KR20140119837A - Pattern code and pattern code system and business model in the field of internet service or ect - Google Patents

Pattern code and pattern code system and business model in the field of internet service or ect Download PDF

Info

Publication number
KR20140119837A
KR20140119837A KR1020130020151A KR20130020151A KR20140119837A KR 20140119837 A KR20140119837 A KR 20140119837A KR 1020130020151 A KR1020130020151 A KR 1020130020151A KR 20130020151 A KR20130020151 A KR 20130020151A KR 20140119837 A KR20140119837 A KR 20140119837A
Authority
KR
South Korea
Prior art keywords
encryption
decryption
algorithm
key
pattern code
Prior art date
Application number
KR1020130020151A
Other languages
Korean (ko)
Inventor
이방원
Original Assignee
이방원
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 이방원 filed Critical 이방원
Priority to KR1020130020151A priority Critical patent/KR20140119837A/en
Publication of KR20140119837A publication Critical patent/KR20140119837A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

(A) The present invention relates to a computer program-related technique derived from a cryptology field available in cryptology, military technology, confidential communications, the Internet, and the like. (B) The technique was devised to automatically create an encryption algorithm in order to overcome a problem in which an existing encryption algorithm is so standardized and uniform all the time that it is an attack target of a decryption attack program, and in order to eliminate the necessity of changing an encryption key. (C) Each character string of encryption keys are substituted to a certain encryption algorithm to create various encryption algorithms according to the number of codes, configurations of character strings, and the like, and when encryption is performed by using the algorithms, a local decryption attack is difficult to perform. There are two key points in pattern codes: one is applying corresponding encryption and decryption algorithms to each of a character string of an encryption key, and the other is automatically creating encryption and decryption algorithms randomly to change an encryption algorithm of a system without incurring additional cost. (D) A pattern code may be variously applied and an effort to logically decode a pattern code can be limited.

Description

인터넷서비스 등에 응용가능한 패턴암호와 이 암호를 이용한 시스템과 비즈니스방법{Pattern code and pattern code system and business model in the field of internet service or ect}This paper proposes a pattern cryptosystem which can be applied to the Internet service,

본 발명은 암호와 컴퓨터프로그래밍과 알고리즘 논리분야에 대한 것으로 특정메세지의 암호화 복호화 방법에 관한 특정패턴을 형성하여 암호화알고리즘을 별다른 추가 비용 없이 지속적으로 변경할 수 있도록 함으로서 정형화된 방법을 통한 해독이 불가능하게 만드는 암호화 기법이다.The present invention relates to cryptography, computer programming, and algorithmic logic fields, in which a particular pattern of encryption and decryption methods of a particular message is formed to allow an encryption algorithm to be continuously changed at no additional cost, It is an encryption technique.

기존의 암호화 기술은 대칭암호 비대칭 공개기 암호 등 암호의 알고리즘과정에 중점을 두었다면 패턴암호는 암호화 알고리즘 자체보다 알고리즘을 적용하게 하는 틀로서 새로운 패러다임을 제시할 것이다.If the existing encryption technology focuses on cryptographic algorithms such as symmetric cryptographic asymmetric public key cryptosystems, pattern cryptography will present a new paradigm as a framework for applying algorithms to the cryptographic algorithm itself.

프로그램암호화 기법이 정형화되면 이를 해독하는 쪽도 정형화된 해독프로그램을 이용해 암호를 해독하려는 시도가 발생할 수 있다. 그러나 암호화기법 즉 암호화 알고리즘을 지속적으로 변경하자면 많은 추가비용을 소모해야 한다. 별다른 추가비용없이 암호화알고리즘을 변경하는 것이 패턴암호의 가장 큰 특징이다.If the program encryption technique is formalized, it may happen that an attempt is made to decrypt the program using a standard decryption program. However, constantly changing the cryptography, or encryption algorithm, requires a lot of additional cost. The most significant feature of pattern cryptography is that it changes the encryption algorithm without any additional cost.

암호화 알고리즘 기법에 정형화된 과정을 부여하여 오로지 암호화 복호화 알고리즘만 변경하고 변경된 알고리즘을 첨부파일 형식으로 데이터만 주고받음으로서 알고리즘 기법이 포함된 데이터를 이용 변형된 알고리즘으로 암호화 복호화가 가능하게 하는 방법이다.It is a method that allows a cryptogram decryption with a modified algorithm using only the data including the algorithm technique by changing only the encryption decryption algorithm by giving a formal process to the encryption algorithm technique and exchanging the changed algorithm with the data in the attachment file format.

암호화 알고리즘을 개발하기 위한 추가적인 비용이 감소하며 정형화된 기법으로 프로그램적 기법을 사용하면 일시적인 암호화 알고리즘의 생성이 가능하다. 따라서 원한다면 실시간으로 암호화 알고리즘을 변경하여 강력한 보안의 암호화 통신이 가능하다.The additional cost of developing an encryption algorithm is reduced, and the use of programmatic techniques as a formal technique allows the creation of temporary encryption algorithms. Therefore, it is possible to change the encryption algorithm in real time, if necessary, so that strong encrypted encryption communication is possible.

패턴암호란 암호키에 각각 대응하는 암호화 알고리즘을 가지는 것부터 시작한다. 만약 암호로 사용되는 암호문의 종류가 대문자 A부터 소문자 z까지 대소문자구분 52가지와 0부터 9까지 10가지를 합쳐 62가지가 존재한다면 62가지에 각각 대응하는 암호화 알고리즘과 각각의 알고리즘에 대한 복호화 알고리즘이 존재해야한다. 암호가 "ABC123cba"일 때, 암호키의 자릿수는 9자리이므로 암호의 순으로 A에 대응하는 알고리즘을 이용하여 특정 메시지를 암호화한 후 암호화된 메시지를 차례로 B,C,1,2,3,c,b,a에 해당하는 알고리즘으로 암호화시킨다. 암호해독을 위해서는 위의 방법으로 암호화된 메시지를 역순으로 a,b,c,3,2,1,C,B,A에 대응하는 각각의 복호화 알고리즘을 적용하여 차례대로 복호화시키면 된다. 여기서 62가지나 되는 각각의 암호키에 대응하는 알고리즘을 어떻게 만들 것인가 하는 것은 간단하다. 메시지를 수치화시킨 후 메시지를 수치화한 값이 27이라면 암호화 알고리즘이 2(M+13)라면 암호화된 값은 M을 메시지의 수치 값인 27을 대입하고 값을 구하면 80이 된다.복호화는 반대로 80을 2로 나누고난 후 13을 빼주면 된다. 이러한 단순 사칙연산, 일반적인 프로그램암호의 시프트연산, 임시키를 이용한 XOR연산 등 복합적인 암호를 랜덤하게 지정할 수 있다. 즉, 임으로 암호키가 C인 경우의 알고리즘을 '왼쪽으로 3회이동 후 임시 키인 '1000100101001001'으로 xor연산 후 +12를 하고 5를 곱한다.'라는 식으로 몇 개의 암호를 복합적으로 쓸 것인가? 무슨 연산을 암호에 적용할 것인가? 정해진 연산에 사용할 수치 값은 어떻게 할 것인가? 라는 세가지 부분에 랜덤함수와 적정범위를 적용한다면 복호화는 암호화의 역순으로 종류에 맞는 복호화 방법에 따라 복호화하면되므로 62가지에 해당하는 각각의 암호화 복호화 알고리즘은 프로그램적으로 임시로 만들 수 있다.Pattern cryptography begins with having a cryptographic algorithm corresponding to each cryptographic key. If the type of ciphertext used as a cipher is from upper case A to lower case z and 52 kinds of upper case and lower case are combined and 10 kinds of 0 to 9 are combined and there are 62 kinds, encryption algorithm corresponding to each of 62 types and decryption algorithm Should exist. When the password is "ABC123cba", the digits of the encryption key are 9 digits. Therefore, after encrypting a specific message using the algorithm corresponding to A in the order of ciphers, the encrypted message is transmitted to B, C, 1,2,3, c , b, and a. In order to decrypt the decrypted message, the decrypted messages are decrypted in the reverse order by applying the respective decryption algorithms corresponding to a, b, c, 3, 2, 1, C, B and A in reverse order. How to make an algorithm corresponding to each of the 62 cryptographic keys is simple here. If the numerical value of the message is 27 after the message is digitized, if the encryption algorithm is 2 (M + 13), the encrypted value M is replaced with 27, which is the numerical value of the message, and 80 is obtained. And subtract 13 from it. Complex passwords can be specified at random such as simple arithmetic operations, general program password shift operations, and XOR operations using temporary keys. In other words, if the encryption key is C, the algorithm is shifted three times to the left, multiplied by a temporary key '1000100101001001', xor is multiplied by 12, and then multiplied by 5. How many passwords will be used in combination? What operations should be applied to the password? What is the numeric value to use for the specified operation? , The decryption can be decrypted according to the decryption method according to the kind in the reverse order of the encryption. Therefore, each of the encryption decryption algorithms corresponding to 62 kinds can be made as a temporary program.

패턴암호란 우리가 일반적으로 사용하는 암호문에 각각의 문자열마다 문자열에 해당하는 암호화 알고리즘을 대입하는 암호로서, 암호화 과정에서 일정한 패턴을 가진 정형화된 암호화 시스템을 사용하면서도 암호화알고리즘은 정형화되지않은 복호화 공격으로부터 상대적으로 더 안전할 수 있는 암호화 기법이다.The pattern cipher is a cipher that assigns a cipher algorithm corresponding to a string to each cipher text that is commonly used by us, and uses a formal cipher system with a certain pattern in the cipher process. However, the cipher algorithm uses a cipher algorithm It is a relatively secure cryptographic technique.

독일군의 에니그마가 해석된 배경에는 여러 가지의 환경이 따라주었지만 가장 큰 이유는 에니그마가 복잡함에도 불구하고 암호화알고리즘이 정형화되었다는 점도 크게 작용한다. 즉 언제나 동일한 알고리즘으로 암호화했기 때문에 동일한 공격에 쉽게 해석되었다는 의미이다. 에니그마에서는 날짜마다 사용할 암호를 정해놓았다던지 에니그마 통신을 통해 다음 사용할 암호키를 전달하였다. 이러한 방식은 패턴암호를 응용하는 데에 있어서도 적용이 가능하다.Although the enigma of the German army has been interpreted in various backgrounds, the main reason is that the encryption algorithm is formalized in spite of the complexity of the enigma. This means that they are easily interpreted by the same attack because they are always encrypted with the same algorithm. In Enigma, you have either set a password to use for each date, or you have passed the encryption key to be used next via Enigma communication. This method can also be applied to the application of pattern cryptography.

예를 들면, 갑과 을이 통신을 하는데 갑과 을은 암호키(ㄱ)를 서로 알고 있고 하자. 을이 갑에게 통신을 하려고 할 때 갑은 각각의 키에 대응하는 암호화 알고리즘과 복호화 알고리즘에 대한 데이터(ㄴ)를 임시 키(ㄷ)와 함께 을에게 제공한다(이때의 키에 대응하는 알고리즘(ㄴ)과 임시 키(ㄷ)는 공개된다). 이때 갑은 을에게 서로가 알고 있는 암호키(ㄱ)와 모두에게 공개된 임시 키(ㄷ)를 사전에 약속된 방법으로 임시키(ㄷ)와 암호키(ㄱ)를 적절히 분배하여 새로운 암호키(ㄹ)를 만들고 각각의 문자열에 대응하는 새로운 암호화 알고리즘과 복호화 알고리즘에 대한 데이터(ㅁ)를 기존의 공개된 알고리즘 데이터(ㄴ)와 새로운 암호키(ㄹ)를 이용해 암호화하여 제공한다.(이때의 암호화 키(ㄹ)는 임시 키(ㄷ)와 암호키(ㄱ)를 사전에 정한 방법으로 만들어진 임시 암호화키(ㄹ)다. 암호화 전의 데이터(ㅁ)는 암호키(ㄱ)를 사전에 알고 있는 을만이 암호키(ㄱ)를 이용해 임시키(ㄷ)와 사전에 정한 방법을 통해 임시 암호키(ㄹ)를 조합해 암호화 알고리즘에 관한 데이터(ㅁ)를 복호화시킬 수 있다.) 을은 갑으로부터 전해받은 암호화된 암호화복호화에 관한 알고리즘데이터(ㅁ)를 갑이 공개적으로 전달한 임시 키(ㄷ)와 공개적으로 전달한 암호화복호화데이터(ㄴ)를 이용해 암호화된 암호화복호화에 관한 알고리즘데이터(ㅁ)를 복호화시킨 후 이를 이용해 메시지를 암호화할 수 있다.(여기서 암호화된 메시지는 기존 대칭암호의 암호문으로 사용될 수 있다)For example, let's say you are communicating with A, and let A and A know the encryption key (a). When you try to communicate to a party, you provide the encryption algorithm corresponding to each key and the data (b) about the decryption algorithm together with the temporary key (c) (the algorithm corresponding to the key at this time) And the temporary key (c) are disclosed). At this time, the user appropriately distributes the temporary key (c) and the cryptographic key (a), which are known to each other and the temporary key (c) (C) encrypting the new encryption algorithm corresponding to each character string and the data (k) for the decryption algorithm using the existing public algorithm data (b) and the new encryption key (d). The key (d) is a temporary encryption key (d) made by preliminarily setting a temporary key (c) and a cipher key (a). The data before cipher (c) (C) can be decrypted by combining the temporary key (c) using the encryption key (a) and the temporary encryption key (d) by a predetermined method to decrypt the data (k) about the encryption algorithm) Algorithm for Encryption Decryption (C) decrypt the encryption algorithm decrypted by using the temporary key (c) publicly transmitted by A and encryption decrypted data (b) publicly transmitted, and encrypt the message using the decrypted algorithm data (k). (Where the encrypted message can be used as the ciphertext of an existing symmetric cipher)

위의 내용에서 사용된 단어를 정리하자면 서로 정보를 전달하고자하는 갑과 을이 있고, 갑이 을에게 제공하는 공개 데이터는 ㄴ,ㄷ이 있고, 비공개 데이터는 ㄱ이며, 암호화된 데이터는 ㅁ있다. 을은 ㄱ과 ㄷ을 이용해 ㄹ을 알 수 있으며 ㄹ과 ㄴ을 이용해 ㅁ을 복호화 할 수 있다. 복호화된 ㅁ을 통해 을이 갑에게 보내려는 메시지를 암호화할 수 있다.In order to summarize the words used in the above, there is a company which wants to transmit information to each other, and the public data provided by the corporation is provided by C and D, the private data is A, and the encrypted data is. You can use  and ㄷ to know d, and you can decrypt ㅁ using d and b. The decrypted message can be used to encrypt messages sent to U.

ㄱ은 암호키, ㄴ은 공개된 암호화복호화관련 알고리즘데이터로 , ㄷ은 임시암호 ㄹ를 을에게 전달하기 위한 임시키, ㄹ은 암호키(ㄱ)와 임시키(ㄷ)을 통해 사전에 정해진 규칙으로 얻을 수 있는 임시암호로 암호화된 알고리즘데이터(ㅁ)를 복호화시킬수 있는 임시암호, ㅁ은 암호화된 알고리즘 데이터로 메시지를 암호화할 수 있는 최종적 목표와 그 응용에 사용된다.A temporary key for transmitting the temporary ciphertext to the ciphertext, an encryption key (a), and a provisional key (c). Temporary cipher that can decrypt the obtained algorithmic data (ㅁ) encrypted with the temporary cipher, ㅁ is the final target that can encrypt the message with encrypted algorithm data, and it is used in the application.

Claims (3)

암호화 복호화 기법에 있어서 암호키를 그 자체로 암호화알고리즘에 사용하지 않고 암호문의 각각의 문자열에 대응하는 암호화 및 복호화 알고리즘을 이용하여 특정 정보를 암호화하는 방법을 사용하는 시스템 및 소프트웨어Systems and software that use a method of encrypting specific information using an encryption and decryption algorithm corresponding to each string of ciphertexts without using the encryption key itself in the encryption algorithm in the encryption and decryption technique 청구항 1에 있어서 각각의 문자열에 대응하는 암호화 및 복호화 알고리즘을 알고리즘의 복합횟수, 연산의 종류, 해당 연산에 사용할 수치 등을 기준으로 무작위로 자동 생성하고 생성한 알고리즘을 데이터화 하여 첨부파일 형식 혹은 데이터형식으로 유무선통신등을 통해 청구함 1의 시스템이나 소프트웨어등을 통해 주고 받아 암호화 복호화에 적용할 수 있는 기능을 포함한 시스템 및 소프트웨어 The encryption and decryption algorithm corresponding to each character string is automatically generated by randomly generating an encryption and decryption algorithm corresponding to each character string based on a complex number of algorithms, a kind of calculation, a numerical value to be used in the calculation, System and software including functions that can be applied to encryption / decryption by sending / receiving through system or software of 1 billing through wired / wireless communication 청구항 2에 있어서 이 시스템 및 소프트웨어를 이용해 암호화 복호화에 응용한 유무선통신관련 비지니스 서비스모델The system of claim 2, wherein the system and software are used for encryption / decryption of a wired / wireless communication-related business service model
KR1020130020151A 2013-02-25 2013-02-25 Pattern code and pattern code system and business model in the field of internet service or ect KR20140119837A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020130020151A KR20140119837A (en) 2013-02-25 2013-02-25 Pattern code and pattern code system and business model in the field of internet service or ect

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020130020151A KR20140119837A (en) 2013-02-25 2013-02-25 Pattern code and pattern code system and business model in the field of internet service or ect

Publications (1)

Publication Number Publication Date
KR20140119837A true KR20140119837A (en) 2014-10-10

Family

ID=51991904

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020130020151A KR20140119837A (en) 2013-02-25 2013-02-25 Pattern code and pattern code system and business model in the field of internet service or ect

Country Status (1)

Country Link
KR (1) KR20140119837A (en)

Similar Documents

Publication Publication Date Title
US11271730B2 (en) Systems and methods for deployment, management and use of dynamic cipher key systems
CN113259329B (en) Method and device for data careless transmission, electronic equipment and storage medium
CN105591737A (en) Data encryption, decryption and transmission methods and systems
US20210357914A1 (en) Constructing a Distributed Ledger Transaction on a Cold Hardware Wallet
CN104660590B (en) A kind of file encryption secure cloud storage scheme
JP2001251287A (en) Confidential transmitting method using hardware protection inside secret key and variable pass code
Kumar et al. A novel approach of symmetric key cryptography
US9231978B2 (en) Cryptographic construction for anonymity during interaction for collective outcome
CN106850597A (en) A kind of distributed cryptographic method and system
KR101602803B1 (en) The encryption and decryption Method of using to polarization
Erondu et al. An encryption and decryption model for data security using vigenere with advanced encryption standard
CN107493287A (en) Industry control network data security system
CN105763322A (en) Obfuscatable encryption key-insulated digital signature making method and system
Gaur et al. A comparative study and analysis of cryptographic algorithms: RSA, DES, AES, BLOWFISH, 3-DES, and TWOFISH
US20040039918A1 (en) Secure approach to send data from one system to another
CN115499118A (en) Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium
CN112149166B (en) Unconventional password protection method and intelligent bank machine
Kaur et al. Multiphase and multiple encryption
Krishna et al. Multiple text encryption, key entrenched, distributed cipher using pairing functions and transposition ciphers
CN107483387A (en) A kind of method of controlling security and device
Singh et al. Cryptography: an art of data hiding
KR20170087120A (en) Certificateless public key encryption system and receiving terminal
KR20140119837A (en) Pattern code and pattern code system and business model in the field of internet service or ect
Saravanan et al. A Review Paper on Cryptography-Science of Secure Communication
Pawar et al. Survey of cryptography techniques for data security

Legal Events

Date Code Title Description
G15R Request for early publication
J201 Request for trial against refusal decision
J301 Trial decision

Free format text: TRIAL DECISION FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20140818

Effective date: 20150303

J2X1 Appeal (before the patent court)

Free format text: APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20150304

Effective date: 20151030

J303 Written judgement (supreme court)

Free format text: JUDGMENT (SUPREME COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20151119

Effective date: 20160415

J254 Retrial (patent court) [patent]

Free format text: RETRIAL NUMBER: 2016211000045

J2X1 Appeal (before the patent court)

Free format text: TRIAL NUMBER: 2016211000045; APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2016241002713; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20160429

Effective date: 20160901

J303 Written judgement (supreme court)

Free format text: TRIAL NUMBER: 2017311000049; JUDGMENT (SUPREME COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20171125

Effective date: 20180622

J2X1 Appeal (before the patent court)

Free format text: TRIAL NUMBER: 2019201005805; APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2018201005495; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20180705

Effective date: 20190819

J2X1 Appeal (before the patent court)

Free format text: TRIAL NUMBER: 2020201001069; APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2019201005805; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20190806

Effective date: 20191216

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2020201001069; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20200106

Effective date: 20200610

J2X1 Appeal (before the patent court)

Free format text: TRIAL NUMBER: 2021201001400; APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2021201001400; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20210123

Effective date: 20210303

J2X1 Appeal (before the patent court)

Free format text: TRIAL NUMBER: 2021201002373; APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2021201002373; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20210322

Effective date: 20210409

J2X1 Appeal (before the patent court)

Free format text: TRIAL NUMBER: 2021201005037; APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2021201005037; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20210906

Effective date: 20211012

J2X1 Appeal (before the patent court)

Free format text: TRIAL NUMBER: 2021201006153; APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2021201006153; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20211119

Effective date: 20211228

J2X1 Appeal (before the patent court)

Free format text: TRIAL NUMBER: 2022201001230; APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2022201001230; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20220119

Effective date: 20220224

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2022201004215; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20220719

Effective date: 20220811

J2X1 Appeal (before the patent court)

Free format text: TRIAL NUMBER: 2022201004970; APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2022201004970; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20220918

Effective date: 20221007

J2X1 Appeal (before the patent court)

Free format text: TRIAL NUMBER: 2022201005720; APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2022201005720; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20221110

Effective date: 20221130

J2X1 Appeal (before the patent court)

Free format text: TRIAL NUMBER: 2023201010026; APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2023201010026; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20230103

Effective date: 20230201

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2023201010651; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20230228

Effective date: 20230323

J2X1 Appeal (before the patent court)

Free format text: TRIAL NUMBER: 2023201011333; APPEAL AGAINST DECISION TO DECLINE REFUSAL

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2023201011333; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20230423

Effective date: 20230517

J302 Written judgement (patent court)

Free format text: TRIAL NUMBER: 2023201012985; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20230818

Effective date: 20230905