1. Field of the Disclosure
The disclosure relates to a device authentication method, a key distribution method and an authentication and key distribution method adapted for machine type communication (MTC).
2. Description of Related Art
Machine type communication (MTC) refers to an information exchange technique between machines performed without (or with rare) human interference through a wireless communication technique.
Referring to
Based on the aforementioned GBA, a key establishment and key distribution mechanism can be established between the UE 203 and the NAF 204 (or an application server), and a distribution mechanism of a symmetric ciphering key and an integrity key is further implemented. However, in such GBA, a mutual authentication is only implemented between the BSF 202 and the UE 203, and the mutual authentication between the NAF 204 and the UE 203 is not directly implemented.
According to conventional techniques, the mutual authentication between the BSF 202 and the UE 203 is performed through the HSS 201 by using an AKA mechanism of a hypertext transfer protocol (HTTP) digest. Namely, the UE 203 authenticates an identity of the BSF 202, and the BSF 202 also authenticates an identity of the UE 203. Then, the UE 203 and the BSF 202 respectively obtain a pair of the ciphering key and the integrity key (CK, IK) used for a session layer, and obtain a key Ks by combining the ciphering key and the integrity key (CK, IK).
Further, based on a bootstrapping security association procedure shown in
In step S304, the BSF 202 obtains the network application function key Ks_NAF according to the key Ks. In step S305, the BSF 202 replies an authentication answer to the NAF 204, where the authentication answer includes the network application function key Ks_NAF, a key lifetime Key_lifetime of the network application function key Ks_NAF and a corresponding user profile. Here, the user profile can be a user security setting. In step 306, the NAF 204 stores the received network application function key Ks_NAF, the key lifetime and the corresponding user profile. In step 307, the NAF 204 replies the UE 203 an application answer.
To be illustrated more clearly, in the flow of
Furthermore, such efficient security mechanism has to comply with the following requirements. For example, an authentication between the MTC devices requires a communication service layer authentication between the machines or a communication application authentication between the machines. Moreover, the aforementioned authentication mechanism is required to ensure data integrity, data privacy and mutual authentication and mutual authorization of devices at two ends of the MTC application. However, the conventional technique is not totally complied with the requirements of the aforementioned authentication mechanism. Therefore, how to suitably modify the conventional authentication procedures in order to meet requirements of the aforementioned authentication mechanism based on a communication protocol of the existing GBA is an important issue in the industry.
An exemplary embodiment of the disclosure provides an authentication method adapted for a wireless communication system including a home subscriber server (HSS), a bootstrapping server function (BSF), a network application function (NAF) and at least one user equipment (UE). The authentication method is adapted for machine type communication and includes following steps. The at least a user equipment transmits an application request including at least a first security material to the NAF, where the first security material is not a first key directly obtained through a bootstrapping procedure of a generic bootstrapping architecture. The NAF generates a second security material according to the first security material, where the second security material is not the first key directly obtained through the bootstrapping procedure of the generic bootstrapping architecture, either. Moreover, the NAF replies an application answer including the at least a second security material to the at least a user equipment. In addition, the NAF authenticates the at least a user equipment according to the second security material, or the at least a user equipment authenticates the NAF according to the second security material.
An exemplary embodiment of the disclosure provides a key distribution method adapted for a wireless communication system including a home subscriber server (HSS), a bootstrapping server function (BSF), a network application function (NAF) and at least one user equipment (UE). The key distribution method is adapted for machine type communication and includes following steps. The at least a user equipment transmits a traffic key request to the NAF, where the traffic key request includes an identification code. The NAF generates a traffic key and ciphers the traffic key by a key encryption key to generate a security parameter. Moreover, the NAF replies a traffic key acknowledgement including the security parameter to the at least a user equipment.
An exemplary embodiment of the disclosure provides an authentication and key distribution method adapted for a wireless communication system including a home subscriber server (HSS), a bootstrapping server function (BSF), a network application function (NAF) and at least one user equipment (UE). The authentication and key distribution method is adapted for machine type communication and includes following steps. The at least a user equipment transmits an application request including a first identification code, a first security parameter and a message to the NAF. The NAF transmits an authentication request including the first identification code and a second identification code to the BSF after receiving the application request. The BSF replies an authentication answer including a network application function key, a key lifetime of the network application function key, and a user profile of the network application function key to the NAF. The NAF replies an application answer including at least a first message authentication code, a second security parameter and a third security parameter to the UE. Moreover, the UE transmits an application acknowledgement including a second message authentication code to the NAF.
In order to make the aforementioned and other features and advantages of the disclosure comprehensible, several exemplary embodiments accompanied with figures are described in detail below.
The accompanying drawings are included to provide a further understanding of the disclosure, and are incorporated in and constitute a part of this specification. The drawings illustrate embodiments of the disclosure and, together with the description, serve to explain the principles of the disclosure.
In the following disclosure, the term “user equipment (UE)” can be referred to a mobile station (MS) or an advanced mobile station (AMS) or a machine type communication (MTC) device. The MTC device is, for example, a vehicular information and communication device, a sensor, a water meter, a gas meter, an electric meter, a sensor device, a digital camera, a mobile phone, a smart phone, a personal computer (PC), a notebook computer (PC), a netbook, a digital television, a flat panel PC, etc. Moreover, the term “network application function (NAF)” referred in the following disclosure can be a MTC server.
In step S420, the network application function generates a second security material according to the first security material, where the second security material is not the first key directly obtained through the bootstrapping procedure of the GBA. In step S430, the network application function replies an application answer including the second security material to the user equipment. In step S440, the network application function authenticates the user equipment according to the second security material, or the user equipment authenticates the network application function according to the second security material. Then, the device authentication method of
In the present disclosure, different implementations of the first exemplary embodiment are described in detail in accordance with following second to sixth exemplary embodiments respectively corresponding to
Actually, the device authentication method initiates from a step 501. In the step 501, the user equipment UE sends an application request to the network application function NAF, where the application request includes the bootstrapping transaction ID B-TID and related message(s). In step 502, the network application function NAF sends an authentication request to the bootstrapping server function BSF, where the authentication request includes the bootstrapping transaction ID B-TID and a network application function transaction ID NAF-TID. Also, the network application function transaction ID NAF-TID is a transaction identification code.
In step 503, the user equipment UE generates a network application function key Ks_NAF according to the key Ks, for example, Ks_NAF=KDF (Ks), where KDF is a key generation function. In step 504, the bootstrapping server function BSF generates the network application function key Ks_NAF according to the key Ks. It is noted that the step 503 can be executed while the steps 501 and 502 are executed, or can be executed before the step 501.
In step 505, the bootstrapping server function BSF replies an authentication answer to the network application function NAF, where the authentication answer includes the network application function key Ks_NAF, a key lifetime of the network application function key Ks_NAF and a corresponding user profile. Here, the user profile can be a user security setting. In step 506, the network application function NAF stores the received network application function key Ks_NAF, the key lifetime and the corresponding user profile. In step 507, the network application function NAF generates a security parameter RNNAF, where the security parameter RNNAF is a random instance, which is, for example, a random number, a geographic position parameter (for example, a longitude and a latitude) of the user equipment UE, any name configured by the user of the user equipment UE, a user name of the user of the user equipment UE, an medium access control (MAC) address ID of the user equipment UE, or the above parameters plus an index, etc.
In step 508, the network application function NAF replies an application answer to the user equipment UE, where the application answer includes the security parameter RNNAF generated by the network application function NAF.
In step 509, the user equipment UE computes or calculates a message authentication code XMAC=(RNNAF, Ks_NAF) according to a calculation method of message authentication code XMAC previously agreed through protocol between the network application function NAF and the user equipment UE by using the received security parameter RNNAF and the network application function key Ks_NAF. In step 510, the user equipment UE replies an application acknowledgement (application ACK) to the network application function NAF, where the application ACK includes the message authentication code XMAC generated by the user equipment UE.
In step 511, the network application function NAF computes or calculates a message authentication code MAC=(RNNAF, Ks_NAF) according to a calculation method of the message authentication code MAC previously agreed through protocol between the network application function NAF and the user equipment UE by using the previously generated security parameter RNNAF and the network application function key Ks_NAF. The message authentication code MAC and the message authentication code XMAC are security symmetric, so that in step 512, the network application function NAF determines whether the received message authentication code XMAC is equal to the generated message authentication code MAC. This is to determine whether XMAC=MAC, and if XMAC=MAC, the network application function NAF can authenticate the user equipment UE, which is a one-way device authentication.
In the step 512, if a determination result is negative, i.e., the received message authentication code XMAC is not equal to the generated message authentication code MAC, the authentication result is failed, and the network application function NAF regards the user equipment UE as an unreal MTC device. The network application function NAF and the user equipment UE have to repeat the aforementioned device authentication method from the step 501.
In step 601, the bootstrapping server function BSF generates a security parameter RNNAF, which is similar to the security parameter RNNAF obtained in the step 507 of
In step 603, the user equipment UE generates a network application function key Ks_NAF according to the key Ks obtained when performing the bootstrapping procedure with the HSS, for example, Ks_NAF=KDF (Ks). In step 604, the user equipment UE calculates a message authentication code XMAC=(RNNAF, Ks_NAF) according to a calculation method of the message authentication code XMAC agreed previously through protocol between the network application function NAF and the user equipment UE by using the received security parameter RNNAF and the network application function key Ks_NAF.
Referring to
In step S608, the bootstrapping server function BSF replies an authentication answer to the network application function NAF, where the authentication answer includes the network application function key Ks NAF, a key lifetime of the network application function key Ks_NAF, a corresponding user profile and the security parameter RNNAF. Here, the user profile can be a user security setting. In step 609, the network application function NAF stores the received network application function key Ks_NAF, the key lifetime, the corresponding user profile and the security parameter RNNAF.
In step 610, the network application function NAF computes or calculates a message authentication code MAC=(RNNAF, Ks_NAF) according to a calculation method of the message authentication code MAC previously agreed through protocol between the network application function NAF and the user equipment UE by using the obtained security parameter RNNAF and the network application function key Ks_NAF.
The message authentication code MAC and the message authentication code XMAC are security symmetric, so that in step 611, the network application function NAF determines whether the message authentication code XMAC received in the step 605 is equal to the generated message authentication code MAC. This is to determine whether XMAC=MAC, and if XMAC=MAC, the network application function NAF can authenticate the user equipment UE, which is a one-way device authentication.
In the step 612, the network application function NAF replies an application ACK to the user equipment UE to confirm that the one-way device authentication is completed. In the above step 611, if a determination result is negative, i.e., the received message authentication code XMAC is not equal to the generated message authentication code MAC, the authentication result is failed, and the network application function NAF regards the user equipment UE as an unreal MTC device. The network application function NAF and the user equipment UE have to repeat the aforementioned device authentication method from the step 605.
In step 703, the network application function NAF generates a network application function key Ks NAF, a key lifetime of the network application function key Ks_NAF, and a corresponding user profile. It is noted that in step 704, the network application function NAF ciphers the network application function key Ks_NAF by using the extracted public key to generate a security parameter E=En (the public key, the network application function key Ks_NAF), where a function En (A,B) represents using a parameter A to cipher a parameter B.
In step 705, the network application function NAF replies an application answer to the user equipment UE, where the application answer includes the generated security parameter E. In step 706, the user equipment UE uses a private key corresponding to the public key in the X.509 certificate obtained from the certificate authority (not shown) to decipher the received security parameter E to obtain the network application function key Ks_NAF=De (the private key, the security parameter E), where a function De (C, D) represents using a parameter C to decipher a parameter D. Thus, the user equipment UE authenticates the network application function NAF. The user equipment UE sends an application ACK to the network application function NAF. Then, in step 71 and step 72, the user equipment UE and the network application function NAF respectively use the network application function key Ks_NAF to perform subsequent processing, for example, authentication and data transmission, etc.
In the aforementioned step 706, if the authentication result is failed, the network application function NAF and the user equipment UE have to repeat the aforementioned device authentication method from the step 701.
In step 801, the user equipment UE generates a security parameter RNUE. In step 802, the user equipment UE sends an application request to the network application function NAF, where the application request includes the bootstrapping transaction ID B-TID, related message(s) Msg and the security parameter RNUE. In step 803, the network application function NAF sends an authentication request to the bootstrapping server function BSF, where the authentication request includes the bootstrapping transaction ID B-TID and a network application function transaction ID NAF-TID.
In step S804, the user equipment UE generates a network application function key Ks_NAF according to the key Ks, for example, Ks_NAF=KDF (Ks), where KDF is a key generation function. Moreover, in other embodiments, the user equipment UE can also use the bootstrapping transaction ID B-TID and the network application function transaction ID NAF-TID as indexes of the key Ks, and generates the network application function key Ks_NAF according to the indexes and the key Ks, for example, Ks_NAF=KDF (Ks, index). In step 805, the bootstrapping server function BSF generates the network application function key Ks_NAF according to the key Ks, for example, Ks NAF=KDF (Ks). It is noted that the step 804 can be executed while the step 801 to the step 803 are executed, or can be executed before the step 801.
In step 806, the bootstrapping server function BSF replies an authentication answer to the network application function NAF, where the authentication answer includes the network application function key Ks_NAF, a key lifetime of the network application function key Ks_NAF, and a corresponding user profile. Here, the user profile can be a user security setting. In step 807, the network application function NAF stores the received network application function key Ks_NAF, the key lifetime, and the corresponding user profile. In step 808, the network application function NAF computes or calculates a message authentication code MAC=(RNUE, Ks_NAF) according to a calculation method of the message authentication code MAC previously agreed through protocol between the network application function NAF and the user equipment UE by using the obtained security parameter RNUE and the network application function key Ks_NAF, and generates a message security parameter RNNAF.
In the step 809, the network application function NAF replies an application answer to the user equipment UE, where the application answer includes the message authentication code MAC and the network application function key Ks_NAF.
In step 810, the user equipment UE calculates a message authentication code XMAC=(RNUE, Ks_NAF) according to a calculation method of the message authentication code XMAC agreed previously through protocol between the network application function NAF and the user equipment UE by using the security parameter RNUE and the network application function key Ks_NAF. Since the message authentication code XMAC and the message authentication code MAC are security symmetric, the user equipment UE further determines whether the generated message authentication code XMAC is equal to the message authentication code MAC received in the step 809. This is to determine whether XMAC=MAC, and if XMAC=MAC, the user equipment UE authenticates the network application function NAF. Therefore, the user equipment UE further computes or calculates another message authentication code RES=(RNNAF, Ks_NAF) according to a calculation method of the message authentication code RES agreed previously through protocol between the network application function NAF and the user equipment UE by using the message security parameter RNNAF and the network application function key Ks_NAF received in the step 809.
In step 811, the user equipment UE replies an application acknowledgement (ACK) to the network application function NAF, where the application ACK includes the message authentication code RES.
In step 812, the network application function NAF computes or calculates a message authentication code XRES=(RNNAF, Ks_NAF) according to a calculation method of the message authentication code XRES agreed previously through protocol between the network application function NAF and the user equipment UE by using the message security parameter RNNAF and the network application function key Ks_NAF. Since the message authentication code XRES and the message authentication code RES are security symmetric, the network application function NAF further determines whether the generated message authentication code)(RES is equal to the message authentication code RES received in the step 811. This is to determine whether XRES=RES, and if XRES=RES, the network application function NAF authenticates the user equipment UE. As such, the mutual authentication between the user equipment UE and the network application function NAF is completed.
In the step 810, if the message authentication code XMAC is not equal to the received message authentication code MAC, or in the step 812, the message authentication code XRES is not equal to the message authentication code RES, the authentication result is failed, and the network application function NAF and the user equipment UE have to repeat the aforementioned mutual authentication method from the step 801.
The mutual authentication method is described below in accordance with
Actually, the mutual authentication method initiates from a step 901. In the step 901, the user equipment UE calculates a message authentication code XMAC=(RNNAF, Ks_NAF) according to a calculation method of the message authentication code XMAC agreed previously through protocol between the network application function NAF and the user equipment UE by using the received security parameter RNNAF and the network application function key Ks_NAF.
In step 902, the user equipment UE sends an application request to the network application function NAF, where the application request includes the bootstrapping transaction ID B-TID, the related message(s) Msg and the message authentication code XMAC. In step 903, the network application function NAF sends an authentication request to the bootstrapping server function BSF, where the authentication request includes the bootstrapping transaction ID B-TID and a network application function transaction ID NAF-TID.
In step S904, the bootstrapping server function BSF generates the network application function key Ks NAF according to the key Ks, for example, Ks_NAF=KDF (Ks).
In step S905, the bootstrapping server function BSF replies an authentication answer to the network application function NAF, where the authentication answer includes the network application function key Ks_NAF, a key lifetime of the network application function key Ks_NAF, a corresponding user profile and the security parameters RNNAF and RNUE. Here, the user profile can be a user security setting. In step 906, the network application function NAF stores the received network application function key Ks_NAF, the key lifetime, the corresponding user profile and the security parameters RNNAF and RNUE.
In step 907, the network application function NAF computes or calculates a message authentication code MAC=(RNNAF, Ks_NAF) according to a calculation method of the message authentication code MAC agreed previously through protocol between the network application function NAF and the user equipment UE by using the obtained security parameter RNNAF and the network application function key Ks_NAF.
The network application function NAF further determines whether the message authentication codes MAC=XMAC, and if the message authentication codes XMAC=MAC, the network application function NAF calculates another message authentication code XRES=(RNUE, Ks_NAF) according to a calculation method of the message authentication code XRES agreed previously through protocol between the network application function NAF and the user equipment UE by using the message security parameter RNUE.
In step 908, the network application function NAF replies an application answer to the user equipment UE, where the application answer includes the message authentication code XRES. In step 909, the user equipment UE calculates a message authentication code RES=(RNUE, Ks_NAF) according to a calculation method of the message authentication code RES agreed previously through protocol between the network application function NAF and the user equipment UE by using the obtained security parameter RNUE and the network application function key Ks_NAF. The user equipment UE further determines whether the message authentication codes RES=XRES, and if the message authentication codes RES=XRES, the mutual authentication between the user equipment UE and the network application function NAF is completed. Therefore, in step 910, the user equipment UE replies an application ACK to the network application function NAF to notify the network application function NAF that the mutual authentication is successful.
In the above step 907, if the message authentication code)(MAC is not equal to the received message authentication code MAC, or in the step 909, the message authentication code XRES is not equal to the received message authentication code RES, the authentication result is failed, and the network application function NAF and the user equipment UE have to repeat the aforementioned mutual authentication method from the step 901.
Referring to
In step 1011, the user equipment UE sends a traffic key request to the network application function NAF, where the traffic key request includes the bootstrapping transaction ID B-TID. Utilization of a traffic key (or a traffic encryption key) Ktr can reduce a utilization frequency of the network application function key Ks_NAF, such that new traffic keys Ktr can be frequently generated to improve security of data transmission between the user equipment UE and the network application function NAF.
Therefore, in step 1012, the network application function NAF generates a random number to serve as the traffic key Ktr. However, the present disclosure is not limited thereto, and the random instance described in the step 507 of
In step 1013, the network application function NAF replies a traffic key answer to the user equipment UE, and the traffic key answer includes the security parameter E. In step S1014, the user equipment UE deciphers the security parameter E by using the key encryption key Ken obtained in the step 1003 to obtain the traffic key Ktr=De (E, Ken). Then, in step 1015, the network application function NAF and the user equipment UE can use the traffic key Ktr to perform subsequent data transmission or other security flows.
Referring to
In step 1112, the network application function NAF sends an authentication request to the bootstrapping server function BSF, where the authentication request includes the bootstrapping transaction ID B-TID and a network application function transaction ID NAF-TID. In step 1113, the user equipment UE generates a network application function key Ks_NAF according to the key Ks, for example, Ks_NAF=KDF (Ks), where KDF is a key generation function. In step 1114, the bootstrapping server function BSF generates the network application function key Ks_NAF according to the key Ks, for example, Ks_NAF=KDF (Ks). It should be noted that the step 1113 can be executed while the steps 1111 and 1112 are executed.
In step 1115, the bootstrapping server function BSF replies an authentication answer to the network application function NAF, where the authentication answer includes the network application function key Ks_NAF, a key lifetime of the network application function key Ks_NAF and a corresponding user profile. Here, the user profile can be a user security setting. In step 1116, the network application function NAF stores the received network application function key Ks_NAF, the key lifetime and the corresponding user profile.
In step 1117, the network application function NAF computes or calculates a message authentication code MAC=(RNUE, Ks_NAF) according to a calculation method of the message authentication code MAC agreed previously through protocol between the network application function NAF and the user equipment UE by using the obtained security parameter RNUE and the network application function key Ks_NAF; computes or calculates a traffic key Ktr=KDF (Ks_NAF) according to another key generation function by using the network application function key Ks_NAF; generates a security parameter RNNAF, and uses a key encryption key Ken to cipher the traffic key Ktr to generate another security parameter E=En (Ken, Ktr). It is assumed that after the network application function NAF and the user equipment UE generate the network application function key Ks NAF in the steps 1113 and 1114, the network application function NAF and the user equipment UE calculate the key encryption key Ken=KDF (Ks_NAF) according to another key generation function KDF by using the generated network application function key Ks_NAF.
In step 1118, the network application function NAF replies an application answer to the user equipment UE, where the application answer includes the message authentication code MAC, the security parameter RNNAF and the security parameter E.
In step 1119, the user equipment UE calculates a message authentication code XMAC=(RNUE, Ks_NAF) according to a calculation method of the message authentication code XMAC agreed previously through protocol between the network application function NAF and the user equipment UE by using the security parameter RNUE and the network application function key Ks_NAF. Since the message authentication code XMAC and the message authentication code MAC are security symmetric, the user equipment UE further determines whether the generated message authentication code XMAC is equal to the message authentication code MAC received in the step 1118. This is to determine whether XMAC=MAC, and if XMAC=MAC, the user equipment UE authenticates the network application function NAF. Therefore, the user equipment UE calculates another message authentication code RES=(RNNAF, Ks_NAF) according to a calculation method of the message authentication code RES agreed previously through protocol between the network application function NAF and the user equipment UE by using the message security parameter RNNAF and the network application function key Ks_NAF.
In step 1120, the user equipment UE replies an application ACK to the network application function NAF, where the application ACK includes the message authentication code RES.
In step 1121, the network application function NAF calculates a message authentication code XRES=(RNNAF, Ks_NAF) according to a calculation method of the message authentication code XRES agreed previously through protocol between the network application function NAF and the user equipment UE by using the message security parameter RNNAF and the network application function key Ks_NAF. Since the message authentication code XRES and the message authentication code RES are security symmetric, the network application function NAF further determines whether the generated message authentication code XRES is equal to the message authentication code RES received in the step 1120. This is to determine whether XRES=RES, and if XRES=RES, the mutual authentication between the user equipment UE and the network application function NAF is completed.
In the step 1119, if the message authentication code XMAC is not equal to the received message authentication code MAC, or in the step 1121, the message authentication code XRES is not equal to the message authentication code RES, the authentication result is failed, and the network application function NAF and the user equipment UE have to repeat the aforementioned device authentication method from the step 1111.
The aforementioned parameters such as the network application function key Ks_NAF, the key Ks, the security parameter RNNAF, the security parameter RNUE, the random instance, the message authentication code MAC, the message authentication code XMAC, the message authentication code RES, the message authentication code XRES, the X.509 certificate, the network application function transaction ID NAF-TID, the bootstrapping transaction ID B-TID, and the security parameter E, etc. are widely regarded as security materials in the present disclosure.
In summary, the exemplary embodiments of the disclosure provide an authentication method, a key distribution method and an authentication and key distribution method adapted for machine type communication (MTC). The methods are adapted to a wireless communication system including a home subscriber server, a bootstrapping server function, a network application function and a user equipment. By generating the security parameters corresponding to the network application function or/and the user equipment, and generating the network application function key according to the key obtained through the bootstrapping procedure of the generic bootstrapping architecture, and generating the message authentication codes according to the security parameters and the network application function key, the device authentication or the mutual authentication can be achieved. Moreover, the network application function key can also be transmitted according to the certificate of the public key infrastructure, or the traffic key is generated according to the network application function key, such that the traffic key is frequently updated for improving security of the MTC. In this way, the device authentication or the mutual authentication between the network application function and the user equipment is implemented to achieve a secure key distribution, so as to satisfy the requirement of efficient security mechanism of the MTC.
It will be apparent to those skilled in the art that various modifications and variations can be made to the structure of the disclosure without departing from the scope or spirit of the disclosure. In view of the foregoing, it is intended that the disclosure cover modifications and variations of this disclosure provided they fall within the scope of the following claims and their equivalents.
Number | Date | Country | Kind |
---|---|---|---|
100117228 | May 2011 | TW | national |
This application claims the priority benefits of U.S.A. provisional application Ser. No. 61/357,719, filed on Jun. 23, 2010 and Taiwan application serial no. 100117228, filed on May 17, 2011. The entirety of each of the above-mentioned patent applications is hereby incorporated by reference herein and made a part of this specification.
Number | Date | Country | |
---|---|---|---|
61357719 | Jun 2010 | US |