in the entire message to be transmitted before the encryption step E22.
- this footprint could however be integrated for transmission at a later stage.
- the encrypted message D is then compressed into a compressed message F by means of a compression algorithm, for example of the ZLIB type (step E24).
- the transmitting device finally proceeds to the conversion of the compressed message F into a message G to be transmitted coded on 6 bits during a step E26.
- This conversion step makes it possible to transmit, with transmission devices working on 6-bit words, the compressed message F initially coded on 8 bits.
- FIG. 3 represents the main steps of the method of reception of the transmitted message, which thus aims at restoring the initial message M from the raw data received (referenced G 'in the following) and which therefore comprises steps substantially complementary to those of the receiving process and in reverse order.
- a message (or set of data) G 'in the form of 6-bit words is first received.
- the received message G ' is identical to the message sent G.
- the receiving device i.e., in general, a microprocessor of the receiving device acting under the control of software
- step E34 of decompression of the message F 'in order to obtain an encrypted message D' equal to the encrypted message D in the event of normal operation.
- the decompression algorithm used is the inverse of the compression algorithm of step E24 mentioned above.
- the receiving device then proceeds to decrypt the encrypted message D 'during a step E36, which makes it possible to reconstruct a message M' and a print E ', identical respectively to the message M transmitted and to the print E determined in FIG. step E20 under normal operating circumstances.
- each of the following causes causes an output of normal operation and could therefore introduce a difference between the message M and the print E at the time of transmission, and the message M 'and the print E'. obtained in step E36: an error in the processing of these elements by the transmitting device, in particular during the algorithms implemented in the steps E22 to E26 described above;
- the authentication of the received message M ' is checked by means of the received fingerprint (or authentication word received) E '.
- the receiving device proceeds during a step E38 to the calculation of the fingerprint E "of the received message M 'by applying it to the latter.
- the message M 1 is equal to the message M; the footprint calculated at the reception E "is therefore equal to the footprint calculated at the emission E and consequently at the received footprint E ', which has, by hypothesis, been processed and transmitted without error.
- step E40 it is verified for authentication in step E40 that the received fingerprint E 1 is equal to the fingerprint calculated at the reception E ": it is considered in case of equality (step E42) that the message received and processed M 1 is in accordance with the message M emitted by the transmitting device.
- the message received is not taken into account, and it is possible to request its retransmission by the transmitting device, and it is also noted that, thanks to the use of the known cryptographic key, only the devices authorized to be exchanged messages, it is impossible for an attacker to provide the receiving device with a fingerprint E 'which would be the result of the application of the hash function to a modified message and which would be the only one likely to authenticate the message m modified by the receiving device.
- Authentication thus makes it possible to ensure the origin and the integrity of the message, and thereby to verify the accuracy of the processing carried out after the authentication on transmission and before the authentication on reception.
- These treatments will therefore not require a maximum level of safety; in practice, the algorithms that implement these processes may have a certification level lower than that required for the entire process, the certification being then provided by the authentication algorithm.
- the example which has just been described represents only one possible embodiment of the invention.
- the example described uses a mechanism authentication using a symmetric key K, but one could alternatively consider using other authentication mechanisms, for example private key systems and public key.
- other types of function than the hash function can be used to provide the authentication mechanism.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Astronomy & Astrophysics (AREA)
- Aviation & Aerospace Engineering (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Facsimile Transmission Control (AREA)
- Small-Scale Networks (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0651086A FR2899408B1 (fr) | 2006-03-29 | 2006-03-29 | Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifs |
PCT/FR2007/000524 WO2007110509A1 (fr) | 2006-03-29 | 2007-03-27 | Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifs |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1999886A1 true EP1999886A1 (fr) | 2008-12-10 |
Family
ID=37421129
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07731206A Withdrawn EP1999886A1 (fr) | 2006-03-29 | 2007-03-27 | Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifs |
Country Status (9)
Country | Link |
---|---|
US (1) | US8572390B2 (zh) |
EP (1) | EP1999886A1 (zh) |
JP (1) | JP2009531904A (zh) |
CN (1) | CN101573911A (zh) |
BR (1) | BRPI0707036A2 (zh) |
CA (1) | CA2643989A1 (zh) |
FR (1) | FR2899408B1 (zh) |
RU (1) | RU2481716C2 (zh) |
WO (1) | WO2007110509A1 (zh) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8171567B1 (en) | 2002-09-04 | 2012-05-01 | Tracer Detection Technology Corp. | Authentication method and system |
FR2912578B1 (fr) * | 2007-02-13 | 2009-05-22 | Airbus France Sas | Methode d'authentification d'un document electronique et methode de verification d'un document ainsi authentifie. |
FR2926692B1 (fr) * | 2008-01-23 | 2010-02-19 | Airbus France | Procedes et dispositifs pour ameliorer la fiabilite de communication entre un aeronef et un systeme distant |
TWI716169B (zh) * | 2010-12-03 | 2021-01-11 | 美商杜比實驗室特許公司 | 音頻解碼裝置、音頻解碼方法及音頻編碼方法 |
US8881294B2 (en) * | 2011-02-18 | 2014-11-04 | Honeywell International Inc. | Methods and systems for securely uploading files onto aircraft |
US9799229B2 (en) * | 2012-12-13 | 2017-10-24 | The Boeing Company | Data sharing system for aircraft training |
EP2768275B1 (en) * | 2013-02-13 | 2018-01-10 | The Boeing Company | Secure transmission of an aircraft trajectory |
US10964226B2 (en) | 2015-01-19 | 2021-03-30 | The Boeing Company | Instructional assessment system for a vehicle |
WO2017017984A1 (ja) | 2015-07-29 | 2017-02-02 | 株式会社日立製作所 | 移動体識別システムおよび識別方法 |
Family Cites Families (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2040117C1 (ru) * | 1992-12-07 | 1995-07-20 | Центральный Научно-Исследовательский Институт Связи | Способ передачи и приема с обеспечением подлинности и конфиденциальности сообщения |
US5915018A (en) * | 1996-11-05 | 1999-06-22 | Intel Corporation | Key management system for DVD copyright management |
US5907619A (en) * | 1996-12-20 | 1999-05-25 | Intel Corporation | Secure compressed imaging |
JP3994466B2 (ja) * | 1997-03-26 | 2007-10-17 | ソニー株式会社 | ユーザ端末及び携帯再生装置 |
JP4447668B2 (ja) * | 1997-03-26 | 2010-04-07 | ソニー株式会社 | データ送受信方法及び装置 |
JP3796883B2 (ja) | 1997-03-26 | 2006-07-12 | ソニー株式会社 | 受信方法及び受信装置 |
JPH10269291A (ja) * | 1997-03-26 | 1998-10-09 | Sony Corp | ディジタルコンテンツ配付管理システム |
US6816968B1 (en) * | 1998-07-10 | 2004-11-09 | Silverbrook Research Pty Ltd | Consumable authentication protocol and system |
US6629150B1 (en) | 1999-06-18 | 2003-09-30 | Intel Corporation | Platform and method for creating and using a digital container |
JP2003510706A (ja) * | 1999-09-21 | 2003-03-18 | ディスカバリー・コミニュケーションズ・インコーポレーテッド | 電子書籍のセキュリティ及び著作権保護システム |
US7798417B2 (en) * | 2000-01-03 | 2010-09-21 | Snyder David M | Method for data interchange |
JP2002057662A (ja) * | 2000-08-07 | 2002-02-22 | Sony Corp | 情報処理装置、情報処理方法、並びに記録媒体 |
JP4296698B2 (ja) * | 2000-08-17 | 2009-07-15 | ソニー株式会社 | 情報処理装置、情報処理方法、並びに記録媒体 |
US7987510B2 (en) * | 2001-03-28 | 2011-07-26 | Rovi Solutions Corporation | Self-protecting digital content |
EP1271896B1 (de) * | 2001-06-18 | 2004-07-28 | Swisscom Mobile AG | Verfahren und System für mobile IP-Nodes in heterogenen Netzwerken |
WO2004047405A2 (en) * | 2001-08-09 | 2004-06-03 | Honeywell International Inc. | Secure aircraft communications addressing and reporting system (acars) |
US20030037238A1 (en) * | 2001-08-16 | 2003-02-20 | Warner Gregory Rade | Paperless records in aircraft maintenance |
US7636724B2 (en) * | 2001-08-31 | 2009-12-22 | Peerify Technologies LLC | Data storage system and method by shredding and deshredding |
US6885863B2 (en) | 2001-08-31 | 2005-04-26 | The Boeing Company | Precoordination of return link for hand-off between coverage areas being traversed by a mobile transceiver platform |
US7912999B2 (en) | 2002-07-03 | 2011-03-22 | Freescale Semiconductor, Inc. | Buffering method and apparatus for processing digital communication signals |
EP1552464B1 (en) * | 2002-07-09 | 2017-01-11 | Neology, Inc. | System and method for providing secure identification solutions |
US8171567B1 (en) * | 2002-09-04 | 2012-05-01 | Tracer Detection Technology Corp. | Authentication method and system |
US7320076B2 (en) * | 2003-03-05 | 2008-01-15 | Sun Microsystems, Inc. | Method and apparatus for a transaction-based secure storage file system |
CN101241735B (zh) * | 2003-07-07 | 2012-07-18 | 罗威所罗生股份有限公司 | 重放加密的视听内容的方法 |
US7558954B2 (en) * | 2003-10-31 | 2009-07-07 | Hewlett-Packard Development Company, L.P. | Method and apparatus for ensuring the integrity of data |
JP2006031097A (ja) * | 2004-07-12 | 2006-02-02 | Matsushita Electric Ind Co Ltd | 通信システムならびにそれに用いられる通信端末、認証情報管理方法、認証情報管理プログラムおよび認証情報管理プログラムを格納する記録媒体 |
US8135362B2 (en) * | 2005-03-07 | 2012-03-13 | Symstream Technology Holdings Pty Ltd | Symbol stream virtual radio organism method and apparatus |
US20080028464A1 (en) * | 2006-07-25 | 2008-01-31 | Michael Paul Bringle | Systems and Methods for Data Processing Anomaly Prevention and Detection |
US20090099761A1 (en) * | 2007-10-11 | 2009-04-16 | Genpower, Inc. | Wireless, battery-powered, photovoltaically charged and monitored runway-based aircraft identification system and method |
US20120070002A1 (en) * | 2009-07-19 | 2012-03-22 | Angel Secure Networks, Inc. | Protecting information in an untethered asset |
US8811616B2 (en) * | 2010-04-12 | 2014-08-19 | Flight Focus Pte. Ltd. | Secure aircraft data channel communication for aircraft operations |
-
2006
- 2006-03-29 FR FR0651086A patent/FR2899408B1/fr not_active Expired - Fee Related
-
2007
- 2007-03-27 CN CNA2007800106216A patent/CN101573911A/zh active Pending
- 2007-03-27 EP EP07731206A patent/EP1999886A1/fr not_active Withdrawn
- 2007-03-27 CA CA002643989A patent/CA2643989A1/en not_active Abandoned
- 2007-03-27 BR BRPI0707036-5A patent/BRPI0707036A2/pt not_active IP Right Cessation
- 2007-03-27 US US12/294,311 patent/US8572390B2/en active Active
- 2007-03-27 WO PCT/FR2007/000524 patent/WO2007110509A1/fr active Application Filing
- 2007-03-27 RU RU2008142767/08A patent/RU2481716C2/ru not_active IP Right Cessation
- 2007-03-27 JP JP2009502144A patent/JP2009531904A/ja active Pending
Non-Patent Citations (1)
Title |
---|
See references of WO2007110509A1 * |
Also Published As
Publication number | Publication date |
---|---|
RU2008142767A (ru) | 2010-05-10 |
BRPI0707036A2 (pt) | 2011-04-12 |
CN101573911A (zh) | 2009-11-04 |
CA2643989A1 (en) | 2007-10-04 |
RU2481716C2 (ru) | 2013-05-10 |
WO2007110509A1 (fr) | 2007-10-04 |
FR2899408A1 (fr) | 2007-10-05 |
JP2009531904A (ja) | 2009-09-03 |
FR2899408B1 (fr) | 2008-07-18 |
US8572390B2 (en) | 2013-10-29 |
US20090138716A1 (en) | 2009-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1999886A1 (fr) | Procedes d'emission et de reception de donnees, en particulier pour des echanges securises entre un aeronef et une base au sol, dispositifs associes et aeronef equipe de tels dispositifs | |
EP2720199B1 (fr) | Procédé sécurisé de commande d'ouverture de dispositifs de serrure à partir de messages mettant en oeuvre un cryptage symétrique | |
EP1351440B1 (fr) | Dispositif pour la multidiffusion sécurisée | |
US20030078058A1 (en) | Method for transmission of secure messages in a telecommunications network | |
US8792642B2 (en) | Apparatus, system and method for detecting a loss of key stream system synchronization in a communication system | |
EP1072124A2 (fr) | Procede de verification de l'usage de cles publiques engendrees par un systeme embarque | |
WO1993015581A1 (fr) | Procede, appareil et dispositif de chiffrement de messages transmis entre reseaux interconnectes | |
EP1758337B1 (fr) | Procédé de transmission securisée de données, via des reseaux, par échange d'informations d'encryptage, et dispositif d'encryptage/decryptage correspondant | |
FR2941584A1 (fr) | Procede de traitement de flux de donnees recues par un appareil de communication sans fil et necessitant au moins en partie des traitements cryptographiques et appareil correspondant | |
WO2007101945A1 (fr) | Procedes et dispositifs d'emission et de reception d'un message a echanger entre un aeronef et une base au sol, et aeronef equipe de tels dispositifs | |
EP3840324B1 (fr) | Liaison série asynchrone sécurisée | |
EP0929169B1 (fr) | Procédé de sécurisation de transmissions d'information réalisées par l'intermédiaire d'un réseau de télécommunications ouvert | |
EP2286541B1 (fr) | Procédé et dispositif d'émission de messages pour garantir l'authenticité d'un système et procédé et dispositif de vérification de l'authenticité d'un tel système | |
US20020138732A1 (en) | Methods, systems and computer program products for providing digital signatures in a network environment | |
WO2021074527A1 (fr) | Procede de gestion d'une base de donnees de cles publiques, procede d'authentification de cles publiques, et dispositifs serveur et client mettant en oeuvre ces procedes | |
JP4543570B2 (ja) | 検証システム | |
WO2021245364A1 (fr) | Procede et systeme pour echanger des informations securisees entre un ou plusieurs satellites et une station d'emission et/ou de reception terrestre | |
EP3340508B1 (fr) | Procédé de réception, récepteur, émetteur et système de communication associés | |
WO2007135274A2 (fr) | Dispositif de reception de messages, en particulier dans le cadre d'echanges securises de donnees, aeronef et procede associes | |
WO2009071589A2 (fr) | Procede de synchro-trame a base de logarithme discret | |
WO2021116603A1 (fr) | Procédé d'appairage sécurisé entre un capteur et un concentrateur embarqués et distants | |
EP1992104B1 (fr) | Authentification d'un dispositif informatique au niveau utilisateur | |
WO2007042664A1 (fr) | Vérification d'un message reçu en mode de multidiffusion dans un réseau de communications | |
EP4406184A1 (fr) | Système et méthode de génération de clé secrète sûre | |
FR3117655A1 (fr) | Système de tachygraphe, dispositif de tachygraphe et procédé de fonctionnement d’un système de tachygraphe |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20080924 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: AIRBUS OPERATIONS |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20161129 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20170411 |