EP2087688A2 - Dispositif de controle de paquets, pour un routeur d'un reseau de communication, en vue du routage de paquets suspects vers des equipements d'analyse dedies - Google Patents
Dispositif de controle de paquets, pour un routeur d'un reseau de communication, en vue du routage de paquets suspects vers des equipements d'analyse dediesInfo
- Publication number
- EP2087688A2 EP2087688A2 EP07821869A EP07821869A EP2087688A2 EP 2087688 A2 EP2087688 A2 EP 2087688A2 EP 07821869 A EP07821869 A EP 07821869A EP 07821869 A EP07821869 A EP 07821869A EP 2087688 A2 EP2087688 A2 EP 2087688A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- packet
- router
- destination address
- address
- control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/60—Router architectures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
Definitions
- the invention relates to communication networks capable of transmitting data packets, and more specifically the routing of packets within such networks.
- Many communication devices, attached to communication networks, are the object, usually via the Internet, of computer attacks by means of attack traffic (consisting of data packets defining, for example, a virus, a to or Trojan horse) generated by malicious people.
- attack traffic consisting of data packets defining, for example, a virus, a to or Trojan horse
- IP destination address
- packets traffic attack
- attack detection system communication
- IDS intrusion detection System
- honeypot devices are typically connected to the Internet and each have an IP ("Internet Protocol”) address that is not usually made public. Therefore, any attempt to connect to such equipment is considered suspicious and a potential attack.
- IP Internet Protocol
- a first solution is to multiply the number of honeypot devices in the largest possible number of networks, so that each of them automatically receives attack traffic targeting its own IP address. But, such a solution is expensive and difficult to manage.
- a second solution consists in making each honeypot type of equipment accessible by several IP addresses. This allows to receive numerous attacks, then to analyze them in the same equipment and to correlate the attacks.
- a honeypot type of equipment can receive and analyze only attack traffic targeting an IP address of the network or networks for which it works. In order to be able to receive and analyze a large number of attack traffic, it must therefore be attached to several ⁇ multi-homed ⁇ networks, which requires that it can be reached by means of several different network addresses. This constraint strongly limits the ability of a honeypot-type device to scale up, since it is difficult to obtain for the same equipment multiple network accesses (this requires several links, possibly virtual).
- honeypot-type device since the number of IP addresses of a honeypot device depends on the number of networks to which it is attached, its detection is facilitated. However, as soon as a honeypot-type device is detected, it becomes useless and it compromises the confidence that one can have in its analyzes since it can be the object of misleading attacks intended to overload it at the same time. time as the IDSs that it feeds into signatures.
- a third solution is to implement in various places of the Internet equipment called "funnel". These devices are responsible for receiving the attack traffic on their own address or address ranges which are respectively allocated to them, and to transfer these received attack traffic to a honeypot type of equipment (generally via a transmission channel tunnel type).
- This solution is advantageous because when a funnel-type device is detected, it does not compromise the entire attack detection system. In addition, it does not require manage only a limited number of honeypot-type equipment. But, it requires to install at least one funnel-type equipment in each network where honeypot-type equipment is installed, which is expensive because of the number of equipment to be deployed and because of the deployment and management costs. of all of said equipment.
- control device intended to be coupled to, or to be part of (at least partially) a communication network router comprising analysis means responsible for determining in the header of a packet. of data, that it has just received, the destination address it contains, for the purpose of routing this packet to this destination address.
- analysis means responsible for determining in the header of a packet. of data, that it has just received, the destination address it contains, for the purpose of routing this packet to this destination address.
- the invention therefore applies to any packet network routed on the destination address, and therefore applies particularly well to IP type networks.
- Control means loaded, when the router analysis means have determined in a header an unassigned or inaccessible destination address, to extract the packet containing this header, and - processing means to associate with a packet retrieved by the control means a chosen alternative destination address, which has been assigned to a packet analysis equipment, for example honeypot type, so that the router the route to this associated replacement destination address.
- the device according to the invention may comprise other characteristics that can be taken separately or in combination, and in particular:
- its processing means may be responsible for associating with a received packet transmitted by packet analysis equipment, for example of the honeypot type, in response to a previous packet extracted by the control means, the source address ( original) of said previous packet extracted by the control means, so that the router routes the received packet to the source address (original) that has been associated with it by the processing means; its processing means may be responsible for placing a packet extracted by its control means in a new packet provided with a header containing the chosen alternative destination address, and then providing the router with the new packet containing the extracted packet; alternatively, its processing means may be responsible for replacing by a chosen alternative destination address the destination address that is contained in a packet that has been extracted by the control means, and then to provide the router with the extracted packet. with his new alternate destination address; its control means may for example be located in a data plane (or "data plane") of the router;
- its processing means may, for example, be implanted in a so-called control plane of the router;
- its processing means can be loaded, when the router analysis means have determined in a header an unassigned or inaccessible destination address, to prevent the router from sending an error message to the equipment (source ) who issued the packet containing that heading and which is designated in the latter;
- management means responsible for configuring the control means so that they do not extract a packet containing an unassigned or inaccessible destination address provided that it satisfies at least one chosen criterion and / or configuring the processing means so that they can proceed to the alternative destination address associations according to at least one selected criterion; each criterion is for example chosen from at least one criterion of membership of the destination address to a set of chosen addresses, a criterion of belonging of the source address to a set of chosen addresses, a criterion of the membership of the content type of the packet to a set of selected content types, a criterion relating to the local time of the router, a criterion of the occupancy rate of at least one selected buffer of the router, and a criterion relating to the value of a chosen meter; > his means of management can be responsible for configuring the means control and / or processing means by transmitting rules defining at least some of the criteria to be applied and / or correspondence tables between criteria
- its management means may be responsible for configuring control means and / or processing means located in at least two routers of its network;
- its management means can for example be implemented in the control plane of the router.
- the invention also proposes a router (communication network) comprising analysis means of the aforementioned type and a control device of the type of that presented above and coupled to said analysis means.
- the invention is particularly well suited, although not exclusively, to Internet Protocol (IP) communication networks.
- IP Internet Protocol
- FIG. 1 very schematically illustrates two communication networks connected to the Internet and comprising analysis equipment as well as routers each equipped with a control device according to the invention
- FIG. 2 schematically and functionally illustrates a router equipped with an exemplary embodiment of a control device according to the invention.
- the attached drawings may not only serve to complete the invention, but also contribute to its definition, if any.
- the object of the invention is to enable a large number of suspect traffics (transmitted as packets via one or more packetized communication networks routed to the destination address, as well as than possibly via the Internet) to reach equipment for analyzing suspicious traffic, for example of the honeypot type.
- FIG. 1 schematically illustrates an example of a communication installation embodying the invention.
- This installation comprises here, by way of purely illustrative and nonlimiting example, two communication networks N1 and N2 capable of transmitting data packets, for example of the IP (Internet protocol) type, and both connected to the Internet.
- network the communication networks N1 and N2
- IP packet a data packet transmitted by an N1 or N2 network.
- the number of routers represented here is equal to four, but it can take any value greater than or equal to one. Note that it is preferable, for reasons of efficiency, that each router of the first network N1 is equipped with one, or coupled to a control device D. It can indeed be envisaged that only one, or some of the routers of the first network N1 are equipped with, or coupled to, a control device D.
- communication equipment EA1, EA2, ES1
- a first equipment for analyzing suspicious traffics (packets) EA1 a second equipment for analyzing suspicious traffics (packets) EA2 and a communication terminal ES1 are connected to the first network N1 .
- the number of routers represented here is equal to three, but it can take any value greater than or equal to one.
- communication equipment EA3, EA4, ES2
- each having a communication address such as an IP address
- a third equipment for analyzing suspicious traffic (packets) EA3, a fourth equipment for analyzing suspicious traffic (packets) EA4 and an communication terminal ES2 are connected to the second network N2.
- the first EA1, second EA2, third EA3 and fourth EA4 suspected traffic analysis equipment (packets) are "honeypot” type equipment.
- the communication terminals ES1 and ES2 are equipment belonging to malicious people wishing to attack, by means of attack traffic (consisting of packets defining, for example, a worm, a virus or a Trojan), other communication equipment (of any type) connected to the first N1 or second N2 network or any other network accessible via the first N1 or second network N2.
- attack traffic consisting of packets defining, for example, a worm, a virus or a Trojan
- Such an (communication) terminal ES1 or ES2 is provided with an address scanning system enabling it to automatically generate any IP address and thus transmit traffic (packets) of attack to all the addresses IP possible, or at least to a large subgroup of all IP addresses.
- each router Ri or R'j is responsible for routing each packet (here of IP type) that it receives to the destination address (IP) that is contained in the header (IP) of this packet (IP).
- IP the IP header of an IP packet includes, among other things, the source address of the source equipment that sent said IP packet and the destination address of the equipment that is the recipient of said IP packet.
- each router Ri or R'j comprises, in particular, an analysis module MA and a routing module (or matrix) MR.
- the analysis module MA is responsible for analyzing the contents of each IP header in order to determine the destination address that it contains, then determining how to route the packet containing this IP header according to routing information (generally stored in a routing table).
- the routing module MR is responsible for routing (router) a received packet to the communication equipment that is designated by the destination IP address determined by the analysis module MA in its IP header, according to the instructions of routing provided by the MA analysis module.
- the analysis module MA is generally part of what the person skilled in the art calls the data plane (or "data plane”) PD of the router Ri or R'j. But, it could be otherwise.
- the routing module MR is generally distributed between the PD data plane and what the skilled person calls the control plane (or "control plane”) PC router Ri or R'j. But, it could be otherwise.
- each control device D comprises at least one control module MC and an processing module MT coupled to each other.
- the control module MC is coupled to the analysis module MA. When it is located in a router Ri or R'j, it is preferably part of its PD data plane. This control module MC is responsible for observing the result of the analysis performed by the analysis module MA on each IP header of a received IP packet. When the analysis module MA has determined in the header of an IP packet to route an unassigned or inaccessible destination address, the control module MC extracts the corresponding packet and transmits it to the processing module MT. It is important to note that the extraction can possibly be done according to at least one selected criterion. The application of some of these criteria may possibly require the analysis of the IP header and / or the content (payload) of the packet. Many criteria may be used, and in particular:
- control module MC may be configured to transmit an IP packet to the processing module MT provided that its IP header includes a destination address belonging to a set of chosen addresses,
- control module MC can be configured to transmit an IP packet to the processing module MT provided that its IP header includes a source address belonging to a set of chosen addresses,
- control module MC can be configured to transmit an IP packet to the processing module MT provided that its content corresponds to a type belonging to a set of selected types.
- control module MC may be optionally configured to select the honeypot type equipment to which an extracted packet must be routed. To do this, it can optionally apply at least one selected criterion). Many criteria can be used for this purpose, including:
- the control module MC can be configured to choose the honeypot type equipment to which an extracted packet must be routed according to the local time. This can in particular allow the distribution of traffic (or "load balancing"). For example, it may order the transmission of an extracted packet to the first honeypot equipment EA1 for the second (or minute) pairs, and to the second equipment of the honeypot type EA2 for the odd seconds (or minutes); a criterion of the occupancy rate of at least one selected buffer of the router Ri or R'j.
- buffers for example of the FIFO type associated with each of the honeypot type of equipment, in order to place the extracted packets awaiting routing according to the honeypot type of equipment recipient.
- an initially extracted packet intended for a first honeypot EA1 type equipment item is placed in the buffer memory associated with the second honeypot equipment item EA2 when the occupancy rate of the buffer memory associated with the first equipment item honeypot type EA1 exceeds a chosen threshold. It can also be used to make the distribution of traffic;
- a criterion relating to the value of a chosen meter may be provided.
- each time the control module MC orders the routing of an extracted IP packet to a honeypot-type device it increments by one unit the value of the counter which is associated with the latter.
- the control module MC orders the routing to the second honeypot equipment EA2 of the following extracted IP packet which should normally be routed to the first equipment type honeypot EA1. This can also be used to make the distribution of traffic.
- control module MC therefore transmits to the processing module
- the processing module MT Whenever the processing module MT receives a packet extracted by the control module MC, it associates it with a chosen alternative destination address (assigned to a honeypot type equipment), so that the router Ri or R'j the route to this associated alternate destination address.
- This alternative address association can be done in at least two different ways.
- a first way is to replace with a chosen alternative destination address the destination address that is contained in the extracted IP packet.
- the processing module MT then supplies to the router Ri or R'j, and more specifically to its data plane PD, the extracted IP packet which now comprises a new replacement destination address.
- a second, currently preferred, way is to place the extracted IP packet in a new packet with a header that contains the alternative destination address chosen.
- the processing module MT then supplies the router Ri or R'j, and more precisely its data plane PD, with the new IP packet that contains the extracted IP packet.
- the replacement destination address which is associated with an extracted IP packet, may be designated (chosen) by the control module MC following the application of one or more selected criteria.
- this address (or its designation) is for example communicated to the processing module MT at the same time as the extracted IP packet concerned.
- the data plane PD receives from the processing module MT the IP packet that has been the subject of the association of a replacement destination address, it processes it as if it were a new IP packet. come. Therefore, it is again analyzed by the analysis module MA, then routed to the replacement destination address it contains, since it is now known and accessible.
- control device D When the control device D is located in a router Ri or R'j, its processing module MT is preferably part of what the skilled person calls the control plane (or "control plane") PC of the router.
- the criteria relating to the IP header or the content type of an IP packet are applied by the control module MC, while the other criteria relating to the selection of the honeypot type equipment is applied by the processing module MT.
- the processing module MT receives an extracted IP packet, to be the subject of a replacement destination address association, it applies one or more criteria to it to determine the honeypot-type equipment to which it must be directed, then he associates him with the destination address of the latter.
- the criteria concerning the header (IP) and / or the content type of a packet (IP) are applied by the processing module MT.
- the criteria concerning the header (IP) and / or the content type of a packet (IP) may be applied by the control module MC and / or the processing module MT.
- a router Ri or R'j when a router Ri or R'j detects an unassigned or inaccessible destination address, it automatically addresses the source equipment ES1 (or ES2), which has issued the corresponding IP packet and which is designated in the IP header, an error message (usually ICMP type) stating the reason why it could not route this IP packet (equipment unreachable because the address of destination does not exist ("host unreachable” - especially in the case of non-existence of an ARP "Address Resolution Protocol" (RFC 826)), or network unreachable because we can not find a route to access the 'network unreachable').
- ES1 or ES2
- RRC 826 Address Resolution Protocol
- the processing module MT may for example be loaded with to forbid its analysis module MA to generate this type of error message when it detects an unassigned or inaccessible destination address.
- some suspicious packet analysis equipment EA1-EA4 may be arranged to respond to the attack messages they receive. Since they now receive a message of attack from a router which is equipped with a control device D according to the invention, they transmit to the same router the response to said attack message, while that This is for ES1 source equipment or ES2.
- the processing module MT of a control device D can be responsible for associating with a received packet transmitted by a device EA1 packet analysis in response to a previous suspect packet extracted by its MC control module, the source address (original) of this previous packet. For this purpose, each time a control module MC extracts a suspicious packet, it stores its source address in a memory of its device D or its router Ri or R'j.
- a control module MC finds that the analysis module MA of its router Ri or R'j has detected a packet transmitted by a packet analysis equipment EA1 in response to a packet that it had previously extracted it determines in the memory the source address which corresponds to this received packet and transmits it to its processing means MT so that it associates it with the received packet.
- the routing module MR of the router Ri or R'j can then route the received packet to the source address that has been associated with it by the processing module MT.
- the processing module MT that can determine in the memory the source address that it must associate with a received packet to be routed to a source equipment ES1 or ES2.
- the control device D can also and optionally include a management module MG responsible for configuring the control module MC and / or the processing module MT, in particular so that it (s) Applies to extracted IP packets one or more selected criteria.
- the management module MG can be used to define rules that define at least some of the criteria to be applied and / or correspondence tables between criteria to be applied and alternative destination addresses, and then (or only ) to transmit some of these rules and / or some of these correspondence tables auo control module MC and / or the processing module MT, according to instructions received from the network manager to which belongs the router Ri or R'j dont it is part of (or to which it is coupled).
- the MG management module can also be responsible for activating or deactivate the control device D at times chosen according to instructions received or a possible programming.
- the management module MG may also be responsible for configuring the address or addresses of the EA1 and EA2 packet analysis equipment to which the suspect packets will be sent.
- the management module MG may also be responsible for configuring control modules MC and / or processing modules MT which are located in (or coupled to) several (at least two) routers.
- a management module MG can be used to configure the control modules MC and / or the processing modules MT of all the routers of its network or only a part of them. In this case, it can be either implanted in one of the control devices D or in a network equipment of another type.
- control device D When the control device D is located in a router Ri or R'j, its management module MG is preferably part of the control plane PC of this router.
- control device D and in particular its control module MC and processing module MT, as well as its possible management module MG, can be implemented in the form of electronic circuits, software (or computer) modules, or a combination of circuits and software.
- control device and router are not limited to the embodiments of control device and router described above, only by way of example, but it encompasses all variants that may be considered by those skilled in the art within the scope of the invention. claims below.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0654592A FR2907998B1 (fr) | 2006-10-27 | 2006-10-27 | Dispositif de controle de paquets, pour un routeur d'un reseau de communication, en vue du routage de paquets suspects vers des equipements d'analyses dedies |
PCT/EP2007/061506 WO2008049908A2 (fr) | 2006-10-27 | 2007-10-26 | Dispositif de controle de paquets, pour un routeur d'un reseau de communication, en vue du routage de paquets suspects vers des equipements d'analyse dedies |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2087688A2 true EP2087688A2 (fr) | 2009-08-12 |
Family
ID=38325505
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07821869A Withdrawn EP2087688A2 (fr) | 2006-10-27 | 2007-10-26 | Dispositif de controle de paquets, pour un routeur d'un reseau de communication, en vue du routage de paquets suspects vers des equipements d'analyse dedies |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2087688A2 (fr) |
FR (1) | FR2907998B1 (fr) |
WO (1) | WO2008049908A2 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106961414B (zh) * | 2016-01-12 | 2020-12-25 | 阿里巴巴集团控股有限公司 | 一种基于蜜罐的数据处理方法、装置及系统 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6775657B1 (en) * | 1999-12-22 | 2004-08-10 | Cisco Technology, Inc. | Multilayered intrusion detection system and method |
WO2002098100A1 (fr) * | 2001-05-31 | 2002-12-05 | Preventon Technologies Limited | Systemes de controle d'acces |
US20040078592A1 (en) * | 2002-10-16 | 2004-04-22 | At & T Corp. | System and method for deploying honeypot systems in a network |
-
2006
- 2006-10-27 FR FR0654592A patent/FR2907998B1/fr active Active
-
2007
- 2007-10-26 WO PCT/EP2007/061506 patent/WO2008049908A2/fr active Application Filing
- 2007-10-26 EP EP07821869A patent/EP2087688A2/fr not_active Withdrawn
Non-Patent Citations (1)
Title |
---|
None * |
Also Published As
Publication number | Publication date |
---|---|
WO2008049908A2 (fr) | 2008-05-02 |
WO2008049908B1 (fr) | 2008-07-24 |
FR2907998A1 (fr) | 2008-05-02 |
FR2907998B1 (fr) | 2009-04-10 |
WO2008049908A3 (fr) | 2008-06-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11522827B2 (en) | Detecting relayed communications | |
US10805325B2 (en) | Techniques for detecting enterprise intrusions utilizing active tokens | |
US8977747B2 (en) | System and method for detection of aberrant network behavior by clients of a network access gateway | |
US20050060535A1 (en) | Methods and apparatus for monitoring local network traffic on local network segments and resolving detected security and network management problems occurring on those segments | |
US20150200960A1 (en) | Techniques for protecting against denial of service attacks near the source | |
US20070094722A1 (en) | Detecting networks attacks | |
US20040255161A1 (en) | System and method for network edge data protection | |
US20070266091A1 (en) | Network advertising system | |
WO2006013292A1 (fr) | Procede, dispositif et systeme de protection d'un serveur contre des attaques de deni de service dns | |
TW200951757A (en) | Malware detection system and method | |
WO2012021906A2 (fr) | Dispositifs, systèmes et procédés destinés à activer et à reconfigurer des services pris en charge par un réseau de dispositifs | |
CN105743878A (zh) | 使用蜜罐的动态服务处理 | |
EP3556130B1 (fr) | Procédé de surveillance d'un réseau de télécommunications mis en oeuvre par un point d'accès | |
EP2087688A2 (fr) | Dispositif de controle de paquets, pour un routeur d'un reseau de communication, en vue du routage de paquets suspects vers des equipements d'analyse dedies | |
CN100561492C (zh) | 网络攻击检测的方法和装置 | |
WO2024121281A1 (fr) | Procédé de gestion d'un ensemble d'adresses ip, procédé de collaboration et dispositifs configurés pour mettre en œuvre ces procédés | |
WO2004015953A2 (fr) | Procede et architecture de communication entre un equipement client et un module intermediaire situes tous les deux sur un reseau local | |
Rayes | Advanced Security Management in Metro Ethernet Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20090527 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
DAX | Request for extension of the european patent (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ALCATEL LUCENT |
|
111Z | Information provided on other rights and legal means of execution |
Free format text: AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR Effective date: 20130410 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ALCATEL LUCENT |
|
D11X | Information provided on other rights and legal means of execution (deleted) | ||
17Q | First examination report despatched |
Effective date: 20161102 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ALCATEL LUCENT |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20180131 |