JP2008504737A - ネットワークパケットの効率的な分類 - Google Patents
ネットワークパケットの効率的な分類 Download PDFInfo
- Publication number
- JP2008504737A JP2008504737A JP2007518222A JP2007518222A JP2008504737A JP 2008504737 A JP2008504737 A JP 2008504737A JP 2007518222 A JP2007518222 A JP 2007518222A JP 2007518222 A JP2007518222 A JP 2007518222A JP 2008504737 A JP2008504737 A JP 2008504737A
- Authority
- JP
- Japan
- Prior art keywords
- feature
- packet
- prism
- feature vector
- vector
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 73
- 239000013598 vector Substances 0.000 claims abstract description 57
- 238000013507 mapping Methods 0.000 claims abstract description 3
- 238000004891 communication Methods 0.000 claims description 13
- 230000000903 blocking effect Effects 0.000 claims 2
- 238000001914 filtration Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 8
- 230000007246 mechanism Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 6
- 238000013459 approach Methods 0.000 description 5
- PXFBZOLANLWPMH-UHFFFAOYSA-N 16-Epiaffinine Natural products C1C(C2=CC=CC=C2N2)=C2C(=O)CC2C(=CC)CN(C)C1C2CO PXFBZOLANLWPMH-UHFFFAOYSA-N 0.000 description 4
- 238000013473 artificial intelligence Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 238000012554 master batch record Methods 0.000 description 4
- 238000012706 support-vector machine Methods 0.000 description 4
- 239000010410 layer Substances 0.000 description 3
- 238000012549 training Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000001427 coherent effect Effects 0.000 description 2
- 238000003066 decision tree Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000007667 floating Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 208000003443 Unconsciousness Diseases 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013145 classification model Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 1
- 239000013545 self-assembled monolayer Substances 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US58244204P | 2004-06-23 | 2004-06-23 | |
| US58867404P | 2004-07-15 | 2004-07-15 | |
| US58854904P | 2004-07-15 | 2004-07-15 | |
| PCT/US2005/022023 WO2006002215A1 (en) | 2004-06-23 | 2005-06-21 | Efficient classification of network packets |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2010210843A Division JP5362669B2 (ja) | 2004-06-23 | 2010-09-21 | ネットワークパケットの効率的な分類 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| JP2008504737A true JP2008504737A (ja) | 2008-02-14 |
Family
ID=34972844
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2007518222A Pending JP2008504737A (ja) | 2004-06-23 | 2005-06-21 | ネットワークパケットの効率的な分類 |
| JP2010210843A Expired - Fee Related JP5362669B2 (ja) | 2004-06-23 | 2010-09-21 | ネットワークパケットの効率的な分類 |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2010210843A Expired - Fee Related JP5362669B2 (ja) | 2004-06-23 | 2010-09-21 | ネットワークパケットの効率的な分類 |
Country Status (4)
| Country | Link |
|---|---|
| US (2) | US8027330B2 (enExample) |
| EP (1) | EP1762079A1 (enExample) |
| JP (2) | JP2008504737A (enExample) |
| WO (1) | WO2006002215A1 (enExample) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2012531661A (ja) * | 2009-06-26 | 2012-12-10 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | 通信ネットワークにおける方法および構成 |
| WO2020031822A1 (ja) * | 2018-08-06 | 2020-02-13 | 日本電気株式会社 | 通信装置、通信方法、及び、通信プログラムが格納された記録媒体 |
| JP2023147418A (ja) * | 2022-03-30 | 2023-10-13 | 尚承科技股▲フン▼有限公司 | Aiによるネットワーク攻撃防御システムおよびその方法 |
Families Citing this family (47)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2008504737A (ja) | 2004-06-23 | 2008-02-14 | クゥアルコム・インコーポレイテッド | ネットワークパケットの効率的な分類 |
| US8660210B2 (en) * | 2006-01-23 | 2014-02-25 | Qualcomm Incorporated | Method of packet format dependent selection of MIMO-OFDM demodulator |
| US8306030B1 (en) * | 2006-03-21 | 2012-11-06 | Sprint Communications Company L.P. | Vector based session security |
| US8096709B2 (en) * | 2006-03-29 | 2012-01-17 | Hitachi Powdered Metals Co., Ltd. | Sliding bearing |
| US8023974B1 (en) * | 2007-02-15 | 2011-09-20 | Trend Micro Incorporated | Lightweight SVM-based content filtering system for mobile phones |
| US8234264B2 (en) * | 2008-02-08 | 2012-07-31 | International Business Machines Corporation | System and method for preferred services in nomadic environments |
| US8336098B2 (en) * | 2009-03-25 | 2012-12-18 | Sysmate Co., Ltd. | Method and apparatus for classifying harmful packet |
| US8495725B2 (en) * | 2009-08-28 | 2013-07-23 | Great Wall Systems | Methods, systems, and computer readable media for adaptive packet filtering |
| CN102156646B (zh) * | 2010-02-11 | 2014-11-05 | 华为技术有限公司 | 特征库升级方法和装置 |
| CN101841546B (zh) * | 2010-05-17 | 2013-01-16 | 华为技术有限公司 | 一种规则匹配方法、装置及系统 |
| ES2393501B1 (es) * | 2010-09-03 | 2013-11-11 | Telefónica, S.A. | Método y sistema para clasificación de tráfico. |
| US8516592B1 (en) | 2011-06-13 | 2013-08-20 | Trend Micro Incorporated | Wireless hotspot with lightweight anti-malware |
| US9553817B1 (en) | 2011-07-14 | 2017-01-24 | Sprint Communications Company L.P. | Diverse transmission of packet content |
| US8881258B2 (en) * | 2011-08-24 | 2014-11-04 | Mcafee, Inc. | System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy |
| US8700913B1 (en) | 2011-09-23 | 2014-04-15 | Trend Micro Incorporated | Detection of fake antivirus in computers |
| US8789135B1 (en) * | 2012-06-15 | 2014-07-22 | Google Inc. | Scalable stateful firewall design in openflow based networks |
| US9137205B2 (en) | 2012-10-22 | 2015-09-15 | Centripetal Networks, Inc. | Methods and systems for protecting a secured network |
| US9565213B2 (en) | 2012-10-22 | 2017-02-07 | Centripetal Networks, Inc. | Methods and systems for protecting a secured network |
| US9203806B2 (en) | 2013-01-11 | 2015-12-01 | Centripetal Networks, Inc. | Rule swapping in a packet network |
| US9124552B2 (en) | 2013-03-12 | 2015-09-01 | Centripetal Networks, Inc. | Filtering network data transfers |
| US9094445B2 (en) | 2013-03-15 | 2015-07-28 | Centripetal Networks, Inc. | Protecting networks from cyber attacks and overloading |
| CN104182248B (zh) * | 2014-07-25 | 2017-11-14 | 汉柏科技有限公司 | 业务规则库升级方法及装置 |
| US9860264B2 (en) | 2014-12-23 | 2018-01-02 | International Business Machines Corporation | Multi-dimensional geometry for enhancement of simulations of network devices |
| US9264370B1 (en) | 2015-02-10 | 2016-02-16 | Centripetal Networks, Inc. | Correlating packets in communications networks |
| US9866576B2 (en) | 2015-04-17 | 2018-01-09 | Centripetal Networks, Inc. | Rule-based network-threat detection |
| US9596215B1 (en) * | 2015-04-27 | 2017-03-14 | Juniper Networks, Inc. | Partitioning a filter to facilitate filtration of packets |
| EP3288222B1 (en) | 2015-05-15 | 2019-11-13 | Mitsubishi Electric Corporation | Packet filtering device and packet filtering method |
| US12109489B2 (en) | 2015-05-29 | 2024-10-08 | Netduma Software Ltd | Selecting a connection in a network |
| US10581746B2 (en) * | 2015-05-29 | 2020-03-03 | Netduma Software, LTD. | Selecting a connection in a network |
| US11278798B2 (en) * | 2015-05-29 | 2022-03-22 | Netduma Software, LTD. | Selecting a connection in a network |
| WO2017019103A1 (en) * | 2015-07-30 | 2017-02-02 | Hewlett Packard Enterprise Development Lp | Network traffic pattern based machine readable instruction identification |
| US10242025B2 (en) * | 2015-10-27 | 2019-03-26 | Netapp, Inc. | Efficient differential techniques for metafiles |
| US9917856B2 (en) | 2015-12-23 | 2018-03-13 | Centripetal Networks, Inc. | Rule-based network-threat detection for encrypted communications |
| US11729144B2 (en) | 2016-01-04 | 2023-08-15 | Centripetal Networks, Llc | Efficient packet capture for cyber threat analysis |
| US10986030B2 (en) | 2016-08-23 | 2021-04-20 | Netduma Software, LTD. | Congestion control |
| US10715442B2 (en) * | 2016-08-23 | 2020-07-14 | Netduma Software, LTD. | Congestion control |
| US11570117B2 (en) | 2016-08-23 | 2023-01-31 | Netduma Software, LTD. | Congestion control |
| US10193863B2 (en) | 2016-10-07 | 2019-01-29 | Microsoft Technology Licensing, Llc | Enforcing network security policy using pre-classification |
| US10708284B2 (en) * | 2017-07-07 | 2020-07-07 | Cisco Technology, Inc. | Private-learned IDS |
| US10503899B2 (en) | 2017-07-10 | 2019-12-10 | Centripetal Networks, Inc. | Cyberanalysis workflow acceleration |
| US10284526B2 (en) | 2017-07-24 | 2019-05-07 | Centripetal Networks, Inc. | Efficient SSL/TLS proxy |
| US11233777B2 (en) | 2017-07-24 | 2022-01-25 | Centripetal Networks, Inc. | Efficient SSL/TLS proxy |
| US10333898B1 (en) | 2018-07-09 | 2019-06-25 | Centripetal Networks, Inc. | Methods and systems for efficient network protection |
| US10491613B1 (en) * | 2019-01-22 | 2019-11-26 | Capital One Services, Llc | Systems and methods for secure communication in cloud computing environments |
| US11362996B2 (en) | 2020-10-27 | 2022-06-14 | Centripetal Networks, Inc. | Methods and systems for efficient adaptive logging of cyber threat incidents |
| US11159546B1 (en) | 2021-04-20 | 2021-10-26 | Centripetal Networks, Inc. | Methods and systems for efficient threat context-aware packet filtering for network protection |
| US12052287B2 (en) * | 2022-03-01 | 2024-07-30 | Fortinet, Inc. | Systems and methods for security policy organization using a dual bitmap |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2002073390A (ja) * | 2000-08-30 | 2002-03-12 | Nippon Telegr & Teleph Corp <Ntt> | 多次元空間データ構造を記録した記録媒体、多次元空間データ更新方法、多次元空間データ探索方法および前記方法を実施するプログラムを記録した記録媒体 |
| US6691168B1 (en) * | 1998-12-31 | 2004-02-10 | Pmc-Sierra | Method and apparatus for high-speed network rule processing |
Family Cites Families (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2170564A1 (en) * | 1996-02-28 | 1997-08-29 | Frank Michael Kappe | Method of propagating data through a distributed information network |
| US5916305A (en) * | 1996-11-05 | 1999-06-29 | Shomiti Systems, Inc. | Pattern recognition in data communications using predictive parsers |
| US5951651A (en) * | 1997-07-23 | 1999-09-14 | Lucent Technologies Inc. | Packet filter system using BITMAP vector of filter rules for routing packet through network |
| US6510164B1 (en) * | 1998-11-16 | 2003-01-21 | Sun Microsystems, Inc. | User-level dedicated interface for IP applications in a data packet switching and load balancing system |
| US6549538B1 (en) * | 1998-12-31 | 2003-04-15 | Compaq Information Technologies Group, L.P. | Computer method and apparatus for managing network ports cluster-wide using a lookaside list |
| US6614789B1 (en) * | 1999-12-29 | 2003-09-02 | Nasser Yazdani | Method of and apparatus for matching strings of different lengths |
| US20040064737A1 (en) * | 2000-06-19 | 2004-04-01 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses |
| US7013482B1 (en) * | 2000-07-07 | 2006-03-14 | 802 Systems Llc | Methods for packet filtering including packet invalidation if packet validity determination not timely made |
| US7054315B2 (en) | 2001-09-17 | 2006-05-30 | Pmc-Sierra Ltd. | Efficiency masked matching |
| TWI244297B (en) * | 2002-06-12 | 2005-11-21 | Thomson Licensing Sa | Apparatus and method adapted to communicate via a network |
| US7017186B2 (en) * | 2002-07-30 | 2006-03-21 | Steelcloud, Inc. | Intrusion detection system using self-organizing clusters |
| US6825706B2 (en) * | 2003-02-11 | 2004-11-30 | Texas Instruments Incorporated | Multiplexer |
| JP2008504737A (ja) | 2004-06-23 | 2008-02-14 | クゥアルコム・インコーポレイテッド | ネットワークパケットの効率的な分類 |
-
2005
- 2005-06-21 JP JP2007518222A patent/JP2008504737A/ja active Pending
- 2005-06-21 EP EP05762219A patent/EP1762079A1/en not_active Withdrawn
- 2005-06-21 WO PCT/US2005/022023 patent/WO2006002215A1/en not_active Ceased
- 2005-06-21 US US11/158,588 patent/US8027330B2/en not_active Expired - Fee Related
-
2010
- 2010-09-21 JP JP2010210843A patent/JP5362669B2/ja not_active Expired - Fee Related
-
2011
- 2011-09-26 US US13/245,680 patent/US8750285B2/en not_active Expired - Fee Related
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6691168B1 (en) * | 1998-12-31 | 2004-02-10 | Pmc-Sierra | Method and apparatus for high-speed network rule processing |
| JP2002073390A (ja) * | 2000-08-30 | 2002-03-12 | Nippon Telegr & Teleph Corp <Ntt> | 多次元空間データ構造を記録した記録媒体、多次元空間データ更新方法、多次元空間データ探索方法および前記方法を実施するプログラムを記録した記録媒体 |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2012531661A (ja) * | 2009-06-26 | 2012-12-10 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | 通信ネットワークにおける方法および構成 |
| WO2020031822A1 (ja) * | 2018-08-06 | 2020-02-13 | 日本電気株式会社 | 通信装置、通信方法、及び、通信プログラムが格納された記録媒体 |
| JPWO2020031822A1 (ja) * | 2018-08-06 | 2021-08-02 | 日本電気株式会社 | 通信装置、通信方法、及び、通信プログラム |
| JP2023147418A (ja) * | 2022-03-30 | 2023-10-13 | 尚承科技股▲フン▼有限公司 | Aiによるネットワーク攻撃防御システムおよびその方法 |
| JP7494240B2 (ja) | 2022-03-30 | 2024-06-03 | 尚承科技股▲フン▼有限公司 | Aiによるネットワーク攻撃防御システムおよびその方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| US20050286522A1 (en) | 2005-12-29 |
| US8750285B2 (en) | 2014-06-10 |
| JP2011054179A (ja) | 2011-03-17 |
| JP5362669B2 (ja) | 2013-12-11 |
| US8027330B2 (en) | 2011-09-27 |
| US20120042374A1 (en) | 2012-02-16 |
| EP1762079A1 (en) | 2007-03-14 |
| WO2006002215A1 (en) | 2006-01-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5362669B2 (ja) | ネットワークパケットの効率的な分類 | |
| Santos et al. | Machine learning algorithms to detect DDoS attacks in SDN | |
| Lima Filho et al. | Smart detection: an online approach for DoS/DDoS attack detection using machine learning | |
| US12081572B2 (en) | Apparatus having engine using artificial intelligence for detecting bot anomalies in a computer network | |
| Resende et al. | A survey of random forest based methods for intrusion detection systems | |
| US9031959B2 (en) | Method and apparatus for identifying application protocol | |
| Dusi et al. | Tunnel hunter: Detecting application-layer tunnels with statistical fingerprinting | |
| US8224989B2 (en) | Effective policies and policy enforcement using characterization of flow content and content-independent flow information | |
| JP4906504B2 (ja) | インテリジェント統合ネットワークセキュリティ装置 | |
| US20110030057A1 (en) | Matching with a large vulnerability signature ruleset for high performance network defense | |
| Lyu et al. | A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection | |
| Mohammadi et al. | HTTPScout: A machine learning based countermeasure for HTTP flood attacks in SDN | |
| Li et al. | Iotensemble: Detection of botnet attacks on internet of things | |
| Singh | Machine learning in openflow network: comparative analysis of DDoS detection techniques. | |
| US20080101222A1 (en) | Lightweight, Time/Space Efficient Packet Filtering | |
| Quinan et al. | Activity and Event Network Graph and Application to Cyber-Physical Security | |
| Cai et al. | E‐Replacement: Efficient scanner data collection method in P4‐based software‐defined networks | |
| Sadlek et al. | Identification of Device Dependencies Using Link Prediction | |
| Mohana Priya et al. | Cog-SDN: Mitigation mechanism for distributed denial of service attacks in software defined networks | |
| Gokcen | A Preliminary Study for Identifying NAT Traffic Using Machine Learning | |
| Siriwardhana et al. | Descriptor: 5G Wireless Network Intrusion Detection Dataset (5G-NIDD) | |
| CN101006702A (zh) | 网络分组的高效分类 | |
| Shalini et al. | DDoS attack detection in SDN using CUSUM | |
| HK1104885A (en) | Efficient classification of network packets | |
| Salih | An adaptive approach to detecting behavioural covert channels in IPv6 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20091009 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20091020 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20100113 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20100120 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20100420 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20100518 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20100921 |
|
| A911 | Transfer to examiner for re-examination before appeal (zenchi) |
Free format text: JAPANESE INTERMEDIATE CODE: A911 Effective date: 20101109 |
|
| A912 | Re-examination (zenchi) completed and case transferred to appeal board |
Free format text: JAPANESE INTERMEDIATE CODE: A912 Effective date: 20101126 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20120201 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20120207 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20120301 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20120306 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20120402 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20120409 |