The present invention relates to the domain of control of access to audiovisual content transmitted to a receiver, in particular control based on the localization of the receiver.
There are several applications which require the geolocation of a receiver in the domain of transmission of audiovisual content. A first reason is the blackout function which consists in preventing the receivers in certain regions from accessing the content. This function has been introduced by the organizers of sports events in order to forbid the receivers which are in the same region as the event to access the event. This is to encourage the interested people to come and see the event rather than watching it in front of a television screen.
A second reason is the “account packing” function, that is the offer of a second or third content receiver at a reduced price. The condition is that these receivers remain in the same household to take advantage of the reduction. It is tempting to buy a second receiver at reduced price and install it at a friend's home. The knowledge of the position of the receivers allows to verify if the condition of proximity of the receivers is met.
A third reason which is similar to the “blackout” function is the management of broadcast rights by territory. An operator acquires the broadcast rights for a given territory. Nevertheless, a transmitted signal cannot follow arbitrary frontiers and the signal extends beyond the authorization area. The operator is then asked, in order to comply with their legal obligations, to set up technical means to avoid that the receivers out of their area be able to access the content.
That is why according to prior art (for example U.S. Pat. No. 6,317,500) it has been proposed to integrate a geolocation system in the receivers in order to control the access to the content.
The defect of these systems is that the reception of the geolocation satellites is not generally possible inside houses or flats. The object of the present invention is to provide a solution to this problem.
The object of the present invention is to propose a localization verification method which cannot be circumvented by the simple transmission of a localization by a portable device situated far from the receiver, in particular to avoid that when the receiver is out of the authorization area, a portable device situated in the area is used for acquiring the localization and transmit it to verification means.
The present invention proposes a method for controlling access to content transmitted to a receiver, said receiver being part of an access geographic control system comprising verification means and security means, the method comprising the following steps:
The particularity of transmitted content is that it is sent to a plurality of receivers without the transmitter having a control over the receiver, as it happens in a point-to-point connection. This kind of transmission can be made by radio waves, by cable, by satellites or by broadcast over IP.
The particularity of this method is to use existing localization means of a portable device such as a smart accessory (mobile phone, tablet, multimedia reader) to complete the functionalities of the receiver. According to a particular embodiment, the portable device is the remote control of the receiver in which localization functions (such as a GPS) are integrated. The localization acquired by the remote control is then transmitted to the receiver.
The localization is not limited to GPS data but can be also obtained by reception of identifiers of antennas of mobile phone network or broadcast-type transmission with identifier of the transmitter. The identifier of such an antenna is thus a “localisation” in the sense of the present invention. The localization means include the acquisition of GPS coordinates, the acquisition of a mobile network or local broadcast identifier.
According to the different embodiments, it is considered that the security means are part of the receiver. The verification means can be integrated in the receiver or be part of a management centre. In the first case, the verification means as well as the security means may be only one security element located in the receiver. In the second case, the verification means of the management centre interact with the security means of the receiver to authorize/forbid access to the content.
As mentioned above, the portable device includes localization means.
There are two types of portable device, the first type having its own communication means with the management centre and the second type in the impossibility to communicate with the management centre.
The remote control is part of the second category and will communicate the localization acquired directly to the receiver. To this aim the portable device has means for local communication with the receiver, which may be the infrared communication of the remote control, a connection according to NFC protocol or Bluetooth.
In the case of the first type, the communication of the localization can also be made directly to the receiver by local communication means (NFC, Bluetooth) or be addressed to the management centre. The devices of the first type may thus have local communication means and remote communication means. It is possible to have a device which has the two communication means (for example a smartphone) but only uses one kind of means in the context of this invention.
According to a preferred embodiment, the communication between the portable device and the receiver is secure. This means that only a portable device known by the receiver can communicate with it.
In order to achieve this aim, the data exchanged between the portable device and the receiver is encrypted by a key shared by the portable device and the receiver.
In case of the remote control, this key can be loaded in the two entities during initialization and no adjustment has to be done afterwards. In the case of a smart accessory, an initialization operation is to be done by the user before being able to authorize the dialogue with the receiver. This initialization allows to load the encryption key in the smart accessory corresponding to the receiver.
The receiver receives a message from the management centre of the totality of the receivers containing an instruction for localization verification. This message, transmitted by the broadcast means or via a dedicated channel, may be addressed to a receiver, a group of receivers, or all the receivers.
The message may contain a localization data set which will define the authorization area for the receiver or the group of receivers, or simply contain a verification command. In the latter case, the data set defining the authorization area has been memorized in the receiver, either at the initialization preceding the activation, or thanks to a setup message (EMM) sent to the receiver or to a group of receivers. In the case of a globally addressed message, if the message contains the data set defining the authorization area, this area defines the whole activity area of the operator. The data set can be in the form of several points of geographic coordinates (for example 3 to define a triangle) defining a polygon containing the authorization area. This set can be a list of antenna identifiers to which the smart accessory is supposed to connect, for example mobile phone network antennas or DVB-H transmission antenna.
Once the message is received by the receiver, a unique code is determined by the receiver, which code may be either contained in the verification message or generated by the receiver. This code is also transmitted to the verification means, or the data allowing the verification means to verify the code. The unique code is then transmitted to the portable device, either in an electronic way by using local communication means (Bluetooth; NFC) or via the display of a piece of information on the screen, information which is then acquired by the portable device to obtain the unique code.
The user will thus use the portable device to acquire their position. In case of the remote control, a button triggers the research of the localization (for example research of the geolocation satellites) and the user may place themselves near a window to have a good reception.
Once the position is acquired, the portable device composes a localization message containing at least the current localization and the unique code. According to one embodiment, the receiver is located near the receiver and the transmission of the localization message can be done. According to another method, the receiver has remote communication means and can thus send the localization message directly to the management centre.
The receiver extracts from the data a localization and control data. The control data is used to ensure that the localization has just taken place by verifying for example the date attached to the data.
In the mode in which the portable device has means for communication with the management centre, these localization data are transmitted to the management centre which has two options, either directly carrying out the verification to ensure that the localization is in the authorized area (the verification means are thus at the management centre), or transmit, in a personal message (EMM), this localization to the receiver for it to carry out the verification (the verification means are thus in the receiver).
The present application will be better understood thanks to the detailed description based on the figures:
Several ways of realisation are proposed in the context of the present application. The common points are:
The user's receiver STB includes means for receiving a flow of transmitted audiovisual data. Several reception types can be supported by the receiver like reception by cable, by satellite, over the air or by IP flow. All these flows have in common the fact that the same flow is transmitted to a large number of receivers and that is why the implementation of the access authorization verification is done at the receiver level. The field of the present application also covers on-demand transmission such as VOD, Replay TV. Preferably, the receiver has security means which can be in several forms:
A receiver is identified by a unique number UA. This number is stored preferably in a memory of the receiver in a permanent way so as not to be able to be modified without authorization. This number is not necessarily secret and it is generally printed on the back of the receiver.
According to a particular form, the receiver is a module which connects in a connector of the screen. A known form is the module PCMCIA but other types of connection (such as USB, FireWire) are possible. In this case, the supply is provided by the screen and the dialogue with the user transits through the connector and uses the means (remote control) of the screen. These modules are known under the name of CAM (Conditional Access Module).
Unique Code
This unique code is at least unique per verification session and will not be reutilized during another verification stage. It can be generated by the management centre and sent in the invitation message to verification or be generated by the receiver such as a random number. In this case, it will further be unique per receiver.
This code is then transmitted to the portable device. This can be done either by the mediation of the screen (display of the code on the screen and re-transcription in the portable device) or directly transmitted thanks to local communication means to the portable device.
This unique code must be verifiable by the verification means. To this aim, these means also receive the unique code generated in order to be able to compare it with the one transmitted with the current localization. Alternatively, the verification means do not receive the unique code but can verify the authenticity of said code via the personal key of the receiver. In this case, the verification means contain the personal key of the receiver and a means to identify the receiver in order to be able to find its key. By decrypting the unique code received with the personal key of the receiver supposed to have produced this unique code, the verification means can verify that the decoded code meets the rules fixed and known by the receiver and the verification means. For example, the unique code can be the result of an encryption of the current date by the personal key of the receiver. The verification means receive the unique code and the identifier of the receiver. Thanks to this identifier, the personal key is retrieved and applied on the unique code. The result of the decryption should have the format of a date (ex. year, month, day) for the code to be considered as authentic.
Several variants of this unique code are provided within the context of the invention:
In case of the transmission of this code onto the screen, the display of this code can be done in an alphanumeric or graphic form. In this case this code is in the form of an image of the barcode or QR code type, the smart accessory comprising a camera for reading this code. This image can contain a large quantity of information such as the identifier of the receiver or security means, the date and/or the hour, a unique code. This image is acquired by a camera of the smart accessory and converted by said accessory into a data string. This string is then associated to the localization data which is transmitted to the management centre. The management centre will be able to verify, in addition to the localization, that the string corresponds to the image displayed by the receiver.
This first mode is characterized in that the current localization, acquired by the portable device, is transmitted to the receiver. It is shown by figures land 2. The local device can be the remote control RMT of the receiver (or of the screen SCR in the case of the CAM module) and the communication may simply be infrared connection. The remote control may have another communication channel such as Bluetooth or NFC. Once the localization has been acquired and temporarily memorized in the remote control, the user approaches the receiver and launches the transfer of this localization towards the receiver STB. The unique code previously received is joined to the localization data. In order to secure this localization, the data sent by the remote control can be further encrypted by a key previously loaded in the receiver and the remote control. Thus, a couple is created not to allow another remote control to be used for this purpose.
In the mode using a smart accessory SP, the principle is the same, that is the latter acquires the current localization (either by GPS, by an antenna identifier, or by transmitter triangulation such as of mobile phone network) and transmits it to the receiver STB by local communication means with the unique code previously received. In one embodiment, the communication of the exchanged data is secured by an encryption. The encryption key can be loaded by a preliminary connection by the smart accessory to a management centre during an initialization process. During this process, the smart accessory receives an invitation to identify the receiver for example by indicating its identifier. The management centre searches its database for the encryption key corresponding to said receiver and sends it to the smart accessory. The latter stores this key and uses it for transmitting the localization data to the receiver.
The management centre can also send an application which is loaded on the smart accessory and which will manage the localization acquisition and the transmission of this data to the receiver. This application will have the personal encryption key of the receiver dissimulated in the application.
This localization operation is released by an invitation message transmitted by the management centre to the receivers to which it is connected. The message can be sent in the transmitted signal BS or addressed to a receiver via a direct connection (by IP protocol by example). This message triggers the obtainment of the unique code according to the above description.
The invitation message will also be able to comprise a maximum duration which is memorized by the receiver, preferably in its security means. This information allows to verify a duration that was necessary to obtain a response of the portable device. During the reception of the localization data and of the unique code, the duration between the apparition of the message and the reception of the data is calculated and compared to the maximum duration. If this calculated duration is superior to the maximum duration, the verification leads to the rejection of the current localization.
It may happen that the invitation message arrives at an inconvenient time and the window which invites the user to verify includes a delay option. The user has the possibility for example to postpone this verification by 30 minutes. Once the time has elapsed and the user is ready to carry out the verification, the receiver transmits the unique code. Without the introduction of this code, the localization by the portable device cannot start. It is thus not possible to take advantage of the 30-minute delay to move the portable device to another area.
Once the localization has been established by the portable device, the data is sent to the receiver with the unique code previously introduced. The receiver can then verify that the received code is the same as the one displayed with the invitation and calculate the current duration. If the code is correct and the duration does not exceed the maximum duration contained in the message, the localization is accepted.
Once this step is over, the receiver has two options, either doing the verification itself or delegating this verification to the management centre.
In the first case, this means that the verification means are contained in the receiver. These means are located with the security means. The receiver has first transmitted the unique code to said verification means. The verification means have a memory containing the localization data defining at least one authorization area. These data can be in the form of a surface defined by the geolocation positions or a set of antenna identifiers in the case of a localization by antenna identifier. The verification means verify that the unique code received from the portable device is correct, and if so, they verify that the current localization received from the portable device is within the area. If so, the receiver continues to function as usual. In the negative, the receiver can take different measures such as the transmission of a message to a management centre (this message comprising the identifier of the receiver and the type of problem observed), or block, limit, or degrade the functionalities of the receiver (for example by blocking the HD content and leaving the SD content).
For carrying out this verification, the verification means must have the authorization area. This information can be contained in the invitation message or be already present in the verification means, for example loaded during an initialization phase or by the reception of a setup message such as an EMM (Entitlement Management Message).
In the second case, the receiver can have a means for communication with the management centre, for example by an IP connection. The current localization and the unique code received from the portable device are sent to the management centre with the identifier of the receiver. The management centre includes the verification means which will, for the received identifier, retrieve the authorization area and verify if the current localization is comprised in the area as well as verify the unique code.
The management centre can take several measures if the current localization is outside the area:
Conversely, if the localization is inside the area, the management centre can also send an EMM message which will renew the expiration date of the reception rights. This message can be sent immediately after the verification or later when the keys of the content encryption system change.
This second mode is characterized in that the current localization, acquired by the portable device, is transmitted directly to the management centre with the unique code. For this purpose, the portable device includes means for localization and remote communication with the management centre, for example by the Wi-Fi network, or 3G/4G. This will then be the case of a smart accessory.
This mode is preferably associated to a specific application loaded in the smart accessory which executes the operation of acquisition of the localization and the transmission of the data. This localization is triggered in the same way as previously, that is the transmission of the unique code from the receiver towards the portable device according to one of the above described methods.
The management centre can take several measures if the current localization is outside the area:
Conversely, if the localization is inside the area, the management centre can also send an EMM message which will renew the expiration date of the reception rights.
This third mode is based on an intrinsic localization of a message received by the management centre MC. It is shown in
The particularity is that the portable device can be a mobile phone without localization means. It will not need to acquire its localization. It will be only asked to send a SMS message to the management centre, containing for example the identifier of the receiver or an identification code displayed on the screen and contained in the invitation message. This information is not even necessary as the management centre, by knowing the telephone number, can retrieve the identifier of the receiver to which it is associated. The code can be produced according to the above described embodiments.
The mobile phone sends a message 3 to the management centre by using the nearest communication tower CT. The communication tower CT relays the message 4 to the management centre by adding service data such as the identifier of the tower CT.
At the reception of the message 4 by the management centre, the latter extracts the service data in order to identify the tower which served as first relay to the message sent by the mobile phone. This identifier becomes the current localization as described in relation with the above methods. The telephone number associated with the message allows to retrieve the identifier of the receiver and thus its data of authorization area(s).
The same options previously discussed in relation with the response of the management centre are applicable here. The EMM message (for example blocking or renewal message) is shown with reference 5 in
Independent GPS Module
In the context of this invention, an independent GPS module with autonomous supply is proposed, comprising means for wireless communication with the receiver (such as Bluetooth). The position of such a module has to be near a window or located outside, which can make the supply via the network difficult. That is why this independent GPS module is proposed, supplied by accumulator, battery, and/or solar collector. An important point is that this module can be in standby mode most of the time. According to one embodiment, said module can comprise a clock which will awake the module at a given time. According to a first embodiment, the receiver permanently listens to the messages transmitted by said module. A message will comprise the localization and can also comprise a module identifier. According to this mode, the module will transmit the current localization at regular intervals. The latter is memorized in the receiver and when a verification is requested by the management centre, the last received localization is used. In order to optimize the stand-by time of the GPS module, the management centre, in its invitation message to verification, may indicate when a successive verification will be done. This allows the receiver, during a communication with the GPS module, to indicate when it has to awake. The GPS module can thus be in standby mode (with a consumption compatible with a solar collector) during several days. Little time before the arrival of the message coming from the management centre, the clock of the GPS module awakes the module and a localization is acquired and transmitted to the receiver.
According to another embodiment, the activation of the GPS module is initiated by pressing a button. When the receiver displays the verification message, the user will press on the activation button of the GPS module which will supply the module. The module will engage the GPS chip and acquire the localization and transmit it towards the receiver. Then, the module returns to the standby mode.
In these embodiments, the module does not receive any unique code from the receiver. The short range of wireless transmission will be relied on for guaranteeing the proximity. It is nevertheless possible to store, in the module and in the receiver, an encryption key which is unique for this couple. Thus, even if a third party intercepts the message transmitted by the GPS module, it will not be understood by another receiver as the localization data are encrypted with the encryption key specific to only one couple module/receiver.
The above different methods and explanations allow to ensure that the receiver is in a place which is compatible with the reception rights.
Number | Date | Country | Kind |
---|---|---|---|
13186380 | Sep 2013 | EP | regional |
This application is a continuation of U.S. patent application Ser. No. 14/917,090 filed Mar. 7, 2016, which is a U.S. National Stage of International Application No. PCT/EP2014/068805 filed Sep. 4, 2014, which claims priority from European Patent Application No. 13186380.5 filed Sep. 27, 2013 and U.S. Provisional Patent Application No. 61/877,297 filed Sep. 13, 2013. The entire contents of each of which are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5451757 | Heath, Jr. | Sep 1995 | A |
6317500 | Murphy | Nov 2001 | B1 |
6480958 | Harrington | Nov 2002 | B1 |
7287692 | Patel | Oct 2007 | B1 |
7530085 | Tsuria | May 2009 | B2 |
7650509 | Dunning | Jan 2010 | B1 |
8185927 | Karaoguz | May 2012 | B2 |
8352980 | Howcroft | Jan 2013 | B2 |
8387084 | Klappert et al. | Feb 2013 | B1 |
8423768 | Huang | Apr 2013 | B2 |
8644840 | Gupta | Feb 2014 | B2 |
8682802 | Kannanari | Mar 2014 | B1 |
8731301 | Bushman | May 2014 | B1 |
8824664 | Ristock | Sep 2014 | B1 |
8826399 | Dorso | Sep 2014 | B2 |
8925053 | Mehta | Dec 2014 | B1 |
8959583 | Fadida | Feb 2015 | B2 |
9009794 | Dykeman | Apr 2015 | B2 |
9032495 | Zhang | May 2015 | B2 |
9075979 | Queru | Jul 2015 | B1 |
9120452 | Nishimoto | Sep 2015 | B2 |
9262771 | Patel | Feb 2016 | B1 |
9262877 | Ruckart | Feb 2016 | B2 |
9503779 | Wang | Nov 2016 | B2 |
9661388 | Phillips | May 2017 | B2 |
9774897 | Ellis | Sep 2017 | B2 |
20030058269 | Dunstan | Mar 2003 | A1 |
20030152207 | Ryan | Aug 2003 | A1 |
20030163483 | Zingher | Aug 2003 | A1 |
20030181160 | Hirsch | Sep 2003 | A1 |
20040117818 | Karaoguz | Jun 2004 | A1 |
20050024227 | Dunstan | Feb 2005 | A1 |
20050213519 | Relan | Sep 2005 | A1 |
20050226170 | Relan | Oct 2005 | A1 |
20050229222 | Relan | Oct 2005 | A1 |
20050229228 | Relan | Oct 2005 | A1 |
20050235307 | Relan | Oct 2005 | A1 |
20060020960 | Relan et al. | Jan 2006 | A1 |
20060059096 | Dublish | Mar 2006 | A1 |
20060085826 | Funk | Apr 2006 | A1 |
20060089152 | Mahonen | Apr 2006 | A1 |
20060155653 | Persokrud | Jul 2006 | A1 |
20060179003 | Steele | Aug 2006 | A1 |
20070016936 | Okada et al. | Jan 2007 | A1 |
20070067828 | Bychkov | Mar 2007 | A1 |
20070157281 | Ellis | Jul 2007 | A1 |
20070185718 | Di Mambro | Aug 2007 | A1 |
20070214364 | Roberts | Sep 2007 | A1 |
20070218979 | Momoda | Sep 2007 | A1 |
20070266396 | Estermann | Nov 2007 | A1 |
20070291944 | Wingert | Dec 2007 | A1 |
20080034216 | Law | Feb 2008 | A1 |
20080040265 | Rackley, III | Feb 2008 | A1 |
20080040274 | Uzo | Feb 2008 | A1 |
20080092154 | Hogyoku | Apr 2008 | A1 |
20080092157 | Walter | Apr 2008 | A1 |
20080098464 | Mizrah | Apr 2008 | A1 |
20080134309 | Qin | Jun 2008 | A1 |
20080208759 | Royyuru | Aug 2008 | A1 |
20090100402 | Heuler | Apr 2009 | A1 |
20090104888 | Cox | Apr 2009 | A1 |
20090125971 | Belz | May 2009 | A1 |
20090249413 | Karaoguz | Oct 2009 | A1 |
20100017831 | Newell | Jan 2010 | A1 |
20100070759 | Leon Cobos | Mar 2010 | A1 |
20100136943 | Hirvela | Jun 2010 | A1 |
20100192180 | Olague | Jul 2010 | A1 |
20100192183 | Hu | Jul 2010 | A1 |
20100241571 | McDonald | Sep 2010 | A1 |
20100251292 | Srinivasan | Sep 2010 | A1 |
20100304819 | Stockdale | Dec 2010 | A1 |
20110055866 | Piepenbrink | Mar 2011 | A1 |
20110069940 | Shimy | Mar 2011 | A1 |
20110072452 | Shimy | Mar 2011 | A1 |
20110078717 | Drummond et al. | Mar 2011 | A1 |
20110099079 | White | Apr 2011 | A1 |
20110138064 | Rieger | Jun 2011 | A1 |
20110154383 | Hao | Jun 2011 | A1 |
20110164175 | Chung | Jul 2011 | A1 |
20110271303 | Isozu | Nov 2011 | A1 |
20110283333 | Ukkadam | Nov 2011 | A1 |
20110289537 | Buehl | Nov 2011 | A1 |
20110298596 | Warrick | Dec 2011 | A1 |
20110314507 | Keen | Dec 2011 | A1 |
20120041877 | Rao | Feb 2012 | A1 |
20120047563 | Wheeler | Feb 2012 | A1 |
20120054818 | Noh | Mar 2012 | A1 |
20120131611 | Yeap et al. | May 2012 | A1 |
20120144202 | Counterman | Jun 2012 | A1 |
20120168510 | Gratton | Jul 2012 | A1 |
20120214416 | Kent | Aug 2012 | A1 |
20120266224 | Gruschka | Oct 2012 | A1 |
20120284195 | McMillen | Nov 2012 | A1 |
20130013932 | Kong | Jan 2013 | A1 |
20130027613 | Kim | Jan 2013 | A1 |
20130069772 | Najafi | Mar 2013 | A1 |
20130124740 | Liansky | May 2013 | A1 |
20130145403 | Sofos | Jun 2013 | A1 |
20130159195 | Kirillin | Jun 2013 | A1 |
20130167170 | Klappert et al. | Jun 2013 | A1 |
20130173765 | Korbecki | Jul 2013 | A1 |
20130201905 | Ling et al. | Aug 2013 | A1 |
20130203337 | Ling et al. | Aug 2013 | A1 |
20130203338 | Ling et al. | Aug 2013 | A1 |
20130203341 | Ling et al. | Aug 2013 | A1 |
20130203343 | Ling et al. | Aug 2013 | A1 |
20130205328 | Ling et al. | Aug 2013 | A1 |
20130227647 | Thomas | Aug 2013 | A1 |
20130255350 | Ling et al. | Aug 2013 | A1 |
20130262311 | Buhrmann | Oct 2013 | A1 |
20130262687 | Avery | Oct 2013 | A1 |
20130276078 | Rockwell | Oct 2013 | A1 |
20130340071 | Vellozo Luz | Dec 2013 | A1 |
20140007211 | Yang | Jan 2014 | A1 |
20140013106 | Redpath | Jan 2014 | A1 |
20140020117 | Nagai | Jan 2014 | A1 |
20140040941 | Rosenberg et al. | Feb 2014 | A1 |
20140089961 | Ling et al. | Mar 2014 | A1 |
20140096154 | Ohtake | Apr 2014 | A1 |
20140189831 | Kemshall | Jul 2014 | A1 |
20140230040 | Crowther | Aug 2014 | A1 |
20140236836 | Salonen | Aug 2014 | A1 |
20140250471 | Guerra | Sep 2014 | A1 |
20140250518 | Schneider | Sep 2014 | A1 |
20140274134 | Ling et al. | Sep 2014 | A1 |
20140279541 | Castrechini | Sep 2014 | A1 |
20140280981 | Singhal | Sep 2014 | A1 |
20140310742 | Kim | Oct 2014 | A1 |
20140331053 | Maruyama | Nov 2014 | A1 |
20150012986 | Sun | Jan 2015 | A1 |
20150050922 | Ramalinqam | Feb 2015 | A1 |
20150089607 | Hubner | Mar 2015 | A1 |
20150230004 | VanDuyn | Aug 2015 | A1 |
20150237031 | Neuman | Aug 2015 | A1 |
20150256824 | Ramachandran | Sep 2015 | A1 |
20160036809 | Bhimanaik | Feb 2016 | A1 |
Number | Date | Country |
---|---|---|
2861237 | Apr 2005 | FR |
2007264835 | Oct 2007 | JP |
WO 2011011854 | Feb 2011 | WO |
WO 2013061174 | May 2013 | WO |
Entry |
---|
English language translation of International Search Report issued in PCT/EP2014/068805 dated Nov. 18, 2014. |
English language translation of Written Opinion issued in PCT/EP2014/068805 dated Nov. 18, 2014. |
English language abstract of FR 2861237 published Apr. 22, 2005. |
Number | Date | Country | |
---|---|---|---|
20200099971 A1 | Mar 2020 | US |
Number | Date | Country | |
---|---|---|---|
61877297 | Sep 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14917090 | US | |
Child | 16699241 | US |