The present invention relates to a method and a system for passively detecting intrusion in an indoor environment.
Intrusion detection is important for improving safety, for instance, for private house, public offices and specific areas. In general, intrusion detection systems are configured to signal the presence of intruders and to trigger an alarm capable of preventing any theft and/or damage by outsiders. Several commercial solutions are currently available by means of different technologies. Typically, such solutions require ad-hoc systems installed to detect and identify threats.
For instance, WO 02/082004 A2 discloses a dedicated device for motion detection that comprises an incoherent detector and a sensing element, which operates at millimeter wavelength. The dedicated device exploits the output of the incoherent detection to detect movements and trigger an alarm.
U.S. Pat. No. 8,730,087 B2 discloses a passive radar for presence and motion detection. More specifically, presence and motion of intruders is detected passively by means of TM-UWB radars. This requires at least two Tm-UWB radars which are displaced according to the area to be protected and which monitor the changes in the propagation environment to detect the presence of an intruder and track its movement.
U.S. Pat. No. 9,185,528 B2, which relates to Wi-Fi mapping and motion detection, discloses methods and systems that rely on a plurality of transceivers positioned so as to transmit and receive signals that pass through a portion of an area of interest. Movements of persons in the area of interest are determined by using the strength of the received signals and prior knowledge of building characteristics.
US 2003/0098791 A1 discloses a wireless security sensor system for windows and doors. The sensor, which is to be installed, e.g., in a window frame, monitors the window opening by means of a magnetic sensor, whose output is processed by a microprocessor and transmitted via an RF transmitter which enables wireless connectivity to the sensor.
In J. Palacios, et al.: “Communication-driven localization and mapping for millimeter wave networks”, in Proceedings of IEEE Conference on Computer Communications (INFOCOM) 2018, the authors propose a ‘Simultaneous Localization And Mapping’ (SLAM) algorithm which exploits beam-training to retrieve angle-difference-of-arrival information. This information is used to estimate the location of the mmWave APs and the position of the user in the surrounding indoor environment. The proposed solution requires that the user device is connected to a mmWave AP.
The inventors have recognized that those intrusion detection solutions discussed above prove to be disadvantageous in terms of certain aspects. In particular, the solutions have a common shortcoming, namely that they require the deployment of an ad hoc apparatus for detecting any intrusive behavior.
In an embodiment, the present disclosure provides a method that passively detects intrusion in an indoor environment. The method includes: establishing at least one communication channel between two millimeter (mm)-wave devices of a plurality of mm-wave devices deployed within the indoor environment, continuously monitoring communication channel parameters of the at least one communication channel, and triggering an intrusion detection process based on variations of the communication channel parameters.
Subject matter of the present disclosure will be described in even greater detail below based on the exemplary figures. All features described and/or illustrated herein can be used alone or combined in different combinations. The features and advantages of various embodiments will become apparent by reading the following detailed description with reference to the attached drawings, which illustrate the following:
Embodiments of the present invention improve and further develop a method and a system for passively detecting intrusion in an indoor environment in such a way that intrusion detection can be efficiently performed without the need of a dedicated apparatus.
An embodiment of the present invention provide a method for passively detecting intrusion in an indoor environment, the method including: establishing at least one communication channel between two mm-wave devices of a number of mm-wave devices deployed within the indoor environment, continuously monitoring communication channel parameters, and using variations of the communication channel parameters to trigger an intrusion detection process.
An embodiment of the present invention provides a system for passively detecting intrusion in an indoor environment, where a number of millimeter (mm)-wave devices is deployed within the indoor environment, and where at least one communication channel is established between two mm-wave devices of the number of mm-wave devices. The system includes a control unit having one or more processors, which, alone or in combination, are configured to provide for execution of the following steps:
continuously monitoring communication channel parameters, and
using variations of the communication channel parameters to trigger an intrusion detection process.
According to embodiments of the invention, the mm-waves communication channel through off-the-shelf routers are exploited to continuously monitor propagation environment changes so as to detect intrusions. Specifically, intrusion detection capabilities and intrusion tracking capabilities may be provided via beamforming. In contrast to solutions discussed above, embodiments of the present invention do not require ad-hoc systems to detect an intrusion. In particular, embodiments may rely on the high penetration rate of the mm-waves devices in the societal behaviors, such as home routers, smart TVs, wearable VR Gaming Headsets, etc. This novel technology is widely deployed in private houses, offices and indoor environments, but so far has only been used to provide connectivity with very high capacity to deliver customized services. Embodiments of the present invention pioneers the novel concept of passive intrusion detection by exploiting the directivity property of mm-waves antennas and the high-sensibility to environmental changes of the mm-waves communication channels.
Embodiments of the present invention implement a passive channel variation detection process that relies on a directive mm-waves communication between two or more devices in an indoor scenario (based on beamforming alignment process). According to further embodiments of the present invention, a deep neural network may be configured that adaptively learns the statistical distribution of the measurements in a specific environment and promptly identifies whenever there is a significant change, i.e., an intrusion.
In an exemplary embodiment, a method for passively detecting intrusion in an indoor environment comprises the steps of establishing a connection between two or more mm-waves devices deployed in an indoor scenario. Channel parameters, such as RSSI and/or SNR, between each pair of mm-waves device beams are continuously monitored. A neural network may be trained with statistical parameters of the channel measurements in a reference scenario as well as when the environment is occupied by one (or more) intruders. The neural network may be fed with collected data, such as RSSI or SNR, and an alert indicative of an intrusion may be triggered when an environmental change is detected.
There are several ways how to design and further develop the teachings of embodiments of the present invention in an advantageous way. To this end it is to be referred to the following explanation of exemplary embodiments of the present invention by way of example, illustrated by the figures. In connection with the explanation of the preferred embodiments of the present invention by the aid of the figures, generally exemplary embodiments and further developments of the teaching will be explained.
As 5G deployments start to roll-out, indoor solutions are increasingly pressed towards delivering an enhanced performance, convenience, security, and user experiences not possible with today's connectivity solutions. Wi-Fi is the predominant technology of choice indoors and major vendors started addressing this need by incorporating the mmWave band to their products. Specifically, with more than 80% of mobile data traffic originating or terminating indoors, service providers aiming at keeping pace with 5G are increasingly considering the mmWave technology for indoor locations as the solution to bring current WiFi products to the next level. As such, it is expected that mmWave devices will become pervasive in the near future. mmWave can elevate user experiences to new heights by bringing multi-Gigabit/s speeds, ultra-low latency experiences, and virtually unlimited capacity to a wide range of devices such as smartphones, tablets, AR/VR (augmented/virtual reality) headsets, and always-connected laptops.
On the standardization side, the IEEE 802.11ad working group, also known as WiGig, already defined a solution delivering high-speed communication capabilities for devices operating in the mmWave frequency bands. Based on this standard, commercial off-the-shelf products are available today. The future IEEE 802.11ay standard (for reference, see IEEE P802.11ay, “Enhanced throughput for operation in license-exempt bands above 45 GHz,” IEEE 802.11 Working Group, Mar. 2019), currently under development, is being designed to provide up to 30 Gbit/s of indoor capacity within 30 meters (for reference, see Y. Ghasempour, C. R. C. M. da Silva, C. Cordeiro, and E. W. Knightly, “IEEE 802.11ay: Next-generation 60 GHz communication for 100 Gb/s Wi-Fi,” IEEE Communications Magazine, vol. 55, no. 12, pp. 186-192, December 2017).
The high data rates offered by mmWave systems compared to classical sub-6 GHz Wi-Fi ones come at the price of much worse propagation properties. Attenuation is very strong at mmWave frequencies and thus, mmWave devices require a larger number of antenna elements so as to provide high spatial processing gains that compensate for experienced pathloss (for reference, see K. Haneda et al, “A statistical spatio-temporal radio channel model for large indoor environments at 60 and 70 GHz,” IEEE Transactions on Antennas and Propagation, vol. 63, no. 6, pp. 2694-2704, June 2015). These multiple antenna elements enable mmWave transmitters to electronically steer the radiation pattern providing spatial diversity to the communication channel. Moreover, strong multi-path features and high obstacle blockage sensitivity make mmWave communications very sensible to propagation environment changes.
With the above in mind, embodiments of the present invention relate to intrusion detection methods and systems that take advantage of the unique properties of mmWave communication channels to perform indoor intrusion detection in a passive manner, in addition to enable Gigabit/s data rates.
In particular, mmWaves can easily pass through common clothing materials and reflect on human bodies. Such reflected waves result in frequency variations that reveal discrepancies from expected communication channel properties measurements (e.g., power, noise, etc.). Thereby, detecting the potential presence of an unexpected person in an indoor environment. In order to do so, according to embodiments, a data analytics engine can carefully parse the monitored data and capture mmWave channel variations. Deep neural networks can then automatically learn the reference channel environment of a given mmWave indoor deployment and, if an unexpected channel variation is detected, recognize whether it is due to the presence of an intruder. Furthermore, the directional nature of the mmWave signal enables a localization feature by sounding the channel on different directions and determining the position of intruders without requiring any active connection.
Each Wi-Gig devices pair has to establish a connection through a pair of beams that are activated during the communication, as exemplarily depicted at 110 in
Millimeter wave propagation is strongly influenced by the propagation environment itself, thus the presence of an intruder can radically change the propagation conditions, which translates into changes in measurements outcome of the beam training phase. Therefore, according to embodiments of the invention, the measurements taken during the beam training phase are exploited to directionally sense the propagation environment. Embodiments of the invention can exploit the power measurements performed by mm-waves devices during standard operations. These measurements may be utilized to detect propagation environment changes and to passively sense intrusions in the area under intrusion control.
According to a further embodiment of the invention, a further functionality is added, which makes Wi-Gig devices capable of providing intrusion detection service to work alongside the connectivity provisioning. In addition, propagation environment changes may be mapped into other emergency situations, such as water leakage, fire, which can be advertised in time to allow emergency recovery.
In a preferred embodiment of the present invention, multiple (e.g., at least two) Wi-Gig devices are statically deployed within the indoor environment that is to be controlled in terms of intrusion detection. Furthermore, at least two of the multiple the Wi-Gig devices establish a successful connection between each other. For example, as shown in
Those devices perform the beam training phase according to the IEEE 802.11ad standard protocol, as shown at 110 in
Different propagation environments may provide distinct channel statistics. If an intruder breaks into the area, this will automatically change the measurement statistics. Against this background, according to embodiments of the invention, the measurement statistics are continuously monitored and, in case of detecting a change of those statistics, the presence of an intruder in the respective area under surveillance (e.g., a room) can be inferred and eventually an alarm can be triggered.
The upper diagrams of
From the diagrams on the right side, the effect of the presence of an intruder moving in the room under surveillance can be obtained. Such an intruder in the covered environment perturbates the propagation environment and this, in turn, is translated into a noticeable difference in the measured SNR for a given couple of activated beams. Different beam pairs provide different statistics showing a distinct sensibility to the environmental changes in different areas of the room depending on their beam pattern. Embodiments of the invention consider the Beam training measurements per each activated beam pair taken in different time windows. While constructing the statistical distribution, a change in the distribution parameters will be detected, such as the mean value μ or the variance σ of the SNR, which might lead to an intrusion detection event.
As shown at 320, the data collected in the dataset 30 during the beam training phase is used to train a feed forward deep neural network classifier 32, which is in charge of learning the different measurement statistics, both in the case of an empty environment and in the case when an intrusion has occurred. After the training phase, the system is ready to operate. New measurements, collected during regular operation as depicted at 330, are continuously fed in to the classifier 32, as shown at 340. The classifier 32 is in charge of detecting any environmental change and triggering an alarm in case of detecting an environmental change, as shown at 320. The alarm is indicative of an intrusion event.
As an example, schematically shown in
Specifically,
Another embodiment of the present invention relates to a system with mm-waves routers deployment to passively localize an intruder in indoor environments. In this context, it is important to note that the highly directional nature of mm-wave communication can provide highly directional channel variation sensing. This means that different beam patterns are capable to sense channel variations caused by different positions of the intruder.
Consequently, according to an embodiment, the directional channel variations are monitored and, based on the monitored variations, the position of an intruder within the indoor environment is inferred. For instance, a deep neural network (for instance, a deep feed forward neural network) may be implemented that takes the power measurements performed during the beam training phase as input and provides an estimation of the position of the intruder within the indoor environment (e.g., the office area of
In a preferred embodiment, in order to detect channel anomalies within an indoor reference environment, a mmWave channel monitoring phase is used. In particular, power measurements on an established mmWave link are regularly collected and analyzed to detect unexpected changes. Following the IEEE 802.11ad protocol guidelines, power measurements are regularly performed during the beam training phase, i.e., when two mmWave devices seek for which beam to activate providing the best channel quality.
IEEE 802.11ad (and its evolution 802.11ay) covers many relevant aspects to establish and sustain a communication link between mmWave-enabled devices. To provide the beamforming capabilities, such devices are equipped with electronically steerable antenna arrays controlled by predefined weights vectors included in a codebook that may automatically activate different transmitting and receiving beam patterns. A specific codebook is selected for transmitting or receiving operations to activate the communication and establish the connection.
The beam pattern activation is performed by means of a complex beam forming training phase. During this phase, the so-called initiator transmits sector sweep (SSW) frames, whereas the responder collects power measurements. As soon as the initiator has probed all available beam patterns by selecting available weights vectors in the codebook, in turn, the responder can start the sector sweep procedure letting the initiator collecting power measurements. This procedure is activated during the association phase being periodically repeated to properly adjust the beam selection during the communication and prevent connection disruptions due to an unexpected signal drop. The entire procedure allows to instantaneously obtain a snapshot of the environment by exploiting the spatial diversity while at the same time considering the best communication path to establish the connection.
Note that, due to the millimeter waves high frequency, their propagation is strongly influenced by the environment itself, including human bodies, walls and even glass objects, which can seriously hamper the signal propagation (for reference, see C. Slezak et al.: “Empirical effects of dynamic human-body blockage in 60 GHz communications”, in IEEE Communications Magazine, vol. 56, no. 12, pp. 60-66, 2018). Thus, the presence of an intruder in the environment can change the propagation conditions, although it might not completely obstruct the communication path between a pair of mmWave nodes. Notably, intruders might have a strong influence on the propagation environment that translates into relevant changes in the beam training measurements outcome. Therefore, the power measurements performed by mmWave devices during standard operations can be exploited to build a complete sensing map of the propagation environment and promptly capture unexpected variations.
Hereafter, a mmWave communication system is considered that consists of multiple mmWave-enabled 802.11ad devices, which can exchange data while periodically performing the beam training phase according to the 802.11ad guidelines. Embodiments of the invention focus on the effects produced by propagation environment changes onto the received power measured by those devices.
The short wavelength characterizing mmWave propagation translates into a quasi-optical propagation behavior. As a consequence, objects which lie in the propagation environment can provide communication blockages as well as a large number of reflected paths that can sustain the communication, especially in indoor environments. Therefore, embodiments of the invention assume mmWave propagation to be a multi-path communication and describe the communication channel with a geometrical model that takes into account the multi-path profile of the environment as follows:
wherein L is the
set of paths constituting the multi-path profile, αl is the complex gain of the l-th path. aTx and aRx are the array steering vectors of the transmitting and receiving device, respectively, which account for the physical characteristics of the arrays, while ΦTx,l and ΦRx,l are the angle of departure and the angle of arrival of the l-th path.
Such devices are provided with a default beam codebook of a set P=(pi) of weighting vectors. Different weighting vectors identify distinct beam patterns activated by each device. During the beam training phase, each of the weighing vectors in the transmitter and receiver codebooks, namely Ptx and Prx, are sequentially selected and applied to the steering vector of the devices. Based thereupon, one can define the set of available pairs of beams as follows:
B:={(i,j)|piϵPtx,pjϵPrx}
Considering the activation of a given couple of transmitting and receiving beams (i, j)ϵB, one can describe the overall communication gain g provided by (i, j) as follows:
g
ij
=|p
j
H
Hp
i|2,
wherein pi□Ptx and pj□Prx are respectively the ith and the jth weighting vectors defined in the transmitting and receiving codebooks of the devices.
The activation of different beam couples provides very different overall communication gains as different weighting vectors pi are designed to be directional and therefore to emphasize different communication directions. This enables the spatial diversity in the power measurements campaign considering different directions and covering a 360°-angle from the device perspective.
Devices may periodically perform the beam training phase, wherein beam patterns are sequentially activated to retrieve power measurements so as to select the best beam for sustaining the data transmission. Analytically, per each beam training phase t, one gets a sample of the received power associated to the beam pair (i, j)ϵB:
ζij=ΩTX+Gij+Xij
wherein ΩTX is the transmission power, Gij is the overall communication gain expressed in dB, and Xij is a random variable that takes into account the non-ideality of the communication channel. The samples of the random process ζij for each selected beam pair can be gathered in a matrix ζt=(ζij). Based thereupon, the expected mean value μ and variance σ of the received power distribution per each couple (i, j)□B by can be computed, representing the power distribution in the standard environmental conditions, i.e. with no intrusions being present.
In case of an intrusion event that occurs when a person moves inside the propagation environment, embodiments of the invention draw one or more of the following three observations: i) due to the hydrophobic millimeter-wave behavior, the presence of an intruder may completely block some of the paths lϵL between the transmitter and the receiver, ii) the flat surfaces that characterize most of the fixtures in the environment might act as wave reflectors: the intruder might permanently move them thereby disrupting some existing path while building new communication channels, iii) a moving person acting as an intruder continuously moves around intermittently blocking some of the communication paths. Such changes in the propagation environment translate into a tangible multi-path profile change that reflects the modifications of the received power statistics both in terms of average and variance.
According to an embodiment, in order to detect such changes, i.e. unexpected data measurements, a density estimate based on a non-parametric kernel estimate function, namely a ground truth density is performed. For instance, this kernel estimate function may be set up in accordance with the approach described in S. Hawkins et al.: “Outlier detection using replicator neural networks,” in Proceedings of the 4th Int. Conf. on Data Warehousing and Knowledge Discovery (DaWaK02). Aix-en-Provence, 2002. In this way, measurement values differing from the ground truth density are labelled as outliers. However, when no assumptions are taken about the distribution of the measurements, outlier detection is only feasible by comparing the estimated density of a given measurement value to the average density of its neighbors, namely unsupervised outlier detection method.
According to a preferred embodiment, while such outlier detection process helps to recognize the next environmental change, the current status of the system is identified based on the data collected within a certain measurement time window in order to trigger an alert for potential intruders. According to embodiments, two main system states may be defined: i) a state 50 “intrusion detected” and ii) a state 52 “no intrusion detected”, as shown in the state diagram of
As will be appreciated by those skilled in the art, the continuous presence of an intruder within the environment may conditionally change the overall power measurements, which may exhibit altered distribution parameters μ and Σ as described above. This would result, in turn, in upcoming power measurements distributed according to the new distribution statistics revealing no further outliers. Therefore, according to embodiments of the invention, the system does not rely only on the outlier detection process to determine the current system state as it might fail while trying to capture diverging behaviors. Instead, a new system state (denoted similarity check 54 in
If no outliers are detected within an entire measurement time window Tk, a distribution similarity process is executed. In particular, this process compares the expected mean values μ and variances σ of the received power within the previous measurement time window Tk against the distribution parameters of a reference scenario. The reference measurements distribution strongly depends on the selected environment and are taken in advance when the environment is not occupied by any human presence (labelled as reference environment 56 in
Different applied settings might result in different system behaviors. As such, embodiments of the invention take into account one or more of the following aspects: i) a larger measurement time window Tk might capture better the channel dynamics and properly recognize the outlier, but it might return a biased set of distribution statistics that might impair the overall similarity process; ii) the measured variance shall be weighted higher than the measured mean value as the variance is a meaningful feature that better describes the data distribution, iii) a detection threshold value A shall be automatically selected as it may lead to reduce the sensitivity of the system to the possible intrusions (when set to low values) while triggering often an alarm (when set to high values) and, iv) the power measurement statistics is assumed as normally distributed which makes the analysis tractable, deviations on this assumption would affect the solution effectiveness.
Regarding the power measurement statistics assumption of being normally distributed,
The intrusion detection solution described so far effectively works for static scenarios where intruders enter an area without modifying the environment. However, when considering an intruder considerably changing the structure of the indoor environment (e.g., moving furniture or introducing new static objects) the reference environment may significantly change its power measurements distribution leading to a ping-pong effect between the “intrusion detected” and “similarity check” system states. In such a case, even though the room might have no intruders anymore and no outliers are detected, the power measurements distribution within the last measurement interval Tk may differ from the reference scenario in T0. To overcome this problem and make the solution able to dynamically learn about room structure changes, embodiments of the invention introduce a machine-learning module responsible of updating the reference environment when required.
To make the intrusion detection solution robust to indoor mmWave environment changes, a machine learning-based solution may be realized which, by means of a training process, is able to automatically approximate the system model described above. The advantage of a self-learning approach versus a parametric model-based solution is multifold: i) the distribution of the power measurements can radically change according to the specific deployment environment, thus the setting parameters have to be properly tuned for each indoor environment to successfully detect intrusions; ii) the indoor environment structure can change (e.g., furniture moved), resulting in a new reference environment that must be identified preventing the system to enter into a deadlock between the non-intrusion and similarity check states; iii) the multivariate Gaussian assumption of the power measurements might not hold if the number of transmission paths is not sufficiently high or in case of non-linearity in the devices' power measurement unit.
As According to embodiments of the invention, a deep convolutional neural network classifier architecture 70 is adopted, as depicted in
f
k
=y(Ik·w),
wherein fk=(fk(i,j)) is relative to each beam couple (i,j))ϵB, y(⋅) is the relu activation function and w is the set of weights of the convolutional layer 74. The idea is to exploit the convolutional layer 74 to find an ad-hoc weighting vector w, which is able to translate the temporal evolution of ζt into a lower dimensional feature space that represents the intrusion phenomena and, at the same time, keeps separated the contributions of each couple (i,j)ϵB. The output of the convolutional layer 74 is a vector with B×1 size. According to an embodiment, this vector is fed into a deep fully connected neural network comprising a 9-neurons layer 76 followed by a 2-neurons output layer 78 with relu and softmax activation functions, respectively. Such layers 76, 78 carry out the classification process. Additionally, the output neurons provide a score, which represents the conditioned probabilities Pr(intrusion|Ik) and Pr(
An aspect of the presented neural network 70 embodiment is that, if the training set is provided with a sufficiently different number of indoor scenarios, the convolutional layer 74 can learn to extract features which are relevant to detect intrusion events independently on the environment itself. The variety of the training data affects also the classification part of the network that is able to generalize the classification process. This translates into a system which is portable and does not require an initial adaptation to the specific area of interest as long as the mmWave devices relative positioning is kept.
Embodiments of the present invention also relate to intruder localization within an area under surveillance. Given the directional nature of the mmWave communication, it is possible to exploit the measurements taken during the beam training phase to sense the propagation environment towards specific directions. Specifically, one can, alongside the intrusion detection, map the changes sensed by the different beams onto the (potential) location of the intruder inside the area of interest (e.g., within the office).
An embodiment of the invention relates to implementing a variation of the neural network-based solution. First, it is important to note that in the context of intruder localization, there is no interest in the temporal evolution of the received power. Conversely, it is assumed that an intrusion occurred, hence, the method should aim at mapping in the received power measurements into the location of the intruder in the area. This can be achieved by adopting a different neural network architecture with respect the one described above. Specifically, embodiments consider a deep neural network with an input layer with the dimensionality of the vector f, followed by an L-neurons hidden layer and a 2-neurons output layer. As activation functions, tan h may be selected for the hidden layer and linear for the output one.
Embodiments of the present invention disclosed may relate to one or more of the following aspects:
Many modifications and other embodiments of the invention set forth herein will come to mind to the one skilled in the art to which the invention pertains having the benefit of the teachings presented in the foregoing description and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
While subject matter of the present disclosure has been illustrated and described in detail in the drawings and foregoing description, such illustration and description are to be considered illustrative or exemplary and not restrictive. Any statement made herein characterizing the invention is also to be considered illustrative or exemplary and not restrictive as the invention is defined by the claims. It will be understood that changes and modifications may be made, by those of ordinary skill in the art, within the scope of the following claims, which may include any combination of features from different embodiments described above.
The terms used in the claims should be construed to have the broadest reasonable interpretation consistent with the foregoing description. For example, the use of the article “a” or “the” in introducing an element should not be interpreted as being exclusive of a plurality of elements. Likewise, the recitation of “or” should be interpreted as being inclusive, such that the recitation of “A or B” is not exclusive of “A and B,” unless it is clear from the context or the foregoing description that only one of A and B is intended. Further, the recitation of “at least one of A, B and C” should be interpreted as one or more of a group of elements consisting of A, B and C, and should not be interpreted as requiring at least one of each of the listed elements A, B and C, regardless of whether A, B and C are related as categories or otherwise. Moreover, the recitation of “A, B and/or C” or “at least one of A, B or C” should be interpreted as including any singular entity from the listed elements, e.g., A, any subset from the listed elements, e.g., A and B, or the entire list of elements A, B and C.
Number | Date | Country | Kind |
---|---|---|---|
19189684.4 | Aug 2019 | EP | regional |
This application is a U.S. National Phase application under 35 U.S.C. § 371 of International Application No. PCT/EP2020/052176, filed on Jan. 29, 2020, and claims benefit to European Patent Application No. EP 19189684.4, filed on Aug. 1, 2019. The International Application was published in English on Feb. 4, 2021 as WO 2021/018417 A1 under PCT Article 21(2).
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2020/052176 | 1/29/2020 | WO |