WO2010100602A2 - Système de réseau de communication sécurisé et procédé rentable de communication sur celui-ci - Google Patents

Système de réseau de communication sécurisé et procédé rentable de communication sur celui-ci Download PDF

Info

Publication number
WO2010100602A2
WO2010100602A2 PCT/IB2010/050889 IB2010050889W WO2010100602A2 WO 2010100602 A2 WO2010100602 A2 WO 2010100602A2 IB 2010050889 W IB2010050889 W IB 2010050889W WO 2010100602 A2 WO2010100602 A2 WO 2010100602A2
Authority
WO
WIPO (PCT)
Prior art keywords
communication
router
central hub
network system
wireless device
Prior art date
Application number
PCT/IB2010/050889
Other languages
English (en)
Other versions
WO2010100602A3 (fr
Inventor
Aasis Vinayak P.G.
Original Assignee
Vinayak P G Aasis
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vinayak P G Aasis filed Critical Vinayak P G Aasis
Publication of WO2010100602A2 publication Critical patent/WO2010100602A2/fr
Publication of WO2010100602A3 publication Critical patent/WO2010100602A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys

Definitions

  • VoIP Voice over Internet Protocol
  • IP internet-protocol
  • VoIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio coders-decoders (codecs) which encode speech allowing transmission over an IP network as digital audio via an audio stream.
  • codecs audio coders-decoders
  • VoIP has been implemented in various ways using both proprietary as well as open source protocols and standards.
  • a major development starting in 2004 has been the introduction of mass-market VoIP services over broadband internet access services, in which subscribers make and receive calls as they would over the PSTN.
  • Full phone service VoIP phone companies provide inbound and outbound calling with Direct Inbound Dialing.
  • ATA analog telephone adapter
  • Another method of connecting VoIP service providers is by way of using dedicated
  • VoIP phones that allow VoIP calls without the use of a computer. Instead they connect directly to the IP network using technologies such as Wi-Fi or Ethernet. In order to connect to the PSTN they usually require service from a VoIP service provider; most people therefore will use them in conjunction with a paid service plan.
  • the third method consists of installing a software called a soft phone on a computer that allows VoIP calling without dedicated hardware.
  • This sotware is also referred to as Internet phone or Digital phone.
  • IMS IP Multimedia Subsystem
  • “Dual mode" telephone sets which allow for the seamless handover between a cellular network and a Wi-Fi network, are expected to help VoIP become more popular.
  • These have sessions-initiation-protocol (SIP) clients built into the firmware which are configured to operate independently of the mobile phone network.
  • SIP sessions-initiation-protocol
  • Some operators choose to remove the client from subsidized handsets. In fact, some operators have actively tried to block VoIP traffic from their networks while others have refused to interconnect with VoIP-enabled networks.
  • This invention seeks to overcome the drawbacks of the existing prior art namely: a. Necessity to have an Internet connection b. No support for custom end-to-end secure communication (as we can do using emails) c. The requirement of necessarily having a computing means along with a shared or dedicated internet connection for a stationary user wanting to use VoIP; d. The requirement of having a high-end VoIP enabled cellular handphone and an exclusive subscription plan which is relatively expensive; and e. The industry created incompatibility issues regarding the seamless integration of PSTN, VoIP and cellular technology to provide the user with a comprehensive communication platform. f . Restricted mobility even if you are using a hand-held device like a Skype phone.
  • the instant invention provides for a secure highly cost efficient communication system resembling the service delivery platform of implementing VoIP enabled communication.
  • This system enables the subscriber to be independent of the VoIP compliant computer which is essential in the state-of-art. It also makes the mobile subscriber independent of high end VoIP compatible mobile phone and an internet connection either shared or dedicated for their last mile connectivity when they wish to communicate using VoIP platform (which is implemented in a custom VPN, as a logical network, by superposing it on the top on internet topology).
  • mobile subscriber means a user who is not stationary and is using VoIP on the g°- b.
  • high end refers to integration of sophisticated technology into a normal cellular handset which renders it expensive for making it compatible with relatively cheap platform for diverse communication needs.
  • the instant invention provides for a secure communication network system comprising a central hub (CH), a plurality of router nodes (RN) and a plurality of wireless devices (WD) wherein said central hub (CH) comprises of plurality of databases of identifiers of all wireless devices (WD) and corresponding public key (PK), plurality of dynamically updated look-up tables, plurality of dynamically updated look-ahead tables and recent activity logs, said router nodes (RN) comprises of compatible router transceiver blocks (RTB) and device identifier (HID) with subscription identifier arranged in tables for logging in wireless devices (WD) for local authentication of said WD, said wireless devices (WD) comprises of compatible wireless transceiver blocks (WTB) and its unique identifier embedded in the said WD' s logic, a mirror image of which is maintained in the said database of identifiers of the said central hub (CH) and which is delivered to said router nodes (RN) when so requested wherein said compatible wireless transceiver block establishes communication sessions with the
  • a secure communication network system wherein the said communication sessions are established over data channel which may be a licensed or unlicensed frequency spectrum.
  • a secure communication network system wherein the said data channel is selected from either a free channel like Industrial Scientific Medical Bandwith (ISM) or licensed proprietary bandwidth like 3G.
  • ISM Industrial Scientific Medical Bandwith
  • 3G licensed proprietary bandwidth
  • a secure communication network system wherein said identifiers constituting said plurality of database maintained at the Central Hub (CH) are mapped to corresponding temporary public key.
  • CH Central Hub
  • a secure VoIP communication network system wherein location of a wireless device with respt to the installed router nodes (RN) are updated dynamically in real time in the said plurality of databases resident on said central hub (CH).
  • a secure VoIP communication network system wherein said look-up table comprises of computing means to determine the shortest communication path needed to establish the desired communication session.
  • a secure VoIP communication network system wherein said dynamically updated look tables comprises of information pertaining to the current location of the wireless device (WD)
  • Figure 1 illustrates the network components used in the invention
  • Figure 2 illustrates a logical block diagram for an inexpensive portable wireless handset of this invention
  • Figure 3 illustrates the implementation of the said invention through a novel wireless communication network
  • Figure 4 illustrates the logical procedure undertaken by a subscriber of the instant invention to communicate with an entity in the proposed network of the said communication system and vice versa
  • Figure 5 illustrates the implementation of the instant invention in the legacy infrastructure like Plain Old Telephone System (POTS) BRIEF DESCRIPTION OF THE INVENTION:
  • POTS Plain Old Telephone System
  • the communication system of the instant invention resembling service delivery platform for VoIP is a peer-to-peer (P2P) topology based network where all kinds of communications requests by its subscribers are serviced by plurality of routing nodes interconnected dynamically using the said P2P topology.
  • the said routing nodes in turn communicate with a logical central hub implemented as a data centre which manages and defines the routing path undertaken by the said nodes while servicing the said end user's communication request.
  • the instant invention provides a fast local network link between its said subscribers and their said corresponding nodes with which the said subscriber is logged on in realtime. This in turn facilitates dynamic synchronization of the mobile subscriber with the corresponding router node using novel compatible communication interface standards loosely based on session setup and teardown concept of VoIP stack.
  • Plurality of such said nodes are also connected to the said hub using the same said interface standards and the said nodes are interconnected among themselves using any packet-switching- network.
  • the said hubs comprise of dynamically updated look up and look ahead routing tables for the said proposed network and thereby instruct the said nodes to forward the actual voice encapsulated data packets to comply with the said end user's communication request.
  • the said hub can be treated as logical proxy for the said end user which basically controls the routing of the said subscriber's communication request but the actual routing is done by the said server nodes.
  • the subscriber's request for a communication service to an entity which is part of this proposed invention implementation is totally free of cost after the one-time payment of the intial subscripton charges.
  • the usage charges are very minimal. All these economic advantages are obtained as the said routing undertaken at the backend of the said system by the said dynamic routing nodes is done by forwarding the said data packets from one router to another to manage the data traffic generated without any form of centralized server client architecture.
  • centralized server client architecture is where the subscribers requests are escalated to some predefined master backbone mainframe servers using vertical hierarchy routing topology.
  • the security concern for the voice encapsulated data traffic to be transmitted over the proposed communication network is taken care of by the instant invention by facilitating the integration of the client's proprietiary encryption algorithm over the default encryption implemented by the service provider in the state of the art VoIP services.
  • every session security is achieved by dual encryption, one part of which is done at the subscriber's end through a private encryption key embedded in the said subscriber's device while the second part is achieved by the said router node generating a device specific temporary public key valid for that session only.
  • This temporary public key is tagged with a time stamp and is transmitted to the said corresponding device over the said local high speed network.
  • the implementation of this dual private and public on-the-fly-encryption assures the subscriber of fool-proof security while communicating within or outside the said local network.
  • the instant invention also provides for the said implementation to be incorporated into the legacy infrastructure like the POTS (Plain Old Telephone System) by attaching a routing device to a fixed landline connection.
  • the said routing device has a mini server embedded in it.
  • the said routing device acts as an interface between the data center (hub) and the fixed landline connection. This eliminates the need for computing means to access the VoIP communication which is a major drawback in the existing state-of- art.
  • the instant invention can also be incorporated into existing cellular handsets with minor improvisations to the motherboard of said cellular handset, for e.g. addition of an adapter. This negates the need of an expensive dual VoIP compatible cellular handset to enable mobile VoIP communication of the existing state of the art.
  • the instant invention also provides for a cellular like architecture enabling the mobile subscriber to move freely since the subscriber's link with the corresponding server node can be dynamically passed on from one node to another without losing the said subscriber's communication facilities. This is possible because of the look up and look ahead databases resident on the said hub which is being dynamically updated enabling real time handshake between said server nodes in case of the said subscriber is moving around. This helps to overcome the coverage area restriction problem in the existing state of the art Mobile VoIP networks.
  • the embodiment details the best mode implementation of the proposed invention but does not restrict its scope in any way and thus the proposed invention can be applied to other applications.
  • the preferred embodiment is illustrated for a wireless cellular implementation but it can be easily adapted for existing fixed line telecommunication technologies like the normal PSTN (Public Switched Telecom Network) with little modification or addition of components on such legacy networks.
  • PSTN Public Switched Telecom Network
  • Figure 1 illustrates the block diagram for a novel wireless communication network system of the instant invention.
  • the said network is implemented as a cellular intranet employing novel session control protocols similar to the protocols used for realizing VoIP services, thus delivering a cost efficient and highly secure communication environment to its subscribers.
  • the said wireless device (WD) is in communication with a plurality of router nodes (RN) in such a manner that each said wireless device (WD) is dynamically synchronized or logged on in real time with at least one such said router node (RN) at any point in time.
  • the synchronization of the wireless device with the router nodes corresponds to the geographic location of the said wireless devices (WD) with respect to the said installed router nodes (RN) location.
  • the said plurality of router nodes (RN) also communicate among themselves based on the partial P2P routing logic through a packet switching network like the internet.
  • the said P2P routing logic is obtained by the said router nodes (RN) from a central hub (CH) which is in communication with the said router nodes (RN).
  • the said central hub (CH) manages and oversees the execution of communication requests by the said subscribers of the said cellular wireless intranet and thus facilitates a high speed wireless local network link for the said subscribers.
  • the wireless devices (WD) as illustrated in figure 2 can be inexpensive portable handsets which can be allotted on a very minimal subscription service by the service provider of the proposed communication network.
  • the said subscription can be implemented by using the Handset Identification Number (HID) of the said portable handset.
  • the said HID is unique for each wireless device and is embedded in the same. This identifies the said subscriber on the high speed local wireless network.
  • the said wireless device (WD) too has an embedded handset identification number (HID) which is unique for each said wireless device
  • the said HID is basically the end product of random number generator again embedded in the said wireless device's (WD) firmware and can be treated as the private encryption key unique for each subscriber's wireless device (WD).
  • This said device's firmware is also configured to enable the said wireless device (WD) into entering a secure mode where a password protection is attached to the packets to be sent over the said local fast wireless network, but before they are transmitted over the said local link the said packets are encrypted with the said private encryption key.
  • router nodes which comprises of compatible transceivers along with primary authentication means resident on base station towers normally used for cellular telephony.
  • the said compatible transceivers are further in sync with dynamically updated look up and look ahead databases and account logs of the said subscribers resident on the said central hub (CH).
  • This is implemented using cloud computing as a data center (DC) which in turn comprises of a virtual web server (WS).
  • DC data center
  • WS virtual web server
  • the said virtual web server (WS) also maintains a list of public encryption keys, each key unique and tagged with the said unique "HID" of each wireless device (WD) present in its area of coverage at that instant to authenticate, register, manage and serve the said subscriber's communication requests.
  • the said web server (WS) functions as a virtual extended EPABX.
  • the said wireless device logic comprising of said firmware is implemented on an existing cellular handset of a subscriber by incorporating an adapter circuit on the motherboard of the said cellular handset.
  • This incorporation makes the said cellular handset compatible with the novel interface standard of the proposed network.
  • the compatible transceivers along with the corresponding local authentication means are installed on existing base station towers used for cellular telephony.
  • the said wireless device (WD) logic incorporated in the said cellular handset is a logical client in this setup and remains in sleep mode until awakened either by the said web server (WS) or when the subscriber initiates communication which pertains to the novel interface of the instant invention.
  • This process of initiating is applicable only for said cellular handset (WD) which are dynamically registered with the corresponding router node resident on the said cell tower.
  • This wakeup call constitutes the said unique HID of the requesting said wireless device (WD) superimposed on the application layer of the said novel session setup protocol to be sent over the said local wireless link to the transceiver block of the said cell tower.
  • the said router node (RN) authenticates the said received HID and initiates the said central hub (CH) to look up for the said wireless device's (WD) unique HID from its real time updated databases. It further generates a session exclusive temporary public key unique for each wireless device (WD). This is finally transmitted to the said corresponding cellular handset (WD).
  • This whole dual encryption is carried out in real time processing mode and is therefore foolproof against pattern based key cracking attacks making the whole system more secure.
  • the packets that are sent over the said local high speed network contain the said temporary public key allocated by the said web server (WS) to the said wireless device (WD) which has initiated this session and is valid for that session only plus his unique subscription number along with the number of the said destination he wishes to communicate with and finally the said message content for which the encryption process has been described above.
  • the said called wireless device (WD2) If the said called wireless device (WD2) is not in the logical active state, its said corresponding tower again undertakes the above described sequence of initiating the said called wireless device (WD2) into a logical active state and allocating a temporary public key which is unique to the said called wireless device (WD2). Moreover, the said temporary unique public key is valid for that session only.
  • the router node resident on the said corresponding tower then encrypts the said received contents and the said unique subscription number of the said calling device (WDl) with the said generated temporary public key of the called device and finally transmits this to the said called wireless device (WD2).
  • the said called wireless device (WD2) upon reception of the said content replies to its said corresponding server with its encrypted content generated by undergoing similar process undertaken by the said calling wireless device (WDl) took while initiating this communication session over the said similar local wireless link.
  • the said web server(WS) from figure acts as a server gateway (SG) as shown in figure 4.
  • the said server gateway (SG) receives the encrypted communication content and the number of the called party, the said encryption done using allotted said temporary session public key unique for the said wireless device (WD).
  • the said server gateway (SG) further decrypts the said encrypted content with the corresponding unique decryption key from its said dynamic database of said keys.
  • a reserved number from the said server gateway maintained database is allocated to the said decrypted content after matching of its internal unique subscriber number with the available external identification numbers.
  • the said server gateway acts as a proxy destination for the called wireless device (WD) and thus receives the message contents intended for the said called wireless device (WD).
  • the server gateway then verifies the account details of the said called wireless device (WD). It further determines the current location and consequently the unique
  • the said central hub (CH) then enables the routing of the said content to the desired tower on the corresponding said router node (RN).
  • the said routing node (RN) resident on the said tower sets up a session with the said called wireless device (WD) and after receiving the said unique private encryption key (HID) from the same generates a corresponding temporary public encryption key (PK) unique for the said called wireless device (WD) and valid for that session only.
  • the said intended message contents and the number of the calling party are encrypted with the said unique public key (HID) and sent over the said local wireless link to complete a communication link between the said calling party and the said called party.
  • the above described invention can be extended to the legacy infrastructure like the POTS (Plain Old Telephone System) as shown in Figure 5 by attaching a router (R) to an analog landline handset (HS) and linking the said handset (HS) with a web server means (WS) using the existing PSTN to create a virtual intranet.
  • the said router comprises of routing device (RD) with a mini server embedded in it.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un système de réseau de communication sécurisé qui permet à l'abonné d'être indépendant de l'ordinateur compatible VoIP et une connexion Internet partagée ou dédiée de manière à satisfaire à des besoins de communication alternée rentable. Le système rend également l'abonné mobile indépendant d'un téléphone portable compatible VoIP de pointe, ainsi que de frais d'abonnement onéreux, ce qui permet de surmonter la limitation de la couverture. Pour ce faire, on fournit un service VoIP semblable à un intranet virtuel mais doté d'une sécurité de bout en bout. L'invention utilise un environnement informatique en nuage associé à un routage P2P.
PCT/IB2010/050889 2009-03-02 2010-03-02 Système de réseau de communication sécurisé et procédé rentable de communication sur celui-ci WO2010100602A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN448/CHE/2009 2009-03-02
IN448CH2009 2009-03-02

Publications (2)

Publication Number Publication Date
WO2010100602A2 true WO2010100602A2 (fr) 2010-09-10
WO2010100602A3 WO2010100602A3 (fr) 2012-09-07

Family

ID=42710063

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2010/050889 WO2010100602A2 (fr) 2009-03-02 2010-03-02 Système de réseau de communication sécurisé et procédé rentable de communication sur celui-ci

Country Status (1)

Country Link
WO (1) WO2010100602A2 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013097457A1 (fr) * 2011-12-29 2013-07-04 华为技术有限公司 Procédé, dispositif et système pour réaliser un appel voip dans un environnement infonuagique
TWI513269B (zh) * 2012-09-06 2015-12-11 Nen Fu Huang 通訊方法及其系統

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005009019A2 (fr) * 2003-07-16 2005-01-27 Skype Limited Systeme telephonique poste a poste
US20070286100A1 (en) * 2006-06-09 2007-12-13 Mika Juhani Saaranen Local discovery of mobile network services
US20080076409A1 (en) * 2006-08-31 2008-03-27 Skype Limited Wireless device for voice communication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005009019A2 (fr) * 2003-07-16 2005-01-27 Skype Limited Systeme telephonique poste a poste
US20070286100A1 (en) * 2006-06-09 2007-12-13 Mika Juhani Saaranen Local discovery of mobile network services
US20080076409A1 (en) * 2006-08-31 2008-03-27 Skype Limited Wireless device for voice communication

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013097457A1 (fr) * 2011-12-29 2013-07-04 华为技术有限公司 Procédé, dispositif et système pour réaliser un appel voip dans un environnement infonuagique
US9602553B2 (en) 2011-12-29 2017-03-21 Huawei Technologies Co., Ltd. Method, apparatus, and system for implementing VOIP call in cloud computing environment
TWI513269B (zh) * 2012-09-06 2015-12-11 Nen Fu Huang 通訊方法及其系統

Also Published As

Publication number Publication date
WO2010100602A3 (fr) 2012-09-07

Similar Documents

Publication Publication Date Title
US11546384B2 (en) Obtaining services through a local network
CA2453069C (fr) Procedes, appareils et systemes d'acces a des reseaux de telephonie mobile et voix sur ip a l'aide d'un combine mobile
US6757823B1 (en) System and method for enabling secure connections for H.323 VoIP calls
US8204044B2 (en) Method and network element for voice-over-IP (VoIP) communications in a mobile IP network
US7542455B2 (en) Unlicensed mobile access (UMA) communications using decentralized security gateway
US8040873B2 (en) Distributed integration of legacy PBX system with SIP networks
US7519075B2 (en) Method and system for serverless VoIP service in personal communication network
KR100735357B1 (ko) 이동통신 시스템의 가입자에게 사설 음성 호 서비스를제공하는 방법 및 시스템과 이를 위한 무선 소프트 스위치장치
US7652984B1 (en) Geographic redundancy and resource optimization for security gateways in wireless networks
JP2004530333A (ja) Ipテレフォニにおいてインテリジェントネットワーク制御サービスを提供するための方法およびシステム
EP2097829B1 (fr) Procédé et système pour gérer des dispositifs de communication
US20080137644A1 (en) METHODS AND APPARATUS TO PROVIDE VOICE OVER INTERNET PROTOCOL (VoIP) SERVICES
WO2007010541A8 (fr) Reseau voip evolue
EP1536621B1 (fr) Portabilité de numéros de terminal dans un réseau de télécommunications IP
KR20050012845A (ko) 무선랜을 무선 전화 네트워크와 상호 연동하기 위한 기술
WO2010100602A2 (fr) Système de réseau de communication sécurisé et procédé rentable de communication sur celui-ci
EP2223561A2 (fr) Procédé de mise à disposition de stations mobiles et communications sans fil avec des stations mobiles situées dans des femtocellules
KR100398658B1 (ko) 이동전화망에서의 개인 컴퓨터와 이동전화 단말기간의화상전화 서비스 제공 장치 및 그 방법
JP2004032505A (ja) 通信システム
KR100493100B1 (ko) 이동통신 시스템에서 인터넷기반 음성서비스 제공 장치 및방법
TW201029436A (en) Methods and arrangement for supporting multiple calls with a single carrier connection

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10748405

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10748405

Country of ref document: EP

Kind code of ref document: A2