Sign In to Follow Application
View All Documents & Correspondence

Mapping Universal Plug And Play Discovered Items To An Smb Location

Abstract: ABSTRACT OF THE DISCLOSURE MAPPING UNIVERSAL PLUG AND PLAY DISCOVERED ITEMS TO AN SMB LOCATION An arrangement is provided in which a Univeral Plug and Play (UPnP) device exposes a service for mapping a UPnP discovered content item to a server message block (SMB) location. The service is arranged to expose an SMB share path to a user at a remote client using a UPnP protocol. The user is then enabled with access to the share via SMB to gain file access, write changes or exercise file level control of the discovered content item. Authentication is optionally utilized to verify that the user is authorized to receive the SMB share location from the service or to verify that the user is authorized to access the SMB share.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
01 January 2009
Publication Number
22/2009
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2018-01-30
Renewal Date

Applicants

MICROSOFT CORPORATION
ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052-6399

Inventors

1. WALTER, JAMES
ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052-6399
2. PLASTINA, DAN
ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052-6399
3. SRINIVAS, KASY
ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052-6399
4. KLEMETS,ANDRES
ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052-6399
5. SCHIEFELBEIN,WILLIAM F.
ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052-6399

Specification

BACKGROUND
[0001] With the addition of device level Plug and Play (PnP) capabilities it became a great deal easier to setup, configure, and add peripherals to consumer electronic devices and personal computers (PCs). Universal Plug and Play (UPnP™) extends this simplicity to include the entire network, enabling discovery and control of networked devices and services, such as network-attached printers, Internet gateways, and consumer electronics equipment. The UPnP networking protocols are promulgated by the UPnP Forum which is an industry initiative designed to enable simple and robust connectivity among stand¬alone devices and PCs from many different vendors.
[0002] UPnP is more than just a simple extension of the Plug and Play peripheral model. It is designed to support zero-configuration, "invisible", networking, and automatic discovery for a breadth of device categories from a wide range of vendors. With UPnP, a device can dynamically join a network, obtain an IP (internet protocol) address, convey its capabilities, and learn about the presence and capabilities of other devices—all automatically to thereby facilitate the construction of zero configuration networks. Devices can subsequently communicate with each other directly using peer-to-peer networking to access and share content.
[0003] The variety of devices that can benefit from a UPnP enabled network are large and include, for example, intelligent appliances, wireless devices, and PCs of all form factors. The scope of UPnP is large enough to encompass many existing and new applications in such areas as home automation and networking, printing and imaging, audio/video entertainment, kitchen appliances, automobile networks, and mobile device network among others.
[0004] UPnP is a distributed, open network architecture that is independent of any particular operating system, programming language, or physical medium. However, UPnP uses standard protocols such as TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol) and XML (extensible Markup Language), enabling it to seamlessly fit into existing networks. Using such standardized protocols allows UPnP to benefit from interoperability as an inherent feature.
[0005] UPnP uses a content directory service that implements a set of functions to provide access to content items (e.g., data files, music, software, pictures, video, games, etc.) stored in a content repository on a local UPnP device to remote UPnP devices on the UPnP network. The function of a content directory service is to allow browsing and

searching of the content items in the repository. Each content item that is referenced in the content directory service includes various information about that content including the transfer protocols and file formats that the local device can use to transfer the content items to a remote device. As with all UPnP services, remote devices interact with the content directory service using Simple Object Abstraction Protocol (SOAP) calls using HTTP.
[0006] After the desired content item has been identified, for example, using a resource or tag in an XML document, the remote device uses the transfer protocol information from the content directory service to match it with the capabilities of a media player in the remote device. Common transfer protocols include HTTP GET and RTSP/RTP (Real Time Streaming Protocol, Real Time Transport protocol), for example. Transferred content is then rendered by the remote device using another UPnP service (the AV Transport Control Service), or a non-UPnP out-of-band protocol, to control the flow of the content (e.g., stop, fast forward, rewind, pause, etc.).
[0007] While UPnP performs very satisfactorily in many networking applications, current implementations do not provide users of a UPnP device with file access to content items that are discovered on other UPnP devices connected to a network. That is, a user is limited to only being able to see that a content item exists and perhaps make a request for read-only consumption. No write changes to a discovered content item or file level control of the content item may be implemented in the existing UPnP environment. SUMMARY
[0008] An arrangement is provided in which a UPnP device exposes a service for mapping a UPnP discovered content item to a server message block (SMB) location. The service is arranged to expose an SMB share path to a requesting user at a remote client using a UPnP protocol. The user is then enabled with access to the share via the SMB protocol to gain file access, write changes or exercise file level control of the discovered content item. Authentication is optionally utilized to verify that the user is authorized to receive the SMB share location from the service or to verify that the user is authorized to access the SMB share.
[0009] In various illustrative examples, a content item is mapped to the most direct available SMB location for a particular user and file. Either an existing UPnP service is extended, or a new UPnP service is utilized, to expose the SMB location to a requesting user in response to a UPnP Browse or Search command through the use of an additional tag that is included in an XML formatted response to the requesting user.

[0010] Advantageously, the present arrangement affords users and devices with
greater access and control over content items that are discovered over a UPnP network.
DESCRIPTION OF THE DRAWINGS
[0011] FIG 1 is a pictorial representation of an illustrative home network that is
arranged to utilize UPnP;
[0012] FIG 2 is a block diagram of a illustrative server and client architecture;
[0013] FIG 3 is a diagram showing an illustrative message flow between a content
directory service and a control point;
[0014] FIG 4 is a diagram showing another illustrative message flow between a
content directory service and a control point;
[0015] FIG 5 is an illustrative XML document that includes a tag which
includes an SMB path;
[0016] FIG 6 is a flowchart of an illustrative method for providing a content directory
service to a requesting user;
[0017] FIG 7 is a flowchart of an illustrative method for identifying and exposing an
SMB share location to a requesting user;
[0018] FIG 8 is a block diagram of an illustrative content repository showing the
directory structure contained therein; and
[0019] FIG 9 is a diagram showing an illustrative message flow between an SMB
server and an SMB client.
DETAILED DESCRIPTION
[0020] Turning to the drawings, where like numerals designate like components or
elements, FIG 1 is a pictorial representation of an illustrative home 100 in which a variety
of devices are coupled to a home network 102. In the den 105 of the home 100, a PC 110
stores a family's photographs. A second PC 116 is located in the living room 123 and
coupled to a big screen television 128. A game console 132 is located in a bedroom 136.
PC 110, PC 116 and game console 132 are each coupled to home network 102 which, in
this illustrative example, is arranged as a UPnP network. UPnP networks may be arranged
using a variety of network media including, for example, phone line, power line, Ethernet,
wireless RF (radio frequency), and IEEE 1394 (Institute of Electrical and Electronic
Engineers).
[0021] Using the present arrangement for mapping UPnP discovered items to an SMB
location, the family can gather in the living room 123 and view the photographs stored on
PC 110 on the big screen television 128. Using PC 116, the family is able to rate the

photographs, rotate them and even rename the photographs from the living room 123. These capabilities are enabled using the viewing properties of UPnP and HTTP while adding file operations over SMB in accordance with the present arrangement. An illustrative family photograph is stored on PC 110 and rendered as an image 150A on a monitor coupled to PC 110, image 150B on big screen television 128, and image 150C on a monitor coupled to game console 132, as shown in FIG 1.
[0022] SMB is a network file sharing protocol at the application/presentation layer in the OSI (Open Systems Interconnection) networking model. Accordingly, SMB may run over multiple lower layer protocols including, for example, NetBIOS (Network Basic Input/Output System) over TCP/IP, NetBEUI (NetBIOS Extended User Interface), or IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange). [0023] The set of message packets that defines a particular version of the SMB protocol is called a dialect. For example, CIFS (Common Internet File System) refers to the SMB dialect that was first implemented in the Microsoft Windows NT operating system. SMB and CIFS are also available on VMS (Virtual Memory System), several versions of Unix, and other operating systems. All dialects of SMB, including CIFS, are usable in the present arrangement and the particular SMB version or dialect selected will depend on the specific requirements of an application of mapping UPnP discovered content. The term "SMB" as used herein is intended to apply to all such SMB versions or dialects.
[0024] FIG 2 is a block diagram of a illustrative server and client architecture 200 including a server device 205 and a client device 212 which are each typically configured as a physical device or unit such as a PC, game console, etc. For example, server device 205 may be embodied in PC 110 (FIG 1) to share content items stored thereon such as family photographs, music, games, data, files and the like. Similarly, client device 212 may be embodied in PC 116 (FIG 1) or game console 132 (FIG 1) to receive content items from the server device 205.
[0025] Server device 205 and client device 212 are arranged with a MediaServer UPnP device 222 and a MediaRenderer UPnP device 228, respectively. UPnP devices are logical devices that do not have to reflect a particular physical set up. That is, a physical device may host several logical UPnP devices and the particular number of UPnP devices selected and their arrangement will depend on the requirements of a particular application of UPnP discovered item mapping. In addition to MediaServer UPnP device 222, server

device 205 includes a SMB server 231 that is arranged to communicate with an SMB client 235 in client device 212 over a network as indicated by line 238. [0026] MediaServer UPnP device 222 includes a content directory service 240 that is typically arranged as a Content Directory Service conforming to the definitions published by the UPnP Forum that is extended with additional functionalities described below. Alternatively, content directory service 240 is arranged as new service (named, for example, "SecureContentDirectoryService") that is accessed by requesting clients using existing UPnP protocols.
[0027J MediaRenderer UPnP device 228 includes a control point 251. In this illustrative example, control point 251 is a UPnP control point that is embedded in MediaRenderer UPnP device 228 which invokes actions on services while providing any required input parameters and receiving any output parameters, service responses and return values. MediaRenderer UPnP device 228 is typically arranged as a MediaRenderer conforming to the definitions published by the UPnP Forum that instantiates the client device 212 with the capability to render content items received from the server device 205. MediaRenderer UPnP device 228 is commonly configured to expose a set of rendering controls in which the control point 251 can control how a particular content item is rendered. In alternative arrangements of mapping UPnP discovered items to an SMB location, MediaRenderer UPnP device 228 is optionally utilized in cases where the server device 205 and client device 212 interact with each other using a non-UPnP (i.e., an out-of-band) communication protocol. For example, Windows® Media Player and Roku™ SoundBridge may be used to render content items.
[0028] In the server-client architecture 200, control point 251 accesses the content directory service 240 over a UPnP network as indicated by line 260 as shown in FIG 2. [0029] FIG 3 is a diagram showing an illustrative message flow between the content directory service 240 and control point 251. Control point 251 is used to discover other devices on a UPnP network such as home network 102 (FIG 1) by sending a discovery message 303, typically an M-Search command using SSDP (Simple Service Discovery Protocol). Content directory service 240 responds to the M-Search command using a SSDP message that contains the URI (Uniform Resource Identifier) of XML formatted device description documents which, in turn, contain the location of XML service description documents 306 for each available service. Control point 251 can download the service description documents 306 via HTTP, for example. MediaServer UPnP device 222 is thus able to expose content directory service 240 to the control point 251.

[0030] FIG 4 is a diagram showing another illustrative message flow between the content directory service 240 and control point 251. Control point 251 connects to the content directory service 240 using an authentication protocol such as Windows Negotiate, Kerberos, NTLM or the like. The use of any authentication process is optional (as indicated by dashed line 406 in FIG 4). If the authentication negotiation between the content directory service 240 and control point 251 is successful, the control point 251 is able to issue Search or Browse commands to the content directory service 240 using SOAP messages 413 via HTTP. The content directory service 240 responds to the Search or Browse commands with an XML document 418 that exposes a tag entry, typically among other entries, for the discovered content items that are mapped to SMB locations. The mapping is described below in the text accompanying FIGs 6-8. [0031] FIG 5 is an illustrative XML document 418 that includes a tag 505 which includes an SMB path. The SMB path is indicated in tag 505 as
\\10.194.65.100\toby\JC-myhorsenamedblue.wma which, in this illustrative example, indicates a Windows Media Audio (WMA) file located in a share named "Toby" on PC 110 in FIG 1 that has an IP address of 10.194.65.100. The WMA file is for a song titled "My Horse Named Blue" that is performed by Johnny Cowboy (where both the song and performer are fictitious). SMB paths for other types of files such as pictures (e.g., Joint Photographic Experts Group or JPEG formatted images having a file extension of JPG or JPEG) or video (e.g., Windows Media Video, RealVideo, Apple QuickTime, etc., formatted videos with file extensions of .wmv, .rm or .ram, and .mov, respectively) may be included in one ore more tags in a similar manner.
[0032] The XML document 418 also includes a tag 510 which identifies a URL for a WMA file that is accessed using HTTP GET, for example, as is provided by an existing UPnP MediaServer device. The URL is indicated in tag 510 as
http://10.194.65.100:10243/WMPNSSv3/847081666/2_eOEyMzhEQzg5LT
REMkItNDFFOSlBREE0LTdFQUE2MURERjREM30uMC5FRDAzQjJB
Mw.wma which, in this illustrative example, is the same WMA music file above using an abstracted path/naming convention that is commonly used.
[0033] FIG 6 is a flowchart of an illustrative method 600 for a UPnP device (such as MediaServer UPnP device 222 in FIG 2) to expose its content items via a content directory service (such as content directory service 240 in FIG 2) to a requesting user. The

requesting user is typically a user of a remotely located electronic device such as client device 212 including MediaRenderer UPnP device 228 in FIG 2. The illustrative method 600 starts at block 605. At block 612, a discovery message such as an M-Search command is sent from control point 251 (FIG 2) to search for UPnP devices of interest and is received at the MediaServer UPnP device 222. The MediaServer UPnP device 222 responds to the discovery message to thereby enable MediaServer UPnP device 222 and content directory service 240 to be discovered by the client device 212, as indicated at block 615. The content directory service 240 exposes content items to the requesting user at block 618 to provide various views of the stored content to thereby enable searching and browsing of content items available on. Using detailed descriptions of the content a search query can return a set of content items. Additionally, organization of content is support via containers, which can be used to cluster content similar to directories or folders. The illustrative method 600 ends at block 627.
[0034] FIG 7 is a flowchart of an illustrative method 700 for identifying and exposing an SMB share location to a requesting user using the content directory service provided in the method 600 (FIG 6) above. The SecureContentDirectory service noted above is usable to perform method 700. Alternatively, the existing UPnP Content Directory Service may be extended to perform the steps shown in FIG 7.
[0035] The illustrative method starts at block 702. At block 711, the content directory service receives a Search or Browse command from a requesting user. An optional authentication step is performed at block 715. The authentication protocol is selected from one of Windows Negotiate, Kerberos, NTLM or the like in most applications. [0036] The content directory service works to map the content item requested in the Search or Browse command at the method step shown in block 711 to the best SMB path. By "best" it is generally meant as the most direct SMB path to which the particular requesting user has access.
[0037] The concept of best SMB path is further illustrated in FIG 8 which is a block diagram of an illustrative content repository 800 showing the directory structure 811 contained therein. Content repository 800 is typically embodied as a memory such as a hard disk drive in a device such as PC 110 in FIG 1. As shown in FIG 8, directory structure 811 includes three shares 815, 822 and 825. In this illustrative example, there are three users of PC 110 including an Admin, Dad and Toby. A remote user wishing to access files in c:\home\toby would thus have three potential ways of accessing the files through each of the respective shares 815, 822 and 825. Admin has access to each of the

shares 815, 822 and 825 while Dad has access to both the Home share 822 and Toby share
825. Accordingly, to identify the best SMB path to expose, the UNC (Universal/Uniform
Naming Convention) path is determined based on the file contained in the request and the
credentials of the requesting user.
[0038] If Toby requests the file in the Toby share, the only available and best UNC
path to expose is \\server\toby\filename.
[0039] If Dad wants access to the same file, then there are two options based on
Dad's access level:
A. \\server\toby\filename
B. \\server\home\toby\filename
In this example, Option A is the best option because it represents the most
direct path. The media server service accordingly selects \\server\toby\filename as the best
SMB path if Dad is the requesting user.
[0040] If Admin is requesting access, there are three options:
A. \\server\toby\filename
B. \\server\home\toby\filename
C. \\server\c$\home\toby\filename
In this example, Option A is again the best option because it represents the
most direct path. The media server service accordingly selects \\server\toby\filename as
the best SMB path if Admin is the requesting user.
[0041] Returning to FIG 7, the media server service impersonates the requesting user
using the requesting user's credentials at block 721. At block 726, the media server
service, by using the local path to the requested file and acting as the impersonated
requesting user, calls a shell API (application programming interface) requesting the best
SMB path to the requested file. If the shell API returns with a SMB path, the media server
service will include that path in a tag included in the XML response to the
requesting user's Search or Browse command as indicated at block 731. Illustrative
method 700 ends at block 740.
[0042] Turning now to FIG 9, a diagram showing an illustrative message flow
between the SMB server 231 (FIG 2) and an SMB client 235 (FIG 2) is presented. The
illustrative messages comprise packets that are exchanged between SMB server 231 and
SMB client 235 using the SMB protocol after the media server service exposes the SMB
path to the requesting user as described above.
[0043] In this illustrative example, the SMB client 235 and SMB server 231 first

establish a full duplex TCP connection. Then the SMB client 235 builds and sends a
NetBIOS session request packet over the TCP connection. If the packet was formatted
correctly, the SMB server 231 returns a packet that contains a message acknowledging
that the session has been established. After this, the SMB client 235 sends a protocol
negotiation message 905 to SMB server 231 to negotiate the particular SMB dialect used
for the session.
[0044] The SMB server 231 responds to the request from SMB client 235 to identify
the SMB dialect that is going to be used in the session. The returned message 912 also
includes an 8-byte random string that will be used as an challenge as part of an optional
shared-key authentication process. SMB client 235 returns a response to the challenge in
message 916 which includes information regarding the capabilities of the SMB client 235.
As noted above, authentication is an optional process which is indicated in FIG 9 by the
dashed lines.
[0045] If the SMB server 231 accepts the response from the SMB client 235 to the
challenge, a valid UID (user ID) is included in the message 918 that is returned to the
SMB client 235. If it is not accepted, the SMB server 231 will return an error code in this
message and deny access.
[0046] The SMB client 235 then requests access to the SMB share contained in the
tag exposed by the media server service as described above. The access request
message 922 contains the fully specified path of the share in UNC format.
[0047] If access to the share is granted, then the SMB server 231 returns the 16-bit
tree ID (TID) that corresponds to the share in message 927. If the share does not exist or
the user has insufficient credentials to access the share, the server will return an error code
in message 927 and deny access to the share.
[0048] SMB client 235 requests the SMB server to open a file on the accessed share
in message 931. This message contains the name of the file to be opened. For example,
referring again to FIG 5, the name of file to be opened is JC-ahorsenamedblue.wma.
[0049] Returning to FIG 9, if access to the file is granted, then the SMB server 231
returns the file ID of the requested file in message 935. If the file does not exist or the
user has insufficient credentials to access the file, the SMB server 231 will return an error
code in message 935 and deny access to the file.
[0050] SMB client 235 requests the SMB server 231 to variously open the file, read
data from the opened file and return this data to the SMB client 235, write to the file or
close the file in message 942. Other file operations including renaming, deleting, etc.

may also be captured by message 942. The file ID that is obtained by the client when the file was opened is included in this message in order to identify from which opened file the SMB server 231 should perform the requested operation. Appropriate responses to message 942 are contained in message 948 from the SMB server 231 to SMB client 235. [0051] Although various illustrative arrangements and methods for mapping UPnP discovered items to an SMB location have been shown and described, it should be understood that the scope of the claims appended hereto shall not necessarily be limited to the specific features, arrangements or methods described. Instead, the specific features, arrangements or methods are disclosed as illustrative forms of mapping UPnP discovered items to an SMB location as more particularly claimed below.

I/WE CLAIM;
1. A computer readable medium which, when executed by one or more processors on
an electronic device, implements a media server (205) comprising:
a UPnP device (222) that is arranged to identify UPnP services available to a client (212) from the media server (205); and
a content directory service (240) that is exposed by the UPnP device (222) responsively to a discovery request (303) from the client (212),
whereby the content directory service (240) exposes one or more SMB paths to the client (212) responsively to a command from the client (212) over a UPnP network (260).
2. The computer readable medium of claim 1 in which the content directory service (240) is a content directory service defined in a UPnP protocol.
3. The computer readable medium of claim 1 in which the content directory service (240) is a Content Directory Service defined in a UPnP protocol, and further being arranged to expose the one or more SMB paths in addition to URLs that are accessible using one of HTTP or RTSP.
4. The computer readable medium of claim 1 in which the one or more SMB paths are exposed using one or more tags (505) in a response to the client (212).
5. The computer readable medium of claim 1 in which the one or more tags (505) are disposed in an XML document (418).
6. The computer readable medium of claim 1 in the command comprises a browse command or a search command (413).
7. The computer readable medium of claim 1 in which the content directory service (240) exposes the one or more SMB paths to the client (212) only if the client (212) is an authenticated client.
8. The computer readable medium of claim 7 in which the content directory service (240) invokes a method for authenticating the client (212) using an authentication method selected from one of Negotiate, Kerberos, or NTLM.
9. The computer readable medium of claim 8 in which the authentication method is substantially performed by an operating system running on the electronic device.
10. A method of providing a file location to a remote client (212) over a UPnP network (260), the method comprising the steps of:
providing a UPnP device description to the remote client (212) to thereby identify a UPnP service that is available to the remote client (212);

mapping a discoverable object disposed in a content repository (800) to an SMB share location; and
exposing the SMB share location responsively to a browse or a search command (413) from the remote client (212) to the identified UPnP service.
11. The method of claim 10 in which mapping is performed to identify an SMB location that is optimized by user or by file.
12 The method of claim 11 in which the optimized SMB location comprises a most direct available SMB path that is accessible by a user.
13. The method of claim 11 in which the identification of the optimized SMB location comprises impersonating the remote client using credentials of the remote client (721).
14. The method of claim 11 including the further step of calling a shell API requesting a most direct SMB path to the file (726).
15. The method of claim 14 including the further step of including a path returned by the shell API in a response to the remote client (731).
16. The method of claim 9 in which the discoverable object comprises one or more discrete piece of media content data selected from one of music, video, image, game, news or data.
17. A client device (212) arranged to communicate with a media server (205) over a UPnP network (260), comprising:
a control point (251) arranged to enable the client device (212) to communicate with a content directory service (240);
an SMB client (235) arranged for accessing an SMB path on a remote server, where the SMB path is provided by a service operating on the media server (205) that is exposed to the control point (251); and
a media renderer (228) for rendering content accessed from the SMB path by the SMB client (235).
18. The client device (212) of claim 17 in which the client device (212) communicates with the content directory service (240) using SSDP or SOAP messages.
19. The client device (212) of claim 17 in which the SMB client (235) is arranged to effect write changes or file level control of content identified in the SMB path.

20. The client device (212) of claim 17 in which the SMB client (235) is arranged to engage in an authentication process with the media server (205) as a prerequisite to obtaining the SMB path from the service.

Documents

Orders

Section Controller Decision Date

Application Documents

# Name Date
1 19-chenp-2009 form-3-30-06-2009.pdf 2009-06-30
1 19-CHENP-2009-RELEVANT DOCUMENTS [15-09-2023(online)].pdf 2023-09-15
2 19-chenp-2009 correspondence others-30-06-2009.pdf 2009-06-30
2 19-CHENP-2009-RELEVANT DOCUMENTS [26-09-2022(online)].pdf 2022-09-26
3 19-CHENP-2009-RELEVANT DOCUMENTS [23-09-2021(online)].pdf 2021-09-23
3 19-CHENP-2009 FORM-18 22-06-2010.pdf 2010-06-22
4 Thumbs.db 2011-09-02
4 19-CHENP-2009-RELEVANT DOCUMENTS [27-03-2020(online)].pdf 2020-03-27
5 19-CHENP-2009-RELEVANT DOCUMENTS [28-05-2019(online)].pdf 2019-05-28
5 0019-chenp-2009 pct.pdf 2011-09-02
6 19-CHENP-2009-RELEVANT DOCUMENTS [27-03-2019(online)].pdf 2019-03-27
6 0019-chenp-2009 pct search report.pdf 2011-09-02
7 19-CHENP-2009-RELEVANT DOCUMENTS [15-03-2019(online)]-1.pdf 2019-03-15
7 0019-chenp-2009 form-5.pdf 2011-09-02
8 19-CHENP-2009-RELEVANT DOCUMENTS [15-03-2019(online)].pdf 2019-03-15
8 0019-chenp-2009 form-3.pdf 2011-09-02
9 0019-chenp-2009 form-26.pdf 2011-09-02
9 19-CHENP-2009-RELEVANT DOCUMENTS [15-03-2018(online)].pdf 2018-03-15
10 0019-chenp-2009 form-1.pdf 2011-09-02
10 19-CHENP-2009-IntimationOfGrant30-01-2018.pdf 2018-01-30
11 19-CHENP-2009-PatentCertificate30-01-2018.pdf 2018-01-30
12 0019-chenp-2009 description (compl,ete).pdf 2011-09-02
12 Abstract_Granted 292304_30-01-2018.pdf 2018-01-30
13 0019-chenp-2009 correspondence-others.pdf 2011-09-02
13 Claims_Granted 292304_30-01-2018.pdf 2018-01-30
14 0019-chenp-2009 claims.pdf 2011-09-02
14 Description_Granted 292304_30-01-2018.pdf 2018-01-30
15 0019-chenp-2009 assignment.pdf 2011-09-02
15 Drawings_Granted 292304_30-01-2018.pdf 2018-01-30
16 0019-chenp-2009 abstract.pdf 2011-09-02
16 Marked up Claims_Granted 292304_30-01-2018.pdf 2018-01-30
17 19-CHENP-2009-PETITION UNDER RULE 137 [15-11-2017(online)].pdf 2017-11-15
17 0019-chenp-2009 abstract.jpg 2011-09-02
18 19-CHENP-2009-RELEVANT DOCUMENTS [15-11-2017(online)].pdf 2017-11-15
18 19-CHENP-2009 FORM-6 28-02-2015.pdf 2015-02-28
19 19-CHENP-2009-Written submissions and relevant documents (MANDATORY) [15-11-2017(online)].pdf 2017-11-15
19 MTL-GPOA - JAYA.pdf 2015-03-13
20 19-CHENP-2009-Correspondence to notify the Controller (Mandatory) [11-10-2017(online)].pdf 2017-10-11
20 FORM-6-1101-1200(JAYA).75.pdf 2015-03-13
21 19-CHENP-2009-Form-3-220216.pdf 2016-03-14
21 19-CHENP-2009-HearingNoticeLetter.pdf 2017-10-05
22 19-CHENP-2009-Correspondence-220216.pdf 2016-03-14
22 Other Patent Document [16-05-2017(online)].pdf 2017-05-16
23 19-CHENP-2009-FER.pdf 2016-12-29
23 Claims [07-02-2017(online)].pdf 2017-02-07
24 Examination Report Reply Recieved [30-01-2017(online)].pdf 2017-01-30
24 Correspondence [07-02-2017(online)].pdf 2017-02-07
25 Description(Complete) [07-02-2017(online)].pdf 2017-02-07
25 Description(Complete) [30-01-2017(online)].pdf_88.pdf 2017-01-30
26 Description(Complete) [07-02-2017(online)].pdf_274.pdf 2017-02-07
26 Description(Complete) [30-01-2017(online)].pdf 2017-01-30
27 Correspondence [30-01-2017(online)].pdf 2017-01-30
27 Examination Report Reply Recieved [07-02-2017(online)].pdf 2017-02-07
28 Other Document [07-02-2017(online)].pdf 2017-02-07
29 Correspondence [30-01-2017(online)].pdf 2017-01-30
29 Examination Report Reply Recieved [07-02-2017(online)].pdf 2017-02-07
30 Description(Complete) [07-02-2017(online)].pdf_274.pdf 2017-02-07
30 Description(Complete) [30-01-2017(online)].pdf 2017-01-30
31 Description(Complete) [07-02-2017(online)].pdf 2017-02-07
31 Description(Complete) [30-01-2017(online)].pdf_88.pdf 2017-01-30
32 Correspondence [07-02-2017(online)].pdf 2017-02-07
32 Examination Report Reply Recieved [30-01-2017(online)].pdf 2017-01-30
33 19-CHENP-2009-FER.pdf 2016-12-29
33 Claims [07-02-2017(online)].pdf 2017-02-07
34 19-CHENP-2009-Correspondence-220216.pdf 2016-03-14
34 Other Patent Document [16-05-2017(online)].pdf 2017-05-16
35 19-CHENP-2009-Form-3-220216.pdf 2016-03-14
35 19-CHENP-2009-HearingNoticeLetter.pdf 2017-10-05
36 FORM-6-1101-1200(JAYA).75.pdf 2015-03-13
36 19-CHENP-2009-Correspondence to notify the Controller (Mandatory) [11-10-2017(online)].pdf 2017-10-11
37 MTL-GPOA - JAYA.pdf 2015-03-13
37 19-CHENP-2009-Written submissions and relevant documents (MANDATORY) [15-11-2017(online)].pdf 2017-11-15
38 19-CHENP-2009 FORM-6 28-02-2015.pdf 2015-02-28
38 19-CHENP-2009-RELEVANT DOCUMENTS [15-11-2017(online)].pdf 2017-11-15
39 0019-chenp-2009 abstract.jpg 2011-09-02
39 19-CHENP-2009-PETITION UNDER RULE 137 [15-11-2017(online)].pdf 2017-11-15
40 0019-chenp-2009 abstract.pdf 2011-09-02
40 Marked up Claims_Granted 292304_30-01-2018.pdf 2018-01-30
41 0019-chenp-2009 assignment.pdf 2011-09-02
41 Drawings_Granted 292304_30-01-2018.pdf 2018-01-30
42 0019-chenp-2009 claims.pdf 2011-09-02
42 Description_Granted 292304_30-01-2018.pdf 2018-01-30
43 0019-chenp-2009 correspondence-others.pdf 2011-09-02
43 Claims_Granted 292304_30-01-2018.pdf 2018-01-30
44 0019-chenp-2009 description (compl,ete).pdf 2011-09-02
44 Abstract_Granted 292304_30-01-2018.pdf 2018-01-30
45 19-CHENP-2009-PatentCertificate30-01-2018.pdf 2018-01-30
46 19-CHENP-2009-IntimationOfGrant30-01-2018.pdf 2018-01-30
46 0019-chenp-2009 form-1.pdf 2011-09-02
47 19-CHENP-2009-RELEVANT DOCUMENTS [15-03-2018(online)].pdf 2018-03-15
47 0019-chenp-2009 form-26.pdf 2011-09-02
48 0019-chenp-2009 form-3.pdf 2011-09-02
48 19-CHENP-2009-RELEVANT DOCUMENTS [15-03-2019(online)].pdf 2019-03-15
49 0019-chenp-2009 form-5.pdf 2011-09-02
49 19-CHENP-2009-RELEVANT DOCUMENTS [15-03-2019(online)]-1.pdf 2019-03-15
50 0019-chenp-2009 pct search report.pdf 2011-09-02
50 19-CHENP-2009-RELEVANT DOCUMENTS [27-03-2019(online)].pdf 2019-03-27
51 19-CHENP-2009-RELEVANT DOCUMENTS [28-05-2019(online)].pdf 2019-05-28
51 0019-chenp-2009 pct.pdf 2011-09-02
52 19-CHENP-2009-RELEVANT DOCUMENTS [27-03-2020(online)].pdf 2020-03-27
53 19-CHENP-2009-RELEVANT DOCUMENTS [23-09-2021(online)].pdf 2021-09-23
53 19-CHENP-2009 FORM-18 22-06-2010.pdf 2010-06-22
54 19-CHENP-2009-RELEVANT DOCUMENTS [26-09-2022(online)].pdf 2022-09-26
54 19-chenp-2009 correspondence others-30-06-2009.pdf 2009-06-30
55 19-CHENP-2009-RELEVANT DOCUMENTS [15-09-2023(online)].pdf 2023-09-15
55 19-chenp-2009 form-3-30-06-2009.pdf 2009-06-30
56 19-CHENP-2009-FORM-27 [12-09-2025(online)].pdf 2025-09-12

Search Strategy

1 PatseerSearchStrategy_18-10-2016.pdf

ERegister / Renewals

3rd: 29 Mar 2018

From 26/07/2009 - To 26/07/2010

4th: 29 Mar 2018

From 26/07/2010 - To 26/07/2011

5th: 29 Mar 2018

From 26/07/2011 - To 26/07/2012

6th: 29 Mar 2018

From 26/07/2012 - To 26/07/2013

7th: 29 Mar 2018

From 26/07/2013 - To 26/07/2014

8th: 29 Mar 2018

From 26/07/2014 - To 26/07/2015

9th: 29 Mar 2018

From 26/07/2015 - To 26/07/2016

10th: 29 Mar 2018

From 26/07/2016 - To 26/07/2017

11th: 29 Mar 2018

From 26/07/2017 - To 26/07/2018

12th: 29 Mar 2018

From 26/07/2018 - To 26/07/2019

13th: 06 Jun 2019

From 26/07/2019 - To 26/07/2020

14th: 10 Jun 2020

From 26/07/2020 - To 26/07/2021

15th: 04 Jun 2021

From 26/07/2021 - To 26/07/2022

16th: 06 Jun 2022

From 26/07/2022 - To 26/07/2023

17th: 24 Jul 2023

From 26/07/2023 - To 26/07/2024