WO2016110448A1 - Teilnehmeridentitätsmodul sowie auf einem teilnehmeridentitätsmodul ausführbare applikation - Google Patents
Teilnehmeridentitätsmodul sowie auf einem teilnehmeridentitätsmodul ausführbare applikation Download PDFInfo
- Publication number
- WO2016110448A1 WO2016110448A1 PCT/EP2016/000013 EP2016000013W WO2016110448A1 WO 2016110448 A1 WO2016110448 A1 WO 2016110448A1 EP 2016000013 W EP2016000013 W EP 2016000013W WO 2016110448 A1 WO2016110448 A1 WO 2016110448A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- subscriber identity
- identity module
- location
- functions
- module according
- Prior art date
Links
- 230000006870 function Effects 0.000 claims abstract description 36
- 238000001514 detection method Methods 0.000 claims description 13
- 238000000034 method Methods 0.000 claims description 4
- 230000008901 benefit Effects 0.000 description 4
- 230000001419 dependent effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/04—Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
- H04W8/245—Transfer of terminal data from a network towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/67—Risk-dependent, e.g. selecting a security level depending on risk profiles
Definitions
- Subscriber identity module and on a subscriber identity module executable application
- the present invention relates to a subscriber identity module for use in a mobile device, such as a mobile device
- Mobile phone a wearable and / or a tablet PC and an executable on a subscriber identity module application.
- a method for providing intelligent network support to a mobile subscriber is known.
- a mobile device in particular a mobile telephone, sends a signaling message from the SIM card to an intermediate unit that interacts with a Home Mobile Land Mobile Network (HPLMN) service control device.
- HPLMN Home Mobile Land Mobile Network
- a message is sent back to the SIM card, the message containing INAP (Intelligent Network Application Part), CORBA, RMI, HTTP or XML messages.
- INAP Intelligent Network Application Part
- Units are embedded (eUICC, embedded Universal Integrated Circuit Card) or delivered as separate units in different form factors IFF to 4FF.
- SIM cards are delivered to different countries, and in different countries - possibly roaming - Conditions, ie a modified fee structure - can be used for the handling of telephone calls, data transfers, etc.
- SIM card may provide different requirements for the functions that a SIM card may provide. These requirements are on the one hand by the local mobile network operator (Mobile Network Operator;
- MNOs and by government agencies.
- the functions may be different
- the invention is based on the object of providing a subscriber identity module for use in a mobile device as well as a subscriber identity module
- the invention is based on the idea that the
- Subscriber identity module and / or an application on the
- Subscriber identity module taking into account a determined Site can define a scope of functionality of the subscriber identity module.
- a subscriber identity module for use in a mobile device includes a processor, a memory in communication with the processor
- a location determining device adapted to determine a location of the subscriber identity module, wherein the
- Subscriber identity module is adapted to a variety of
- the subscriber identity module depending on the determined location at least a part of the functions limited and / or not available.
- Subscriber identity module can be particularly advantageous account of this circumstance.
- the memory is in a volatile
- RAM Random Access Memory
- ROM Read Only Memory
- EEPROM Electrically erasable programmable read-only memory
- the location-determining device is set up to determine the location on the basis of a mobile radio cell in which the subscriber identity module is registered or with which the subscriber identity module (which is arranged in a mobile device) is connected. Taking advantage of the mobile radio cell, in which the subscriber identity module is booked, it is particularly advantageous possible to quickly find the location of the subscriber identity module.
- the location determining device for determining the location of the vehicle for determining the location of the vehicle.
- the position detection module can be integrated into the mobile device and / or the subscriber identity module.
- Position acquisition module may be a GPS
- Position capture module act.
- the location comprises at least one piece of information in which country the subscriber identity module is located located.
- the subscriber identity module may be a SIM card, a UICC and / or an embedded Universal Integrated Circuit Card (eUICC).
- the options available depending on the location determined are stored in a whitelist in the memory of the subscriber identity module according to a preferred embodiment.
- the whitelist can be used to determine which functions are allowed in the country. These functions are then made available and the remaining functions are advantageously available only to a limited extent.
- the functions not available at the determined location may be stored in a blacklist. Consequently, the subscriber identity module advantageously releases all functions except for the functions stored in the blacklist.
- the function is a functional scope of a
- Encryption algorithm determines the extent to which encryption takes place, that is, how much
- the correct encryption level can be selected. According to another embodiment, the
- Participant identity module were listed, also with advantage in
- Fig. 1 shows a schematic view of a mobile device in which a subscriber identity module is arranged, wherein the
- Subscriber identity module additionally shown in Fig. 1 is enlarged.
- Fig. 1 shows a mobile device 20 which is provided with a display device 22.
- the mobile device 20 may be, for example, a mobile phone, a tablet PC, a wearable or the like.
- the mobile device 20 is a mobile phone provided with the display device 22.
- the mobile device 20 is a mobile phone provided with the display device 22.
- Display device 22 may be a capacitive display device on which a user can make inputs by touching the surface of display device 22.
- the mobile device 20 is, as shown in Fig. 1, with a
- the subscriber identity module 10 may be fixed in the mobile device in the form of an integrated one
- Subscriber Identity Module 10 be installed or as exchangeable
- Subscriber identity module 10 may be installed in the mobile device 20.
- An integrated subscriber identity module is also known as eUICC (embedded Universal Integrated Circuit Card).
- the changeable Subscriber identity module 10 is also under the term SIM card
- the subscriber identity module 10 serves to identify the user to the mobile network operator.
- a processor 12 and a memory 14 are formed in the subscriber identity module.
- the memory 14 can be divided into a volatile and a non-volatile memory,
- the memory may be divided into a ROM area, a RAM area, and an EEPROM area.
- the operating system is usually stored in the ROM area. There can also for
- IMSI International Mobile Subscriber Identity
- Subscriber identity module 10 as well as the IMSI is referred to the prior art, which is hereby explicitly included.
- Subscriber identity module is to be delivered, a variety of
- Subscriber identity modules 10 must be kept available depending on the permissible range of functions in the respective countries.
- the subscriber identity module 10 additionally has a
- the location detection facility 16 is configured to control the location, i. determine the geographic position of the subscriber identity module 10.
- Location-determining device 16 can determine the location, for example, by sending it from a mobile radio cell into which the
- Subscriber identity module 10 is logged in, i. with that
- Subscriber identity module 10 communicates, location data queried and determined based on this location data, in which country the mobile device 20 and thus the subscriber identity module 10 are located.
- the location-determining device 16 can
- Position detection module may be integrated in the mobile device 20 and / or in the subscriber identity module 10.
- Position detection module is adapted to position data, in particular GPS and / or GLON ASS data / information too
- a location of the subscriber identity module 10 can be determined and thus the country in which the subscriber identity module is located.
- the location determination device 16 may have a device that can detect an incorrect location information. In this way, it is possible to detect manipulations on the subscriber identity module 10 or the location-determining device 16.
- Subscriber identity module should not be allowed.
- Subscriber identity module 10 depending on the determined location, in particular the determined country, at least a part of the functions restricted or not available.
- some countries require that they use a particularly strong encryption or a particularly weak encryption of the data transmitted with the subscriber identity module 10.
- licenses for an application might only work with limited functionality depending on the location, or the application might not be available at all.
- a payment application or a banking application can only work in certain countries. In this way, it is advantageously possible to allow access to a payment application and / or banking application only in "secure" countries, whereby it is possible to store in the memory 14 of the subscriber identity module which functions in Whitelist or which functions are not allowed in a country (blacklist).
- the range of functions permitted in a certain country can also be determined by the mobile network operator (MNO) with whom the subscriber identity module 10 has established a connection.
- MNO mobile network operator
- At least part of the above-mentioned functions can be restricted or not made available.
- Subscriber identity module 10 is located. Depending on the location, the application is able to restrict some of the functions of the subscriber identity module or not provide it.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP16700141.1A EP3243340A1 (de) | 2015-01-08 | 2016-01-05 | Teilnehmeridentitätsmodul sowie auf einem teilnehmeridentitätsmodul ausführbare applikation |
US15/542,561 US20170353471A1 (en) | 2015-01-08 | 2016-01-05 | Subscriber Identification Module and Application Executable on a Subscriber Identification Module |
RU2017128103A RU2682008C2 (ru) | 2015-01-08 | 2016-01-05 | Модуль идентификации абонента |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102015000224.4 | 2015-01-08 | ||
DE102015000224.4A DE102015000224A1 (de) | 2015-01-08 | 2015-01-08 | Teilnehmeridentitätsmodul sowie auf einem Teilnehmeridentitätsmodul ausführbare Applikation |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2016110448A1 true WO2016110448A1 (de) | 2016-07-14 |
WO2016110448A8 WO2016110448A8 (de) | 2017-10-05 |
Family
ID=55077502
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2016/000013 WO2016110448A1 (de) | 2015-01-08 | 2016-01-05 | Teilnehmeridentitätsmodul sowie auf einem teilnehmeridentitätsmodul ausführbare applikation |
Country Status (5)
Country | Link |
---|---|
US (1) | US20170353471A1 (de) |
EP (1) | EP3243340A1 (de) |
DE (1) | DE102015000224A1 (de) |
RU (1) | RU2682008C2 (de) |
WO (1) | WO2016110448A1 (de) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1653754A2 (de) * | 2004-10-26 | 2006-05-03 | Spreadtrum Communications (Shangai) Co., Ltd. | Sicherheitsmethode und zellulares Telefon mit Sicherheitsmerkmalen |
US7362866B2 (en) * | 2001-12-21 | 2008-04-22 | Huawei Technologies, Co., Ltd. | Method for determining encryption algorithm of secret communication based on mobile country codes |
US20090247122A1 (en) * | 2008-04-01 | 2009-10-01 | William Fitzgerald | System for monitoring the unauthorized use of a device |
US20110078089A1 (en) * | 2009-09-25 | 2011-03-31 | Hamm Mark D | Sensor zone management |
US20130283047A1 (en) * | 2010-08-05 | 2013-10-24 | Gemalto Sa | System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2418099A (en) | 1998-08-11 | 2000-03-06 | Swisscom Ag | Method for providing intelligent network support to a mobile subscriber |
US7120254B2 (en) * | 2000-10-30 | 2006-10-10 | Geocodex Llc | Cryptographic system and method for geolocking and securing digital information |
US7512989B2 (en) * | 2002-10-22 | 2009-03-31 | Geocodex Llc | Data loader using location identity to provide secure communication of data to recipient devices |
US20050282559A1 (en) * | 2003-02-25 | 2005-12-22 | Boston Communications Group, Inc. | Method and system for providing supervisory control over wireless phone data usage |
US7873166B2 (en) * | 2005-09-13 | 2011-01-18 | Avaya Inc. | Method for undetectably impeding key strength of encryption usage for products exported outside the U.S |
CN1968500A (zh) * | 2006-04-13 | 2007-05-23 | 华为技术有限公司 | 控制移动通讯设备功能的方法及设备 |
EP1848174B1 (de) * | 2006-04-18 | 2016-11-02 | BlackBerry Limited | Sicherheitskontrolle in einem Kommunikationssystem |
EP2127300B1 (de) * | 2007-01-26 | 2018-04-18 | InterDigital Technology Corporation | Methode und gerät zur sicherung von ortsinformation und zugangskontrolle die ortsinformation benutzend |
US8612582B2 (en) * | 2008-12-19 | 2013-12-17 | Openpeak Inc. | Managed services portals and method of operation of same |
US20110055891A1 (en) * | 2009-08-26 | 2011-03-03 | Rice Christopher T | Device security |
US20110131421A1 (en) * | 2009-12-02 | 2011-06-02 | Fabrice Jogand-Coulomb | Method for installing an application on a sim card |
US8171529B2 (en) * | 2009-12-17 | 2012-05-01 | Intel Corporation | Secure subscriber identity module service |
US20110247074A1 (en) * | 2010-03-30 | 2011-10-06 | Manring Bradley A C | Metadata-based access, security, and compliance control of software generated files |
US9712996B2 (en) * | 2011-09-28 | 2017-07-18 | Kt Corporation | Profile management method, embedded UICC, and device provided with the embedded UICC |
US20140075493A1 (en) * | 2012-09-12 | 2014-03-13 | Avaya, Inc. | System and method for location-based protection of mobile data |
EP3020252A1 (de) * | 2013-07-10 | 2016-05-18 | Ciaran Hynes | Verfahren und vorrichtung zur einschränkung der verwendung einer mobilkommunikationsvorrichtung |
-
2015
- 2015-01-08 DE DE102015000224.4A patent/DE102015000224A1/de active Pending
-
2016
- 2016-01-05 WO PCT/EP2016/000013 patent/WO2016110448A1/de active Application Filing
- 2016-01-05 US US15/542,561 patent/US20170353471A1/en active Pending
- 2016-01-05 EP EP16700141.1A patent/EP3243340A1/de not_active Ceased
- 2016-01-05 RU RU2017128103A patent/RU2682008C2/ru active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7362866B2 (en) * | 2001-12-21 | 2008-04-22 | Huawei Technologies, Co., Ltd. | Method for determining encryption algorithm of secret communication based on mobile country codes |
EP1653754A2 (de) * | 2004-10-26 | 2006-05-03 | Spreadtrum Communications (Shangai) Co., Ltd. | Sicherheitsmethode und zellulares Telefon mit Sicherheitsmerkmalen |
US20090247122A1 (en) * | 2008-04-01 | 2009-10-01 | William Fitzgerald | System for monitoring the unauthorized use of a device |
US20110078089A1 (en) * | 2009-09-25 | 2011-03-31 | Hamm Mark D | Sensor zone management |
US20130283047A1 (en) * | 2010-08-05 | 2013-10-24 | Gemalto Sa | System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device |
Also Published As
Publication number | Publication date |
---|---|
RU2017128103A3 (de) | 2019-02-08 |
EP3243340A1 (de) | 2017-11-15 |
RU2682008C2 (ru) | 2019-03-14 |
WO2016110448A8 (de) | 2017-10-05 |
US20170353471A1 (en) | 2017-12-07 |
RU2017128103A (ru) | 2019-02-08 |
DE102015000224A1 (de) | 2016-07-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2864967B1 (de) | Vorrichtung und verfahren zum steuern einer zugangsberechtigung und/oder fahrberechtigung für ein fahrzeug | |
EP2910039B1 (de) | Verfahren zum einbringen von teilnehmeridentitätsdaten in ein teilnehmeridentitätsmodul | |
EP3132626A1 (de) | Verfahren und vorrichtung zum betreiben eines mobilen endgeräts in einem mobilfunknetzwerk | |
DE102011122242A1 (de) | Verfahren zur Kommunikation mit einer Applikation auf einem portablen Datenträger sowie ein solcher portabler Datenträger | |
DE19921524C2 (de) | Einrichtung zum Schutz des Ersteinsatzes einer Prozessor-Chipkarte | |
EP2698964B1 (de) | Betreiben eines Teilnehmeridentitätsmoduls | |
DE102012016164A1 (de) | Sicherheitselement und Verfahren zur Installation von Daten in dem Sicherheitselement | |
EP3011714B1 (de) | Betreiben eines sicherheitselements mit dem auf das ausgewählte verwendungsprofil abgestimmten satz von betriebsparametern | |
WO2016110448A1 (de) | Teilnehmeridentitätsmodul sowie auf einem teilnehmeridentitätsmodul ausführbare applikation | |
DE102015015502A1 (de) | Verfahren und Vorrichtung für die sichere Speicherung elektronischer Identifikationsdokumente auf einem mobilen Endgerät | |
DE102008063864A1 (de) | Verfahren zur Authentifizierung einer Person gegenüber einer elektronischen Datenverarbeitungsanlage mittels eines elektronischen Schlüssels | |
WO2015018510A2 (de) | Verfahren und vorrichtungen zum wechseln eines mobilfunknetzes | |
DE102012011729A1 (de) | Mobilstation mit festgesetztem Betriebsumfang | |
EP2688327A2 (de) | Aktivieren von Teilnehmeridentitätsdaten | |
EP3345413A1 (de) | Verfahren und vorrichtung zum verwalten von subskriptionen auf einem sicherheitselement | |
WO2015090586A1 (de) | Verfahren und vorrichtungen zum verwalten von subskriptionen auf einem sicherheitselement | |
EP2768199A1 (de) | Verfahren zur Übertragung über ein Telekommunikationsnetz einer Berechtigungsinformation oder einer mit einem Telekommunikationsendgerät assoziierten Berechtigung. Telekommunikationsendgerät, System. Computerprogramm und Computerprogrammprodukt | |
WO2004070492A2 (de) | Kontrolle von kreditkarten-transaktionen | |
EP3277005B1 (de) | Personalisierung eines sicherheitselements | |
EP3351029A1 (de) | Verfahren zum handhaben einer subskriptionshistorie | |
EP2723113A1 (de) | Verfahren zum Betreiben eines Sicherheitsmoduls | |
DE102015015212B4 (de) | Verfahren zum Betreiben eines Sicherheitsmoduls und Sicherheitsmodul | |
EP3361436A1 (de) | Verfahren zur freigabe einer transaktion | |
DE202011001370U1 (de) | Vorrichtung zum weltweiten Auffinden von gestohlenen oder verlorenen Netz-Kommunikationsendgeräten | |
AT8794U1 (de) | Kartenlesegerät für chipkarten |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16700141 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15542561 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2016700141 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2017128103 Country of ref document: RU Kind code of ref document: A |