WO2013062393A1 - 이동 통신 시스템 에서 단일 사용자 승인을 지원하는 관리 방법 및 장치 - Google Patents
이동 통신 시스템 에서 단일 사용자 승인을 지원하는 관리 방법 및 장치 Download PDFInfo
- Publication number
- WO2013062393A1 WO2013062393A1 PCT/KR2012/008949 KR2012008949W WO2013062393A1 WO 2013062393 A1 WO2013062393 A1 WO 2013062393A1 KR 2012008949 W KR2012008949 W KR 2012008949W WO 2013062393 A1 WO2013062393 A1 WO 2013062393A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- request
- authentication
- terminal
- redirect
- information
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
Definitions
- the present invention relates to a mobile communication system, and more particularly, to a method and system for efficiently supporting a process in which a terminal performs a single user approval procedure in association with a mobile communication system.
- a method of transmitting an identifier and approving a user for user approval was required.
- the present invention provides a generic Bootstrapping Architecture and related protocols and other security-related protocols in the evolved mobile communication system including 3GPP Evolved Packet System (EPS), and when supporting the Open ID, the terminal communicates with the network.
- EPS 3GPP Evolved Packet System
- the object of the present invention is to provide a method and apparatus for safely and efficiently supporting a terminal in performing a single user approval process.
- a method for user approval by a terminal includes transmitting information including a user identifier to a relay part (RP); Receiving a redirect request message including an OpenID authentication request from the RP; And validating the RP based on the redirect message.
- RP relay part
- a terminal for user approval transmits information including a user identifier to a relay part (RP), and receives a redirect request message including an OpenID authentication request from the RP. Transmitting and receiving unit; And a controller configured to verify the validity of the RP based on the redirect message.
- RP relay part
- the present invention provides a generic bootstrapping architecture and related security protocols and other security-related protocols in the evolved mobile communication system including 3GPP EPS, and Open ID, when the terminal communicates with the network.
- 3GPP EPS 3GPP EPS
- Open ID Open ID
- the terminal performs a security related procedure so that the terminal can perform more securely in performing a single user approval procedure in a mobile communication environment, thereby allowing the terminal to use a single use authorization (denoted as SSO or less under Single sign-ON) in a secure environment.
- a single use authorization denoted as SSO or less under Single sign-ON
- EUTRAN Evolved Universal Terrestrial Radio Access Network
- UTRAN Universal Terrestrial Radio Access Network
- GERAN GSM / EDGE Radio Access Network: referred to as GERAN
- SSO Single sign-ON
- FIG. 1 is a block diagram illustrating a single user sign-on environment in a mobile communication system environment according to a preferred embodiment of the present invention.
- FIG. 2 is a message flow diagram illustrating a procedure of a single user approval process according to an embodiment of the present invention.
- the present invention to be described below is to provide a safer single use approval procedure and a method for managing a single use of a terminal in a mobile communication system environment.
- the EPS system based on 3GPP, UTRAN, and GERAN will be used, and the present invention may be used in other mobile systems.
- various modifications are possible within the scope of the present invention without departing from the scope of the present invention in the process of processing the relevant information so that the terminal is suitable for a single use approval environment.
- the present invention is for single use authorization (denoted as SSO below Single sign-on) in a mobile communication network.
- SSO is the ability for a user to log on to the network once and access all authorized resources in the enterprise.
- the SSO program accepts a user ID and password and automatically logs on to all appropriate servers. Accordingly, the present invention relates to a method and system for resolving and managing a security problem that occurs when a single user authorization is interworked with a mobile communication network through an operation between a protocol and other network entities.
- a method for managing security between a terminal and a network in a single user environment using protocol messages and operations according to the present invention is involved in setting up a terminal (hereinafter referred to as UE) and initial security related information of the terminal.
- Universal Subscriber Idnentity Module USIM center: USIM center
- HSS Home Subscriber Server
- AuC Authentication Center
- BSF Bootstrapping Server Function
- OP Open ID provider
- NAF network application function
- the UE performs a single user approval process by transmitting an identifier for identifying a user, checking whether it is an appropriate RP and an appropriate OP, and whether it is triggering for a connection sent by the UE.
- the terminal may solve a security problem that may occur during a single user approval process.
- EUTRAN Evolved Universal Terrestrial Radio Access Network
- UTRAN Universal Terrestrial Radio Access Network
- GERAN GSM / EDGE Radio Access Network: referred to as GERAN
- the terminal can perform a single user approval in a secure environment by performing a procedure of setting related information and security information parameters when verifying a single user, verifying security related information, and sending a request message for verification.
- GERAN GSM / EDGE Radio Access Network
- FIG. 1 of the present invention proposes a method in which a terminal, which is a basic object of the present invention, is approved by a terminal in an EUTRAN or 3GPP environment.
- the architecture or similar protocols or protocols are applicable to other mobile communication systems having different but similar operating protocols with minor variations within the scope of the present invention without departing from the scope of the present invention. It is self-evident that it is possible in the judgment of a skilled technical person.
- FIG. 1 is a block diagram illustrating a single user sign-on environment in a mobile communication system environment according to a preferred embodiment of the present invention.
- 3GPP EPS system structure is illustrated as an example.
- the present invention has been described based on EUTRAN, and this method can be used in other similar mobile communication systems.
- a user equipment (hereinafter referred to as a terminal or a UE) 110 may establish a wireless connection with a base station and perform communication.
- the UE 110 may access a packet data network such as the Internet through a Serving Gateway (hereinafter referred to as Serving GW, or SGW).
- Serving GW Serving Gateway
- the UE 110 may include a mobile equipment (hereinafter referred to as ME) and a subscriber identification module (SIM).
- ME mobile equipment
- SIM subscriber identification module
- the mobile device may perform an operation for communication in conjunction with a user or a network.
- the SIM may perform an operation related to storage, management, etc. of user-related information and security information of a user.
- the Home Subscriber Server may manage authentication information and service information about the user and the terminal.
- the HSS 121 may include a home location register server (hereinafter referred to as HLR) and an AUC (authentication center).
- HLR home location register server
- AUC authentication center
- Bootstrapping Server Function (BSF) 193 may be involved in the bootstrapping procedure to construct a generic bootstrapping architecture.
- the network application function (hereinafter, referred to as NAF) 191 may perform an application.
- the NAF 191 may include an Open ID Provider (hereinafter referred to as OP).
- a relaying part (RP) 195 is an entity involved in a single user approval procedure.
- RP 195 includes a web application that wants proof that the user uses an identifier.
- the OP is an entity that performs an open ID authentication server function.
- the UE 110, the HSS 121, the BSF 193, the NAF / OP 191, and the RP 195 each include a transceiver capable of transmitting and receiving data with other components, and based on the data received through the transceiver. And a control unit capable of transmitting and receiving a result value according to the determination result through the transceiver.
- FIG. 2 is a message flow diagram illustrating a procedure of a single user approval process according to an embodiment of the present invention.
- the UE 110 may send a signal including a user identifier (identifier) to the RP 195 through a browser.
- identifier a user identifier
- IMPU IP Multimdia Public Identity
- IP Multimdia Public Identity IP Multimdia Public Identity
- the IMPU is used in the process of sending the identifier, not only the IMPU but also the encrypted value based on a value such as a security key Ks of the terminal may be transmitted to the RP 195.
- an IMPI derived from an IP Multimedia Private Identity (IMPI) or an International Mobile Station Identity (IMSI) may be used in the process of transmitting the user identifier.
- IMPI IP Multimedia Private Identity
- IMSI International Mobile Station Identity
- the UE 110 may transmit an identifier to the RP 195 using another form of indentifier such as a URL or an Extensible Resource Identifier.
- the UE 110 may include a RP 195 including a value used to verify that the UE or a value that can be verified by encrypting with a security key.
- the RP 195 may inquire the address of the OP 191 based on the signal received in step 201.
- the OP 191 may include a NAF.
- the RP 195 may set shared secret information between the OP / NAF 191 inquired in step 203.
- the RP 195 may transmit a signal including information requesting the UE 110 to redirect the browser of the UE 110 to the shared secret OP 191 in operation 205.
- the signal may include an OpenID authentication request.
- the UE 110 may verify whether the RP 195, from which the RP 195 retrieves the address of the OP 191 in step 203, is an appropriate RP. The above operation can be said to validate the RP. According to an embodiment, the UE 110 may verify whether the name and address of the RP 195 are correct and also verify that the Uniform Resource Locator (URL) corresponding to the RP 195 is correct.
- the address of the RP 195 may include an IP address.
- the terminal 110 may store a whitelist for a suitable RP, and may verify whether the RP 195 is suitable for communication based on the whitelist.
- the UE 110 may verify whether a signal corresponding to the identity sent in operation 201 is received based on the signal received in operation 207. If in step 201 the UE 110 has sent a value encrypted with the IMPU and the IMPU as the security key, the UE 110 decrypts the encryption of the IMPU with the security key, and based on the decrypted value, the UE 110 determines that the identity is from itself. You can see that it was sent.
- the UE in order to perform step 211, may need a bootstrapping process as in step 219.
- a value used to verify that the UE 110 is included in the signal plane and transmitted based on the value to verify the identity sent by the terminal 110 or the value encrypted with the security key to verify the identity can do.
- the terminal 110 may verify whether the OP 191 searched for by the RP 195 is an appropriate OP based on the signal received in operation 207.
- the above procedure may be referred to as a procedure for validating the OP 191. That is, it is verified whether it is correct to transmit the request to the OP 191 set as a destination of the authentication message.
- the suitability of the OP 191 may be preset in the UE 110 and may be changed by the setting of the network operator.
- UE 110 may transmit an HTTPS GET message to the OP 191 based on the signal received in step 207.
- the NAF may start a UE authentication process based on the HTTPS GET message received in operation 215.
- step 219 the UE 110 performs a bootstrapping process with the BSF 193.
- step 221 the UE 110 sends an HTTPS request message including a B-TID (bootstrapping transaction identifier) used for the bootstrapping transaction. It may transmit to the OP / NAF 191.
- B-TID bootsstrapping transaction identifier
- the OP / NAF 191 and the BSF 193 may perform a process for user authentication.
- the OP / NAF 191 may transmit a signal requesting to redirect the browser of the UE 110 to the RP 195 together with the authentication confirmation.
- the OP / NAF 191 may transmit a message by encrypting a message authentication code or a time stamp by a key shared with the RP 195 or by transmitting a digital signature.
- the UE 110 may verify whether the RP 195 to communicate is legitimate based on the signal received in step 225. To do this, if the message is encrypted and redirected from the OP / NAF 191 to the RP 195 from step 225 to step 229, the intermediate node UE 110 checks that the RP 195 is a valid message receiver.
- the message transmitted from the / NAF 191 may be transmitted by including an address or a name corresponding to the RP 195.
- the UE 227 may check whether the RP 195 is legitimate based on the received information, and then redirect the message to the RP 195.
- the message may include race confirmation.
- the UE 110 may redirect the browser of the UE 110 to the RP 195 together with the authentication confirmation to the RP 195.
- the RP 195 may verify that the UE 110 that has sent the authentication confirmation is an appropriate UE 110 based on the received authentication confirmation.
- the RP 195 may verify the UE 110 by verifying a signature of a message received in operation 229 or comparing a code or a time stamp value for verification.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (14)
- 통신 시스템에서 단말이 사용자 승인을 하는 방법에 있어서,사용자 식별자를 포함하는 정보를 릴레이 파트(Rely Part, RP)에 송신하는 단계;상기 RP로부터 OpenID 인증 요청을 포함하는 리다이렉트 요청 메시지를 수신하는 단계; 및상기 리다이렉트 메시지를 기반으로 RP의 유효성을 검증하는 단계를 포함하는 방법.
- 제1항에 있어서,상기 RP의 유효성을 검증하는 단계는상기 RP에 대응되는 URL, 이름 및 주소 중 하나를 기반으로 상기 RP의 유효성을 검증하는 단계를 포함하는 것을 특징으로 하는 방법.
- 제1항에 있어서,상기 리다이렉트 요청 메시지를 기반으로 상기 OpenID 인증 요청이 상기 단말이 송신한 사용자 식별자 정보에 대응하는지 검증하는 단계를 더 포함하는 것을 특징으로 하는 방법.
- 제1항에 있어서,상기 리다이렉트 요청 메시지를 수신하는 단계는 리다이렉트 될 오픈 아이디 제공자(OpenID Provider, OP)정보를 포함하는 메시지를 수신하는 것을 포함하고,상기 리다이렉트 될 OP의 유효성을 검증하는 단계를 더 포함하는 것을 특징으로 하는 방법.
- 제1항에 있어서,상기 리다이렉트 요청 메시지를 기반으로 오픈 아이디 제공자(OpenID Provider, OP)에 인증 요청을 전송하는 단계; 및상기 OP로부터 인증 승인 정보 및 RP로 리다이렉트를 요청하는 정보를 수신하는 단계를 더 포함하는 방법.
- 제5항에 있어서,상기 인증 승인 정보를 기반으로 RP에 인증 요청을 하는 단계를 더 포함하는 방법.
- 제5항에 있어서, 상기 OP에 인증 요청을 하는 단계는상기 OP에 HTTP GET 요청을 하는 단계;상기 HTTP GET 요청을 기반으로 인증 요청을 상기 OP로부터 수신하는 단계;상기 인증 요청을 기반으로 부트스트래핑 서버와 부트스트래핑을 하는 단계; 및상기 부트스트래핑에 따라 획득된 부트스트래핑 트랜젝션 아이디를 상기 OP 전송하는 단계를 포함하는 방법.
- 통신 시스템에서 사용자 승인을 위한 단말에 있어서,사용자 식별자를 포함하는 정보를 릴레이 파트(Rely Part, RP)에 송신하고, 상기 RP로부터 OpenID 인증 요청을 포함하는 리다이렉트 요청 메시지를 수신하는 송수신부; 및상기 리다이렉트 메시지를 기반으로 RP의 유효성을 검증하는 제어부를 포함하는 단말.
- 제8항에 있어서,상기 제어부는 상기 RP에 대응되는 URL, 이름 및 주소 중 하나를 기반으로 상기 RP의 유효성을 검증하는 것을 특징으로 하는 단말.
- 제8항에 있어서,상기 제어부는 상기 리다이렉트 요청 메시지를 기반으로 상기 OpenID 인증 요청이 상기 단말이 송신한 사용자 식별자 정보에 대응하는지 검증하는 것을 특징으로 하는 단말.
- 제8항에 있어서,상기 송수신부는 리다이렉트 될 오픈 아이디 제공자(OpenID Provider, OP)정보를 포함하는 메시지를 수신하고,상기 제어부는 상기 리다이렉트 될 OP의 유효성을 검증하는 것을 특징으로 하는 단말.
- 제8항에 있어서,상기 송수신부는 상기 리다이렉트 요청 메시지를 기반으로 오픈 아이디 제공자(OpenID Provider, OP)에 인증 요청을 전송하고, 상기 OP로부터 인증 승인 정보 및 RP로 리다이렉트를 요청하는 정보를 수신하는 것을 특징으로 하는 단말.
- 제12항에 있어서,상기 송수신부는 상기 인증 승인 정보를 기반으로 RP에 인증 요청을 하는 것을 특징으로 하는 단말.
- 제5항에 있어서,상기 송수신부는 상기 OP에 HTTP GET 요청을 하고, 상기 HTTP GET 요청을 기반으로 인증 요청을 상기 OP로부터 수신하고, 상기 인증 요청을 기반으로 부트스트래핑 서버와 부트스트래핑을 하고, 상기 부트스트래핑에 따라 획득된 부트스트래핑 트랜젝션 아이디를 상기 OP 전송하는 것을 특징으로 하는 단말.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020147009432A KR20140095050A (ko) | 2011-10-28 | 2012-10-29 | 이동 통신 시스템에서 단일 사용자 승인을 지원하는 관리 방법 및 장치 |
US14/353,626 US9485654B2 (en) | 2011-10-28 | 2012-10-29 | Method and apparatus for supporting single sign-on in a mobile communication system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161552673P | 2011-10-28 | 2011-10-28 | |
US61/552,673 | 2011-10-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013062393A1 true WO2013062393A1 (ko) | 2013-05-02 |
Family
ID=48168122
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2012/008949 WO2013062393A1 (ko) | 2011-10-28 | 2012-10-29 | 이동 통신 시스템 에서 단일 사용자 승인을 지원하는 관리 방법 및 장치 |
Country Status (3)
Country | Link |
---|---|
US (1) | US9485654B2 (ko) |
KR (1) | KR20140095050A (ko) |
WO (1) | WO2013062393A1 (ko) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145039A (zh) * | 2017-12-25 | 2019-01-04 | 北极星云空间技术股份有限公司 | 一种适用于联邦制工作流集成的ui桥接的方法 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9736165B2 (en) | 2015-05-29 | 2017-08-15 | At&T Intellectual Property I, L.P. | Centralized authentication for granting access to online services |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20080012946A (ko) * | 2005-05-06 | 2008-02-12 | 베리사인 인코포레이티드 | 토큰 공유 시스템 및 방법 |
US7457950B1 (en) * | 2000-09-29 | 2008-11-25 | Intel Corporation | Managed authentication service |
US20080313719A1 (en) * | 2007-03-23 | 2008-12-18 | Kaliski Jr Burton S | Methods and Apparatus for Delegated Authentication |
KR20100040413A (ko) * | 2008-10-10 | 2010-04-20 | 주식회사 케이티 | 오픈아이디를 지원하는 단일 사용승인 아이디 인증 방법 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0414421D0 (en) * | 2004-06-28 | 2004-07-28 | Nokia Corp | Authenticating users |
-
2012
- 2012-10-29 US US14/353,626 patent/US9485654B2/en active Active
- 2012-10-29 WO PCT/KR2012/008949 patent/WO2013062393A1/ko active Application Filing
- 2012-10-29 KR KR1020147009432A patent/KR20140095050A/ko not_active Application Discontinuation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7457950B1 (en) * | 2000-09-29 | 2008-11-25 | Intel Corporation | Managed authentication service |
KR20080012946A (ko) * | 2005-05-06 | 2008-02-12 | 베리사인 인코포레이티드 | 토큰 공유 시스템 및 방법 |
US20080313719A1 (en) * | 2007-03-23 | 2008-12-18 | Kaliski Jr Burton S | Methods and Apparatus for Delegated Authentication |
KR20100040413A (ko) * | 2008-10-10 | 2010-04-20 | 주식회사 케이티 | 오픈아이디를 지원하는 단일 사용승인 아이디 인증 방법 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145039A (zh) * | 2017-12-25 | 2019-01-04 | 北极星云空间技术股份有限公司 | 一种适用于联邦制工作流集成的ui桥接的方法 |
CN109145039B (zh) * | 2017-12-25 | 2022-01-28 | 北极星云空间技术股份有限公司 | 一种适用于联邦制工作流集成的ui桥接的方法 |
Also Published As
Publication number | Publication date |
---|---|
US20140308925A1 (en) | 2014-10-16 |
US9485654B2 (en) | 2016-11-01 |
KR20140095050A (ko) | 2014-07-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10237732B2 (en) | Mobile device authentication in heterogeneous communication networks scenario | |
US8347090B2 (en) | Encryption of identifiers in a communication system | |
CN101651682B (zh) | 一种安全认证的方法、系统和装置 | |
AU2008213766B2 (en) | Method and system for registering and verifying the identity of wireless networks and devices | |
KR101170191B1 (ko) | 비승인 모바일 액세스 시그널링에 대한 개선된 가입자 인증 | |
US9306748B2 (en) | Authentication method and apparatus in a communication system | |
EP3120591B1 (en) | User identifier based device, identity and activity management system | |
WO2019017840A1 (zh) | 网络验证方法、相关设备及系统 | |
KR20080106982A (ko) | 애플리케이션 인증 | |
KR20100054178A (ko) | 이동 통신 시스템에서 단말 보안 능력 관련 보안 관리 방안및 장치 | |
EP3143780B1 (en) | Device authentication to capillary gateway | |
JP7337912B2 (ja) | コアネットワークへの非3gppデバイスアクセス | |
US8442527B1 (en) | Cellular authentication for authentication to a service | |
WO2013040957A1 (zh) | 单点登录的方法、系统和信息处理方法、系统 | |
CN110754101B (zh) | 用于保护与用户设备相关联的订户信息的方法、系统和计算机可读存储介质 | |
WO2013062393A1 (ko) | 이동 통신 시스템 에서 단일 사용자 승인을 지원하는 관리 방법 및 장치 | |
EP2961208A1 (en) | Method for accessing a service and corresponding application server, device and system | |
WO2013062394A1 (ko) | 이동 통신 시스템에서 단일 사용 승인 방법 및 장치 | |
CN114301967A (zh) | 窄带物联网控制方法、装置及设备 | |
KR100463751B1 (ko) | 무선통신을 위한 패킷데이터 생성 방법과, 이를 이용한무선통신 방법 및 그 장치 | |
RU2779029C1 (ru) | Доступ не отвечающего спецификациям 3gpp устройства к базовой сети | |
CN103428694A (zh) | 一种分离终端单点登录组合鉴权方法和系统 | |
CN117896725A (zh) | 无线通信方法、系统和电子设备及存储介质 | |
Nagesha et al. | A Survey on Wireless Security Standards and Future Scope. | |
Stakenburg | Managing the Client-side Risks of IEEE 802.11 Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12843873 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20147009432 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14353626 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12843873 Country of ref document: EP Kind code of ref document: A1 |