The background description provided herein is for the purpose of generally presenting the context of the disclosure. The work of the presently named inventors, to the extent it is described in this background section, as well as aspects of the description that may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against the present disclosure.
Users of mobile communication systems have to be authenticated into the systems to ensure only authorized users are permitted to use the systems. Authentication is a multiple step process using encryption algorithms and electronic keys to ensure the network is kept secure and only authorized users may use the system. However, the communication between users and the authorization system requires many hops through the network as the authorization system is usually deep within a network and the algorithms to encrypt the authorization data are purposely made to be difficult and take time to execute.
When a user attempts to authorize to a network and a response is not received such as when an authorization node is down, the user may repeat the authorization request. Further, there are often many, many users of a network and each user of the network may repeat their authorization requests. As a result, a significant amount of network traffic may be created as users repeatedly attempt to obtain authorization to the point that entire network may be brought down due to authorization traffic.
The describes system and method may attempt to redirect network authorization traffic when a network authorization node has degraded performance or the authorization function is not operating. The method and system may determining whether an authentication function operating on an authentication node on a network is not responsive. In response to determining that the authentication function operating on the authentication node on a network is not responsive, a re-direct message may be communicated to at least one edge device on the network such that requests of the authentication function on the authentication node are re-directed to a different authentication node. Once the authentication function on the authentication node is operating again, a message may be communicated to the at least one edge device on the network to stop requiring redirection and allowing authentication requests to flow to the previously unresponsive node.
The following section describes important high level concepts and components of Long Term Evolution (LTE) networks. Of course, the systems and method described herein may apply just as easily to other network types such as GSM, 4G, 5G and future network types. LTE is used as an example and should not be considered a limitation.
One of the fundamental concepts to the overall LTE network architecture may be that mobile devices (UEs) 101 connect to base stations that make up the Evolved Universal Terrestrial Radio Access Network (E-UTRAN) 105 via radio signals, and the base stations 110 may transmit and receive IP packets to and from the core network 115. The core network 115 may have a large number of entry and exit points, including the internet and connections to other cellular networks.
In contrast to earlier cellular network technologies that use a hybrid of circuit-switched technology for voice and packet-switched technology for data, LTE may uses packet switched, IP-based technology. In the LTE architecture, voice traffic may traverse the network over the data connection using protocols, such as Voice over LTE (VoLTE), which is similar to Voice Over IP (VoIP). VoLTE may be deployed with widespread adoption by Mobile Network Operator MNO in the US. Mobile Network Operators (MNOs) still utilize legacy mobile devices
Mobile devices 101 may be the primary endpoint in cellular networks, interacting with base stations 110 via radio signals to send and receive information. A mobile device 101 may be composed of two distinct systems: the general purpose mobile operating system (OS) (e.g., Android, iOS, Windows Phone) that users interact with and the telephony subsystem used to access the cellular network. The telephony subsystem may contain a distinct application processor referred to as the baseband processor, which has may have its own operating system used to interact with the cellular network, often developed by the cellular system on a chip (SoC) manufacturer.
LTE standards refer to a mobile device as the UE 101, which refers to both the terminal with the mobile operating system, baseband processor, and LTE radio, and the removable hardware token housing security-critical information used to obtain network access. This removable hardware token is colloquially referred to as the SIM card, but LTE standards may use the term Universal Integrated Circuit Card (UICC). The UICC, which is essentially a smartcard, may run a Java application known as the Universal Subscriber Identity Module (USIM). The USIM may interface with the cellular radio and subsequently the mobile network. The UICC may contain secret cryptographic keys that are shared with the MNO before it is provisioned to a user.
There may be two distinct identifiers used in cellular networks: The International Mobile Subscriber Identity (IMSI) 605 and the International Mobile Equipment Identifier (IMEI). The IMSI may be the long term identity that the carrier uses to identify a subscriber. The IMEI may be used to identify a specific mobile device to the network and is stored on a mobile device's internal flash memory, although the IMEI may also be stored on the UICC.
The following is a consolidated list of the components included within the UE 101:
In addition to the IMEI and IMSI, MNO's may utilize other LTE identities, including the Globally Unique Temporary Identity (GUTI) and the Temporary Mobile Subscriber Identity (TMSI). The GUTI may identify a UE 101 to a network without having to send the long-term identity (i.e., IMSI). Different identities may be used for various reasons, including limiting the exposure of a permanent identity, to minimize tracking of a device as it accesses multiple services on the network.
The Radio Access Network (RAN) has evolved over time into the Evolved Universal Terrestrial Radio Access Network (E-UTRAN) 105. UEs 101 may connect to the E-UTRAN 105 to send data to the core network. The E-UTRAN 105 may be a mesh network composed of base stations 105b. A base station 105b, or Evolved Node B, may modulate and demodulate radio signals to communicate with UEs 101. eNodeBs 105b may then act as a relay point to create and send IP packets to and from the core network. Cellular networks may be designed to pass connectivity from one radio access device in the E-UTRAN 105 to the next as the connected UE 101 changes location. This seamless handoff ability may allow devices to have a constant connection with minimal interruptions providing what is known as ‘mobility’ within cellular networks. eNodeBs 105b may use the X2 interface 121 to communicate with each other, primarily transmitting control signaling to allow for LTE network communication enabling UE mobility. During this handover, the serving eNodeB 105b may transfer all UE 101 context1, cellular parameters and other information about the UE 101, to the receiving eNodeB 105b.
LTE may use a concept of named interfaces to easily identify the communication link between two endpoints. A named interface in LTE terminology, such as the X2 interface 121, may refer to the logical link between two endpoints, and in this example two eNodeBs 105b. Named interfaces in LTE may be responsible for sending and receiving specified messages and data. These interfaces 121 may be physically implemented in a variety of ways and multiple named interfaces may share the same physical connection. This physical connection may be a variety of network technologies such as fiber, Ethernet, microwave, satellite link, etc.
Base stations 105 may come in a variety of form factors, different than a typical base station comprised of a physical cell tower and radio equipment. Small cells may have a smaller form factor, transmit at lower power levels, capable of extending network coverage, and ultimately increase the capacity of the network.
The following list consolidates this information:
Evolved Packet Core
The evolved packet core (EPC) 110, illustrated in
LTE Network Topologies
An LTE network may minimally include a UE 101, a group of eNodeBs 105b and other radio access equipment making up the E-UTRAN 105 and the backend core network controlled by the MNO. The E-UTRAN 105 may be connected to the EPC 110 via a network link known as the backhaul. From a security perspective, the E-UTRAN 105 and EPC 100 are most likely in completely different geographic locations. Thus, the interfaces that link them may or may not be contained totally within the MNO's private domain.
A fixed LTE network may be a typical implementation of a cellular network utilizing multiple cell sites to provide coverage to a large geographic area. In this type of architecture, the core network components are generally in separate locations. The cell sites that house the eNodeBs 105b may connect to the EPC 110 through the backhaul. The backhaul connection may be provided by a multitude of technologies (e.g., microwave, satellite, fiber, etc.). An MNO may typically deploy this type of network architecture. Although LTE networks may require the same functional components in order to operate effectively, the quantity and placement of these components may completely dependent on the MNO's network design. It may be possible the network operator incorporates multiple EPC 110 components that serve critical functions as well as load balances these components to provide increased availability.
During authentication, in LTE network, the HSS 225 (Home Subscriber Server) is a database that contains Authentication Information and Subscriber's Data such as Services associated, Location Information etc. This interface is used to authenticate subscribers, providing services to subscribers, and to store location information of subscribers sent by MME 305.
Authentication may be a major function of HSS 225. A variety of message may be sent to the HSS for authentication purposes. One is an AIR/AIA (Authentication-Information-Request/Answer): —MME 305 fetches authentication data from HSS 225 to authenticate subscriber.
AIR/AIA may be an important and first message on S6a/S6d interface that has been exchange between MME 305 and the HSS 225 during very first attach procedure. MME 305 may ask for authentication credentials from the HSS 225 usually called as authentication vectors to authenticate and authorize the subscriber.
MME 305 may use EPS authentication vectors and MMS 305 may ask for authentication vectors. The MME 305 may tell the number of authentication vectors it needs, generally between 1-5. If this information is missing, then HSS 225 may send one authentication vector to the MME 305.
A sample structure used by MME to ask for EPS vectors may be as follows:
Requested-EUTRAN-Authentication-Info::=<AVP header:10415>
Generally a time-period on the MME 305 end for which if more than one vector are downloaded at MME 305 are treated as fresh. After that time is elapsed, the vectors may be treated as stale and may bel be deleted by MME 305 from its end. The MME 305 may send “Re-synchronization-Info” if sequence number mis-match at UE end and shall be discussed whole scenario in following article.
LTE Network Protocols
Each protocol within the air interface cellular stack may perform a series of functions and may operate on one of two logical planes: the user plane or the control plane. The user plane may be the logical plane responsible for carrying user data being sent over the network (e.g., voice communication, SMS, application traffic) while the control plane may be responsible for carrying all of the signaling communication needed for the UE 101 to be connected. To make the technology evolution paths somewhat independent, the 3GPP specifications partition the cellular protocols into two strata; the Non-Access Stratum (NAS) 520 and the Access Stratum (AS). The AS may be all communication between the UE 101 and eNodeB 105b occurring via the Radio Frequency (RF) channel. The NAS 520 may include all non-radio signaling traffic between UE 101 and MME. All of a user's TCP/IP and other application traffic may be transmitted via the user plane. The control plane, which may be required to setup, maintain, and terminate the air interface connection between the UE 101 and the MME 305, hosts the RRC 505 protocol. The PDCP 510, RLC 515, MAC, and PHY layers may form the foundation of the air interface and may be part of both user and control planes. The aforementioned control and user planes may operate on top of these protocols.
The RRC 505 may perform a variety of control tasks such as broadcasting system information, establishing a connection with the eNodeB 105b, paging, performing authentication, bearer establishment, and transferring Non-Access Stratum (NAS) messages. The PDCP 510 may perform header compression, packet reordering, retransmission, and access stratum security (including integrity and confidentiality protections). By standard, all cryptographic protection, both confidentiality and integrity, may be mandated to occur at the PDCP 510 layer. The RLC 515 may ready packets to be transferred over the air interface and transfers data to the MAC layer. It may also performs packet reordering and retransmission operations. The MAC may perform multiplexing, channel scheduling, Quality of Service (QoS) activities, and creates a logical mapping of data to the PHY layer. The PHY layer may provide error management, signal processing, and modulates data onto and off of the air interface.
The interfaces between the components within the E-UTRAN 105 and the EPC 110 may have their own communication protocols, not listed here.
LTE Bearers
In LTE networks, connections may be established between endpoints before user traffic can be communicated; these connections are called bearers. A bearer may be a connection between two endpoints that contains specific information about the traffic class, bit rate, delivery order, reliability, priority, and quality of service for its connection. A bearer may span multiple interfaces. It is important to note that there are two main types of bearers: signaling radio bearers and transport bearers. Signaling radio bearers may be established on the control plane in order to allow signaling communication between the UE 101 and eNodeB 105b, and the eNodeB 105b and MME 305. Transport bearers may be established along the path of the user plane in order to allow transmission of user data to its desired endpoint.
There are three signaling radio bearers that may need to be established which are solely used for the purpose of transmitting RRC 505 and NAS 520 messages:
Once the SRBs are set up, the UE 101 may be connected to the core network through a specific eNodeB 105b, and may be ready to transmit and receive user data. Throughout the LTE network, there are multiple connection points (UE 101 to eNodeB 105b, eNodeB 105b to S-GW, etc.) that user traffic must traverse. In order for user traffic to be allowed to traverse the LTE network, multiple bearers must be established. For a UE 101 to have full network connectivity the following bearers may be established in this order:
Throughout the UE 101 attach process, bearers may be established on an as needed basis.
UE Attach
Before a UE 101 may join an LTE network and access voice and data services, it may go through a procedure to identify itself to the LTE network. This process is known as the Initial Attach Procedure and may handle the communication of identifiable information from the UE 101 to the LTE EPC to ensure that the UE 101 may access the network. If the process is successful, then the UE 101 may be provided default connectivity, with any charging rules that are applicable and enforced by the LTE network. The attach process may be illustrated in
The Initial Attach procedure may begin as illustrated in
If there are specific Policy and Charging Control rules in the PCRF 320 for a subscriber or device for the default EPS bearer, they may be predefined in the P-GW 315 and turned on in the attachment by the P-GW 315 itself. During attachment, one or more Dedicated Bearer Establishment procedures may be launched to establish dedicated EPS bearer(s) for the specific UE 101. Also during the attach procedure, IP address allocation may be requested by the UE 101. The MME 305 may obtain the IMEI from the UE 101 and may check it with an EIR (Equipment Identity Register), which may verify that this UE's IMEI is not blacklisted. The MME 305 may then pass the IMEI software version to the HSS 225 and P-GW 315. Once a UE 101 has gone through the initial attach procedure, it may be assigned a GUTI by the MME 305. The GUTI may be stored in both the UE 101 and the MME 305 and may be used when possible instead of the IMSI 605 for future attach procedures for the specific UE.
Once the attach procedure is successfully completed, the UE 101 may authenticate via the Authentication and Key Agreement (AKA) protocol.
LTE Security
This section may describe in further detail the authentication, cryptographic protection mechanisms, hardware protection mechanisms, and network protections LTE provides. A high level discussion of LTE security goals may be provided within and an understanding of 3GPP's rationale for making certain security decisions and assumptions is recorded within.
Hardware Security
The UICC may be the next-generation Subscriber Identity Module (SIM) card used in modern mobile devices and is the foundation of the LTE security architecture. The UICC may host the Universal Subscriber Identity Module (USIM) application that performs the full range of security critical operations required of LTE cellular networks, such as authentication and other cryptographic functions. The UICC is a tamper resistant removable storage device that users can leverage to move their cellular service from one cellular device to another, while also providing the capability of storing contacts and other user data. The UICC may house a processor, ROM, RAM, may be network aware, and may be capable of running small Java applications used for a variety of functions ranging from maintenance, updates, and even video games. The UICC may also potentially be used for identity services and Near Field Communication (NFC).
From a security perspective, one of the most important functions of the UICC may be cryptographic key and credential storage. In LTE, UICCs may be provisioned with a long-term, pre-shared cryptographic key referred to as K 550. This key may be stored within the tamper resistant UICC and also within the core network (in the HSS) and may not leave either of those locations. All other keys in LTE's cryptographic structure may be derived from K 550, with the session master key referred to as K{ASME} 555. Security functions such as cryptographic operations and subscriber authentication may be performed by the UICC in conjunction with the HSS and MME. The UICC may also play a role in storing LTE security contexts. Security contexts may contain cryptographic keys, UE 101 security capabilities, and other security parameters generated during an attach that may be reused during future system accesses. The UICC also may store the IMSI 605 and IMEI, which are both used to support the use of identities. Some modern mobile equipment operating systems may implement the USIM PIN specified by 3GPP TS 121.111. This may allow a PIN to be configured on a UICC. As UICCs may be removed from one mobile device and inserted into another to provide service, the UICC PIN may prevent someone from stealing another user's UICC and obtaining unauthorized network access.
UE Authentication
The primary LTE authentication mechanism mobile handsets may use to authenticate to an LTE network is known as the Authentication and Key Agreement (AKA) protocol. The AKA protocol cryptographically may prove that the UICC and MNO have knowledge of the secret key K 550. From a security perspective, this effectively may authenticate the UICC to the network, but not the user or mobile device. An AKA protocol run may be depicted and further described below:
The AKA procedure illustrated in
After the identifier is provided to the core network, the MME 305 may provide the identifier, alongside additional cryptographic parameters and the serving network ID (SN id) 610, to the HSS/AuC (item 2 in
As can be seen, the authentication process involves many parts of the network and has to access many hops into the depth of the network as illustrated in
In response, the proposed system and method address the unresponsive authorization node problem.
In one embodiment, an authority on the network may track network traffic. The authority may determine that authorization requests are being made repeatedly which may indicate that the authentication node is not being responsive.
In another embodiment, an authority on the network may track network traffic and may notice that authentications have stopped flowing from an authentication node. In some embodiments, the number of authentication requests may be matched to the number of authentication responses and if the difference is under a threshold, the system may assume that the authentication node is down.
In another embodiment, the authentication node may return an error or message that indicates that the authentication node is not responding at the current time. The error code may be a time out notification. In other embodiments, the error code may be a pre-set code that the authorization node communicates when the authorization function is not operating or is operating at a reduce efficiency.
If the determination at block 205 if that the authentication function operating on the authentication node is not being unresponsive, control may pass to block 230 where the authentication node may continue to be monitored.
At block 210, in response to determining that the authentication function operating on the authentication node on a network is unresponsive, the method may attempt to direct traffic to other authentication nodes. By re-directing traffic, the network may not be clogged to the point of breaking down with repeated authorization requests.
In one embodiment, a re-direct message may be communicated to at least one edge device on the network that requests of the authentication function on the authentication node be re-directed to a different authentication node. At a high level, by moving the re-direct message to one or more edge device, authorization messages will not travel all the way to the authentication node inside the HSS as illustrated in
In other embodiments, the error message may include the address of the additional authorization node that is capable of handling the authorization traffic. In some embodiments, the additional authorization node may be preset. In other embodiments, the additional authorization node may be determined by an authority that determines the additional authorization node that has been determined to be most efficient at handling the additional authorization traffic. In some embodiments, the additional authorization node may not be the closest node.
In another embodiment, there may be a plurality of additional authorization nodes. The authorization node may use intelligence from an authority to direct authorization traffic to the appropriate authorization node. The intelligence may be based on a random assignment or may be based on feedback from the network which may assist in assigning the traffic to the node determined to provide the best response.
Depending on the system design, an end-re-direct message may be communicated to a diameter routing agent or traffic handling function on the network.
At block 215, the method may determine that the authentication function operating on an authentication node on a network is responsive again. In some embodiments, the method may periodically test the authentication function on the node that was non-responsive. For example and not limitation, other authorization nodes may communicate a message to test the non-responsive authentication node.
In another embodiment, a network authority may test the node that was non responsive. For example, the network may have a troubleshooting system to track, identify and troubleshoot problems. The troubleshooting system may identify the problem and may periodically test the non-responsive node, such as communicating a test message every five minutes until the problem is corrected.
In some embodiments, the troubleshooting system may communicate a reset message to the non-responsive node in the hopes that a reset may fix the non-responsive authentication node. In other embodiments, the troubleshooting system may attempt to remotely determine the problem such as running through a root cause analysis and may communicate proposed fixes to the non-responsive authentication node. Assuming the reset or the fix works, the authentication node may become responsive and once the authentication node is responsive, the network, including the edge devices, may be notified that the non-responsive authentication node is now responsive.
In yet another embodiment, the non-responsive authentication node may require a hardware fix which may occur automatically such as switching to a backup server or may require the assistance of a human. Once the hardware fix is complete, the fixed hardware may communicate to the network that the authentication node is operational again.
In yet other embodiments, the non-responsive node may communicate a message when it is responsive again.
If the determination at block 215 is that the authentication function operating on the unresponsive authentication node continues to be unresponsive, control may pass to block 220, where the system may continue to test and monitor the unresponsive authentication node to see if it has been fixed.
If the determination at block 215 is that the authentication function operating on the unresponsive authentication node is no longer unresponsive, control may pass to block 224 where the network may announce that the unresponsive network node is no longer unresponsive and that the unresponsive network node should be used as normal and control may pass to block 230 where the various authentication nodes may continue to be monitored for desired performance.
In some embodiments, the system may determining if a previous authorization exists. For example, the authentication node in the HSS may keep previous authentications in a memory. In some embodiments, the previous authorizations may be marked as stale after a period of time. In other embodiments, the authorizations may be marked as unusable after a period of time. In yet another embodiments, the authorizations may be kept in a memory until a new authorization occurs for the user and the old authorization may be deleted or marked as stale.
In response to determining a previous authorization exists, the previous authorization may be used. Logically, if the authorization is days old, it may not be appropriate to be used. Thus, if the age of the previous authorization is above a threshold, the authorization request may be added to an authorization queue and the authorization request may have to wait for the authorization function to be operating again such that the authorization queue may be submitted to the authorization function.
The threshold may be determined in a variety of ways. In some embodiments, the threshold may be based on time. In other embodiments, the threshold may be based on the number of authorizations that have occurred since the original authorization. In yet another embodiment, the number of authorizations may have a limit and if the specific authorization is beyond the limit, it may not be used as being stale.
In other embodiments, the threshold may be a calculation based on the number of authorization requests that have not been answered during a period of time and if the number of unanswered authorizations is above a threshold, the threshold me be increased. For example, if a large number of authorization requests have not been answered, the threshold may be increased to keep the backlog of authorization request and re-requests from becoming excessive and clogging the network.
In yet another embodiment, the system and method may refrain from purging past authentication determinations in a memory within a purge time threshold. For example, if an authority on the system recognizes that authorization messages are not being communicated, the system may refrain from purging past authentication determinations in a memory within a purge time threshold. Of course, if the authentication determinations are over a threshold, the memory will still be purged as authentications which are too stale likely are not trustworthy and should be deleted. Similarly, once the authentication function is operating again, past authentication determination in the memory may be purged in response to an authentication being received again.
Upon reading this disclosure, those of skill in the art will appreciate still additional alternative structural and functional designs for the systems and methods described herein through the disclosed principles herein. Thus, while particular embodiments and applications have been illustrated and described, it is to be understood that the disclosed embodiments are not limited to the precise construction and components disclosed herein. Various modifications, changes and variations, which will be apparent to those skilled in the art, may be made in the arrangement, operation and details of the systems and methods disclosed herein without departing from the spirit and scope defined in any appended claims.
This application is a continuation application of U.S. application Ser. No. 16/579,141, filed on Sep. 23, 2019, the entire contents of which are hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
6732179 | Brown | May 2004 | B1 |
7876754 | Novaes | Jan 2011 | B2 |
9220118 | Ramamurthy | Dec 2015 | B1 |
9774586 | Roche | Sep 2017 | B1 |
10044723 | Fischer | Aug 2018 | B1 |
11100146 | Brest | Aug 2021 | B1 |
11394702 | Avetoom | Jul 2022 | B2 |
11432144 | Avetoom | Aug 2022 | B2 |
20020083317 | Ohta | Jun 2002 | A1 |
20020161857 | Narasimhan | Oct 2002 | A1 |
20020169958 | Nyman | Nov 2002 | A1 |
20020169966 | Nyman | Nov 2002 | A1 |
20030226037 | Mak | Dec 2003 | A1 |
20040064699 | Hooker | Apr 2004 | A1 |
20050246346 | Gerdes | Nov 2005 | A1 |
20060036690 | O'Neil | Feb 2006 | A1 |
20060046689 | Kim | Mar 2006 | A1 |
20060061820 | Okamoto | Mar 2006 | A1 |
20060225129 | Inoue | Oct 2006 | A1 |
20070088793 | Landsman | Apr 2007 | A1 |
20070130471 | Walker Pina | Jun 2007 | A1 |
20070250612 | Elias | Oct 2007 | A1 |
20070271618 | Chao | Nov 2007 | A1 |
20080080858 | Feldman | Apr 2008 | A1 |
20080104580 | Wilkinson | May 2008 | A1 |
20080126333 | Bezar | May 2008 | A1 |
20080130869 | Akkar | Jun 2008 | A1 |
20080155278 | Carrico | Jun 2008 | A1 |
20080235426 | De | Sep 2008 | A1 |
20080240440 | Rose | Oct 2008 | A1 |
20090054082 | Kim | Feb 2009 | A1 |
20090196170 | Ayyagari | Aug 2009 | A1 |
20100009669 | Pirhonen | Jan 2010 | A1 |
20110078328 | Dunsdon | Mar 2011 | A1 |
20110314467 | Pearson | Dec 2011 | A1 |
20120054495 | Takahashi | Mar 2012 | A1 |
20130067059 | Gatta | Mar 2013 | A1 |
20130325926 | Oozeki | Dec 2013 | A1 |
20140064057 | Bryskin | Mar 2014 | A1 |
20140075203 | Barbu | Mar 2014 | A1 |
20140090041 | Kim | Mar 2014 | A1 |
20140173718 | Kodama | Jun 2014 | A1 |
20140325220 | Tunnell | Oct 2014 | A1 |
20150098106 | Chapman | Apr 2015 | A1 |
20150121013 | Chiang | Apr 2015 | A1 |
20150161416 | Na | Jun 2015 | A1 |
20160007293 | Hyland | Jan 2016 | A1 |
20160029228 | Mufti | Jan 2016 | A1 |
20160042767 | Araya | Feb 2016 | A1 |
20160142389 | Denker | May 2016 | A1 |
20160188451 | Xia | Jun 2016 | A1 |
20160188459 | Kanno | Jun 2016 | A1 |
20160277436 | Lim | Sep 2016 | A1 |
20160321443 | Ishibashi | Nov 2016 | A1 |
20170048008 | Yi | Feb 2017 | A1 |
20170063932 | Hubbard | Mar 2017 | A1 |
20170093829 | Gitlin | Mar 2017 | A1 |
20170109770 | Kusens | Apr 2017 | A1 |
20170150353 | Hillis | May 2017 | A1 |
20170169227 | Rajcan | Jun 2017 | A1 |
20170201546 | Park | Jul 2017 | A1 |
20170295489 | Agiwal | Oct 2017 | A1 |
20170337370 | Chereshnev | Nov 2017 | A1 |
20170345456 | Hassner | Nov 2017 | A1 |
20170372055 | Robinson | Dec 2017 | A1 |
20170374551 | Shen | Dec 2017 | A1 |
20180041488 | Kohli | Feb 2018 | A1 |
20180054432 | Bailey | Feb 2018 | A1 |
20180109541 | Gleichauf | Apr 2018 | A1 |
20180124697 | Nair | May 2018 | A1 |
20180191720 | Dawes | Jul 2018 | A1 |
20180213461 | Grayson | Jul 2018 | A1 |
20180234837 | Lee | Aug 2018 | A1 |
20180249339 | Noh | Aug 2018 | A1 |
20180255189 | Granby | Sep 2018 | A1 |
20180341773 | Khatri | Nov 2018 | A1 |
20180375994 | Gestraud | Dec 2018 | A1 |
20180376444 | Kim | Dec 2018 | A1 |
20190052616 | Campbell | Feb 2019 | A1 |
20190058991 | Al-Kabra | Feb 2019 | A1 |
20190207950 | Mohammed | Jul 2019 | A1 |
20190215234 | Bonnin | Jul 2019 | A1 |
20190286806 | Robinson | Sep 2019 | A1 |
20190306780 | Baek | Oct 2019 | A1 |
20190380128 | Park | Dec 2019 | A1 |
20190394683 | Sillanpaa | Dec 2019 | A1 |
20200014683 | Russell | Jan 2020 | A1 |
20200053083 | Kunz | Feb 2020 | A1 |
20200067898 | Kosugi | Feb 2020 | A1 |
20200073698 | Wu | Mar 2020 | A1 |
20200089867 | Kim | Mar 2020 | A1 |
20200112572 | Ajayi | Apr 2020 | A1 |
20200145414 | Romero | May 2020 | A1 |
20200162919 | Velev | May 2020 | A1 |
20200193006 | Krieg | Jun 2020 | A1 |
20200234003 | Bakman | Jul 2020 | A1 |
20200310823 | Poosapalli | Oct 2020 | A1 |
20200404485 | Ranjan | Dec 2020 | A1 |
20210049309 | Su | Feb 2021 | A1 |
20210084492 | Budhathoki | Mar 2021 | A1 |
20210092104 | Avetoom | Mar 2021 | A1 |
20210135971 | Martin | May 2021 | A1 |
20210136658 | Rönneke | May 2021 | A1 |
20210194592 | Schaeffer | Jun 2021 | A1 |
20210281577 | Sasaki | Sep 2021 | A1 |
20220417746 | Avetoom | Dec 2022 | A1 |
Entry |
---|
Office Action (Notice of Allowance and Fees Due (PTOL-85)) dated Mar. 15, 2022 for U.S. Appl. No. 16/579,141 (pp. 1-8). |
Office Action dated Nov. 9, 2021 for U.S. Appl. No. 16/579,141 (pp. 1-25). |
Number | Date | Country | |
---|---|---|---|
20220345452 A1 | Oct 2022 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16579141 | Sep 2019 | US |
Child | 17860315 | US |