KR20140119837A - Pattern code and pattern code system and business model in the field of internet service or ect - Google Patents
Pattern code and pattern code system and business model in the field of internet service or ect Download PDFInfo
- Publication number
- KR20140119837A KR20140119837A KR1020130020151A KR20130020151A KR20140119837A KR 20140119837 A KR20140119837 A KR 20140119837A KR 1020130020151 A KR1020130020151 A KR 1020130020151A KR 20130020151 A KR20130020151 A KR 20130020151A KR 20140119837 A KR20140119837 A KR 20140119837A
- Authority
- KR
- South Korea
- Prior art keywords
- encryption
- decryption
- algorithm
- key
- pattern code
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
본 발명은 암호와 컴퓨터프로그래밍과 알고리즘 논리분야에 대한 것으로 특정메세지의 암호화 복호화 방법에 관한 특정패턴을 형성하여 암호화알고리즘을 별다른 추가 비용 없이 지속적으로 변경할 수 있도록 함으로서 정형화된 방법을 통한 해독이 불가능하게 만드는 암호화 기법이다.The present invention relates to cryptography, computer programming, and algorithmic logic fields, in which a particular pattern of encryption and decryption methods of a particular message is formed to allow an encryption algorithm to be continuously changed at no additional cost, It is an encryption technique.
기존의 암호화 기술은 대칭암호 비대칭 공개기 암호 등 암호의 알고리즘과정에 중점을 두었다면 패턴암호는 암호화 알고리즘 자체보다 알고리즘을 적용하게 하는 틀로서 새로운 패러다임을 제시할 것이다.If the existing encryption technology focuses on cryptographic algorithms such as symmetric cryptographic asymmetric public key cryptosystems, pattern cryptography will present a new paradigm as a framework for applying algorithms to the cryptographic algorithm itself.
프로그램암호화 기법이 정형화되면 이를 해독하는 쪽도 정형화된 해독프로그램을 이용해 암호를 해독하려는 시도가 발생할 수 있다. 그러나 암호화기법 즉 암호화 알고리즘을 지속적으로 변경하자면 많은 추가비용을 소모해야 한다. 별다른 추가비용없이 암호화알고리즘을 변경하는 것이 패턴암호의 가장 큰 특징이다.If the program encryption technique is formalized, it may happen that an attempt is made to decrypt the program using a standard decryption program. However, constantly changing the cryptography, or encryption algorithm, requires a lot of additional cost. The most significant feature of pattern cryptography is that it changes the encryption algorithm without any additional cost.
암호화 알고리즘 기법에 정형화된 과정을 부여하여 오로지 암호화 복호화 알고리즘만 변경하고 변경된 알고리즘을 첨부파일 형식으로 데이터만 주고받음으로서 알고리즘 기법이 포함된 데이터를 이용 변형된 알고리즘으로 암호화 복호화가 가능하게 하는 방법이다.It is a method that allows a cryptogram decryption with a modified algorithm using only the data including the algorithm technique by changing only the encryption decryption algorithm by giving a formal process to the encryption algorithm technique and exchanging the changed algorithm with the data in the attachment file format.
암호화 알고리즘을 개발하기 위한 추가적인 비용이 감소하며 정형화된 기법으로 프로그램적 기법을 사용하면 일시적인 암호화 알고리즘의 생성이 가능하다. 따라서 원한다면 실시간으로 암호화 알고리즘을 변경하여 강력한 보안의 암호화 통신이 가능하다.The additional cost of developing an encryption algorithm is reduced, and the use of programmatic techniques as a formal technique allows the creation of temporary encryption algorithms. Therefore, it is possible to change the encryption algorithm in real time, if necessary, so that strong encrypted encryption communication is possible.
패턴암호란 암호키에 각각 대응하는 암호화 알고리즘을 가지는 것부터 시작한다. 만약 암호로 사용되는 암호문의 종류가 대문자 A부터 소문자 z까지 대소문자구분 52가지와 0부터 9까지 10가지를 합쳐 62가지가 존재한다면 62가지에 각각 대응하는 암호화 알고리즘과 각각의 알고리즘에 대한 복호화 알고리즘이 존재해야한다. 암호가 "ABC123cba"일 때, 암호키의 자릿수는 9자리이므로 암호의 순으로 A에 대응하는 알고리즘을 이용하여 특정 메시지를 암호화한 후 암호화된 메시지를 차례로 B,C,1,2,3,c,b,a에 해당하는 알고리즘으로 암호화시킨다. 암호해독을 위해서는 위의 방법으로 암호화된 메시지를 역순으로 a,b,c,3,2,1,C,B,A에 대응하는 각각의 복호화 알고리즘을 적용하여 차례대로 복호화시키면 된다. 여기서 62가지나 되는 각각의 암호키에 대응하는 알고리즘을 어떻게 만들 것인가 하는 것은 간단하다. 메시지를 수치화시킨 후 메시지를 수치화한 값이 27이라면 암호화 알고리즘이 2(M+13)라면 암호화된 값은 M을 메시지의 수치 값인 27을 대입하고 값을 구하면 80이 된다.복호화는 반대로 80을 2로 나누고난 후 13을 빼주면 된다. 이러한 단순 사칙연산, 일반적인 프로그램암호의 시프트연산, 임시키를 이용한 XOR연산 등 복합적인 암호를 랜덤하게 지정할 수 있다. 즉, 임으로 암호키가 C인 경우의 알고리즘을 '왼쪽으로 3회이동 후 임시 키인 '1000100101001001'으로 xor연산 후 +12를 하고 5를 곱한다.'라는 식으로 몇 개의 암호를 복합적으로 쓸 것인가? 무슨 연산을 암호에 적용할 것인가? 정해진 연산에 사용할 수치 값은 어떻게 할 것인가? 라는 세가지 부분에 랜덤함수와 적정범위를 적용한다면 복호화는 암호화의 역순으로 종류에 맞는 복호화 방법에 따라 복호화하면되므로 62가지에 해당하는 각각의 암호화 복호화 알고리즘은 프로그램적으로 임시로 만들 수 있다.Pattern cryptography begins with having a cryptographic algorithm corresponding to each cryptographic key. If the type of ciphertext used as a cipher is from upper case A to lower case z and 52 kinds of upper case and lower case are combined and 10 kinds of 0 to 9 are combined and there are 62 kinds, encryption algorithm corresponding to each of 62 types and decryption algorithm Should exist. When the password is "ABC123cba", the digits of the encryption key are 9 digits. Therefore, after encrypting a specific message using the algorithm corresponding to A in the order of ciphers, the encrypted message is transmitted to B, C, 1,2,3, c , b, and a. In order to decrypt the decrypted message, the decrypted messages are decrypted in the reverse order by applying the respective decryption algorithms corresponding to a, b, c, 3, 2, 1, C, B and A in reverse order. How to make an algorithm corresponding to each of the 62 cryptographic keys is simple here. If the numerical value of the message is 27 after the message is digitized, if the encryption algorithm is 2 (M + 13), the encrypted value M is replaced with 27, which is the numerical value of the message, and 80 is obtained. And subtract 13 from it. Complex passwords can be specified at random such as simple arithmetic operations, general program password shift operations, and XOR operations using temporary keys. In other words, if the encryption key is C, the algorithm is shifted three times to the left, multiplied by a temporary key '1000100101001001', xor is multiplied by 12, and then multiplied by 5. How many passwords will be used in combination? What operations should be applied to the password? What is the numeric value to use for the specified operation? , The decryption can be decrypted according to the decryption method according to the kind in the reverse order of the encryption. Therefore, each of the encryption decryption algorithms corresponding to 62 kinds can be made as a temporary program.
패턴암호란 우리가 일반적으로 사용하는 암호문에 각각의 문자열마다 문자열에 해당하는 암호화 알고리즘을 대입하는 암호로서, 암호화 과정에서 일정한 패턴을 가진 정형화된 암호화 시스템을 사용하면서도 암호화알고리즘은 정형화되지않은 복호화 공격으로부터 상대적으로 더 안전할 수 있는 암호화 기법이다.The pattern cipher is a cipher that assigns a cipher algorithm corresponding to a string to each cipher text that is commonly used by us, and uses a formal cipher system with a certain pattern in the cipher process. However, the cipher algorithm uses a cipher algorithm It is a relatively secure cryptographic technique.
독일군의 에니그마가 해석된 배경에는 여러 가지의 환경이 따라주었지만 가장 큰 이유는 에니그마가 복잡함에도 불구하고 암호화알고리즘이 정형화되었다는 점도 크게 작용한다. 즉 언제나 동일한 알고리즘으로 암호화했기 때문에 동일한 공격에 쉽게 해석되었다는 의미이다. 에니그마에서는 날짜마다 사용할 암호를 정해놓았다던지 에니그마 통신을 통해 다음 사용할 암호키를 전달하였다. 이러한 방식은 패턴암호를 응용하는 데에 있어서도 적용이 가능하다.Although the enigma of the German army has been interpreted in various backgrounds, the main reason is that the encryption algorithm is formalized in spite of the complexity of the enigma. This means that they are easily interpreted by the same attack because they are always encrypted with the same algorithm. In Enigma, you have either set a password to use for each date, or you have passed the encryption key to be used next via Enigma communication. This method can also be applied to the application of pattern cryptography.
예를 들면, 갑과 을이 통신을 하는데 갑과 을은 암호키(ㄱ)를 서로 알고 있고 하자. 을이 갑에게 통신을 하려고 할 때 갑은 각각의 키에 대응하는 암호화 알고리즘과 복호화 알고리즘에 대한 데이터(ㄴ)를 임시 키(ㄷ)와 함께 을에게 제공한다(이때의 키에 대응하는 알고리즘(ㄴ)과 임시 키(ㄷ)는 공개된다). 이때 갑은 을에게 서로가 알고 있는 암호키(ㄱ)와 모두에게 공개된 임시 키(ㄷ)를 사전에 약속된 방법으로 임시키(ㄷ)와 암호키(ㄱ)를 적절히 분배하여 새로운 암호키(ㄹ)를 만들고 각각의 문자열에 대응하는 새로운 암호화 알고리즘과 복호화 알고리즘에 대한 데이터(ㅁ)를 기존의 공개된 알고리즘 데이터(ㄴ)와 새로운 암호키(ㄹ)를 이용해 암호화하여 제공한다.(이때의 암호화 키(ㄹ)는 임시 키(ㄷ)와 암호키(ㄱ)를 사전에 정한 방법으로 만들어진 임시 암호화키(ㄹ)다. 암호화 전의 데이터(ㅁ)는 암호키(ㄱ)를 사전에 알고 있는 을만이 암호키(ㄱ)를 이용해 임시키(ㄷ)와 사전에 정한 방법을 통해 임시 암호키(ㄹ)를 조합해 암호화 알고리즘에 관한 데이터(ㅁ)를 복호화시킬 수 있다.) 을은 갑으로부터 전해받은 암호화된 암호화복호화에 관한 알고리즘데이터(ㅁ)를 갑이 공개적으로 전달한 임시 키(ㄷ)와 공개적으로 전달한 암호화복호화데이터(ㄴ)를 이용해 암호화된 암호화복호화에 관한 알고리즘데이터(ㅁ)를 복호화시킨 후 이를 이용해 메시지를 암호화할 수 있다.(여기서 암호화된 메시지는 기존 대칭암호의 암호문으로 사용될 수 있다)For example, let's say you are communicating with A, and let A and A know the encryption key (a). When you try to communicate to a party, you provide the encryption algorithm corresponding to each key and the data (b) about the decryption algorithm together with the temporary key (c) (the algorithm corresponding to the key at this time) And the temporary key (c) are disclosed). At this time, the user appropriately distributes the temporary key (c) and the cryptographic key (a), which are known to each other and the temporary key (c) (C) encrypting the new encryption algorithm corresponding to each character string and the data (k) for the decryption algorithm using the existing public algorithm data (b) and the new encryption key (d). The key (d) is a temporary encryption key (d) made by preliminarily setting a temporary key (c) and a cipher key (a). The data before cipher (c) (C) can be decrypted by combining the temporary key (c) using the encryption key (a) and the temporary encryption key (d) by a predetermined method to decrypt the data (k) about the encryption algorithm) Algorithm for Encryption Decryption (C) decrypt the encryption algorithm decrypted by using the temporary key (c) publicly transmitted by A and encryption decrypted data (b) publicly transmitted, and encrypt the message using the decrypted algorithm data (k). (Where the encrypted message can be used as the ciphertext of an existing symmetric cipher)
위의 내용에서 사용된 단어를 정리하자면 서로 정보를 전달하고자하는 갑과 을이 있고, 갑이 을에게 제공하는 공개 데이터는 ㄴ,ㄷ이 있고, 비공개 데이터는 ㄱ이며, 암호화된 데이터는 ㅁ있다. 을은 ㄱ과 ㄷ을 이용해 ㄹ을 알 수 있으며 ㄹ과 ㄴ을 이용해 ㅁ을 복호화 할 수 있다. 복호화된 ㅁ을 통해 을이 갑에게 보내려는 메시지를 암호화할 수 있다.In order to summarize the words used in the above, there is a company which wants to transmit information to each other, and the public data provided by the corporation is provided by C and D, the private data is A, and the encrypted data is. You can use and ㄷ to know d, and you can decrypt ㅁ using d and b. The decrypted message can be used to encrypt messages sent to U.
ㄱ은 암호키, ㄴ은 공개된 암호화복호화관련 알고리즘데이터로 , ㄷ은 임시암호 ㄹ를 을에게 전달하기 위한 임시키, ㄹ은 암호키(ㄱ)와 임시키(ㄷ)을 통해 사전에 정해진 규칙으로 얻을 수 있는 임시암호로 암호화된 알고리즘데이터(ㅁ)를 복호화시킬수 있는 임시암호, ㅁ은 암호화된 알고리즘 데이터로 메시지를 암호화할 수 있는 최종적 목표와 그 응용에 사용된다.A temporary key for transmitting the temporary ciphertext to the ciphertext, an encryption key (a), and a provisional key (c). Temporary cipher that can decrypt the obtained algorithmic data (ㅁ) encrypted with the temporary cipher, ㅁ is the final target that can encrypt the message with encrypted algorithm data, and it is used in the application.
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020130020151A KR20140119837A (en) | 2013-02-25 | 2013-02-25 | Pattern code and pattern code system and business model in the field of internet service or ect |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020130020151A KR20140119837A (en) | 2013-02-25 | 2013-02-25 | Pattern code and pattern code system and business model in the field of internet service or ect |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20140119837A true KR20140119837A (en) | 2014-10-10 |
Family
ID=51991904
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020130020151A KR20140119837A (en) | 2013-02-25 | 2013-02-25 | Pattern code and pattern code system and business model in the field of internet service or ect |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20140119837A (en) |
-
2013
- 2013-02-25 KR KR1020130020151A patent/KR20140119837A/en unknown
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11271730B2 (en) | Systems and methods for deployment, management and use of dynamic cipher key systems | |
CN113259329B (en) | Method and device for data careless transmission, electronic equipment and storage medium | |
CN105591737A (en) | Data encryption, decryption and transmission methods and systems | |
US20210357914A1 (en) | Constructing a Distributed Ledger Transaction on a Cold Hardware Wallet | |
CN104660590B (en) | A kind of file encryption secure cloud storage scheme | |
JP2001251287A (en) | Confidential transmitting method using hardware protection inside secret key and variable pass code | |
Kumar et al. | A novel approach of symmetric key cryptography | |
US9231978B2 (en) | Cryptographic construction for anonymity during interaction for collective outcome | |
CN106850597A (en) | A kind of distributed cryptographic method and system | |
KR101602803B1 (en) | The encryption and decryption Method of using to polarization | |
Erondu et al. | An encryption and decryption model for data security using vigenere with advanced encryption standard | |
CN107493287A (en) | Industry control network data security system | |
CN105763322A (en) | Obfuscatable encryption key-insulated digital signature making method and system | |
Gaur et al. | A comparative study and analysis of cryptographic algorithms: RSA, DES, AES, BLOWFISH, 3-DES, and TWOFISH | |
US20040039918A1 (en) | Secure approach to send data from one system to another | |
CN115499118A (en) | Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium | |
CN112149166B (en) | Unconventional password protection method and intelligent bank machine | |
Kaur et al. | Multiphase and multiple encryption | |
Krishna et al. | Multiple text encryption, key entrenched, distributed cipher using pairing functions and transposition ciphers | |
CN107483387A (en) | A kind of method of controlling security and device | |
Singh et al. | Cryptography: an art of data hiding | |
KR20170087120A (en) | Certificateless public key encryption system and receiving terminal | |
KR20140119837A (en) | Pattern code and pattern code system and business model in the field of internet service or ect | |
Saravanan et al. | A Review Paper on Cryptography-Science of Secure Communication | |
Pawar et al. | Survey of cryptography techniques for data security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
G15R | Request for early publication | ||
J201 | Request for trial against refusal decision | ||
J301 | Trial decision |
Free format text: TRIAL DECISION FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20140818 Effective date: 20150303 |
|
J2X1 | Appeal (before the patent court) |
Free format text: APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20150304 Effective date: 20151030 |
|
J303 | Written judgement (supreme court) |
Free format text: JUDGMENT (SUPREME COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20151119 Effective date: 20160415 |
|
J254 | Retrial (patent court) [patent] |
Free format text: RETRIAL NUMBER: 2016211000045 |
|
J2X1 | Appeal (before the patent court) |
Free format text: TRIAL NUMBER: 2016211000045; APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2016241002713; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20160429 Effective date: 20160901 |
|
J303 | Written judgement (supreme court) |
Free format text: TRIAL NUMBER: 2017311000049; JUDGMENT (SUPREME COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20171125 Effective date: 20180622 |
|
J2X1 | Appeal (before the patent court) |
Free format text: TRIAL NUMBER: 2019201005805; APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2018201005495; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20180705 Effective date: 20190819 |
|
J2X1 | Appeal (before the patent court) |
Free format text: TRIAL NUMBER: 2020201001069; APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2019201005805; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20190806 Effective date: 20191216 |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2020201001069; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20200106 Effective date: 20200610 |
|
J2X1 | Appeal (before the patent court) |
Free format text: TRIAL NUMBER: 2021201001400; APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2021201001400; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20210123 Effective date: 20210303 |
|
J2X1 | Appeal (before the patent court) |
Free format text: TRIAL NUMBER: 2021201002373; APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2021201002373; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20210322 Effective date: 20210409 |
|
J2X1 | Appeal (before the patent court) |
Free format text: TRIAL NUMBER: 2021201005037; APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2021201005037; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20210906 Effective date: 20211012 |
|
J2X1 | Appeal (before the patent court) |
Free format text: TRIAL NUMBER: 2021201006153; APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2021201006153; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20211119 Effective date: 20211228 |
|
J2X1 | Appeal (before the patent court) |
Free format text: TRIAL NUMBER: 2022201001230; APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2022201001230; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20220119 Effective date: 20220224 |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2022201004215; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20220719 Effective date: 20220811 |
|
J2X1 | Appeal (before the patent court) |
Free format text: TRIAL NUMBER: 2022201004970; APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2022201004970; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20220918 Effective date: 20221007 |
|
J2X1 | Appeal (before the patent court) |
Free format text: TRIAL NUMBER: 2022201005720; APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2022201005720; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20221110 Effective date: 20221130 |
|
J2X1 | Appeal (before the patent court) |
Free format text: TRIAL NUMBER: 2023201010026; APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2023201010026; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20230103 Effective date: 20230201 |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2023201010651; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20230228 Effective date: 20230323 |
|
J2X1 | Appeal (before the patent court) |
Free format text: TRIAL NUMBER: 2023201011333; APPEAL AGAINST DECISION TO DECLINE REFUSAL |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2023201011333; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20230423 Effective date: 20230517 |
|
J302 | Written judgement (patent court) |
Free format text: TRIAL NUMBER: 2023201012985; JUDGMENT (PATENT COURT) FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20230818 Effective date: 20230905 |