WO2012091528A2 - Terminal et procédé de sélection de point d'accès (ap) fiable - Google Patents

Terminal et procédé de sélection de point d'accès (ap) fiable Download PDF

Info

Publication number
WO2012091528A2
WO2012091528A2 PCT/KR2011/010407 KR2011010407W WO2012091528A2 WO 2012091528 A2 WO2012091528 A2 WO 2012091528A2 KR 2011010407 W KR2011010407 W KR 2011010407W WO 2012091528 A2 WO2012091528 A2 WO 2012091528A2
Authority
WO
WIPO (PCT)
Prior art keywords
reliability
aps
terminal
calculator
packets
Prior art date
Application number
PCT/KR2011/010407
Other languages
English (en)
Korean (ko)
Other versions
WO2012091528A3 (fr
Inventor
정현철
Original Assignee
(주)노르마
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020110108660A external-priority patent/KR20130044545A/ko
Application filed by (주)노르마 filed Critical (주)노르마
Publication of WO2012091528A2 publication Critical patent/WO2012091528A2/fr
Publication of WO2012091528A3 publication Critical patent/WO2012091528A3/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/102Route integrity, e.g. using trusted paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point

Definitions

  • the present invention relates to a terminal and a method for selecting a reliable AP.
  • 3G is a communication method for providing a wireless Internet service through a base station
  • Wi-Fi is a communication method for providing a wireless Internet service using an access point (hereinafter, also referred to as an 'AP').
  • Portable terminals such as smartphones and tablet PCs can use wireless Internet services using 3G or Wi-Fi, regardless of time and place.
  • the user when the user uses 3G, the user must pay a fee, and when using the Wi-Fi, the user can use the Internet for free.
  • Wi-Fi services have been provided in open environments such as many public places.
  • the Internet by 3G is safe in terms of security, but the Internet by Wi-Fi uses the AP by using the AP, so the reliability of the portable terminal is low.
  • a terminal and method are provided that can calculate a reliability for a plurality of APs, respectively, to inform a user that an AP with a lower reliability is more likely to be an attacker.
  • a program is written that enables a terminal to calculate the reliability of a plurality of APs, respectively, to inform the user that the less reliable APs are more likely to be attackers.
  • a recording medium Provided is a recording medium.
  • a method comprising: receiving packets from a plurality of APs providing a wireless communication service; Analyzing the received packets to calculate reliability of the plurality of APs; And displaying the calculated reliability and identification information of the plurality of APs.
  • a communication unit for receiving packets from a plurality of APs for providing a wireless communication service;
  • a reliability calculator configured to calculate the reliability of the plurality of APs by analyzing the received packets;
  • a display unit which displays a reliability screen showing the calculated reliability and identification information of the plurality of APs.
  • the user by calculating the respective reliability of the plurality of APs in the vicinity and notifying the user of the portable terminal, the user can prevent the leakage of personal information in advance. have.
  • FIG. 1 is a diagram showing a wireless communication system including a portable terminal according to an embodiment of the present invention
  • FIG. 2 is a block diagram illustrating a first portable terminal 100 according to an embodiment of the present invention shown in FIG. 1.
  • FIG. 3 is a flowchart illustrating a method of providing reliable AP information to a portable terminal according to an embodiment of the present invention
  • step S330 of FIG. 3 is a flowchart for explaining step S330 of FIG. 3 in detail;
  • FIG. 5 is a block diagram illustrating the operation of a portable terminal according to an embodiment of the present invention.
  • FIG. 6 is a block diagram showing a terminal 200 according to another embodiment of the present invention.
  • FIG. 7 is a block diagram illustrating a terminal 300 according to another embodiment of the present invention.
  • Reliability calculator 307 OS
  • the portable terminal is an example, and thus, the inventive concept is not limited to the portable terminal. It will be appreciated by those skilled in the art to which the inventive concept pertains that the inventive concept may be applied even when a fixed computer terminal such as a desktop is in wireless communication.
  • the attacker terminal and the Fake AP will be used interchangeably unless there is a particular advantage.
  • FIG. 1 is a diagram illustrating a wireless communication system including a portable terminal having a firewall according to an embodiment of the present invention.
  • a wireless communication system includes first to third access points (APs) 10, 20, and 30 and first to fourth portable terminals 100, 110, 120, and 130.
  • APs access points
  • portable terminals 100, 110, 120, and 130.
  • the number of APs or the number of portable terminals are exemplary, and those skilled in the art can understand that the inventive concept is not limited to such numbers.
  • the first to third APs 10, 20, and 30 are devices for providing a wireless communication service to terminals located in a short distance, and may include a wired or wireless router (hereinafter, 'wireless router').
  • the first to third APs 10, 20, and 30 broadcast packets indicating their presence providing wireless communication service, respectively.
  • the header of each broadcasted packet includes a MAC address and a SSID (Service Set Identifier).
  • the MAC address is a unique address assigned to the first to third APs 10, 20, and 30 for wireless communication
  • the SSID is a WLAN provided by the first to third APs 10, 20, and 30. Name of the service.
  • the SSID can be the same or different between the access points. Examples of SSIDs common in Korea may be iptime, u + zone, myLGnet .. and so on.
  • the first and second portable terminals 100 and 130 may provide various functions such as voice call, Internet information search, transmission / reception of data by wired / wireless communication, fax transmission, and schedule management, and are equipped with an operating system such as a personal computer. There may be, for example, a smartphone.
  • the third and fourth portable terminals 120 and 140 may be tablet PCs, for example.
  • an AP is an entity that connects a wireless medium with a wired network such as IEEE 802.3.
  • the AP serves as a base station for a wireless local area network (WLAN) device and connects a WLAN device to a wired network such as a LAN. I can let you. This type of internet connection is often called Wi-Fi.
  • the AP serves as a router, the AP supports a plurality of portable terminals to use the Internet.
  • Wi-Fi internet service is provided free of charge in public places such as libraries, companies, and cafes.
  • the first to third APs 10, 20, and 30 are installed, the first to fourth portable terminals 100, 110, 120, and 130 are the first to third APs. (10, 20, 30) receives the broadcast packets to indicate the signal strength and SSID for each AP.
  • the user may select an AP with high reliability from among the APs displayed by the portable terminal and access the selected AP.
  • low-trust APs are APs having different SSIDs, and APs having the same MAC address are low-trust APs.
  • each MAC address must always be different.
  • Another example of low reliability APs are APs with different SSIDs and MAC addresses, and if the received signal sensitivities of packets received by the mobile terminal from these APs are completely the same, then those APs are low reliability APs, Most likely an attacker's terminal. This takes into account the case where an attacker terminal broadcasts packets with different SSIDs and MAC addresses at fixed locations.
  • FIG. 2 is a block diagram illustrating a first portable terminal 100 according to an embodiment of the present invention shown in FIG. 1.
  • the first portable terminal 100 may include an input / output unit 110, a storage unit 120, a communication unit 130, a reliability calculator 140, and a controller 150.
  • the input / output unit 110 may be implemented as, for example, a touch screen and is responsible for input or output interfacing between the user and the first portable terminal 100.
  • the user may use or receive a function provided by the first portable terminal 100 through the input / output unit 110.
  • the input / output unit 110 is configured as a touch screen, the user may select a desired icon among the function icons displayed by the input / output unit 100 by a touch method.
  • the input / output unit 100 may include a display unit 112 and an input unit 114.
  • the display unit 112 may display a screen indicating a current state of the first portable terminal 100
  • the input unit 114 may be configured as a touch panel or an operation panel, and input a command from a user through these panels. I can receive it.
  • the touch screen using the touch method is mainly described, but it may also be configured as a display panel such as a light emitting diode (LED), a liquid crystal display (LCD), an input device such as a keyboard or a mouse.
  • LED light emitting diode
  • LCD liquid crystal display
  • an input device such as a keyboard or a mouse.
  • the storage unit 120 performs operations of the first portable terminal 100 with programs such as a control program, an operating system, an application, a driver for driving a hardware, and / or an operating system required for driving the first portable terminal 100. It can store data necessary for and data generated during operation.
  • the application may be downloaded through a network and installed in portable terminals.
  • the storage unit 140 means a recording medium capable of temporarily or permanently storing data and / or programs. Although one storage unit 140 is illustrated in this embodiment, this is for ease of explanation of the inventive concept, and those skilled in the art to which the inventive concept belongs may form the storage unit 140 in various forms ( For example, RAM, ROM, hard disk, etc. can be implemented in various numbers.
  • the communication unit 130 may communicate with a base station (not shown) for a telephone, and may communicate with an AP for a wireless communication service such as the Internet. To this end, the communication unit 130 may be implemented as a module having a complex function. The communication unit 130 may receive packets broadcast by the APs under the control of the controller 150 in the vicinity of the place where the portable terminal is currently located.
  • the communication unit 130 may receive packets broadcast by the first to third APs 10, 20, and 30.
  • the reliability calculator 140 may analyze the packets received by the communicator 130 to calculate the reliability.
  • the reliability calculator 140 may calculate the reliability of each AP by analyzing packets received from the first to third APs 10, 20, and 30.
  • the reliability is an index indicating the degree of safety of the first to third APs (10, 20, 30).
  • Each packet of the first to third APs 10, 20, and 30 may include data such as an SSID, a MAC address, a received signal sensitivity, and a timestamp of each of the packets 10, 20, and 30.
  • the reliability calculator 140 may determine the reliability by applying a data mining technique to at least two pieces of data included in the packet, for example. Data mining is the process of discovering useful correlations hidden in data, extracting actionable information in the future and using it to make decisions.
  • the reliability calculator 140 analyzes packets of neighboring APs to determine whether or not it corresponds to a first situation (when SSIDs are different but MAC addresses are the same), and calculates reliability.
  • the reliability calculator 140 analyzes the MAC address and the SSID included in the packets received from the first to third APs 10, 20, and 30, and then the first to third APs 10. , 20 and 30 can be calculated for each of the reliability.
  • the reliability calculator 140 may detect APs having different SSIDs and having the same MAC address among the first to third APs 10, 20, and 30.
  • the reliability calculator 140 may determine the reliability of the first AP 10 and the third AP 30. May be lower than that of the second AP 20.
  • the reliability calculator 140 may calculate a low reliability of APs determined to have a high probability of being an attacker terminal.
  • the reliability calculator 140 analyzes packets of neighboring APs to determine whether or not it corresponds to a second situation (when the SSID and MAC address are different and the received signal strengths are the same or similar to each other). Can be calculated.
  • the reliability calculator 140 may find an attacker terminal by checking signal strengths of packets broadcast from APs. This is because there may be an attacker terminal among APs having different SSIDs and MAC addresses.
  • the reliability calculator 140 determines whether the received signal strengths of the packets received from the APs are the same or similar, and according to the same or similar degree of the signal strength, the reliability calculator 140 determines each of the APs transmitting the packets. Can calculate the reliability.
  • the reliability calculator 140 may determine the reliability of the first AP 10 and the third AP 30. May be lower than that of the second AP 20. To this end, the reliability calculator 140 may additionally classify the received signal strengths of the APs to a minute degree.
  • the operation of comparing the signal strength of the AP has been described as performed by the reliability calculator 140, but this is merely an example of comparing the signal strength of the AP, not the reliability calculator 140. It is also possible to provide components.
  • the operation of comparing the signal strengths of the APs may be performed by, for example, squaring a signal of each AP for a predetermined time domain and comparing the square values with each other.
  • this method is exemplary and it would be possible to use other known algorithms to compare the signal strength of the AP.
  • the reliability calculator 140 may calculate the reliability by analyzing packets of neighboring APs to determine whether the packet corresponds to a third situation (when the same MAC address and the received signal sensitivity are the same). .
  • the reliability calculator 140 detects packets having the same MAC address among the MAC addresses included in the packets received from the first to third APs 10, 20, and 30, and detects the detected packets.
  • APs having the same received signal strength may calculate low reliability. This is because it is most likely an attacker's terminal.
  • the reliability calculator 140 may calculate the reliability of the first AP 10 and the second AP 30 to be lower than that of the second AP 20.
  • the reliability calculator 140 may calculate the reliability by analyzing packets of neighboring APs to determine whether the packet corresponds to the fourth situation (when the SSIDs are different but the received signal strengths are the same).
  • the reliability calculator 140 considers the SSID and the received signal strength included in the packets received from the first to third APs 10, 20, 30, and the first to third APs 10, 10. 20, 30) each reliability can be calculated. That is, APs having different SSIDs but having the same signal strength may yield low reliability.
  • the reliability calculator 140 may calculate the reliability by analyzing packets of neighboring APs to determine whether the packet corresponds to the fifth situation (when there is a MAC address not included in the manufacturer).
  • the reliability calculator 140 analyzes MAC addresses included in packets received from the first to third APs 10, 20, and 30, and selects an AP having a MAC address without a manufacturer. For, the reliability is low. Since manufacturers are releasing OIDs recently, the reliability calculator 140 may select an AP for which a manufacturer does not exist by comparing the OID included in the MAC address with the OID published by the manufacturer. The reliability calculator 140 calculates a low reliability of the selected AP.
  • a server for storing the OID disclosed by the manufacturer may be provided separately, and the first portable terminal 100 may download the manufacturer's OID from the server storing the OID and store the OID in the storage unit 120. Can be.
  • the reliability calculator 140 may calculate reliability by analyzing packets of neighboring APs, determining whether the packet corresponds to the sixth situation (in the case of a portable AP).
  • the reliability calculator 140 may analyze the MAC addresses included in the packets received from the APs 10, 20, and 30, select the portable AP, and calculate a low reliability for the portable AP. .
  • the identification of the portable AP among the APs 10, 20, and 30 may be distinguished by a MAC address.
  • the MAC address usually includes information indicating the manufacturer, and such information can be used to select whether or not it is a portable AP.
  • the storage unit 120 may store information on the AP manufacturer list.
  • the list of AP manufacturers is a list of each AP manufacturer and indicates whether only a portable AP or a portable AP is not produced for each AP manufacturer.
  • the MAC address is AA: BB: CC: DD: EE: EF
  • the AA: BB: CC part is often called an Organizationally Unique Identifier (OUI) as information for identifying a manufacturer.
  • UAI Organizationally Unique Identifier
  • the reliability calculator 140 may calculate the reliability by analyzing packets of neighboring APs and determining whether the packet corresponds to the seventh situation (when a 3G network or a 4G network is used as a back end).
  • the reliability calculator 140 may select an AP using a 3G network or a 4G network as a back end, and calculates a low reliability of the selected AP.
  • APs use Ethernet at the back end, and there are often APs using 3G or 4G networks.
  • 3G network or 4G network is used in the back end, the cost is high and the communication speed is low, and there is no reason to use the 3G network or the 4G network. Therefore, APs using 3G or 4G networks in the back end are likely to be attackers.
  • the reliability calculator 140 calculates low reliability of APs using 3G or 4G networks.
  • a method of selecting APs using 3G or 4G networks may include, for example, the following methods.
  • the reliability calculator 140 may determine whether the AP uses a 3G network or a 4G network for the back end by finding a routing path path. For example, the reliability calculator 140 may determine a routing path path using the ICMP protocol.
  • the reliability calculator 140 may directly determine the routing path path.
  • the reliability calculator 140 calls the operating system 0S of the terminal 100 so that the operating system 0S determines the routing path path. You can find out.
  • the operating system finds a routing path path using the ICMP (Internet Control Message Protocol) protocol, it notifies the reliability calculator 140 of the result.
  • ICMP Internet Control Message Protocol
  • the operating system 0S may be stored in the storage 120 or another storage not shown, and may be loaded and operated in a memory (not shown).
  • FIG. 5 is a block diagram illustrating an operation of a portable terminal according to an embodiment of the present invention. Referring to FIG. 5, a method of determining a routing path path using an ICMP protocol will be described.
  • the AP informs its IP address, and routers R1 and R2 connected to the AP also inform their terminal 100 of their IP address.
  • the gateway also informs the terminal 100 of its IP address, the terminal 100 can know whether the 3G network or 4G network is used in the back end when referring to the IP address of the gateway.
  • the method of selecting APs using the above-described 3G network or 4G network at the back end stage is exemplary, and the present invention is not limited only to such a method.
  • the reliability calculator 140 may determine whether the APs correspond to the eighth situation (when the routing path is different) and calculate the reliability.
  • the reliability calculator 140 may select an AP having a routing path different from the previously stored routing path, and calculate a low reliability for the AP.
  • the storage unit 120 may store a routing path for each AP. The terminal 100 can find out the routing path using the ICMP protocol as described above.
  • the reliability calculator 140 may determine whether or not the APs correspond to a ninth situation (when both the SSID and the routing path are the same or when the SSID and the authentication algorithm and the routing path are the same). Can be.
  • Certain types of terminals have terminals that have a function of automatically accessing an AP once connected.
  • the terminal searches for APs around an asset (terminal) to find accessible APs. And, among the APs found, the AP that the UE (the terminal) has accessed in the past and i) both SSIDs are the same, or ii) if both SSIDs are the same and the authentication algorithm is the same, whether the AP is connected to the terminal user. It automatically connects to the AP that was connected in the past without asking. This loophole can be used by the Fake AP.
  • the terminal 100 stores at least two hops of routing paths to each of the APs that have been connected in the past in order to select such a Fake AP.
  • the storage unit 120 may store at least two hops of routing paths for each of the APs.
  • the terminal according to the present embodiment stores the SSID and the authentication algorithm for each of the APs connected in the storage unit 120.
  • the terminal 100 checks the SSIDs and authentication algorithms of the scanned APs.
  • the SSIDs of the APs connected in the past stored in the storage 120 and the authentication algorithm are compared.
  • the terminal 100 has the same SSID as the i) SSID of the AP (hereinafter, referred to as an 'accessible AP') that has been accessed in the past, or ii )
  • an AP corresponding to i) or ii) is called 'i) ii) _AP'.
  • the terminal 100 checks a routing path with respect to 'i) ii) _AP'. Do this.
  • the terminal 100 checks whether the routing path of 'i) ii) _AP' and the routing path of the 'connected AP' stored in the storage 120 are the same, and if the two are not the same, i) ii) _AP 'is treated as a Fake AP to calculate a low reliability value.
  • the operation of comparing the SSID and the authentication algorithm and confirming the routing path may be directly performed by the reliability calculator 140.
  • the reliability calculation unit 140 calls the operating system of the terminal 100 to find out the routing path of 'i) ii) _AP', and the operating system finds the routing path of 'i) ii) _AP' The calculating unit 140 may be informed.
  • the reliability calculator 140 or the operating system may store the SSID, the authentication algorithm, and the routing path of the connected AP in the storage unit 120 each time the AP is connected to the AP.
  • the SSID, the authentication algorithm, and the routing path of the accessed AP have been described as being stored in the storage unit 120, but may be separately stored in other storage units (not shown).
  • another storage unit (not shown) is a device that the terminal 100 has or is connected to the terminal 100 through communication (for example, a device for providing a storage device through a network, such as a cloud server or a web hard, etc.). May be).
  • the reliability calculator 140 may determine whether or not the APs correspond to a tenth situation (when it corresponds to a predetermined encryption order) and calculate reliability.
  • the reliability calculator 140 may determine the reliability value of each AP in consideration of the temporal change of the encryption method of the scanned APs.
  • the reliability calculator 140 may set a lower reliability value for the first AP. In other words, if the temporal change of the encryption method changes from strong to weak, the reliability value is calculated low.
  • the reliability calculation unit 140 maintains or calculates a higher reliability value if the temporal change of the encryption scheme is changed from a low degree of encryption to a strong one (for example, changed from OPEN to WPA).
  • the reliability calculator 140 may store the change of the encryption method for the APs scanned at the current location in a memory (not shown) of the terminal 100.
  • the reliability calculator 140 may determine whether the APs correspond to the tenth situation (when included in the blacklist or the whitelist) and calculate the reliability.
  • the storage unit 120 stores the black list and the white list for the SSID
  • the reliability calculator 140 may reflect the calculation of the reliability by using the list. For example, when the SSID of a specific AP is included in the black list, the reliability value can be calculated low. When the SSID of the specific AP is included in the white list, the reliability value can be calculated high.
  • the reliability calculator 140 may determine whether the APs correspond to an eleventh situation (with a hidden SSID) and calculate the reliability.
  • the reliability calculator 140 may determine whether or not the APs correspond to the twelfth situation (with a hidden SSID) and calculate the reliability.
  • the reliability calculator 140 may maintain or increase the reliability value without lowering the reliability value when the AP has the hidden SSID.
  • the reliability calculator 140 may calculate reliability by determining whether APs correspond to a thirteenth situation (when using the same channel).
  • the reliability calculator 140 may calculate the reliability of the APs as a whole lower.
  • APs use channels of a specific band, and since Fake APs are more likely to use channels of the same band, if there are very many APs using the same band of channels in a particular region, the same band is used. All APs that are mentioned will most likely be Fake APs.
  • the reliability calculator 140 may calculate reliability by determining whether APs correspond to a fourteenth situation (when the position change is greater than or equal to the reference number of times).
  • the reliability calculator 140 may reflect the calculation of the reliability value by referring to the location history of the APs over time. For example, the position value of each AP may be roughly calculated by the first portable terminal 100 and stored in the memory (not shown) or the storage unit 120 for each time zone. The reliability calculator 140 may set the AP having a lower reliability than the AP whose position does not change in consideration of the temporal position change of the APs.
  • the reliability calculator 140 may calculate reliability by determining whether APs correspond to a fifteenth situation (the MAC address corresponds to the address of a smartphone (or laptop) manufacturer).
  • the reliability calculator 140 checks whether the MAC address included in the packets received from the first to third APs 10, 20, and 30 is the MAC address of the smartphone (or notebook) manufacturer, and the smartphone. (Or laptop) If the manufacturer's MAC address, you can calculate a low reliability.
  • the reliability calculator 140 determines the reliability of the first AP 10 by the second AP 30 and the third AP. It can calculate lower than (20).
  • the reliability calculator 140 may calculate reliability in consideration of at least one or more of the first to fifteenth situations described above.
  • the reliability calculator 140 may calculate the reliability at the minimum without considering other situations. For example, since the AP corresponding to the first situation is almost likely to be an attacker, the reliability of the AP corresponding to the first situation can be calculated to be the lowest. For another example, the reliability may be calculated to the lowest in the AP included in the black list. On the other hand, the reliability of the AP included in the white list can be best calculated. In the inventive concept, a specific situation for calculating the lowest or highest reliability is determined in advance, and the reliability of the AP corresponding to such a situation is calculated at the lowest.
  • the reliability calculator 140 may calculate the reliability by applying a preset weight to each situation. For example, although the SSIDs of the first to third APs 10, 20, and 30 are all different, and the MAC addresses are all different, the first AP 10 and the second AP 20 have the same received signal strengths. Say you have it. Although the SSID and the MAC address are different from each other, the same received signal sensitivity may indicate that a packet is broadcast from the same location, and the first AP 10 and the second AP may be attacker terminals.
  • the reliability calculator 140 may calculate the reliability of the first AP 10 and the second AP 20 to be lower than the reliability of the third AP 30.
  • the method of calculating the reliability by the reliability calculator 140 may be one of the following, for example.
  • the reliability is divided into grades such as 'up', 'middle', and 'low' according to the first to fifteenth situations. For example, in the case of the first situation, the reliability is always calculated as 'not recommended' regardless of the other situation. In another example, if the second situation and the fifth situation, it is calculated as 'not recommended'. For another example, if none of the circumstances apply, the calculation is recommended. In this manner, a person belonging to the technical field of the present invention may be appropriately given a grade by combining the first to fifteenth situations.
  • the first to the fifteenth situation does not correspond to any situation Medium (usually) In case of the fourth situation only Down (not recommended, dangerous) In the first situation; in at least three or more of the first to fifteenth situations; in the blacklist in the tenth situation;
  • Table 1 is an example, and is provided by way of example only for a few situations for ease of understanding.
  • the reliability calculator 140 determines which of the first to fifteenth situations corresponds to the APs scanned around the location where the terminal 100 is located, and for each situation as shown in Table 1 above. Reliability can be calculated by referring to a table (depending on situation-reliability chart) that defines the reliability.
  • the reliability calculator 140 may calculate M using the following equation, and calculate the reliability with reference to Table 2 below.
  • Equation is considered only for the first to fourth situations, and X, Y, Z, and W are values corresponding to the first, second, third, and fourth situations, respectively.
  • A, B, C, and D are weights given to each situation.
  • A, B, C, D may be given, for example, 2, 1.5, 1.2, 1.7, respectively.
  • the controller 150 may control an operation of the first portable terminal 100 by using a control program, an operating system, and an application stored in the storage 120. For example, when the user selects one of the plurality of applications through the input unit 114, the controller 150 may drive the selected application and display the corresponding screen on the display unit 112.
  • the controller 150 controls the communication unit 130 to receive a packet from surrounding APs, for example, first to third APs 10, 20, and 30.
  • the reliability calculator 140 may be controlled to analyze the packets received by the communicator 130 to calculate reliability of the first to third APs 10, 20, and 30.
  • the controller 150 When the reliability is calculated by the reliability calculator 140, the controller 150 generates a screen showing the calculated reliability or recommendation and identification information (eg, SSID) of each AP, and displays the generated screen. 112 may be controlled to display. As a result, the user can easily distinguish a dangerous AP among the available first to third APs 10, 20, and 30, and can prevent a risk related to security.
  • the calculated reliability or recommendation and identification information eg, SSID
  • the controller 150 may be a 'risk' when the APs (eg, the first AP 10) using the same MAC address are found in the reliability calculator 140, a company in which the Mac manufacturer is known, for example.
  • the first AP 10 is designated as a smartphone and 'danger', in case of a MAC address not registered in the OUI standard, 'suspect', and when the MAC address is different but has the same signal sensitivity, A screen showing information may be generated and the generated screen may be displayed on the display unit 112.
  • the controller 150 When the reliability is calculated by the above-described method, and if the recommendation is determined, the controller 150 generates a screen showing the calculated reliability and recommendation and identification information (eg, SSID) of each AP, and generates the generated screen. Can be displayed on the display unit 112.
  • the calculated reliability and recommendation and identification information eg, SSID
  • control program, the operating system, and the application are all stored in the storage 120, but this is merely an example and may be stored in different separate storage units.
  • a storage unit for storing the control program and the operating system and a storage unit for storing the application may be separately provided.
  • control program, the operating system, and the application when operated, they may be loaded and operated in a volatile storage (not shown), such as a RAM. Since such techniques are well known, they will not be described in more detail.
  • FIG. 3 is a view for explaining a method of providing reliable AP information to a portable terminal according to an embodiment of the present invention.
  • the portable terminal performing the method for AP selection of FIG. 3 may be implemented in the form of an application and / or hardware installed in the first portable terminal 100 described with reference to FIG. 2 or the first portable terminal 100.
  • the first to third APs may broadcast at least one packet to inform their presence of providing a wireless communication service.
  • the portable terminal that is requested by the user for the search for the surrounding wireless signal may analyze the received packets to calculate the reliability of the first to third APs.
  • the portable terminal may determine whether to recommend the use of the first to third APs based on the reliability calculated in operation S330. For example, in the case of an AP having high reliability, the portable terminal may determine to recommend the use of the AP.
  • the portable terminal may display a list showing the reliability calculated in operation S330 and whether the recommendation determined in operation S340 is displayed together with the SSIDs of the first to third APs.
  • the portable terminal may request access from the selected target AP.
  • a target AP eg, the first AP
  • the first AP may transmit an IP (Internet Protocol) required for wireless connection to the portable terminal.
  • IP Internet Protocol
  • the portable terminal may provide a wireless Internet service using the received IP. Since a process of providing a wireless Internet service is a well-known technology, a detailed description thereof will be omitted.
  • FIG. 4 is a flowchart for describing operation S330 of FIG. 3 in detail.
  • step S410 the portable terminal can check the MAC address, SSID and the received signal sensitivity included in the received packets.
  • the portable terminal checks whether the same MAC address exists among the identified MAC addresses.
  • step S430 the portable terminal can determine whether to consider the received signal sensitivity further.
  • step S440 the portable terminal may check whether the same signal sensitivity exists among the received signal sensitivity of packets having the same MAC address identified in step S420.
  • the portable terminal calculates the reliability of the AP that transmits the packet having the same signal sensitivity among the packets having the same MAC address, that is, the first AP.
  • the reliability of the first AP may be calculated with the lowest value. This is because the packet has the same MAC address and the same signal sensitivity because a plurality of packets are broadcast from the first AP, and therefore, the first AP is likely to be an attacker terminal.
  • step S460 the portable terminal calculates the reliability of the AP that transmits packets having the same MAC address identified in step S420, that is, the first AP. .
  • the reliability of the first AP may be calculated with a low value. This is because the MAC addresses of the packets are the same because a plurality of packets are broadcast from the first AP, and therefore, the first AP is likely to be an attacker terminal.
  • step S470 the portable terminal can check whether the same signal sensitivity among the received signal sensitivity of the packets identified in step S410.
  • step S480 the portable terminal calculates the reliability of the first AP transmitting the packet having the same signal sensitivity among the packets having the same MAC address.
  • the reliability of the first AP may be calculated to be low. This is because even though the MAC address and SSID of the packets are not the same, the received signal sensitivity is the same because a plurality of packets are broadcast from the same first AP, and therefore, the first AP is likely to be an attacker terminal.
  • step S490 the portable terminal determines that the attacker terminal does not exist in the vicinity, calculates the reliability of all the first to third AP broadcast the packet do.
  • data and / or programs stored by the storage unit 120 may be separately stored in other storage units (not shown).
  • another storage unit is a device that the terminal 100 has or is connected to the terminal 100 through communication (for example, a device for providing a storage device through a network, such as a cloud server or a web hard, etc.). May be).
  • FIG. 6 is a block diagram illustrating a terminal 200 according to another embodiment of the present invention.
  • the terminal 200 may include a memory 203, a CPU 215, H / W resources 218, S / W resources 220, and an input / output unit 222. .
  • an application 205 and an operating system 207 for providing reliable AP information according to the inventive concept are loaded under the control of the CPU 215.
  • the H / W resources 218 and the S / W resources 220 refer to respective hardware resources and software resources required for the operation of the terminal 200, and in particular, these resources 218 and 220 may correspond to an application ( 205, hardware resources and software resources necessary for the operation of the operating system 207, the memory 203, and the CPU 215.
  • the operating system 207 is stored in a hard disk, which is one of the H / W resources 218, and when the terminal 200 is powered on, the operating system 207 is loaded and operated under the control of the CPU 215. Can be.
  • the application 205 may be stored in a hard disk, which is one of the H / W resources 218, and then loaded and operated in the memory 203 under the control of the CPU 215 at the user's request.
  • the application 205 may include an AP scanning unit 209 and a reliability calculator 211.
  • the AP scanning unit 209 collects AP packets existing around the terminal 200 and provides the SSID and the MAC address to the reliability calculator 211.
  • the AP scanning unit 209 may instruct the API 213 of the operating system 207 to collect AP packets existing around the terminal 200.
  • the API 213 directly or by calling other functions or procedures in the operating system 207 to perform the operation commanded by the AP scanning unit 209, and sends the result to the AP scanning unit 209. Or may be provided to the reliability calculator 211.
  • the operation of the reliability calculator 211 may perform an operation performed by the reliability calculator 240 of FIGS. 1 and 2.
  • the reliability calculator 140 performs an operation of finding a routing path path
  • the reliability calculator 211 may also perform an operation of finding a routing path path.
  • the reliability calculator 211 may call the API 213 to instruct the AP scanning unit 205 to find the routing path paths for the scanned APs. Based on such an instruction, the API 213 may directly find the routing path path, or call another function or procedure belonging to the operating system to find the routing path, and provide the result to the reliability calculator 211. do.
  • the application 205 may be configured to include a 'routing path path determining unit' (not shown) that finds a routing path path path instead of the reliability calculation unit 211. Do.
  • the 'routing path path determining unit' may find out the IP address or call the API 213 directly.
  • the reliability calculator 140 performs an operation of finding IP addresses of routers.
  • the reliability calculator 211 may also perform an operation of finding an IP address.
  • the reliability calculator 211 may call the API 213 to instruct the AP scanning unit 205 to find IP addresses of routers on a routing path for the scanned APs.
  • the API 213 may find out the IP address by itself or call another function or procedure belonging to the operating system based on such an instruction, and find out the IP address, and return the result to the reliability calculator 211. to provide.
  • the application 205 may be configured to include an 'IP address grasping unit' that finds an IP address instead of the reliability calculating unit 211 separately from the reliability calculating unit 211.
  • the 'IP address grasping unit' can find out the IP address by itself or by calling the API 213.
  • the application 205 may be downloaded from an external server through an internet network and stored in a hard disk which is one of the H / W resources 218.
  • the operating system 207 downloads the application 205 from the external server and stores it on the hard disk in an executable state, and when the executable state becomes the executable state, the operating system 207 provides an icon for operating the application 205 to the user through the input / output unit 222. I can display it.
  • the operating system 207 may provide the user with icons of applications executable in the terminal 200 on the screen, and the user may execute the application by selecting such an icon.
  • the application 205 may be executed by a user's command or automatically executed even if there is no user's command.
  • the application 205 may further include a component (not shown) for continuously storing the reliability calculated for the APs scanned by the AP scanning unit 209. That is, the reliability calculated by the reliability calculator 211 may map and store the reliability for each AP.
  • APs with high reliability are added to the white list described above, and APs with low reliability (down, not recommended, risk, etc.) are added to the black list described above. can do.
  • the H / W resources 218 may include a hard disk that stores an AP-reliability mapping DB in which reliability is mapped to AP.
  • the application 205 may send the AP-trust mapping DB to the external server periodically or upon request from the external server.
  • FIG. 7 is a block diagram illustrating a terminal 300 according to another embodiment of the present invention.
  • the terminal 300 may include a memory 303, a CPU 315, H / W resources 318, S / W resources 320, and an input / output unit 322. .
  • an application 305 and an operating system 307 for providing reliable AP information according to the inventive concept are loaded under the control of the CPU 315.
  • the H / W resources 318 and the S / W resources 320 refer to respective hardware resources and software resources required for the operation of the terminal 300, and in particular, these resources 318 and 320 may correspond to an application ( 305, the hardware resources and the software resources required for the operation of the operating system 307, the memory 303, and the CPU 315.
  • the application 305 differs only in that it includes a signal strength comparison unit 314 separately, and the rest are the same. Therefore, the operation of the signal strength comparison unit 314 will be mainly described, and description of the remaining components will be omitted. This is because they are functionally identical or similar to each other.
  • the operation of the reliability calculator 311 may perform an operation performed by the reliability calculator 140 of FIGS. 1 and 2. However, in the embodiment of FIG. 7, the operation of comparing the received signal strength of packets received from the APs scanned by the AP scanning unit 305 is not the reliability calculator 311 but the signal strength comparison unit 314. May be performed to provide the result to the reliability calculator 311.
  • the reliability calculator 311 may also perform an operation of finding a routing path path. For example, the reliability calculator 311 may call the API 313 to instruct the AP scanning unit 305 to find routing path paths for the scanned APs. Based on such an instruction, the API 313 may find out the routing path path directly or call another function or procedure belonging to the operating system to find the routing path, and provide the result to the reliability calculator 311. do.
  • the application 305 may be configured to include a 'routing path path determining unit' (not shown) that finds a routing path path path instead of the reliability calculation unit 311. Do.
  • the 'routing path path determining unit' may find out the IP address or call the API 313 directly.
  • the reliability calculator 140 performs an operation of finding IP addresses of routers
  • the reliability calculator 311 may also perform an operation of finding an IP address.
  • the reliability calculator 311 may call the API 313 to instruct the AP scanning unit 305 to find IP addresses of routers on a routing path for the scanned APs.
  • the API 313 may find out the IP address directly based on such an instruction, or call another function or procedure belonging to an operating system to find the IP address, and return the result to the reliability calculator 311. to provide.
  • the application 305 may be configured to include an 'IP address grasping unit' that finds an IP address instead of the reliability calculating unit 311 separately from the reliability calculating unit 311.
  • the 'IP address grasping unit' may find out the IP address by itself or by calling the API 313.
  • the application 305 may be downloaded from an external server through an internet network and stored in a hard disk which is one of the H / W resources 318.
  • the operating system 307 downloads the application 305 from the external server and stores it on the hard disk in an executable state, and when the executable state becomes the executable state, the operating system 307 provides an icon for operating the application 305 to the user through the input / output unit 322. I can display it.
  • the operating system 307 may provide a user with icons of applications executable in the terminal 300 on the screen, and the user may execute the application by selecting such an icon.
  • the application 305 may be executed by a user's command or automatically executed even if there is no user's command.
  • the application 305 may further include a component (not shown) that continuously stores the reliability calculated for the APs scanned by the AP scanning unit 309. That is, the reliability calculated by the reliability calculator 311 may map and store the reliability for each AP.
  • APs with high reliability are added to the white list described above, and APs with low reliability (down, not recommended, risk, etc.) are added to the black list described above. can do.
  • the H / W resources 318 may include a hard disk that stores an AP-reliability mapping DB in which reliability is mapped to AP.
  • the application 305 may transmit the AP-trust mapping DB to the external server periodically or upon request from the external server.
  • the external server receives the AP-confidence mapping DB from the user terminals, aggregates and stores it, stores the aggregated AP-reliability mapping DB, creates a white list and a black list, and then sends the white list and the black list to the user terminals. Send it.
  • Each reliability calculator installed in the user terminals may calculate the reliability using such lists.
  • the reliability calculation unit has been described as having both the operation of selecting the attacker terminal (or Fake AP) and the operation of calculating the reliability, which is exemplary and performs the operation of selecting the attacker terminal.
  • the component may be separately provided, and the reliability calculator may be configured to perform an operation for calculating reliability.
  • the present invention may be implemented as a program that enables the terminal 100 to execute all or at least some of the above-described methods.
  • the present invention may provide a computer-readable recording medium having stored thereon a program that enables the terminal 100 to execute all or at least some of the above-described methods.
  • a recording medium may be included in the terminal 100 or in a server connected to the terminal 100 via a network.
  • a server may be connected to the terminal to support the terminal to perform all or at least some of the methods described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un terminal et un procédé de sélection d'un point d'accès (AP) fiable. Le procédé de sélection d'un AP consiste : à recevoir une pluralité de paquets d'une pluralité d'AP qui fournissent un service de communication sans fil ; à analyser la pluralité de paquets reçus pour calculer des fiabilités en termes de sécurité pour la pluralité d'AP ; à afficher les fiabilités ainsi calculées et les informations d'identification pour la pluralité d'AP.
PCT/KR2011/010407 2010-12-30 2011-12-30 Terminal et procédé de sélection de point d'accès (ap) fiable WO2012091528A2 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR20100138873 2010-12-30
KR10-2010-0138873 2010-12-30
KR10-2011-0108660 2011-10-24
KR1020110108660A KR20130044545A (ko) 2011-10-24 2011-10-24 방화벽을 가진 휴대용 단말기 및 방법

Publications (2)

Publication Number Publication Date
WO2012091528A2 true WO2012091528A2 (fr) 2012-07-05
WO2012091528A3 WO2012091528A3 (fr) 2012-11-08

Family

ID=46383779

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2011/010407 WO2012091528A2 (fr) 2010-12-30 2011-12-30 Terminal et procédé de sélection de point d'accès (ap) fiable

Country Status (2)

Country Link
KR (2) KR20120078654A (fr)
WO (1) WO2012091528A2 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108834047A (zh) * 2018-06-08 2018-11-16 武汉理工大学 一种路径损耗模型的ap选择室内定位方法

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101429178B1 (ko) * 2013-03-05 2014-08-12 유넷시스템주식회사 무선 네트워크 보안 시스템 및 방법
KR101714528B1 (ko) * 2016-01-04 2017-03-09 현대자동차주식회사 무선 통신 서비스를 제공하는 차량 및 그 제어방법
CN105828456B (zh) * 2016-02-04 2019-06-07 维沃移动通信有限公司 一种建立无线连接的方法、装置及无线接入点设备
KR101895766B1 (ko) * 2016-03-15 2018-09-07 (주)제이엠피시스템 와이파이의 통신 품질 제공 사용자 단말기, 방법, 애플리케이션 및 통신 품질 확인 장치
KR101881255B1 (ko) * 2017-05-29 2018-07-24 한국시스템보증(주) 무선 근거리 통신망의 ap 접속 처리 장치 및 방법
KR102366304B1 (ko) 2020-05-11 2022-02-23 (주)노르마 페이크 디바이스 탐지 방법 및 무선 디바이스 케어 장치
KR102357368B1 (ko) * 2020-08-10 2022-02-07 주식회사 엘지유플러스 미디어 출력 기기에서 Wi-Fi 접속을 용이하게 하는 방법 및 장치

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4833779B2 (ja) * 2006-09-13 2011-12-07 株式会社リコー 無線lan機器

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SUMAN JANA ET AL.: 'On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews' IEEE TRANSACTIONS OF MOBILE COMPUTING vol. 9, no. 3, 2010, *
XIAO QIANG PENG ET AL.: 'The intrusion Detection System design in WLAN based on Rogue AP' 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY. vol. 3, 2010, NEW YORK, *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108834047A (zh) * 2018-06-08 2018-11-16 武汉理工大学 一种路径损耗模型的ap选择室内定位方法
CN108834047B (zh) * 2018-06-08 2020-09-15 武汉理工大学 一种路径损耗模型的ap选择室内定位方法

Also Published As

Publication number Publication date
KR101563213B1 (ko) 2015-10-26
KR20130079274A (ko) 2013-07-10
KR20120078654A (ko) 2012-07-10
WO2012091528A3 (fr) 2012-11-08

Similar Documents

Publication Publication Date Title
WO2012091529A2 (fr) Terminal
WO2012091528A2 (fr) Terminal et procédé de sélection de point d'accès (ap) fiable
WO2014200240A1 (fr) Procédé et appareil d'enregistrement de dispositif sans fil dans un système de communication sans fil
WO2011062404A2 (fr) Procédé et dispositif d'examen de service d'affichage wi-fi dans un réseau direct wi-fi
WO2015016627A1 (fr) Procédé et dispositif permettant de connecter un seul dispositif ap parmi de multiples dispositifs ap dans le même réseau sur un terminal
WO2015016604A1 (fr) Appareil domestique et procédé de commande de celui-ci
WO2016047983A1 (fr) Procédé et dispositif pour une communication sans fil entre des terminaux de communication
WO2017030399A1 (fr) Procédé et appareil d'accès d'ue
WO2011087210A2 (fr) Dispositif électronique et procédé de fonctionnement associé
WO2016039576A2 (fr) Dispositif et procédé d'accès à une pluralité de réseaux dans un système de communications sans fil
WO2020122638A1 (fr) Dispositif mobile et dispositif électronique pour la communication sans fil, et procédés de commande de ceux-ci
WO2015157942A1 (fr) Dispositif et procédé d'accès à un réseau sans fil
WO2013073784A1 (fr) Appareil et procédé de prise en charge de service pour la transmission simultanée de données sur la base de multiples réseaux
WO2014065632A1 (fr) Procédé et dispositif pour gérer une clé de sécurité pour une authentification de communication d'une station d'abonné utilisée dans une communication coopérative de multiples stations de base dans un système de communication radio
WO2021261728A1 (fr) Dispositif de communication sécurisée pour une fournir une fonction sécurisée multifonctions, et procédé de fonctionnement associé
WO2016068654A1 (fr) Appareil de terminal utilisateur, système, appareil électronique et son procédé de commande
WO2019235813A1 (fr) Dispositif électronique prenant en charge de multiples protocoles de communication sans fil et son procédé
WO2014112851A1 (fr) Procédé et appareil pour contrôler la sélection d'un point d'accès de réseau lan sans fil d'un équipement d'utilisateur dans un système de communications sans fil
WO2021045598A1 (fr) Procédé et système de sélection et de resélection de cellule avec priorisation
WO2019182342A1 (fr) Procédé et dispositif d'authentification de dispositif au moyen d'un service de réseau lan sans fil
WO2019139421A1 (fr) Dispositif de terminal d'utilisateur, dispositif électronique, système le comprenant et son procédé de commande
WO2019112241A1 (fr) Serveur et procédé de défense contre un programme malveillant l'utilisant
WO2019194412A1 (fr) Appareil de réseau et son procédé de commande
WO2016003119A1 (fr) Procédé de commande d'un dispositif électronique, dispositif électronique, procédé de commande d'un point d'accès et point d'accès
WO2019050166A1 (fr) Procédé et dispositif de gestion de connexion sans fil

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11853783

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

WPC Withdrawal of priority claims after completion of the technical preparations for international publication

Ref document number: 10-2011-0108660

Country of ref document: KR

Date of ref document: 20130627

Free format text: WITHDRAWN AFTER TECHNICAL PREPARATION FINISHED

Ref document number: 10-2010-0138873

Country of ref document: KR

Date of ref document: 20130627

Free format text: WITHDRAWN AFTER TECHNICAL PREPARATION FINISHED

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC OF 171014

122 Ep: pct application non-entry in european phase

Ref document number: 11853783

Country of ref document: EP

Kind code of ref document: A2