JP2005051479A - Time limit encipherment/decipherment system - Google Patents

Time limit encipherment/decipherment system Download PDF

Info

Publication number
JP2005051479A
JP2005051479A JP2003280888A JP2003280888A JP2005051479A JP 2005051479 A JP2005051479 A JP 2005051479A JP 2003280888 A JP2003280888 A JP 2003280888A JP 2003280888 A JP2003280888 A JP 2003280888A JP 2005051479 A JP2005051479 A JP 2005051479A
Authority
JP
Japan
Prior art keywords
time
decryption
self
certificate
decipherment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2003280888A
Other languages
Japanese (ja)
Inventor
Tokio Handa
富己男 半田
Yoshihiro Yano
義博 矢野
Naoto Shibata
直人 柴田
Kenichiro Saito
賢一郎 斎藤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dai Nippon Printing Co Ltd
Original Assignee
Dai Nippon Printing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dai Nippon Printing Co Ltd filed Critical Dai Nippon Printing Co Ltd
Priority to JP2003280888A priority Critical patent/JP2005051479A/en
Publication of JP2005051479A publication Critical patent/JP2005051479A/en
Pending legal-status Critical Current

Links

Images

Abstract

<P>PROBLEM TO BE SOLVED: To facilitate operation by facilitating the operation at the third party organization and by simplifying the entire configuration of a time limit decipherment system. <P>SOLUTION: A time limit encipherment/decipherment system comprises: a means 1 generating a self-decompression-allowing compression file based on a cipher text enciphered by a common key and decipherment specification time; a memory medium 2 written the generated compression file and the key certificate 4 of the third party organization used in decipherment; and a means 3 verifying a digital signature attached to a present time certificate 5 issued by the third party organization, comparing the present time taken out from the present time certificate with the decipherment specification time stored on the self-decompression-allowing compression file read from the storage medium, and deciphering the encipher text by using the common key, provided that the decipherment specification time is not future beyond the present time. <P>COPYRIGHT: (C)2005,JPO&NCIPI

Description

本発明は暗号化されたデータについて、事前に設定した期間が経過するまで復号が困難となる時限暗号化/復号装置に関する。   The present invention relates to a time-limited encryption / decryption device that makes it difficult to decrypt encrypted data until a preset period elapses.

従来、暗号化されたデータがある期間誰にもその内容を知られたくない場合には、次のような2つの提案がされている
1)計算量的に、ある程度の期間復号が困難な問題を用いる。
2)信頼できる第三者機関(trusted agent )に対して、復号に必要な情報の一部を預け一定期間の管理を委託する(非特許文献1)。
Conventionally, the following two proposals have been made when the encrypted data is not desired by anyone for a certain period of time.
1) Use a problem that is difficult to decode for a certain period in terms of computational complexity.
2) Entrust a certain period of information to a trusted third party (trusted agent) and entrust management for a certain period of time (Non-patent Document 1).

1)の方法は、例えば解読方法が公知の暗号を用いて、最速の解読法とコンピュータの計算能力(将来のコンピュータの発達も考慮)から、解読までに必要な時間を大まかに設定する方法である。
2)の方法は、例えば信頼できる第三者機関に鍵やアルゴリズム、暗号文の一部等を預けることで、復号の時期を制御するものである。
Numao,M.,"Timed-Release Threshold Cryptosystem," SCIS'99 Rivest,L.R.,Shamir,A.,and Wagner,D.A., "Time-lock puzzles and timed-release Crpto,"MIT Technical Paper,1996
Method 1) is a method that roughly sets the time required for decryption from the fastest decryption method and computer computing power (including future computer development) using, for example, a known decryption method. is there.
The method 2) controls the time of decryption, for example, by depositing a key, algorithm, part of ciphertext, etc. in a trusted third party.
Numao, M., "Timed-Release Threshold Cryptosystem,"SCIS'99 Rivest, LR, Shamir, A., and Wagner, DA, "Time-lock puzzles and timed-release Crpto," MIT Technical Paper, 1996

上記1)の方法は、計算能力の発達の見積もりが困難であり、想定した期間内に暗号文が解読される、あるいは想定した期間が過ぎても解読ができないといったことが起こり得る。
2)の方法は、利用者が多くなると、第三者機関における鍵等のデータの管理が極めて困難になる。また、鍵管理などで第三者機関を完全に信用することができないというポリシーを持っている場合には、複数の第三者機関を利用して、秘密情報分散法を援用しなければならない(非特許文献2)。
Shamir,A."How to share a secret",Communications of theACM,Vol.22,pp.612-613 November 1979
In the above method 1), it is difficult to estimate the development of computing power, and it may happen that the ciphertext is decrypted within the assumed period, or that the decryption cannot be performed after the assumed period.
With the method 2), as the number of users increases, it becomes extremely difficult to manage data such as keys at a third party. Also, if you have a policy that you cannot fully trust a third party organization for key management etc., you must use the secret information distribution method by using multiple third party organizations ( Non-patent document 2).
Shamir, A. “How to share a secret”, Communications of the ACM, Vol. 22, pp. 612-613 November 1979

本発明は上記課題を解決しようとするものであり、第三者機関での運用を容易にし、時限復号システムの全体構成を簡単にして運用を容易にすることを目的とする。   An object of the present invention is to solve the above-described problems, and it is an object of the present invention to facilitate operation at a third-party organization, simplify the overall configuration of a time-decoding system, and facilitate operation.

本発明は、復号に必要なデータ、暗号文の一部、あるいはアルゴリズムそのものなどをICカード等の耐タンパー性を持ち、かつ演算能力のある媒体に格納し、第三者機関からの何らかの情報を確認することで、復号を可能にするものである。この第三者機関からの情報には、デジタル署名やMAC(Message Authentication Code)が施されていて、ICカード等の真正性を確認してからその情報を利用してしても良く、第三者機関が情報の制限をすることで、復号の時期を制限しても良く、あるいは第三者機関からは日時や時刻の情報がただ出力されるだけで、ICカード等が復号の時期を制限しても良い。   The present invention stores data necessary for decryption, a part of ciphertext, or the algorithm itself in a tamper-resistant medium such as an IC card and has a computing capacity, and stores some information from a third party. Confirmation enables decryption. The information from this third party is digitally signed or MAC (Message Authentication Code), and the information may be used after confirming the authenticity of the IC card, etc. The institution can restrict the information so that the decryption time can be restricted, or the third party can simply output the date and time information, and the IC card can restrict the decryption time. You may do it.

第三者機関が個々のデータを復号するのに必要な情報を減らすことができるため、第三者機関の運用が容易になる。
複数の第三者機関による秘密情報分散を行わなくてもよいため、時限復号システム全体の構成が簡単で運用が容易になる。
Since the information necessary for a third party to decrypt individual data can be reduced, the operation of the third party is facilitated.
Since it is not necessary to distribute secret information by a plurality of third party organizations, the configuration of the entire time-decryption system is simple and easy to operate.

以下、本発明の実施の形態について説明する。
図1は本発明の暗号化/復号システムの例を説明する概念図である。
メッセージ送信者側では、暗号化プログラムを搭載したPC(パーソナルコンピュータ)1を使用し、秘匿しておきたいメッセージMを暗号化する。PCにおける暗号化は、復号指定時刻T1 (秘匿されたメッセージの復号を可能ならしめる期日・時刻)、鍵Kを入力し、DESやRC5等のよく知られた共通鍵暗号化方式で暗号化し、さらにこの暗号文と復号指定時刻T1 とを合成して自己解凍が可能な形式の圧縮ファイルを作成する。ここで圧縮ファイルの暗号文EK (M,T1 )は、鍵Kを用いてMを暗号化し、時刻T1 までは復号を不可能に設定した暗号文である。なお、鍵KはICカード2内に予め格納されているものを読み取ってもよいし、他の方法で与えてもよい。
Embodiments of the present invention will be described below.
FIG. 1 is a conceptual diagram illustrating an example of an encryption / decryption system according to the present invention.
On the message sender side, a personal computer (PC) 1 equipped with an encryption program is used to encrypt the message M to be kept secret. Encryption in the PC is performed by inputting a designated decryption time T 1 (a date / time at which a secret message can be decrypted) and a key K, and encrypting with a well-known common key encryption method such as DES or RC5. Further, the ciphertext and the decryption designated time T 1 are combined to create a compressed file in a format that allows self-decompression. Here, the ciphertext E K (M, T 1 ) of the compressed file is a ciphertext in which M is encrypted using the key K and cannot be decrypted until time T 1 . Note that the key K stored in the IC card 2 may be read, or may be given by other methods.

自己解凍が可能な形式の圧縮ファイルは、ICカード2内に書き込まれる。なお、ハードディスクやCDR等の通常のPC外部記憶媒体に記憶させてもよい。ICカードまたは外部記録媒体への書き込みが終了したら、書き込みの成功/失敗の如何にかかわらず、書き込み終了後に、メモリ上に残存していた暗号文と圧縮ファイルをメモリ上から消去する。この消去はメモリ領域を特定の値(ゼロ等)で埋めるなどの方法で行う。   A compressed file in a format capable of self-decompression is written in the IC card 2. It may be stored in a normal PC external storage medium such as a hard disk or CDR. When the writing to the IC card or the external recording medium is finished, the ciphertext and the compressed file remaining on the memory are erased from the memory after the writing regardless of the success / failure of the writing. This erasing is performed by a method of filling the memory area with a specific value (such as zero).

また、PC1から復号時に利用する予定の第三者機関の公開鍵証明書4をICカード2内に書き込む。この書き込みエリアは、正当なカード保持者以外の者にはアクセスできないように、PIN等によってアクセス制御されていなければならない。   Also, the public key certificate 4 of the third party that is to be used for decryption is written in the IC card 2 from the PC 1. This writing area must be access controlled by a PIN or the like so that it cannot be accessed by anyone other than a valid cardholder.

ICカード内に書き込まれた自己解凍形式の圧縮ファイルは受信者側のPC3に読み込まれて自己解凍され、復号されたメッセージMが得られる。このとき、第三者機関が発行した現在時刻証明書5を必要とする。すなわち、現在時刻証明書に添付された第三者機関のデジタル署名を検証し、現在時刻証明書の真正性を確かめる。デジタル署名検証の際に必要な第三者機関の公開鍵はICカード内に記憶されているものを使用する。   The self-extracting compressed file written in the IC card is read by the recipient's PC 3 and self-extracting to obtain a decrypted message M. At this time, the current time certificate 5 issued by a third party is required. That is, the digital signature of a third party attached to the current time certificate is verified to confirm the authenticity of the current time certificate. The public key of a third party necessary for digital signature verification is the one stored in the IC card.

現在時刻証明書の真正性が確認できたら、証明書から現在時刻T(秘匿されたメッセージの復号を実際に試みるときの時刻)を取り出し、自己解凍圧縮ファイル内に記憶されているT1 とTを比較し、
1 >T(ここで>はT1 がTより未来の時刻であることを示す)
であれば、解凍失敗のメッセージを返して処理を終了する。
If the authenticity of the current time certificate can be confirmed, the current time T (the time when the decryption of the confidential message is actually attempted) is extracted from the certificate, and T 1 and T stored in the self-extracting compressed file are extracted. Compare
T 1 > T (where> indicates that T 1 is a time later than T)
If so, a decompression failure message is returned and the process ends.

1 が現在時刻T以前の時刻ならば、鍵Kを用いてメモリMを復号して出力する。鍵KはICカード内に予め格納されているものを読み取ってもよいし、他の方法で与えてもよい。 If T 1 is a time before the current time T, the memory K is decrypted using the key K and output. The key K may be read in advance stored in the IC card, or may be given by another method.

図2は暗号化時の処理フローを説明する図である。   FIG. 2 is a diagram for explaining a processing flow at the time of encryption.

PC上の暗号化のプログラムは、入力としてメッセージM、鍵K、復号指定時刻T1 を取り込み(ステップS1)、鍵Kを用いてメッセージMを暗号化する(ステップS2)。次いで、作成された暗号文と復号指定時刻T1 とを合成して、PC上で自己解凍が可能な形式の圧縮ファイルを作成し(ステップS3)、作成された自己解凍形式の圧縮ファイルを、ICカード内に書き込む(ステップS4)。 ICカードへの書き込みが終了したら、書き込みの成功/失敗の如何にかかわらず、書き込み終了後に、メモリ上に残存していた暗号文と圧縮ファイルをメモリ上から消去する(ステップS5)。次いで、復号時に利用する予定の第三者機関の公開鍵証明書をICカード内に書き込む(ステップS6)。 Encryption program on a PC, the message M, the key K, the decoding designated time T 1 uptake as an input (step S1), and encrypts the message M using the key K (step S2). Next, the created ciphertext and decryption designated time T 1 are synthesized to create a compressed file in a format that can be self-extracted on the PC (step S3). Write in the IC card (step S4). When the writing to the IC card is finished, the ciphertext and the compressed file remaining on the memory are erased from the memory after the writing regardless of the success / failure of the writing (step S5). Next, the public key certificate of the third party that is to be used for decryption is written in the IC card (step S6).

図3は自己解凍時の処理フローを説明する図である。
第三者機関が発行した現在時刻証明書を取得し(ステップS11)、現在時刻証明書に添付された第三者機関のデジタル署名を検証して現在時刻証明書の真正性を確かめる(ステップS12)。現在時刻証明書が真正か否か判断し(ステップS13)、真正性が確認できたら、現在時刻証明書から現在時刻Tを取り出し、自己解凍圧縮ファイル内に記憶されているT1 とTを比較する(ステップS14)。次いでT1 <Tか否か判断し、現在時刻が復号指定時刻を過ぎていれば鍵Kを用いてメッセージMを復号して出力する(ステップS16)。ステップS13において現在時刻証明書が真正でなく、あるいはステップS15においてT1 >Tの場合は、解凍失敗のメッセージを返して処理を終了する。
FIG. 3 is a diagram illustrating a processing flow at the time of self-decompression.
A current time certificate issued by a third party is obtained (step S11), and the digital signature of the third party attached to the current time certificate is verified to confirm the authenticity of the current time certificate (step S12). ). It is determined whether or not the current time certificate is authentic (step S13). If the authenticity is confirmed, the current time T is extracted from the current time certificate, and T 1 and T stored in the self-extracting compressed file are compared. (Step S14). Next, it is determined whether or not T 1 <T. If the current time has passed the designated decryption time, the message M is decrypted and output using the key K (step S16). If the current time certificate is not authentic in step S13 or if T 1 > T in step S15, a decompression failure message is returned and the process ends.

上記の例において復号プログラムが、時刻確認ロジック部と復号ロジック部から構成されており、復号プログラムがデータ(暗号文)を読み込んで動作する形式で本システムを実装した場合、攻撃者は時刻確認ロジック部だけを何らかの手段でパスしてしまえば、通常の暗号プログラムと同様に、鍵と暗号文だけで復号可能なデータがPCのメモリ上に展開されているため、指定した時刻にならなくても、鍵さえ入手すれば復号されてしまう可能性があった。しかし上記の例においては、時刻確認プログラム・ロジックと復号プログラム・ロジックと暗号文とを一体化した自己解凍形式の圧縮ファイルであるため、このような攻撃法は困難となる。   In the above example, when the decryption program is composed of a time confirmation logic unit and a decryption logic unit, and the decryption program reads this data (ciphertext) and implements this system, the attacker will use the time confirmation logic. If only the copy is passed by some means, data that can be decrypted with only the key and ciphertext is expanded in the PC memory, just like a normal encryption program. If there was even a key, it could be decrypted. However, in the above example, since it is a self-extracting compressed file in which the time confirmation program logic, the decryption program logic, and the ciphertext are integrated, such an attack method becomes difficult.

なお、上記の例においては復号時にPC上で自己解凍していたが、ICカード内に自己解凍するプログラムを組み込んでおき、ICカード内で自己解凍するようにしてよい。   In the above example, self-decompression is performed on the PC at the time of decoding. However, a self-decompression program may be incorporated in the IC card and self-decompression may be performed in the IC card.

本発明のシステムの例を説明する概念図である。It is a conceptual diagram explaining the example of the system of this invention. 暗号化時の処理フローを説明する図である。It is a figure explaining the processing flow at the time of encryption. 復号時の処理フローを説明する図である。It is a figure explaining the processing flow at the time of decoding.

符号の説明Explanation of symbols

1,3…パターンコンピュータ、2…ICカード、4…公開鍵証明書、5…現在時刻証明書。 1, 3 ... Pattern computer, 2 ... IC card, 4 ... Public key certificate, 5 ... Current time certificate.

Claims (3)

共通鍵で暗号化した暗号文と復号指定時刻とに基づいて自己解凍可能な圧縮ファイルを生成する手段と、
生成された圧縮ファイルおよび復号時に使用する第三者機関の鍵証明書が書き込まれる記憶媒体と、
第三者機関が発行する現在時刻証明書に添付されたデジタル署名を検証し、現在時刻証明書から取り出した現在時刻と、記憶媒体から読み出した自己解凍圧縮ファイル内に記憶されている復号指定時刻とを比較し、復号指定時刻が現在時刻より未来でないことを条件に、共通鍵を用いて暗号文を復号する手段と、
を備えた時限暗号化/復号システム。
Means for generating a self-decompressible compressed file based on the ciphertext encrypted with the common key and the specified decryption time;
A storage medium in which the generated compressed file and the third party's key certificate used for decryption are written;
Verify the digital signature attached to the current time certificate issued by a third-party organization, extract the current time extracted from the current time certificate, and the specified decoding time stored in the self-extracting compressed file read from the storage medium And decrypting the ciphertext using a common key on the condition that the designated decryption time is not in the future than the current time;
Timed encryption / decryption system with
前記記憶媒体がICカードであることを特徴とする請求項1記載の時限暗号化/復号システム。 2. The timed encryption / decryption system according to claim 1, wherein the storage medium is an IC card. 共通鍵で暗号化した暗号文と復号指定時刻とに基づいて自己解凍可能な圧縮ファイルを生成する手段と、
生成された圧縮ファイルおよび復号時に使用する第三者機関の鍵証明書が書き込まれ、自己解凍手段を有するICカードとからなり、
前記自己解凍手段は、第三者機関が発行する現在時刻証明書に添付されたデジタル署名を検証し、現在時刻証明書から取り出した現在時刻と、自己解凍圧縮ファイル内に記憶されている復号指定時刻とを比較し、復号指定時刻が現在時刻より未来でないことを条件に、共通鍵を用いて暗号文を復号することを特徴とする時限暗号化/復号システム。
Means for generating a self-decompressible compressed file based on the ciphertext encrypted with the common key and the specified decryption time;
The generated compressed file and the key certificate of the third party organization used at the time of decryption are written, and consist of an IC card having a self-decompression means
The self-extracting means verifies the digital signature attached to the current time certificate issued by a third party, and extracts the current time extracted from the current time certificate and the decryption designation stored in the self-extracting compressed file. A time-based encryption / decryption system that compares a time and decrypts a ciphertext using a common key on the condition that the designated decryption time is not in the future from the current time.
JP2003280888A 2003-07-28 2003-07-28 Time limit encipherment/decipherment system Pending JP2005051479A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2003280888A JP2005051479A (en) 2003-07-28 2003-07-28 Time limit encipherment/decipherment system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2003280888A JP2005051479A (en) 2003-07-28 2003-07-28 Time limit encipherment/decipherment system

Publications (1)

Publication Number Publication Date
JP2005051479A true JP2005051479A (en) 2005-02-24

Family

ID=34266575

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2003280888A Pending JP2005051479A (en) 2003-07-28 2003-07-28 Time limit encipherment/decipherment system

Country Status (1)

Country Link
JP (1) JP2005051479A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006323503A (en) * 2005-05-17 2006-11-30 Canon Inc Document management device and its control method, computer program and storage medium
JP2008263568A (en) * 2007-04-10 2008-10-30 Takeshi Nakadokoro Time authenticating method
JP2018502524A (en) * 2015-01-20 2018-01-25 ゼットティーイー コーポレーションZte Corporation Encryption control for information, information analysis method, system and terminal
JP2020527302A (en) * 2017-06-26 2020-09-03 タリン,スティーヴン Systems and methods for converting large data to smaller representations and reconverting smaller representations back to the original larger data
CN113552999A (en) * 2020-04-01 2021-10-26 株式会社日立制作所 Storage device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006323503A (en) * 2005-05-17 2006-11-30 Canon Inc Document management device and its control method, computer program and storage medium
JP4717509B2 (en) * 2005-05-17 2011-07-06 キヤノン株式会社 Document management apparatus and control method therefor, computer program, and storage medium
JP2008263568A (en) * 2007-04-10 2008-10-30 Takeshi Nakadokoro Time authenticating method
JP2018502524A (en) * 2015-01-20 2018-01-25 ゼットティーイー コーポレーションZte Corporation Encryption control for information, information analysis method, system and terminal
JP2020527302A (en) * 2017-06-26 2020-09-03 タリン,スティーヴン Systems and methods for converting large data to smaller representations and reconverting smaller representations back to the original larger data
US11003589B2 (en) 2017-06-26 2021-05-11 Stephen Tarin Systems and methods for transforming large data into a smaller representation and for re-transforming the smaller representation back to the original large data
CN113552999A (en) * 2020-04-01 2021-10-26 株式会社日立制作所 Storage device

Similar Documents

Publication Publication Date Title
RU2351078C2 (en) Efficient control of generation of cryptographic keys
US6859535B1 (en) Digital content protection system
AU2005223902B2 (en) Authentication between device and portable storage
US20110222691A1 (en) Recording system, playback system, key distribution server, recording device, recording medium device, playback device, recording method, and playback method
US20120002805A1 (en) Cryptographic Key Spilt Combiner Including a Biometric Input
WO2001078298A1 (en) Information processing system and method
KR20080093635A (en) Method for encrypting message for keeping integrity of message and apparatus, and method for decrypting message for keeping integrity of message and apparatus
WO2006013924A1 (en) Recording/reproducing device, recording medium processing device, reproducing device, recording medium, contents recording/reproducing system, and contents recording/reproducing method
WO2007001075A1 (en) Encryption device, encryption method, decryption device, decryption method, and data structure
JP4427693B2 (en) Data processing apparatus and method, and data decoding processing apparatus and method
WO2012053886A1 (en) A method and system for file encryption and decryption in a server
CN101174941B (en) Off-line digital copyright protection method and device for mobile terminal document
JPH10271104A (en) Ciphering method and decipherinc method
JP2005051479A (en) Time limit encipherment/decipherment system
US20030065930A1 (en) Encryption/decryption apparatus and method
WO2021044465A1 (en) Encrypting device, decrypting device, computer program, encryption method, decryption method, and data structure
CN113114458A (en) Encryption certificate generation method, decryption method, encryption certificate generation device, decryption device and encryption certificate system
JP2004297755A (en) Key management server in encryption system, program for controlling decryption apparatus, key management server in signature/verification system and program for controlling verification apparatus
JP3831205B2 (en) Online personalization method and system
JP2005020608A (en) Content distribution system
JP2001125481A (en) Cryptographic communication terminal, cryptographic communication center device, cryptographic communication system, and recording medium
WO2004054208A1 (en) Transferring secret information
JP7466791B2 (en) ENCRYPTION DEVICE, DEC ... POSSIBLE VERIFICATION DEVICE, CRYPTOSYSTEM, ENCRYPTION METHOD, AND ENCRYPTION PROGRAM
KR20020025343A (en) Apparatus and Method for encryption and decryption of file using base key and one-time key
JP4302076B2 (en) Key judgment device

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20060629

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20080617

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20080627

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20080825

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20081031

A02 Decision of refusal

Free format text: JAPANESE INTERMEDIATE CODE: A02

Effective date: 20090313