JP2020522034A - 複数の鍵ペア署名を使用したプログラム実行およびデータ証明スキーム - Google Patents
複数の鍵ペア署名を使用したプログラム実行およびデータ証明スキーム Download PDFInfo
- Publication number
- JP2020522034A JP2020522034A JP2019553389A JP2019553389A JP2020522034A JP 2020522034 A JP2020522034 A JP 2020522034A JP 2019553389 A JP2019553389 A JP 2019553389A JP 2019553389 A JP2019553389 A JP 2019553389A JP 2020522034 A JP2020522034 A JP 2020522034A
- Authority
- JP
- Japan
- Prior art keywords
- code
- sub
- key
- node
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
Description
202 関与者A
204 関与者B
206 関与者C
308 クライアント
310:ノード
310:ノード(TEE)
312 認証サービス
320 認証エビデンス
322 測定値
324 公開鍵
326 署名
334 検証結果
336 署名
802 送信モジュール
804 受信モジュール
806 検証モジュール
808 送信モジュール
810 受信モジュール
Claims (10)
- 高信頼実行環境(TEE)内のサブロジックコードを実行するためのプログラム実行およびデータ証明のためのコンピュータ実施方法であって、前記方法は、
クライアントデバイスによって、ノードに要求を送信するステップであって、前記ノードは、TEE内の高信頼プログラムを実行し、前記要求は、識別子と1つまたは複数の要求パラメータとを含み、前記識別子は、前記サブロジックコードを識別する、ステップと、
前記クライアントデバイスによって、前記要求に対する応答を受信するステップであって、前記応答は、結果データとデジタル署名とを含み、前記結果データは、前記TEE内の前記サブロジックコードを使用した前記1つまたは複数の要求パラメータの処理によって生成され、前記デジタル署名は、前記サブロジックコードの秘密コード鍵を使用して生成される、ステップと、
前記クライアントデバイスによって、前記デジタル署名と前記サブロジックコードの公開コード鍵とを使用して前記結果データを検証するステップと
を含む、方法。 - 前記クライアントデバイスによって、前記TEE内の前記高信頼プログラムに前記サブロジックコードを登録するために登録要求を送信するステップであって、前記登録要求は、前記識別子と前記サブロジックコードとを含む、ステップと、
前記クライアントデバイスによって、前記高信頼プログラムから登録結果を受信するステップであって、前記登録結果は、前記サブロジックコードの前記公開コード鍵を含む、ステップと
をさらに含む、請求項1に記載の方法。 - 前記高信頼プログラムのデジタル署名と前記高信頼プログラムの公開鍵とを使用して前記登録結果を検証するステップであって、前記高信頼プログラムの前記デジタル署名は、前記高信頼プログラムの秘密鍵を使用して生成され、前記高信頼プログラムの前記公開鍵と前記秘密鍵とは、前記高信頼プログラムの認証の間に鍵ペアとして生成される、ステップをさらに含む、請求項2に記載の方法。
- 前記サブロジックコードは、前記識別子に基づいてコンピュータ可読メモリから読み出され、前記結果を生成するために前記TEE内で実行される、請求項1から3のいずれか一項に記載の方法。
- 前記サブロジックコードは、前記ノードに記憶されている複数のサブロジックコードのうちの1つである、請求項1から4のいずれか一項に記載の方法。
- 前記公開コード鍵と前記秘密コード鍵とは、前記TEE内の前記サブロジックコードの登録の間にコード鍵ペアとして生成される、請求項1から5のいずれか一項に記載の方法。
- 前記要求は、前記結果データを提供するために実行されることになる前記サブロジックコードのバージョンを示すバージョン番号をさらに含む、請求項1から6のいずれか一項に記載の方法。
- 前記クライアントデバイスは、ブロックチェーンネットワーク内のクライアントノードを含む、請求項1から7のいずれか一項に記載の方法。
- 高信頼実行環境(TEE)内のプログラム実行およびサブロジックコード実行のためのデータ証明のための装置であって、前記装置は、請求項1から8のいずれか一項に記載の方法を行うための複数のモジュールを含む、装置。
- 1つまたは複数のコンピュータと、
前記1つまたは複数のコンピュータに結合されているとともに、請求項1から8のいずれか一項に記載の方法を行うように前記1つまたは複数のコンピュータによって実行可能な命令を記憶している1つまたは複数のコンピュータ可読メモリと
を含む、システム。
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/079715 WO2019120317A2 (en) | 2019-03-26 | 2019-03-26 | Program execution and data proof scheme using multiple key pair signatures |
Publications (1)
Publication Number | Publication Date |
---|---|
JP2020522034A true JP2020522034A (ja) | 2020-07-27 |
Family
ID=66994285
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2019553389A Pending JP2020522034A (ja) | 2019-03-26 | 2019-03-26 | 複数の鍵ペア署名を使用したプログラム実行およびデータ証明スキーム |
Country Status (10)
Country | Link |
---|---|
US (2) | US10762197B1 (ja) |
EP (1) | EP3610405B1 (ja) |
JP (1) | JP2020522034A (ja) |
KR (1) | KR102392420B1 (ja) |
CN (1) | CN110998581B (ja) |
AU (1) | AU2019204707B2 (ja) |
CA (1) | CA3058499C (ja) |
SG (1) | SG11201908946PA (ja) |
TW (1) | TWI725655B (ja) |
WO (1) | WO2019120317A2 (ja) |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110998581B (zh) | 2019-03-26 | 2024-05-24 | 创新先进技术有限公司 | 使用多重密钥对签名的程序执行和数据证明方案 |
US11537523B2 (en) * | 2019-07-31 | 2022-12-27 | Red Hat, Inc. | Command result caching for building application container images |
US20220292174A1 (en) * | 2019-08-19 | 2022-09-15 | Nokia Technologies Oy | Verifiability for execution in trusted execution environment |
CN110633328B (zh) * | 2019-09-25 | 2024-03-22 | 腾讯云计算(北京)有限责任公司 | 一种信息处理方法、装置及计算机可读存储介质 |
WO2021077118A1 (en) * | 2019-10-18 | 2021-04-22 | Tbcasoft, Inc. | Verification requirement document for credential verification |
WO2021080449A1 (en) * | 2019-10-23 | 2021-04-29 | "Enkri Holding", Limited Liability Company | Method and system for anonymous identification of a user |
CN111090865B (zh) * | 2019-12-17 | 2022-01-25 | 支付宝(杭州)信息技术有限公司 | 一种密钥授权方法和系统 |
CN110890962B (zh) * | 2019-12-20 | 2021-04-13 | 支付宝(杭州)信息技术有限公司 | 认证密钥协商方法、装置、存储介质及设备 |
US20210200858A1 (en) * | 2019-12-28 | 2021-07-01 | Intel Corporation | Executing code in protected memory containers by trust domains |
US11244077B2 (en) * | 2020-01-31 | 2022-02-08 | Fortanix, Inc. | Securing data integrity for an application |
EP4107903A4 (en) * | 2020-02-21 | 2023-08-23 | SDSE Networks, Inc. | SECURE COMMUNICATIONS PROCESS AND SYSTEM |
JP6830635B1 (ja) * | 2020-02-21 | 2021-02-17 | 株式会社LayerX | データ管理方法 |
US11121864B1 (en) * | 2020-03-13 | 2021-09-14 | International Business Machines Corporation | Secure private key distribution between endpoint instances |
US11080412B1 (en) | 2020-08-20 | 2021-08-03 | Spideroak, Inc. | Efficiently computing validity of a block chain |
CN112422500B (zh) * | 2020-09-25 | 2023-05-16 | 北京熠智科技有限公司 | 跨平台数据传输方法以及装置、存储介质、电子装置 |
US11475140B1 (en) * | 2020-11-24 | 2022-10-18 | Amazon Technologies, Inc. | Enclave-based cryptography services in edge computing environments |
CN112700852A (zh) * | 2021-01-07 | 2021-04-23 | 福州数据技术研究院有限公司 | 一种基于区块链智能合约的医疗数据资产发布管理的方法和存储设备 |
US20220245238A1 (en) * | 2021-01-29 | 2022-08-04 | Securosys SA | Trusted Execution Environment to Provide Attestation of Code Execution Result |
KR102561252B1 (ko) * | 2021-03-18 | 2023-07-28 | 인하대학교 산학협력단 | 자동품질확인이 가능한 블록체인기반 크라우드 소싱방법 |
CN113221166A (zh) * | 2021-05-11 | 2021-08-06 | 支付宝(杭州)信息技术有限公司 | 一种获取区块链数据的方法、装置、电子设备及存储介质 |
CN112948810B (zh) * | 2021-05-12 | 2021-08-31 | 支付宝(杭州)信息技术有限公司 | 一种可信计算程序调用方法、装置、电子设备及存储介质 |
CN112989319B (zh) * | 2021-05-12 | 2021-08-31 | 支付宝(杭州)信息技术有限公司 | 一种实现可信计算的方法、装置、电子设备及存储介质 |
US11829495B2 (en) | 2021-08-05 | 2023-11-28 | International Business Machines Corporation | Confidential data provided to a secure guest via metadata |
US11809607B2 (en) | 2021-08-05 | 2023-11-07 | International Business Machines Corporation | Customization of multi-part metadata of a secure guest |
US20230068880A1 (en) * | 2021-08-27 | 2023-03-02 | EMC IP Holding Company LLC | Function-based service framework with trusted execution platform |
EP4145762B1 (en) * | 2021-09-06 | 2023-10-25 | Axis AB | Method and system for enabling secure processing of data using a processing application |
WO2023113573A1 (ko) * | 2021-12-17 | 2023-06-22 | 주식회사 크립토랩 | 전자 장치 및 암호화 방법 |
WO2023186328A1 (en) * | 2022-04-01 | 2023-10-05 | Huawei Technologies Co., Ltd. | Method and apparatus for providing an application-level attestation for trusted applications |
CN116112187B (zh) * | 2023-04-10 | 2023-07-14 | 山东海量信息技术研究院 | 一种远程证明方法、装置、设备及可读存储介质 |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9064109B2 (en) * | 2012-12-20 | 2015-06-23 | Intel Corporation | Privacy enhanced key management for a web service provider using a converged security engine |
US9698989B2 (en) * | 2013-07-23 | 2017-07-04 | Intel Corporation | Feature licensing in a secure processing environment |
US9444627B2 (en) * | 2014-12-24 | 2016-09-13 | Intel Corporation | System and method for providing global platform compliant trusted execution environment |
US9722775B2 (en) * | 2015-02-27 | 2017-08-01 | Verizon Patent And Licensing Inc. | Network services via trusted execution environment |
JP2018516026A (ja) * | 2015-03-20 | 2018-06-14 | リヴェッツ・コーポレーションRivetz Corp. | ブロックチェーンを使用したデバイス整合性の自動認証 |
CN104899506B (zh) | 2015-05-08 | 2018-01-12 | 深圳市雪球科技有限公司 | 基于可信执行环境中虚拟安全元件的安全系统实现方法 |
US9787478B2 (en) * | 2015-06-10 | 2017-10-10 | Qualcomm Incorporated | Service provider certificate management |
US10230529B2 (en) * | 2015-07-31 | 2019-03-12 | Microsft Technology Licensing, LLC | Techniques to secure computation data in a computing environment |
CN106899551B (zh) * | 2015-12-21 | 2020-04-17 | 中国电信股份有限公司 | 认证方法、认证终端以及系统 |
US10419402B2 (en) * | 2017-01-26 | 2019-09-17 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment using signing key |
US10691793B2 (en) | 2017-02-20 | 2020-06-23 | AlphaPoint | Performance of distributed system functions using a trusted execution environment |
WO2018164955A1 (en) * | 2017-03-06 | 2018-09-13 | Rivetz Corp. | Device enrollment protocol |
US10397005B2 (en) * | 2017-03-31 | 2019-08-27 | Intel Corporation | Using a trusted execution environment as a trusted third party providing privacy for attestation |
US11348095B2 (en) * | 2017-04-11 | 2022-05-31 | Nchain Licensing Ag | Rapid distributed consensus on blockchain |
US10742393B2 (en) | 2017-04-25 | 2020-08-11 | Microsoft Technology Licensing, Llc | Confidentiality in a consortium blockchain network |
WO2019010863A1 (zh) | 2017-07-13 | 2019-01-17 | 华为技术有限公司 | 控制可信应用访问的方法和终端 |
US10567359B2 (en) | 2017-07-18 | 2020-02-18 | International Business Machines Corporation | Cluster of secure execution platforms |
CN107464109B (zh) * | 2017-07-28 | 2020-10-20 | 中国工商银行股份有限公司 | 可信移动支付装置、系统和方法 |
CN107689868B (zh) * | 2017-09-12 | 2021-09-07 | 北京握奇智能科技有限公司 | 客户端应用与可信应用的通信方法、装置以及终端 |
US10887090B2 (en) * | 2017-09-22 | 2021-01-05 | Nec Corporation | Scalable byzantine fault-tolerant protocol with partial tee support |
CN108563953B (zh) * | 2018-03-26 | 2021-12-21 | 南京微可信信息技术有限公司 | 一种安全可扩展的可信应用开发方法 |
CN110998581B (zh) | 2019-03-26 | 2024-05-24 | 创新先进技术有限公司 | 使用多重密钥对签名的程序执行和数据证明方案 |
-
2019
- 2019-03-26 CN CN201980003885.1A patent/CN110998581B/zh active Active
- 2019-03-26 SG SG11201908946P patent/SG11201908946PA/en unknown
- 2019-03-26 JP JP2019553389A patent/JP2020522034A/ja active Pending
- 2019-03-26 AU AU2019204707A patent/AU2019204707B2/en active Active
- 2019-03-26 WO PCT/CN2019/079715 patent/WO2019120317A2/en unknown
- 2019-03-26 KR KR1020197028585A patent/KR102392420B1/ko active IP Right Grant
- 2019-03-26 CA CA3058499A patent/CA3058499C/en active Active
- 2019-03-26 EP EP19732227.4A patent/EP3610405B1/en active Active
- 2019-09-30 US US16/588,436 patent/US10762197B1/en active Active
- 2019-12-10 TW TW108145111A patent/TWI725655B/zh active
-
2020
- 2020-07-20 US US16/933,629 patent/US10977362B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US10977362B2 (en) | 2021-04-13 |
KR102392420B1 (ko) | 2022-05-02 |
AU2019204707A1 (en) | 2019-06-27 |
SG11201908946PA (en) | 2019-10-30 |
US20200349252A1 (en) | 2020-11-05 |
CN110998581B (zh) | 2024-05-24 |
KR20200116012A (ko) | 2020-10-08 |
EP3610405B1 (en) | 2021-07-21 |
US10762197B1 (en) | 2020-09-01 |
CA3058499C (en) | 2021-10-26 |
EP3610405A2 (en) | 2020-02-19 |
EP3610405A4 (en) | 2020-07-08 |
WO2019120317A3 (en) | 2020-02-20 |
CA3058499A1 (en) | 2019-06-27 |
AU2019204707B2 (en) | 2020-10-01 |
TW202036345A (zh) | 2020-10-01 |
WO2019120317A2 (en) | 2019-06-27 |
CN110998581A (zh) | 2020-04-10 |
TWI725655B (zh) | 2021-04-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102392420B1 (ko) | 다중키 쌍 시그너처를 사용한 프로그램 실행 및 데이터 증명 체계 | |
TWI734426B (zh) | 使用可信執行環境檢索區塊鏈網路的公開資料 | |
JP6811339B2 (ja) | 高可用な高信頼実行環境を使用したブロックチェーンネットワークのためのパブリックデータの読み出し | |
TWI707245B (zh) | 使用高可用性的可信執行環境檢索區塊鏈網路的存取資料 | |
JP2020528224A (ja) | 信頼できる実行環境におけるスマート契約動作のセキュアな実行 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20191126 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20201030 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20201223 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20210104 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20210401 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20210921 |