WO2021018489A1 - Transmission de données à un dispositif iot - Google Patents

Transmission de données à un dispositif iot Download PDF

Info

Publication number
WO2021018489A1
WO2021018489A1 PCT/EP2020/067936 EP2020067936W WO2021018489A1 WO 2021018489 A1 WO2021018489 A1 WO 2021018489A1 EP 2020067936 W EP2020067936 W EP 2020067936W WO 2021018489 A1 WO2021018489 A1 WO 2021018489A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
data rate
connection
maximum
firmware
Prior art date
Application number
PCT/EP2020/067936
Other languages
German (de)
English (en)
Inventor
Stephan Eberle
Abdelghani El-Kacimi
Original Assignee
itemis France SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by itemis France SAS filed Critical itemis France SAS
Publication of WO2021018489A1 publication Critical patent/WO2021018489A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/654Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Definitions

  • the invention relates to a method for communication between a device and a server, a system comprising at least one device and at least one server and a server, a device for use in the method and / or the system and a computer program product.
  • the invention relates to devices that fall within the context of the Internet of Things. This refers to the connection and networking of electronic devices with wireless or wired network interfaces via the Internet. Such networked devices can send information directly to PCs,
  • Networked devices are often mass-produced products with very limited hardware equipment. This can, for example, be the selection of the
  • Micro controllers affect, but also the memory equipment.
  • Unprotected communication between networked devices and a server can lead to significant security problems. Therefore secure communication connections are to be preferred.
  • the consequences of installing malware on a networked device can be very serious.
  • a prominent example of this is the “Mirai” malware, which was brought into circulation on October 21, 2016 [5] and which spreads particularly via unsecured and therefore highly vulnerable networked devices such as DVD players, TV decoders, or surveillance cameras, could spread very quickly. This has led to a massive outage of large parts of the Internet that has lasted for several hours.
  • a networked device can, for example, consist of an electronic unit which is composed of sensors, actuators, a network interface and one (or more) microcontroller (s) and is built into a housing.
  • Firmware is usually executed on the microcontroller (s), which integrates and controls all other elements, realizes the actual device function and enables the desired forms of information exchange and interactions via the Internet.
  • the networked device can preferably be implemented as a “system-on-chip” (SoC) on which both a microcontroller and a network interface, preferably a WLAN interface, are integrated.
  • SoC system-on-chip
  • the resulting limitations can affect computing power, flash memory or RAM memory size, or a combination of these aspects.
  • the networked device Due to the scarce hardware equipment, there are limits to the capability of the networked device with regard to the maximum data throughput that can still be processed, i.e., for example, can be received, decrypted and / or stored by the device. If the data throughput delivered to the device by a server is above the maximum data throughput that can be processed by the device, data can be lost. While with conventional, well-equipped devices with network interfaces, e.g. servers or personal computers, the achievable processing speed of received data is usually so high that data transmitted over the network at normal network data rates can be processed without further ado, this is The maximum achievable processing speed for the networked devices considered here is at least temporarily below the data rate available from the server.
  • the firmware of networked devices can be updated by manual intervention by a technician directly on the device.
  • this approach is highly unattractive and, at best, suitable as an emergency solution.
  • Much more appropriate is to carry out these updates “over-the-air” (OTA), ie to obtain them via the Internet connection that the networked device already has (whereby the term “over-the-air” is also to be understood as that this includes a data transmission completely or at least partially via wired network connections).
  • OTA over-the-air
  • a secure OTA update functionality for the firmware of a networked device can be achieved by obtaining updates of the firmware running on a microcontroller of the device from a web server.
  • a network interface integrated on the chip and a device for establishing the network connection to the server can be used, preferably via the Internet, for example in the form of an Internet router.
  • the web server can, for example, provide the new versions of the firmware in the form of downloadable binary files.
  • the device can, for example, connect to this web server as a client and download the appropriate new firmware version.
  • the device can program the new firmware version in a free area of its flash memory. After successfully completing these steps, the device can switch from the current to the new firmware version by restarting.
  • data for example updates, can be downloaded from the server providing the information.
  • the server can be a web server and communication can take place in accordance with the HTTPS (HyperText Transfer Protocol Secure) [6] protocol.
  • HTTPS HyperText Transfer Protocol Secure
  • HTTP HyperText Transfer Protocol
  • HTTP HyperText Transfer Protocol
  • TLS Secure Sockets Layer / Transport Layer Security
  • Both are based on a TCP / IP (Transmission Control Protocol / Internet Protocol) [10] connection, which in turn runs over the WLAN networks, local networks (LAN) and wide area networks (WAN) that run between the networked device and the web server in question.
  • TCP / IP Transmission Control Protocol / Internet Protocol
  • the networked device should also advantageously have suitable logic, in particular suitable hardware and software components for controlling and performing the update process itself.
  • functions and software libraries in particular can be used that, for example, use TCP / IP connections via a network interface, services to establish secure tunnels via existing TCP / IP connections Use of the encryption protocol SSL / TLS, and services for carrying out firmware OTA updates.
  • the following software components or layers can be used: Operating system including support for establishing and using TCP / IP connections, an implementation of the SSL / TLS encryption protocol and an HTTP server software package including an implementation of the HTTP protocol.
  • the respective original implementations on the networked devices and the web server would have to be replaced by these.
  • a maximum data rate is specified for the connection and the server transmits data to the device at a data rate which does not exceed the specified maximum data rate.
  • the device can preferably specify a maximum data rate for the server when establishing a connection.
  • the computer program product according to the invention can preferably comprise a server component and a client component, the server-side software component being executed on the server and implementing the behavior described there, while the client-side software component is executed on the device in order to implement the behavior described
  • the device can properly store, decrypt and / or process the data in the form in which they are received from the server, even with limited hardware equipment.
  • the transmission will be split into fragments, with the fragments having a maximum fragment size.
  • the maximum fragment size is also specified when the connection is established, in particular is specified by the device.
  • a value suitable for the device can be selected for the fragment size.
  • the data transmission can be set in a suitable way for each device.
  • a secure OTA update functionality is implemented for the firmware of a networked water leak detector.
  • the ESP8266 [3] from the Chinese chip manufacturer Espressif is used as the microcontroller.
  • This is a very inexpensive “System-on-Chip” (SoC), on which both a 32-bit microcontroller and a WLAN interface are integrated.
  • SoC System-on-Chip
  • the OTA updates of the firmware running on this microcontroller should be obtained from a web server, for the connection with this the integrated on the chip should be integrated WLAN interface and a standard internet router are used.
  • the web server provides the new versions of the firmware in the form of downloadable binary files.
  • the device in question connects to this web server as a client, downloads the appropriate new firmware version and programs it in a free area of its flash memory. After successfully completing these steps, the device changes from the current to the new firmware version by restarting.
  • IRAM Internal RAM memory
  • Static RAM memory 80 KB, of which actually available for the application: ⁇ 45 KB
  • ESP8266 NONOS SDK [11] an extensive software development package called ESP8266 NONOS SDK [11] can be used to facilitate application development. This includes the following services:
  • An HTTP server software package including an implementation of the HTTP protocol - the market leaders include Apache HTTP Server [19] and Microsoft® Internet Information Services [20]
  • the size of the binary files with new versions of the water leak detector firmware was approx. 350 KB.
  • this size can vary greatly in other projects and depending on the type of networked device. It can almost be ruled out that the size of a firmware that support secure OTA updates is significantly less than 100 KB.
  • the maximum data size that can be transmitted in one go via a connection secured with the SSL / TLS encryption protocol is only 16 KB [9]. This is by no means a limitation caused by the protocol implementations, but rather a parameter that was determined by the underlying protocol standard. Thus, all files or data blocks that exceed this maximum size are broken down in the course of the transfer into a series of data fragments, the size of which is equal to or smaller than the mentioned threshold value.
  • the inventors have recognized that the maximum size of the data that can be transmitted in one train specified by the SSL / TLS protocol results in the problem that it is in no way in line with the severely limited hardware resources of most networked devices.
  • the maximum data size that could be received on the ESP8266 microcontroller in one go was less than 4 KB due to its limited RAM memory size.
  • a web server that is used to provide firmware updates and is based on a standard implementation of the SSL / TLS encryption protocol, however, has no way of finding out and taking into account such restrictions. He therefore systematically breaks down each new firmware version to be transmitted into a sequence of 16 kB fragments. As a result, the downloading process comes to an abrupt end as soon as the first data fragment arrives on the networked device, since its size far exceeds the free storage capacity available there.
  • the inventors have recognized another problem that it should be ensured that the fragments of a new firmware version that arrive on the networked device are received and processed in a sufficiently short time. Otherwise there is a risk that the networked device will still be busy processing the previous firmware fragments when the subsequent firmware fragments arrive, and thereby one or the other Firmware fragment is lost in whole or in part.
  • the processing that every received firmware fragment must be subjected to consists of two sub-steps: its decryption and programming in the flash memory of the microcontroller.
  • the ESP8266 microcontroller In the case of the ESP8266 microcontroller, the latter have proven to be sufficient to reliably receive and process firmware fragments arriving at a transfer rate between 8 KB / s and 10 KB / s.
  • a web server that is used to provide firmware updates and is based on a standard implementation of the SSL / TLS encryption protocol, however, has hardly any possibility of satisfying such restrictions. Instead, it transmits the firmware fragments at the maximum possible transmission rate, which results from its computing power and the operating conditions of the physical networks to be passed through.
  • the resulting transfer rate is usually well above the 8 KB / s to 10 KB / s limit mentioned above.
  • the networked device occasionally succeeds in receiving and processing the first firmware fragments as expected, but then quickly saturates and aborts the download process due to the receipt of incomplete or inconsistent firmware fragments.
  • the open source library axTLS [13] was used as the starting point for a solution to the identified problems, which also serves as the basis for the services provided by the ESP8266 NONOS SDK for establishing and using secure SSL / TLS connections.
  • the inventors have resorted to an extension mechanism called “Hello Extensions” [22], which was specifically provided for by the SSL / TLS standard. It offers clients (here the networked devices) the possibility of negotiating the use of certain functional extensions with the server to which they want to establish a secure connection (in this case the web server). These are optional behavior features of the SSL / TLS protocol that can be activated on request from the client when establishing new secure connections to a server.
  • the SSL / TLS standard includes a list [23] in which the existing extensions of this type are named, as well as corresponding specifications [24] by which their respective goals and modes of operation are defined.
  • the inventors have solved the problem of the size of the downloaded firmware fragments being too large by means of an extension called “Maximum Fragment Length” [25] already provided for in the SSL / TLS standard. It enables a client to request the server, to which it is establishing a secure connection, that the latter uses a smaller maximum size when dimensioning the data fragments to be transmitted to the former than the 16 KB normally provided for this.
  • the chosen solution to the problem was therefore to complete the partial support of the "Maximum Fragment Length" extension, which is included in the axTLS Library was found.
  • the axTLS library modified in this way, was used to replace the original version that is contained in the ESP8266 NONOS SDK.
  • the application code has been expanded to inform the web server of the maximum size of the data fragments that should be used when downloading new firmware versions.
  • the modified axTLS library was integrated into a simple HTTP server software implementation (which is included with the axTLS library as sample code). The result was a secure web server that has the ability to customize the size of the data fragments to be transmitted to the restrictions of the networked devices connected to it.
  • the inventors designed and implemented the specifications of a “Maximum Data Rate”. It allows a client to request the server, to which it is establishing a secure connection, to limit the transmission rate that the latter uses to transmit the data fragments to the former to a specified value in KB / s and thus prevent the data fragments from being sent te arrive at the client in too fast a sequence. Regardless of the fact that this is a novel behavioral characteristic, the extension that enables it to be activated is based on the same extension mechanism "Hello Extensions" [22] that is also used for all existing extensions. It was only assigned its own unique identifier, which was selected from one of the areas with free identifiers that have not yet been assigned [23].
  • the inventors added the partial functionality of the axTLS library, which is responsible for recognizing and evaluating the expansion requirements transmitted by the networked device, with the ability to extract the maximum data transfer rate to be used.
  • the partial functionality that is responsible for sending the data from the server to the client has been modified in order to adapt the transmission rate of the outgoing data fragments accordingly. Instead of having the data fragments to be transmitted follow one another directly, a time delay is observed after each data fragment has been sent, the duration of which is determined dynamically. As a result, the data fragments are distributed over the time axis and the average data transfer rate remains below the value specified by the client.
  • the result was a secure web server that is able to individually adapt the transmission rate of the data fragments to be transmitted to the restrictions of the networked devices connected to it.
  • the peculiarity of the chosen approach to remedy the observed problems is that the found solution is neither limited to a specific networked device, nor to a specific microcontroller, nor to the firmware OTA update application.
  • the use of the "Hello Extensions" mechanism defined by the SSL / TLS standard was advantageous. This is based on the principle of negotiation between client and server in order to decide when each new secure connection is established whether and which additional behavioral characteristics are to be used and which operating parameters should be used.
  • the extensions implemented as part of this project allow every networked device to cause the server to which it connects to use individually adapted sizes and transmission rates when transmitting data fragments that are in accordance with the There are limitations on its hardware resources and the task to be performed.
  • the same extended implementation of the SSL / TLS encryption protocol and also the same web server that uses it can be used, on the one hand, to operate different networked devices with different microcontrollers and, on the other hand, to cover a large number of applications that require secure communication between a networked device and require a server.
  • the invention is of a relatively general nature and, apart from the Internet of Things, which is primarily considered here, can also be used in many other areas (e.g. Industry 4.0).
  • SSL / TLS encryption protocol which is particularly suitable for making secure communication usable on networked devices that are equipped with extremely scarce hardware resources. This made it possible to successfully implement the secure OTA update functionality required in the illustrated embodiment for the firmware of a water leak detector based on the ESP8266 microcontroller.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention porte sur un procédé de communication entre un dispositif et un serveur, sur un système comprenant au moins un dispositif et au moins un serveur, sur un serveur, sur un dispositif destiné à être utilisé dans le procédé et/ou le système, et sur un produit programme d'ordinateur. Une connexion chiffrée est établie entre un dispositif, par exemple un dispositif réseauté dans le contexte de l'Internet des objets (IoT), et un serveur afin de réaliser une communication entre le dispositif et le serveur. Afin de permettre une communication fiable malgré un matériel limité, le débit de données maximal pour la connexion est déterminé, et le serveur transmet des données au dispositif à un débit de données qui ne dépasse pas le débit de données maximal déterminé.
PCT/EP2020/067936 2019-07-26 2020-06-25 Transmission de données à un dispositif iot WO2021018489A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102019120331.7A DE102019120331A1 (de) 2019-07-26 2019-07-26 Datenübertragung zu einem IOT-Gerät
DEDE102019120331.7 2019-07-26

Publications (1)

Publication Number Publication Date
WO2021018489A1 true WO2021018489A1 (fr) 2021-02-04

Family

ID=71579545

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2020/067936 WO2021018489A1 (fr) 2019-07-26 2020-06-25 Transmission de données à un dispositif iot

Country Status (2)

Country Link
DE (1) DE102019120331A1 (fr)
WO (1) WO2021018489A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102021203940A1 (de) 2021-04-21 2022-10-27 Robert Bosch Gesellschaft mit beschränkter Haftung Verfahren und Vorrichtung zum Verarbeiten von mit einem elektronischen Gerät für ein Fahrzeug assoziierten Daten

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005055502A2 (fr) * 2003-12-01 2005-06-16 Interdigital Technology Corporation Protocole de lancement de session a base de transfert a la demande
WO2017024100A1 (fr) * 2015-08-04 2017-02-09 Convida Wireless, Llc Gestion de qualité de service de couche de service de bout en bout de l'internet des objets
WO2017095701A1 (fr) * 2015-12-04 2017-06-08 T-Mobile USA, Inc Concentrateur

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102010008816A1 (de) * 2010-02-22 2011-08-25 Continental Automotive GmbH, 30165 Verfahren zur Online-Kommunikation
US10298650B2 (en) * 2016-04-20 2019-05-21 Vasona Networks, Inc. Maximum sustainable encoding bit rates for video downloads

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005055502A2 (fr) * 2003-12-01 2005-06-16 Interdigital Technology Corporation Protocole de lancement de session a base de transfert a la demande
WO2017024100A1 (fr) * 2015-08-04 2017-02-09 Convida Wireless, Llc Gestion de qualité de service de couche de service de bout en bout de l'internet des objets
WO2017095701A1 (fr) * 2015-12-04 2017-06-08 T-Mobile USA, Inc Concentrateur

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "Zigbee - Wikipedia", 24 July 2019 (2019-07-24), XP055729069, Retrieved from the Internet <URL:https://en.wikipedia.org/w/index.php?title=Zigbee&oldid=907690797> [retrieved on 20200909] *
IEEE: "IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications;IEEE Std 802.11-2012 (Revision of IEEE Std 802.1", 29 March 2012 (2012-03-29), pages 1, 44 - 91, 417, XP002713576, ISBN: 978-0-7381-7211-8, Retrieved from the Internet <URL:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6178212> [retrieved on 20130925] *

Also Published As

Publication number Publication date
DE102019120331A1 (de) 2021-01-28

Similar Documents

Publication Publication Date Title
DE60011147T2 (de) Verfahren und system zur kontrolle des herunterladens von software- und firmwareobjekten uber ein kabelfernsehsystem
DE112012002362B4 (de) Automatisierte Empfehlungen für Cloud-Computing-Optionen
EP3652656B1 (fr) Dispositifs destinés à fournir une quantité d&#39;enregistrements unitaires de transactions, protégés de manière cryptographique et filtrés ainsi que triés, d&#39;un maillon d&#39;une chaîne de blocs
DE102014012257A1 (de) Aktualisierungsmanagement
DE102016201666B4 (de) System und verfahren zur flexiblen gerätepaarung unter verwendung der adaptiven variablen schwellenwertbildung
DE602005004214T2 (de) Kommunikationssystem and Verfahren zur Aktualisierung von Software in einem Endbenutzergerät
DE60211254T2 (de) Fernereignis Behandlung in ein Paketnetzwerk
DE102015002541A1 (de) Verfahren und system zum bereitstellen eines effizienten verwundbarkeitsverwaltungs- und verifikationsdienstes
EP2529529A1 (fr) Procédé de téléchargement sécurisé de sources de téléchargement réparties
DE112016002340B4 (de) Verwendung eines Netzwerks, um ein zweites Netzwerk in Betrieb zu nehmen
DE102016203598A1 (de) Gemeinschaftliche sammlung von diagnosedaten von softwareprogrammen
WO2016092003A1 (fr) Procédé de mise à jour de microprogramme d&#39;appareils
WO2021018489A1 (fr) Transmission de données à un dispositif iot
WO2021249920A1 (fr) Dispositif de configuration, serveur de mise à jour et procédé de mise à jour d&#39;un logiciel d&#39;une installation technique
DE102013100139A1 (de) Prozessdaten-Gateway in einem dezentralen Automatisierungssystem auf Basis der Webtechnologie
DE102021127358A1 (de) Automatische Einrichtung von drahtlosen oder drahtgebundenen Netzen durch Bündelung von Gateways und Tunnelung des Datenverkehrs zu den Gateways
EP3529967A1 (fr) Procédé de liaison d&#39;appareils avec ledit nuage, programme d&#39;ordinateur avec une mise en uvre du procédé et unité de traitement pour l&#39;exécution du procédé
WO2016045736A1 (fr) Production de valeurs de processus dans un système de processus
WO2001098899A2 (fr) Surveillance de serveurs
EP3118768A1 (fr) Procede de formation d&#39;un environnement virtuel dans un systeme d&#39;exploitation d&#39;un ordinateur
EP3285162A1 (fr) Procédé de projection d&#39;un projet et système d&#39;exécution du procédé
DE102010043718A1 (de) Automatische Verbindungsanalyse für ein DICOM-Netzwerk
WO2016092006A1 (fr) Système de gestion de microprogrammes ainsi que procédé de gestion de microprogrammes pour la mise à jour de microprogrammes d&#39;appareils
EP3681099A1 (fr) Procédé de fonctionnement d&#39;un système informatique pour une installation d&#39;automatisation et / ou installation de fabrication ainsi que système informatique
DE102020108230A1 (de) Verfahren zur Fernbedienung eines Feldgeräts

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20739576

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: FESTSTELLUNG EINES RECHTSVERLUSTS NACH REGEL 112(1) EPUE (EPA FORM 1205A VOM 18/04/2023)

122 Ep: pct application non-entry in european phase

Ref document number: 20739576

Country of ref document: EP

Kind code of ref document: A1