Sign In to Follow Application
View All Documents & Correspondence

Authentication Method For Connecting A Companion Device When Same Is Disconnected From A Subscriber Device

Abstract: The invention relates to an authentication method for a system including a subscriber device and a companion device. The authentication method includes the issuing (E21) by the subscriber device (10) to the companion device (20) of a temporary profile and of an authentication reply signed by the subscriber device and sent to the server (41) the installation (E31) of the temporary profile to configure a second wireless communication interface of the companion device (20) the request for a second authentication (E41) with the server (41) via the second interface using the authentication reply issued so as to authorize the second interface when the companion (20) and subscriber (10) devices are not communicating via the first communication interface. The invention applies to systems including subscriber and companion devices such as watches and connected objects.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
19 December 2017
Publication Number
04/2018
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2024-05-15
Renewal Date

Applicants

OBERTHUR TECHNOLOGIES
420 rue dEstienne dOrves 92700 Colombes

Inventors

1. WOZNIAK Tomasz
c/o OBERTHUR TECHNOLOGIES 420 rue dEstienne dOrves 92700 Colombes
2. LARIGNON Guillaume
c/o OBERTHUR TECHNOLOGIES 420 rue dEstienne dOrves 92700 Colombes

Specification

The field of the invention relates to an authentication method from a mobile telephony operator authentication server for a companion device connectable to a communication service of the operator via a subscriber device.

The mobile phone market sees appearing clothing accessory devices also told companion devices that connect to a communication service of a mobile operator through the mobile phone when it is authenticated to the network through its telephone subscription . For example, in the case of connected watches, these allow the user to receive notifications of emails, the weather service or phone calls when the watch is connected to the mobile phone via a short-range communication, typically a communication according to the Bluetooth standard. To function, the watch must be near the phone.

However, it is common that the user forgets their mobile phone in a place. Often, for cost reasons of integration and reducing the watch is not equipped with a subscription card (SIM card for "Identy Subscriber Module" in English) to the telephone network. It is so devoid of communication allowing it to receive the desired content because of its distance to the mobile phone

There are a software environment which provides a watch, when the user moves away from his mobile phone, the initiation of a connection via a wireless interface instead of the Bluetooth interface. This reconfiguration Communications keeps watch connectivity to a range of several tens of meters.

However, this solution is not feasible when the user moves away from several kilometers, eg when away from home.

US20130262629A1 the patent document describing a system is known comprising a base device and a satellite device, the latter running through the base device attached mode, via a wired connection. The system provides for establishing a tunnel connection between the base and the satellite due to a prior exchange of tunnel key pair when they are connected for mutual authentication.

It is also known US8898743B1 patent describing a content control method for a multimedia device via a plurality of communication interfaces.

These documents describe methods of accessing content services but do not offer solutions to authenticate individually to a communication network when a companion device is removed from the device subscriber.

More specifically, the invention relates to an authentication method with an authentication server of a mobile operator for a companion device connectable to a communication service of the operator via a subscriber device which operated a first authentication with the server, the companion device being in communication with the subscriber device via a first wireless communication interface of short range. According to the invention, the method comprises the following steps:

- the issuance by the subscriber device to the companion device for a temporary profile and an authentication response signed by the subscriber device to the server;

- the installation of temporary profile to configure a second wireless communication interface of the companion device;

- the application of a second authentication via the second interface to the server using the authentication response fed so to enable the second interface when the companion devices and subscriber are not in communication via the first communication interface .

Alternatively, the authentication response was signed by the subscriber device to operate the first authentication.

Alternatively, the method also comprises a step of notification of the subscriber device from the authentication server to allow the authentication response to be used in the second authentication.

Alternatively, the notification includes the authentication response.

Alternatively, the authentication response is encrypted by the subscriber device before delivery, eg by means of a public key of the companion device, or using a known secret data of the subscriber device and the companion device. The secret data can be either symmetrical or asymmetrical.

Alternatively, the delivery of the authentication response is performed via the first interface or a third secure short-range interface, for example according to ISO / IEC 14443 standard.

Alternatively, the method comprises a step to communication from the authentication server and / or a service server of a user the presence of information from the companion device so as to trigger a redirection services from the service server directly to the companion device via the second interface.

Alternatively, the second interface is a mobile communication module and the authentication response includes at least one response cryptogram having been generated from a random issued by the authentication server and encrypted with a private key hosted by the subscriber device.

Alternatively, the second interface conforms to the standard IEEE802.il and the authentication response allows the companion device to operate an EAP type of authentication.

The invention also provides a system comprising a companion device and a subscriber device to authenticate the companion device with an authentication server of a mobile operator, the companion device connectable to a communication service of the operator via a subscriber device which has made a first authentication with the server, the companion device being in communication with the subscriber device via a first wireless communication interface of short range.

According to the invention, the subscriber device comprises a means for delivering to the companion device a temporary profile and an authentication response signed by the subscriber device to the server; the companion device comprises means for installing the temporary profile to configure a second wireless communication interface of the companion device; the companion device comprises means for performing a second authentication via the second interface to the server using the authentication response fed so to enable the second interface when the companion devices and subscriber are not in communication via the first communication interface.

Thanks to the invention, the companion device remains connected when the subscriber device is removed. The invention eliminates the cost of additional secure integrated circuit that will host identifiers and cryptographic means permanently.

Other features and advantages of the present invention will become more apparent from reading the following detailed description, including embodiments of the invention given as non-limiting examples and illustrated by the accompanying drawings, wherein:

1 shows the method of authenticating a companion device and a subscriber device in accordance with the invention;

2A shows the system formed by the companion device and the subscriber device when they are in communication;

2B shows the system formed by the companion device and the subscriber device when they are no longer in communication.

The method according to the invention is directed to a system comprising a companion device and a subscriber device with a communication fee to a service of a mobile operator. Figure 1 shows the authentication method for a subscriber device 10 and a companion device 20 of a cellular telephone network access to which is controlled by an authentication server 41. The cellular telephone network supports data exchange consistent voice and data to an IP network, such as 2G, 3G or 4G. It is possible that the phone operator also includes an alternative communication network without average hotspots scope, WIFI type. The access points are connected to a wired data network, e.g., ADSL or optical fiber types. The authentication server 41 also controls access to the network. The authentication server 41 is a functional entity distributed on one or more physical entity working sets.

We hear the term companion device 20, an electronic device do not benefit from an autonomous and permanent authentication module to identify itself to the server 41. The companion device is associated with a subscriber device 10 includes all means identification to operate independently authenticate with the server 41. it is understood that the companion device is not designed to work only to enjoy the services of the mobile operator.

The Cl identification means of the device 10 are a subscriber subscriber profile, the private encryption keys, encryption algorithms, and any identification parameter. The subscription profile in response to a server ID request 41 generates an authentication response, such as a signed ciphertext that was generated by encrypting a challenge provided by the server using a private key and an encryption algorithm.

Through authentication to a telephone network, it is a subscriber profile to the phone operator to connect to the mobile network, including the identifier of the subscriber [IMSI called for "International Mobile Subscriber Identity "in English), private keys, operator, or master key derivation key used to encrypt a random or from the server to encrypt data communications, as well as files and connection settings to the server 41.

In one embodiment, the method also allows to operate EAP authentication ( "Extensible Authentication Protocol" in English) from an access point of a wireless network without average range WIFI type. The identification means are Cl the subscriber profile, encryption keys, encryption algorithms to operate an authentication via the wireless access point.

It is conceivable that the identification means Cl operate both authentication to a cellular network and an access point.

The subscriber device 10 includes a secure integrated circuit 13 or trusted software environment meets the safety standards and constraints. The integrated circuit or trusted environment (TE for "Trusted Environment" in English) are called secure because access to the memory of the integrated circuit is protected by a password or passphrase. It is also not possible to read data fraudulently. The integrated circuit is a SIM card, a secure element embedded (ESE for "Embedded Secure Element" in English). Preferably, the identification means Cl subscriber device 10 are housed in the secure integrated circuit 13, or the trusted software environment.

Meanwhile, the companion device 20 is not equipped with a secure integrated circuit specifically designed to authenticate to the server 41. The companion device does not store permanent means of identification and thus avoids a costly certification an integrated and provisioning chain circuit. The companion device may be a clothing accessory, such as a watch, or more generally any object that is connected to a communication service via a subscriber device, for example a

TV, tablet, or multimedia equipment in a vehicle connected via Bluetooth or WiFi.

According to FIG 1, the authentication method comprises a first phase of authentication of subscriber device 10 with the authentication server 41 of the mobile operator. The subscriber 10 is in communication via a first short-range wireless communication interface (Bluetooth, WiFi) with the companion device 20. As long as the subscriber device does not authenticate the server 41 or the subscriber device 10, or companion device 20 have the ability to make and receive calls and data, for example data from the mobile phone network. They can only exchange information locally, that is to say the information contained in one or the other devices via the first communication interface.

During a step E01, upon receiving an identifier of the subscriber device 10 (IMSI), the server 41 identifies the one or more private keys accommodated in the subscriber module, is housed in the secure integrated circuit 13 or be a secure environment . During this step E01, the server 41 generates a random, also known challenge that is transmitted to the subscriber device 10 to authenticate the authentication response. According to conventional authentication process, the server 41 also encrypts the random with the private key of subscriber device, the key being known in its databases from the IMSI identifier. The server 41 generates the verification cryptogram which is then used to authenticate the authentication response from the subscriber device 10 by comparing the signed authentication response and the verification ciphertext.

In a step E03, the device operates 10 subscriber authentication operations including generating at this stage the authentication response from the private key and random from the server 41. The authentication response is a signature cryptogram obtained by the execution of an encryption algorithm, such MILENAGE, COMP128, A3, A8 according to the GSM standard for Global System for Mobile communication. The authentication response SRES is known as the acronym for a signed response.

At step E02, the exchanges between the subscriber device 10 and the server 41 operate via the mobile phone network to perform the first authentication.

If authentication of the subscriber device to the server 41 is successful, it is allowed to receive and send calls and data over the mobile phone network. The steps E01, E02 and E03 are the conventional steps of an authentication phase to a mobile phone network.

Alternatively, the steps E01, E02, E03 are stages of EAP authentication type subscriber device with a compliant access point to the IEEE802.il standard.

Then, when the companion devices and subscriber are in communication via the short-range wireless interface (Bluetooth, WIFI), they can exchange data. The data is received by the subscriber device 10 and from the mobile network via its GSM interface managed by the mobile operator administering the authentication server 41.

At a step Eli, the subscriber device receives data from the mobile phone network via the GSM interface. At a step E12, the exchanges take place between the subscriber device 10 and the companion device 20 via the short-range wireless communication interface and a step E 3, the companion device 20 receives and processes the data, notifications display, emails etc .. the companion device 20 is operational to function normally through the subscriber device 10.

2A shows the companion and subscriber devices when they are in communication via the communication interfaces short range wireless 12, 22 respectively.

The subscriber device 10 includes the secure integrated circuit 13 containing the Cl authentication bundle may develop an authentication response generated during authentication with the server 41. It comprises the interface 11 for communicating with the mobile telephony network 40 .

The companion device 20 includes interface 22 for communicating with the subscriber device 10 and an interface 21 for communicating with a mobile telephony network. The interface 21 at this stage of the process is not authorized to authenticate with a mobile network because it does not include identification and authentication means to the operator's network.

It also includes other communication interfaces 24, 26 to communicate according to a wireless protocol or ISO / IEC 14443 protocol in near field respectively.

The companion device 20 includes a secure integrated circuit 23 with secure applications or data to operate with the interface 26 in close communication fields. Applications are payment or transport applications, for example. The applications hosted in the secure integrated circuit 23 can exchange in accordance with ISO / IEC 14443 protocol with the interface 26.

Note that a server 43 management multimedia services or content exchange (calls, data, information, notifications, SMS ( "Short Message Service" in English)) controls the sending of data to applications hosted in the subscriber device 10. the companion device 20 then receives data from the server 43 via the subscriber device 10. the arrows 44 represent the flow of data transmitted by the service server 43.

Furthermore, the authentication method includes a step E20 preparing a C2 authentication packet to be transmitted to the companion device 20 via the interface 22, short range. The authentication bundle comprises at least a temporary profile and an authentication response signed by the subscriber device 10, preferably in the first authentication E03. The authentication package preferably also includes connection parameters to the server 41. The temporary subscriber profile comprises for example a temporary IMSI number associated with the subscriber profile of the subscriber device 10. Other authentication responses can be included according to first operated authentication.

C2 authentication package is a software package including files, scripts and parameters necessary for software installation in the companion device 20 to perform authentication functions with a communication interface. For example, the software package can include a sequence of control instructions APDU ( "Application Protocol Data Unit") to install the authentication package in the secure element 23.

Note that the temporary profile is recognizable by the server 41 as it is associated with the subscriber profile present in the device 10. The temporary subscriber profile can be a subscriber profile clone or an identifier derived from the ID of the subscriber. The profile is temporary because it is valid for a limited period, such as a preset time by the server 41.

At a step E21, the method comprises providing temporary profile and the authentication response to the companion device 20 via the short wireless communication interface device carried by the subscriber. The steps E20, E21 can be executed on initiative of the user, automatically in a scheduled refresh, or as a result of an authentication event subscriber device 10 with the authentication server 41.

Alternatively, the issuance of the temporary profile and the authentication response is performed via another wireless interface secure short-range 26, for example an interface according to ISO / IEC 14443. This interface has a range of a few centimeters . The preparation of the authentication packet and exchange are operated on the user's initiative or at the request of the subscriber device or companion device via an application and the devices screen. Note that the subscriber device 10 is then also equipped with a short-range wireless communications interface in accordance with ISO / IEC 14443.

At step E31, the method comprises the E31 installation of temporary profile of the subscriber belonging to the C2 authentication package to configure a second wireless communication interface 21, 24 of the companion device 20. The installation is the phase of writing temporary profile in the secure element 23. This is for example the setting of the connection (access address to the server), the choice of authentication protocol. The signed authentication response transmitted when issuing E21 is stored in the secure element 23.

In addition, it is provided in the context of the invention the C2 authentication package installed in the integrated circuit 23 can operate exchanges with the interfaces 21, 24 for communication. C2 allows authentication package including conducting an authentication protocol in accordance with an authentication protocol with a cellular network via the interface 21 and / or a network compliant with the standard IEEE802.il 24 via the interface.

2B shows the situation when the subscriber device 10 is away from the companion device 20 so that the interface 22 is no longer in communication with the interface 12, for example when the user leaves home and forgets are phone. The interface 22 is no longer synchronized with the interface 12 and is no longer authorized to receive data. The end of the communication is detected by a detection event of the companion device 20 and the subscriber device 10. The detection event can be a communication status indicating the presence of communication or loss of communication.

Alternatively, the method further comprises a notifying step E22 of the subscriber device 10 to the authentication server 41 to allow the authentication response to be used during a second authentication E41. This notification is triggered by the status of communication. 10 When the subscriber device detects the end of communication event with the companion device 20 via the interfaces 12, 22, E22 notification is issued.

The E22 notification may include an identifier of the authentication response to authorize the data required for the generation of the authentication response, the authentication response or an authentication response the derivative enabling the server 41 to perform E43 the verification of the second authentication.

At step E23, the server 41 allows a second authentication with the use of the authentication response signed by the subscriber device 10 and a temporary subscriber profile.

The steps E22, E23 allow the server 41 to secure the use of the authentication response signed by the subscriber device with a companion device. If notification is not received, the server refuses a second authentication with the authentication response.

At a step E41, the process comprises a second authentication of the companion device 20 to the server 41 using the authentication response signed by the subscriber device via the second interface 21. The second authentication is used to enable the second interface when the companion devices 20 and subscriber 10 are not in communication via the first communication interface 22. An authentication protocol application controls the E42 exchanges with the server 41.

the second authentication Note that is made when the status of end of communication between the subscriber device and the companion device is detected.

At a step E43, the method comprises the steps of the authentication response verification from the companion device. Authentication is accepted if the signature of the authentication response is consistent with the identity of the subscriber and the server 41 has been previously notified of the use of the authentication response if necessary.

In case of non compliance of the authentication response with the temporary identity of the subscriber 10, the server refuses authentication step E43.

Note that the authentication response has been signed by the subscriber device 10 and transmitted to the server 41 during the first authentication E03. The authentication response was signed by the subscriber device to operate the first E03 authentication.

Alternatively, the server 41 has transmitted a challenge which is then derived by the subscriber device, the derivation can be executed in parallel at the server 41 according to the known rules of the two entities. A challenge derivative can be signed and sent to the companion device 20 to perform the second authentication.

It is also possible that the server during a first authentication transmits several challenges to generate several authentication responses that are then signed by the subscriber device.

Alternatively, the authentication request E41 conforms to EAP protocol and is operated to enable the E24 companion interface device 20 to communicate with an access point 42 in accordance with the IEEE802.il standard. This variant is carried out when the first E03 authentication with the server 41 is compliant with the EAP protocol for a wireless subscriber interface of the device 10.

It is possible that the server 41 delegates authentication steps to a trusted authenticator network operator 42, for example to a WiFi access point.

Moreover, in a variant E22 notification also triggers a redirection services (data stream 44) of the 43 management server to direct them to the companion device 20 directly at the same time as the device subscriber 10, or in another mode exclusively to the companion device 20. for this, it is possible that the authentication server 41 transmits an order to redirect to the server 43.

Alternatively, the E22 notification is also transmitted to the server 43 management multimedia services or content exchange to a service application companion device 20 and the subscriber device 10, the notification is transmitted directly to the server 43 service management.

Alternatively, the order of forwarding is also based on the detection of a successful authentication server E43 41 with the companion device 20.

Alternatively, the method comprises a second notification E51 companion device 20 to the server 41 and / or the service server 43 of information

presence of the user company companion device 20. The presence information is a result of E50 successful action on a user interface of the companion device (screenshot button actuation, catch voice or audio message, fingerprint reading, reading pulse, reading a heartbeat or capture camera) or a successful request input E50 of a secret code, read fingerprint or voice detection by the user on the companion device 20.

The server 41 generates a sequence E52 Feed Redirect 44 destination services from service server 43 according to presence information. If the presence information indicates the presence of the user, the service flow 44 is led directly to the companion device 20, exclusive or not.

The second notification E51 is emitted by the device 20 when the second authentication is successful and the communication interface 21 (or 24) is authorized by the server 41.

In this situation, the server 41 (the server 43 and parallel multimedia services or content exchange) is informed that the subscriber device 10 is temporarily removed from the user, due to the connection between break-detecting companion device and the subscriber device (via the communication E22) and, the detection of the presence of the user with the companion device 20 (via the second communication E51).

Note also that the method comprises in one embodiment a step (not shown in the figure) of the user authentication by the entry of a secret code, reading fingerprint or voice detection on the companion device to allow the second request of 'E41 authentication. Thus, the use of authentication signed response is secured against the use of an unrecognized third.

The authentication process avoids the use of a SIM secure integrated circuit of a telephone operator to be certified by official bodies to house permanently an authentication package, including private cryptographic keys, with the authentication server 41. It is conceivable to use for example the integrated circuit 23 to house the NFC payment applications ( "Near Field Contact"). The process leverages the security of the IC 23 used by other secure applications while avoiding the cost of a second SIM type integrated circuit and the necessary certification.

In the case of authentication with the telephone network, the profile temporary subscriber and the authentication response are temporarily stored and deleted when

the companion device is again in communication with the subscriber device 10 via the interface 21, 22 for short range. The deletion order is based on the communication detection event or function of an order from the server 41

CLAIMS

1. authentication method with an authentication server (41) of a mobile operator for a companion device (20) connectable to a communication service (40; 42) of the operator by via a subscriber device (10) has operated a first authentication (E03) from the server (41), the companion device (20) being in communication with the subscriber device (10) via a first wireless communication interface short-range (22), characterized in that it comprises the following steps:

- issuing (E21) by (10) the subscriber device to the companion device (20) of a temporary profile and an authentication response signed by the subscriber device to the server (41);

- installation (E31) from the temporary profile to configure a second wireless communication interface (21; 24) of the companion device (20);

- the application of a second authentication (E41) via the second interface (21; 24) to the server (41) using the authentication response fed so to enable the second interface when the companion devices (20 ) and subscriber (10) are not in communication via the first communication interface (22).

2. Method according to claim 1, characterized in that the authentication response has been signed by the subscriber device (10) to operate the first authentication (E03).

3. Method according to any one of claims 1 to 2, characterized in that it further comprises a notification step (E22) of the subscriber device (10) to the authentication server (41) to allow the response of authentication to be used in the second authentication (E43).

4. A method according to claim 3, characterized in that the notification (E22) includes the authentication response.

5. A method according to any one of claims 1 to 4, characterized in that the authentication response is encrypted by the subscriber device (10) prior to the issuance (E21).

6. A method according to any one of claims 1 to 5, characterized in that the issue of the authentication response is performed via the first interface (22) or a third interface (26) secure short-range, for example according ISO / IEC 14443.

7. Method according to any one of claims 1 to 6, characterized in that it comprises a step of notifying (E51) to the authentication server (41) and / or a service server (43) a user the presence of information from the companion device (20) so as to trigger a redirection (E52) services from the service server (43) directly to the companion device (20) via the second interface (21; 24).

8. A method according to any one of claims 1 to 7, characterized in that the second interface (21) is a mobile communication module and the authentication response includes at least one response cryptogram having been generated from a random issued by the authentication server (41) and encrypted with a private key hosted by the subscriber device (10).

9. A method according to any one of claims l to 7, characterized in that the second interface (24) is consistent with the IEEE802.il standard, and the authentication response allows the companion device to operate EAP type of authentication .

10. System comprising a companion device (20) and a subscriber device (10) for authenticating the partner device (20) from an authentication server (41) of a mobile operator, the companion device (20) connectable to a communication service (40; 42) of the operator via a subscriber device (10) has operated a first authentication (E03) from the server (41), the companion device (20 ) being in communication with the subscriber device (10) via a first communication interface short-range wireless (22), characterized in that:

- the subscriber device (10) comprises means for providing (E21) to the companion device (20) a temporary profile and an authentication response signed by the subscriber device to the server (41);

- the companion device (20) comprises means for installing (E31) the temporary profile to configure a second wireless communication interface (21; 24) of the companion device (20);

- the companion device (20) comprises means for performing a second authentication (E41) via the second interface (21; 24) to the server (41) using the authentication response fed so to enable the second interface when the companion devices (20) and subscriber (10) are not in communication via the first communication interface (22).

Documents

Application Documents

# Name Date
1 201717045660-STATEMENT OF UNDERTAKING (FORM 3) [19-12-2017(online)].pdf 2017-12-19
2 201717045660-PRIORITY DOCUMENTS [19-12-2017(online)].pdf 2017-12-19
3 201717045660-FORM 1 [19-12-2017(online)].pdf 2017-12-19
4 201717045660-FIGURE OF ABSTRACT [19-12-2017(online)].pdf 2017-12-19
5 201717045660-DRAWINGS [19-12-2017(online)].pdf 2017-12-19
6 201717045660-DECLARATION OF INVENTORSHIP (FORM 5) [19-12-2017(online)].pdf 2017-12-19
7 201717045660-COMPLETE SPECIFICATION [19-12-2017(online)].pdf 2017-12-19
8 abstract.jpg 2018-01-12
9 201717045660-certified copy of translation (MANDATORY) [29-01-2018(online)].pdf 2018-01-29
10 201717045660-OTHERS-020218.pdf 2018-02-08
11 201717045660-Correspondence-020218.pdf 2018-02-08
12 201717045660-FORM-26 [05-03-2018(online)].pdf 2018-03-05
13 201717045660-certified copy of translation (MANDATORY) [08-03-2018(online)].pdf 2018-03-08
14 201717045660-OTHERS-080318.pdf 2018-03-19
15 201717045660-Correspondence-080318.pdf 2018-03-19
16 201717045660-FORM 3 [25-04-2018(online)].pdf 2018-04-25
17 201717045660-FORM 3 [25-04-2018(online)]-1.pdf 2018-04-25
18 201717045660-Proof of Right (MANDATORY) [25-05-2018(online)].pdf 2018-05-25
19 201717045660-OTHERS-290518.pdf 2018-06-04
20 201717045660-OTHERS-290518-.pdf 2018-06-04
21 201717045660-Correspondence-290518.pdf 2018-06-04
22 201717045660-FORM 18 [31-05-2019(online)].pdf 2019-05-31
23 201717045660-FORM 4(ii) [17-06-2021(online)].pdf 2021-06-17
24 201717045660-OTHERS [21-09-2021(online)].pdf 2021-09-21
25 201717045660-FORM 3 [21-09-2021(online)].pdf 2021-09-21
26 201717045660-FER_SER_REPLY [21-09-2021(online)].pdf 2021-09-21
27 201717045660-CLAIMS [21-09-2021(online)].pdf 2021-09-21
28 201717045660-FER.pdf 2021-10-18
29 201717045660-PatentCertificate15-05-2024.pdf 2024-05-15
30 201717045660-IntimationOfGrant15-05-2024.pdf 2024-05-15

Search Strategy

1 searchE_28-12-2020.pdf

ERegister / Renewals