WO2006131852A1 - Protected wireless network access - Google Patents
Protected wireless network access Download PDFInfo
- Publication number
- WO2006131852A1 WO2006131852A1 PCT/IB2006/051749 IB2006051749W WO2006131852A1 WO 2006131852 A1 WO2006131852 A1 WO 2006131852A1 IB 2006051749 W IB2006051749 W IB 2006051749W WO 2006131852 A1 WO2006131852 A1 WO 2006131852A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- guest
- access point
- key
- encryption key
- wireless
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
Definitions
- the present invention relates to wireless networks.
- Wireless networks such as those defined in the IEEE standard 802.1, are becoming more common, in both home and office environments.
- a wired equivalent protocol (WEP) technique can be used in which communications are encrypted using a secret WEP key.
- WEP wired equivalent protocol
- the WEP technique is intended to make security of wireless networks straightforward by using a predefined encryption key for devices on the network.
- using a single, predetermined key value has a significant disadvantage, as will be described.
- failure to change WEP key values means that the guest device would always have access to the network services and resources, since the guest device would always have a valid WEP key for the network.
- an embodiment of the present invention provides an access point having a first operating mode in which communication is enabled with a first predefined set of wireless devices using a first encryption key.
- the access point is provided with a second operating mode in which communication is enabled with the first predefined set of wireless devices and with a guest wireless device, using a second encryption key different from the first encryption key.
- communication is enabled using the IEEE802.11 wireless communication standard incorporating the wired equivalent protocol security technique.
- the access point includes a switch operable to switch the access point between the operating modes.
- communication can be enabled with a plurality of guest devices using the second encryption key, thereby enabling a plurality of guest devices access to the network.
- An access point embodying the present invention may also include a memory device operable to store the first and second encryption keys.
- the memory device can store a plurality of guest encryption keys, and the access point can then, in the second operating mode, retrieve a selected guest encryption key for use as the second encryption key.
- a method of operating a wireless network access point comprises, in a first operating mode, communicating with a first predetermined set of wireless devices using a first encryption key, and, in a second operating mode, communicating with the first predetermined set of wireless devices and with a guest wireless device using a second encryption key.
- a method of enabling communication between a wireless access point, a first predetermined set of wireless devices and a guest wireless device comprises, in a first operating mode, communicating with a first predetermined set of wireless devices using a first encryption key, and, in a second operating mode, communicating with the first predetermined set of wireless devices and with a guest wireless device using a second encryption key.
- Fig. 1 is a block diagram illustrating a wireless network
- Fig. 2 is a block diagram illustrating an access point embodying the present invention.
- FIG. 1 illustrates a wireless network 1 embodying one aspect of the present invention.
- the network 1 includes a server 10 which provides the network services and resources. It will be appreciated that the server shown in Figure 1 is merely illustrative of the network services and resources, and that these may be provided by any combination of appropriate devices.
- the server 10 is connected with a wireless access point (AP) 12.
- the server 10 and access point 12 transfer data with one another, and the access point 12 defines a wireless node for the network.
- a home wireless device 14 communicates wirelessly with the access point 12, for example using radio frequency (RF) communications in the manner specified by the IEEE 802.11 standard.
- RF radio frequency
- the wired equivalent protocol technique is used for ensuring security of the wireless network.
- the wired equivalent protocol (WEP) technique uses an encryption and decryption key which is kept secret. Every device can have up to four WEP keys, that are generally numbered 0 to 3. Each device in the wireless network is configured to set values for at least one of the keys, with a flag used to indicate the number of the key to be used for transmission.
- a guest device 16 is also shown in Figure 1 communicating with the access point 12.
- the guest device 16 is granted temporary access to the network 1 using a technique embodying one aspect of the present invention.
- Figure 2 illustrates an access point 12 which embodies a further aspect of the present invention.
- the access point 12 includes a controller 121 which communicates with the server 10 (of Figure 1) via a network interface 122.
- the access point includes a radio frequency (RF) transceiver 123 which transmits and receives radio frequency signals via an antenna 124.
- the controller 121 transfers data with the RF transceiver 123 to control transmission of data therefrom, and to receive incoming data therefrom.
- RF radio frequency
- the access point 12 also includes a memory device 125 for storing configuration settings and key values, for example, and also includes an input device 126 for providing user inputs to the controller 121.
- the input device can be provided by physical buttons on the access point, or by inputs received from the server 10 or the mobile wireless devices 14, 16.
- the access point 12 is provided with two modes of operation, namely a "home mode" and a "guest mode". In the home mode, a home WEP key is used by "home” devices on the network, and no other devices are able to access the network 1. In the guest mode, the guest WEP key is used for transmissions to and from the guest device. A data value trkey is used to indicate the key being used by the transmitting device.
- the home mode allows only designated "home” devices to access the network, by using a home WEP key.
- Each home device is assigned the home key, for example as key [0], and the access point 12 and home device 14 use this key [0] for communication.
- key[l] is used for transmissions from the access point 12.
- the guest device 16 is provided only with the value of key [I].
- the static configuration of the home device therefore includes both the home key and the guest key. This configuration is set at the initial configuration of the network, and need not be changed on each of the home devices.
- the two modes of operation use different configurations.
- the access point 12 In the home mode, the access point 12 is provided only with the home key, and in the guest mode the access point 12 is provided with both the home and guest keys, and is set for transmission using the guest key.
- the mode of operation of the access point 12 is therefore all that need be changed when allowing a guest access to the network.
- the access point 12 can be provided with a hardware switch to change the mode of operation, in order that the change is simple.
- the guest device is unable to eavesdrop on the communication, or access network resources because the home key is unknown to the guest device.
- the home device 14 transmits to the access point 12 using the home key, key [O].
- the access point 12 transmits to the home device using the guest key, key[l]. Since the home device has the guest key as key[l], such transmission is possible.
- the transmissions from the home device use the home key in order to avoid the need to reconfigure the home device 14.
- the transmissions from the home device use the same (home) key in both the home and guest modes of operation.
- the guest device 16 knows the guest key, and so communications in the guest mode between the access point 12 and the guest device 16 make use of the guest key.
- the infrastructure mode of operation of IEEE 802.11 all transmissions are routed through the access point 12, and so communication between the home and guest devices 14 and 16 is possible using the access point to re-encrypt home device communications using the guest key.
- the access point 12 When the guest device 16 leaves the network, the access point 12 is switched back to the home mode, such that access point transmissions are performed using the home key. This means that the guest device is no longer known to the access point 12, and so the access point refuses communication request from the guest device. This refusal is a product of the configuration of the access point in the home mode.
- the home mode simply does not include the guest key, and so illegitimate communications are prevented.
- more than one guest key can be defined, and the guest mode can use one of the guest keys.
- the guest keys can be chosen in succession, or be chosen randomly. Use of multiple guest keys can prevent unwanted access from a previous guest device when the guest mode is entered again.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
An access point (12) for a wireless network is provided with two operating modes. In a first operating mode, network access is limited to home devices (14) using a home encryption key. In a second operating mode, access to the network by a guest device (16) is enabled using a guest encryption key.
Description
PROTECTED WIRELESS NETWORK ACCESS
The present invention relates to wireless networks.
Wireless networks, such as those defined in the IEEE standard 802.1, are becoming more common, in both home and office environments. To ensure adequate security of the network, a wired equivalent protocol (WEP) technique can be used in which communications are encrypted using a secret WEP key. For example, see http://staiidards.ieee. org/getieee8G2/8Q2.11.html. The WEP technique is intended to make security of wireless networks straightforward by using a predefined encryption key for devices on the network. However, using a single, predetermined key value has a significant disadvantage, as will be described.
The problem occurs with such WEP enabled networks: when a guest device is to access the network services, the guest device must be given the secret WEP key. The network host must then change the WEP key for the network following the guest device's departure, in order to avoid unauthorised further use of the network services. Alternatively, a temporary key is assigned to the network, and then the key returned to the original settings following the guest departure.
Such reconfiguration of the network requires some fairly detailed knowledge of network administration, and, even then, is relatively cumbersome and so very unlikely to be performed, particularly in the home environment.
However, failure to change WEP key values means that the guest device would always have access to the network services and resources, since the guest device would always have a valid WEP key for the network.
Accordingly, it is an object of the present invention to provide a technique that enables straightforward guest access to a wireless network, but which overcomes the security disadvantages of existing techniques.
Accordingly, an embodiment of the present invention provides an access point having a first operating mode in which communication is enabled with a first predefined set of wireless devices using a first encryption key. The access point is provided with a second operating mode in which communication is enabled with the first predefined set of wireless devices and with a guest wireless device, using a second encryption key different from the first encryption key.
In one particular embodiment, communication is enabled using the IEEE802.11 wireless communication standard incorporating the wired equivalent protocol security technique. Such embodiments have the advantage that complex network administration is avoided, by providing an appropriate number of preset operating modes, which merely need switching between. In one embodiment, the access point includes a switch operable to switch the access point between the operating modes.
In the second operating mode, communication can be enabled with a plurality of guest devices using the second encryption key, thereby enabling a plurality of guest devices access to the network.
An access point embodying the present invention may also include a memory device operable to store the first and second encryption keys. The memory device can store a plurality of guest encryption keys, and the access point can then, in the second operating mode, retrieve a selected guest encryption key for use as the second encryption key.
In another aspect of the present invention, a method of operating a wireless network access point comprises, in a first operating mode, communicating with a first predetermined set of wireless devices using a first encryption key, and, in a second operating mode, communicating with the first predetermined set of wireless devices and with a guest wireless device using a second encryption key.
In another aspect of the present invention, a method of enabling communication between a wireless access point, a first predetermined set of wireless devices and a guest wireless device comprises, in a first operating mode, communicating with a first predetermined set of wireless devices using a first encryption key, and, in a second operating mode, communicating with the first predetermined set of wireless devices and with a guest wireless device using a second encryption key.
In one embodiment of such a method, the access point and each of the first predetermined set of wireless devices store the first and second encryption keys, and the or each guest wireless device stores only the second encryption key.
Fig. 1 is a block diagram illustrating a wireless network; and Fig. 2 is a block diagram illustrating an access point embodying the present invention.
Figure 1 illustrates a wireless network 1 embodying one aspect of the present invention. The network 1 includes a server 10 which provides the network services and resources. It will be appreciated that the server shown in Figure 1 is merely illustrative of the network services and resources, and that these may be provided by any combination of appropriate devices.
The server 10 is connected with a wireless access point (AP) 12. The server 10 and access point 12 transfer data with one another, and the access point 12 defines a wireless node for the network. A home wireless device 14 communicates wirelessly with the access point 12, for example using radio frequency (RF) communications in the manner specified by the IEEE 802.11 standard.
In a wireless network embodying the present invention, the wired equivalent protocol technique is used for ensuring security of the wireless network. The wired equivalent protocol (WEP) technique uses an encryption and decryption key which is kept secret. Every device can have up to four WEP keys, that are generally numbered 0 to 3. Each device in the wireless network is configured to set values for at least one of the keys, with a flag used to indicate the number of the key to be used for transmission.
A guest device 16 is also shown in Figure 1 communicating with the access point 12. The guest device 16 is granted temporary access to the network 1 using a technique embodying one aspect of the present invention. Figure 2 illustrates an access point 12 which embodies a further aspect of the present invention. The access point 12 includes a controller 121 which communicates with the server 10 (of Figure 1) via a network interface 122. The access point includes a radio frequency (RF) transceiver 123 which transmits and receives radio frequency signals via an antenna 124. The controller 121 transfers data with the RF transceiver 123 to control transmission of data therefrom, and to receive incoming data therefrom. The access point 12 also includes a memory device 125 for storing configuration settings and key values, for example, and also includes an input device 126 for providing user inputs to the controller 121. The input device can be provided by physical buttons on the
access point, or by inputs received from the server 10 or the mobile wireless devices 14, 16. The access point 12 is provided with two modes of operation, namely a "home mode" and a "guest mode". In the home mode, a home WEP key is used by "home" devices on the network, and no other devices are able to access the network 1. In the guest mode, the guest WEP key is used for transmissions to and from the guest device. A data value trkey is used to indicate the key being used by the transmitting device.
The home mode allows only designated "home" devices to access the network, by using a home WEP key. Each home device is assigned the home key, for example as key [0], and the access point 12 and home device 14 use this key [0] for communication. The access point 12 and the home device 14 both transmit using key [O]. In this case trkey=O.
In the guest mode, key[l] is used for transmissions from the access point 12. The guest device 16 is provided only with the value of key [I]. In the guest mode, the host will give to the guest the following WEP configuration for him to configure the guest device: Key [ 1 ]=GGGGG; trkey=l . The static configuration of the home device therefore includes both the home key and the guest key. This configuration is set at the initial configuration of the network, and need not be changed on each of the home devices.
The two modes of operation use different configurations. In the home mode, the access point 12 is provided only with the home key, and in the guest mode the access point 12 is provided with both the home and guest keys, and is set for transmission using the guest key.
The mode of operation of the access point 12 is therefore all that need be changed when allowing a guest access to the network. The access point 12 can be provided with a hardware switch to change the mode of operation, in order that the change is simple. In the home mode, the home device 14 and the access point 12 both use the exclusively home WEP key, key[0], trkey=O in this example, for communications. The guest device is unable to eavesdrop on the communication, or access network resources because the home key is unknown to the guest device.
In the guest mode, all of the access point 12 transmissions are performed using the guest key, in this example key[l], trkey=l. The home device 14 transmits to the access point 12 using the home key, key [O]. The access point 12 transmits to the home device using the guest key, key[l]. Since the home device has the guest key as key[l], such transmission is possible. The transmissions from the home device use the home key in order to avoid the
need to reconfigure the home device 14. The transmissions from the home device use the same (home) key in both the home and guest modes of operation.
The guest device 16 knows the guest key, and so communications in the guest mode between the access point 12 and the guest device 16 make use of the guest key. In the infrastructure mode of operation of IEEE 802.11 , all transmissions are routed through the access point 12, and so communication between the home and guest devices 14 and 16 is possible using the access point to re-encrypt home device communications using the guest key.
When the guest device 16 leaves the network, the access point 12 is switched back to the home mode, such that access point transmissions are performed using the home key. This means that the guest device is no longer known to the access point 12, and so the access point refuses communication request from the guest device. This refusal is a product of the configuration of the access point in the home mode. The home mode simply does not include the guest key, and so illegitimate communications are prevented. In a further embodiment of the present invention, more than one guest key can be defined, and the guest mode can use one of the guest keys. For example, the guest keys can be chosen in succession, or be chosen randomly. Use of multiple guest keys can prevent unwanted access from a previous guest device when the guest mode is entered again. In the case where a single guest key is used, all previous guests could access the network whenever it is in the guest mode. Using multiple possible guest keys substantially reduces the probability of this occurring. If multiple keys are to be used, then these are defined upon initialisation of the network, and the home devices are configured with all of the possible guest keys. In accordance with IEEE802.11, up to three additional guest keys can be defined. It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be capable of designing many alternative embodiments without departing from the scope of the invention as defined by the appended claims. In the claims, any reference signs placed in parentheses shall not be construed as limiting the claims. The words "comprising" and "comprises", and the like, do not exclude the presence of elements or steps other than those listed in any claim or the specification as a whole. The singular reference of an element does not exclude the plural reference of such elements and vice-versa. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer, if appropriate. In a claim enumerating several means, several of these means may be embodied by one and the same item of hardware. The mere fact that certain measures are
recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Claims
1. A wireless network access point (12) having a first operating mode in which communication is enabled with a first predefined set of wireless devices (14) using a first encryption key, and a second operating mode in which communication is enabled with the first predefined set of wireless devices (14) and with a guest wireless device (16), using a second encryption key different from the first encryption key.
2. An access point as claimed in claim 1, comprising a switch (126) operable to switch the access point between the operating modes.
3. An access point as claimed in claim 1 or 2, wherein, in the second operating mode, communication is enabled with a plurality of guest devices (16) using the second encryption key.
4. An access point as claimed in any one of claims 1 to 3, comprising a memory device (125) operable to store the first and second encryption keys.
5. An access point as claimed in claim 4, wherein the memory device (125) is operable to store a plurality of guest encryption keys, and the access point (12) is operable, in the second operating mode, to retrieve a selected guest encryption key for use as the second encryption key.
6. A method of operating a wireless network access point (12), the method comprising: in a first operating mode, communicating with a first predetermined set of wireless devices (14) using a first encryption key; and in a second operating mode, communicating with the first predetermined set of wireless devices (14) and with a guest wireless device (16) using a second encryption key.
7. A method as claimed in claim 6, comprising, in the second operating mode, communicating with a plurality of wireless guest devices (16) using the second encryption key.
8. A method as claimed in claim 6, or 7, comprising storing a plurality of guest encryption keys in a memory device (126), selecting the second encryption key from the plurality of guest encryption keys, and retrieving the selected guest key from the memory device (126) for use as the second encryption key.
9. A method of enabling communication between a wireless access point, a first predetermined set of wireless devices and a guest wireless device, the method comprising: in a first operating mode, communicating with a first predetermined set of wireless devices (14) using a first encryption key; and in a second operating mode, communicating with the first predetermined set of wireless devices (14) and with a guest wireless device (16) using a second encryption key.
10. A method as claimed in claim 9, wherein the access point and each of the first predetermined set of wireless devices store the first and second encryption keys, and the or each guest wireless device stores only the second encryption key.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05104897 | 2005-06-06 | ||
EP05104897.3 | 2005-06-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006131852A1 true WO2006131852A1 (en) | 2006-12-14 |
Family
ID=36954632
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2006/051749 WO2006131852A1 (en) | 2005-06-06 | 2006-06-01 | Protected wireless network access |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006131852A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916325A (en) * | 2014-04-09 | 2014-07-09 | 汕头市奥斯卡网络科技有限公司 | Secure router based on hardware switch circuit |
CN107113604A (en) * | 2014-12-26 | 2017-08-29 | 华为技术有限公司 | The method of adjustment and device of a kind of network mode |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000024175A1 (en) * | 1998-10-16 | 2000-04-27 | Softbook Press, Inc. | Authentication for information exchange over a communication network |
WO2004014038A1 (en) * | 2002-07-29 | 2004-02-12 | Philips Intellectual Property & Standards Gmbh | Security system for apparatuses in a network |
-
2006
- 2006-06-01 WO PCT/IB2006/051749 patent/WO2006131852A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000024175A1 (en) * | 1998-10-16 | 2000-04-27 | Softbook Press, Inc. | Authentication for information exchange over a communication network |
WO2004014038A1 (en) * | 2002-07-29 | 2004-02-12 | Philips Intellectual Property & Standards Gmbh | Security system for apparatuses in a network |
Non-Patent Citations (1)
Title |
---|
ANONYMOUS: "WPA Deployment Guidelines for Public Access Wi-Fi Networks", WI-FI ALLIANCE, 28 October 2004 (2004-10-28), XP002335993 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916325A (en) * | 2014-04-09 | 2014-07-09 | 汕头市奥斯卡网络科技有限公司 | Secure router based on hardware switch circuit |
CN107113604A (en) * | 2014-12-26 | 2017-08-29 | 华为技术有限公司 | The method of adjustment and device of a kind of network mode |
EP3229508A4 (en) * | 2014-12-26 | 2017-12-27 | Huawei Technologies Co., Ltd. | Method and apparatus for adjusting network mode |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7733833B2 (en) | Self-configuring, self-optimizing wireless local area network system | |
US7519184B2 (en) | Wireless communication system | |
CN107371163A (en) | A kind of method and apparatus for controlling access wireless network | |
EP1917787B1 (en) | Automatic commandable ssid switching | |
US20010048744A1 (en) | Access point device and authentication method thereof | |
CN101779416B (en) | Communication apparatus, control method thereof, and computer program | |
JP2009303238A (en) | Radio communication device | |
CN101164315A (en) | System and method for utilizing a wireless communication protocol in a communications network | |
KR20050084926A (en) | Radio lan access authentication system | |
JP2007074297A (en) | Method for setting security of wireless communication network, security setting program, wireless communication network system, and client apparatus | |
WO2006129287A1 (en) | Method and devices for wireless network access management | |
US20080046719A1 (en) | Access point and method for supporting multiple authentication policies | |
US11540129B2 (en) | Systems and methods for virtual personal Wi-Fi network | |
US20190104422A1 (en) | System and Method for Easy Configuration and Authentication of Network Devices | |
US10089449B2 (en) | System, method, and device for controlled access to a network | |
WO2010134182A1 (en) | Communication device, communication device control method and program | |
CN104980358A (en) | Wireless router and wireless network management method thereof | |
KR100679016B1 (en) | Device, system and method for setting of security information in wireless network | |
WO2006131852A1 (en) | Protected wireless network access | |
JP5364852B2 (en) | Wireless communication device | |
US20190028991A1 (en) | Devices and methods for operating a communication network | |
WO2009142907A1 (en) | Methods and apparatus for roaming in a wireless network | |
EP2438705B1 (en) | Method and system for identifying compromised nodes | |
KR101723957B1 (en) | Network access controller for personal wireless router | |
JP2006020088A (en) | Automatic connection method of network, apparatus for automatically connecting to network, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06756031 Country of ref document: EP Kind code of ref document: A1 |