JP2009534964A - 不正操作に対し保護された暗号鍵生成方法および暗号鍵生成システム - Google Patents
不正操作に対し保護された暗号鍵生成方法および暗号鍵生成システム Download PDFInfo
- Publication number
- JP2009534964A JP2009534964A JP2009507005A JP2009507005A JP2009534964A JP 2009534964 A JP2009534964 A JP 2009534964A JP 2009507005 A JP2009507005 A JP 2009507005A JP 2009507005 A JP2009507005 A JP 2009507005A JP 2009534964 A JP2009534964 A JP 2009534964A
- Authority
- JP
- Japan
- Prior art keywords
- node
- short
- nodes
- monitoring
- radio
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
- H04W12/0471—Key exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims (13)
- 無線インタフェース(3)を介した2つのノード(2−1,2−2)間における暗号化共通鍵の不正操作保護された生成方法において、
前記暗号化共通鍵(S)の生成中、前記2つのノード(2−1,2−2)のうち少なくとも一方のノードが生成期間において、第3のノード(9)が前記2つのノード(2−1,2−2)のうち一方のノードと前記無線インタフェース(3)を介して通信を行っているか否かを監視することを特徴とする、
暗号化共通鍵の不正操作保護された生成方法。 - 請求項1記載の方法において、
監視を行うノード(2−2)が、第3のノード(9)が無線インタフェース(3)を介して前記2つのノード(2−1,2−2)のうち一方のノードと通信していることを識別すると、該監視を行うノード(2−2)は他方のノード(2−1)との暗号化共通鍵(S)の生成を中止することを特徴とする方法。 - 請求項1記載の方法において、
第3のノード(9)が無線インタフェース(3)を介して前記2つのノード(2−1,2−2)のうち一方のノードと通信しているならば、、監視を行うノード(2−)は他方のノード(2−1)との暗号化共通鍵(S)の生成を中止し、生成された暗号化共通鍵(S)を安全でない暗号化共通鍵(S)として記憶することを特徴とする方法。 - 請求項2または3記載の方法において、
第3のノード(9)が前記無線インタフェース(3)を介して前記2つのノード(2−1,2−2)のうち一方のノードと生成期間内で通信しているならば、前記監視を行うノード(2−2)は付加的にエラー警告メッセージを送信することを特徴とする方法。 - 請求項1記載の方法において、
前記監視を行うノード(2−2)は前記無線インタフェース(3)における1つまたは複数の無線チャネルを監視することを特徴とする方法。 - 請求項1記載の方法において、
前記2つのノード(2−1,2−2)は鍵取り決めプロトコルに従い、前記無線インタフェース(3)における少なくとも1つの無線チャネルを介してまえもって定められた鍵取り決めメッセージを交換することにより、暗号化共通鍵を生成することを特徴とする方法。 - 請求項6記載の方法において、
前記監視を行うノード(2−2)は、前記鍵取り決めメッセージが第3のノード(9)により前記無線インタフェース(3)を介して前記2つのノード(2−1,2−2)のうち一方のノードに送信されたか否かについて監視することを特徴とする方法。 - 請求項1記載の方法において、
前記監視を行うノード(2−2)は、エラー警告メッセージが他方のノード(9)から送信されたか否かを監視することを特徴とする方法。 - 請求項1記載の方法において、
前記監視を行うノード(2−2)は、暗号化共通鍵生成中に生成期間内で無線チャネル品質が低下したか否かを監視することを特徴とする方法。 - 請求項1記載の方法において、
前記監視を行うノード(2−2)は、第3のノード(9)が前記生成期間の前および後ろの保護期間中、前記無線インタフェース(3)を介して前記2つのノード(2−1,2−2)のうち一方のノードと通信しているか否かを付加的に監視することを特徴とする方法。 - 請求項1記載の方法において、
前記ノード(2−1,2−2)は短距離無線装置(2)により形成されることを特徴とする方法。 - 無線インタフェース(3)を介して互いに通信を行う複数の短距離無線装置(2)が設けられている短距離無線システム(1)において、
該短距離無線システム(1)の2つの短距離無線装置(2−1,2−2)間で暗号化共通鍵(S)を生成するとき、前記無線インタフェース(3)を介した該暗号化共通鍵(S)の生成中に生成期間内で、さらに別の短距離無線装置(9)が前記2つの短距離無線装置(2−1,2−2)のうち一方の短距離無線装置と無線インタフェース(3)を介して通信しているか否かを監視することを特徴とする、
短距離無線システム。 - 短距離無線装置(2)において、
無線インタフェース(3)を介して他方の短距離無線装置(2)とともに暗号化共通鍵(S)を生成するとき、不正操作を識別するため前記無線インタフェース(3)を、前記暗号化共通鍵(S)の生成中、第3の短距離無線装置(9)が2つの短距離無線装置(2−1,2−2)のうち一方の短距離無線装置と前記無線インタフェース(3)を介して通信しているか否かについて監視することを特徴とする、
短距離無線装置。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102006019466A DE102006019466B4 (de) | 2006-04-26 | 2006-04-26 | Verfahren und System zum manipulationssicheren Einrichten eines kryptographischen Schlüssels |
DE102006019466.7 | 2006-04-26 | ||
PCT/EP2007/051191 WO2007124965A1 (de) | 2006-04-26 | 2007-02-08 | Verfahren und system zum manipulationssicheren einrichten eines kryptographischen schlüssels |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2009534964A true JP2009534964A (ja) | 2009-09-24 |
JP5595036B2 JP5595036B2 (ja) | 2014-09-24 |
Family
ID=38174801
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2009507005A Expired - Fee Related JP5595036B2 (ja) | 2006-04-26 | 2007-02-08 | 不正操作に対し保護された暗号鍵生成方法および暗号鍵生成システム |
Country Status (10)
Country | Link |
---|---|
US (1) | US9614820B2 (ja) |
EP (1) | EP2011302B1 (ja) |
JP (1) | JP5595036B2 (ja) |
KR (1) | KR101476995B1 (ja) |
CN (2) | CN101427545A (ja) |
AT (1) | ATE556549T1 (ja) |
DE (1) | DE102006019466B4 (ja) |
ES (1) | ES2386040T3 (ja) |
RU (1) | RU2445746C2 (ja) |
WO (1) | WO2007124965A1 (ja) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102006019466B4 (de) | 2006-04-26 | 2009-07-30 | Siemens Ag | Verfahren und System zum manipulationssicheren Einrichten eines kryptographischen Schlüssels |
US8291231B2 (en) * | 2007-11-07 | 2012-10-16 | Nippon Telegraph And Telephone Corporation | Common key setting method, relay apparatus, and program |
DE102008008237B4 (de) | 2008-02-08 | 2021-06-02 | Volkswagen Ag | Verfahren und System zur Erfassung der Drehbewegung eines Fahrzeugrades |
US8068011B1 (en) | 2010-08-27 | 2011-11-29 | Q Street, LLC | System and method for interactive user-directed interfacing between handheld devices and RFID media |
US9088552B2 (en) * | 2011-11-30 | 2015-07-21 | Motorola Solutions, Inc. | Method and apparatus for key distribution using near-field communication |
KR101785964B1 (ko) * | 2011-12-16 | 2017-10-18 | 삼성전자주식회사 | 근접장을 이용하여 풀 듀플렉스 통신 방식에 따라 통신하는 제1 노드 및 제2 노드의 통신 보안 방법 및 장치 |
DE102014212488B4 (de) * | 2014-06-27 | 2016-02-18 | Siemens Aktiengesellschaft | Gesichertes Bereitstellen eines Replika-Pseudo-Zufallsrauschcodes an eine Empfängereinheit |
CN104780537A (zh) * | 2015-04-09 | 2015-07-15 | 天津大学 | 一种无线局域网wlan身份验证方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003229847A (ja) * | 2001-11-28 | 2003-08-15 | Yun-Factory:Kk | 鍵交換装置、方法、プログラムおよび該プログラムを記録した記録媒体 |
US20050010536A1 (en) * | 2002-02-27 | 2005-01-13 | Imagineer Software, Inc. | Secure communication and real-time watermarking using mutating identifiers |
US20050010680A1 (en) * | 2003-06-18 | 2005-01-13 | Zick Donald A. | Enhanced shared secret provisioning protocol |
JP2006025374A (ja) * | 2004-07-09 | 2006-01-26 | Fujitsu Ltd | ワイヤレス通信不正使用検証システム |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5450493A (en) * | 1993-12-29 | 1995-09-12 | At&T Corp. | Secure communication method and apparatus |
US5604806A (en) | 1995-01-20 | 1997-02-18 | Ericsson Inc. | Apparatus and method for secure radio communication |
US6705323B1 (en) | 1995-06-07 | 2004-03-16 | Conceptus, Inc. | Contraceptive transcervical fallopian tube occlusion devices and methods |
US7047404B1 (en) * | 2000-05-16 | 2006-05-16 | Surety Llc | Method and apparatus for self-authenticating digital records |
US7516325B2 (en) * | 2001-04-06 | 2009-04-07 | Certicom Corp. | Device authentication in a PKI |
RU2230438C2 (ru) | 2001-12-27 | 2004-06-10 | Воронежский государственный технический университет | Способ формирования ключа шифрования-дешифрования |
US20030232598A1 (en) * | 2002-06-13 | 2003-12-18 | Daniel Aljadeff | Method and apparatus for intrusion management in a wireless network using physical location determination |
US6986161B2 (en) * | 2002-08-12 | 2006-01-10 | Harris Corporation | Mobile ad-hoc network with intrusion detection features and related methods |
RU2328083C2 (ru) | 2003-11-11 | 2008-06-27 | Сименс Акциенгезелльшафт | Способ обеспечения трафика данных между первым оконечным устройством и первой сетью, а также вторым оконечным устройством и второй сетью |
DE10358987A1 (de) * | 2003-11-11 | 2005-06-16 | Siemens Ag | Verfahren zur Sicherung des Datenverkehrs zwischen einem ersten Endgerät und einem ersten Netz sowie einem zweiten Endgerät und einem zweiten Netz |
US7002943B2 (en) | 2003-12-08 | 2006-02-21 | Airtight Networks, Inc. | Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices |
WO2005107141A1 (en) | 2004-04-30 | 2005-11-10 | Research In Motion Limited | Systems and methods to securely generate shared keys |
US7965845B2 (en) * | 2004-06-29 | 2011-06-21 | Koninklijke Philips Electronics N. V. | System and methods for efficient authentication of medical wireless ad hoc network nodes |
US7644276B2 (en) * | 2004-08-03 | 2010-01-05 | Hewlett-Packard Development Company, L.P. | Method for verifying a secure association between devices |
US7375616B2 (en) * | 2004-09-08 | 2008-05-20 | Nokia Corporation | Electronic near field communication enabled multifunctional device and method of its operation |
JP2006108977A (ja) * | 2004-10-04 | 2006-04-20 | Matsushita Electric Ind Co Ltd | ワイヤレス監視システム |
US8082443B2 (en) * | 2006-01-09 | 2011-12-20 | Bbnt Solutions Llc. | Pedigrees for quantum cryptography |
DE102006019466B4 (de) | 2006-04-26 | 2009-07-30 | Siemens Ag | Verfahren und System zum manipulationssicheren Einrichten eines kryptographischen Schlüssels |
-
2006
- 2006-04-26 DE DE102006019466A patent/DE102006019466B4/de active Active
-
2007
- 2007-02-08 RU RU2008146501/08A patent/RU2445746C2/ru not_active IP Right Cessation
- 2007-02-08 EP EP07704444A patent/EP2011302B1/de active Active
- 2007-02-08 ES ES07704444T patent/ES2386040T3/es active Active
- 2007-02-08 CN CNA2007800146904A patent/CN101427545A/zh active Pending
- 2007-02-08 KR KR1020087028789A patent/KR101476995B1/ko active IP Right Grant
- 2007-02-08 US US12/298,694 patent/US9614820B2/en active Active
- 2007-02-08 WO PCT/EP2007/051191 patent/WO2007124965A1/de active Application Filing
- 2007-02-08 JP JP2009507005A patent/JP5595036B2/ja not_active Expired - Fee Related
- 2007-02-08 AT AT07704444T patent/ATE556549T1/de active
- 2007-02-08 CN CN201510602197.0A patent/CN105120459A/zh active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003229847A (ja) * | 2001-11-28 | 2003-08-15 | Yun-Factory:Kk | 鍵交換装置、方法、プログラムおよび該プログラムを記録した記録媒体 |
US20050010536A1 (en) * | 2002-02-27 | 2005-01-13 | Imagineer Software, Inc. | Secure communication and real-time watermarking using mutating identifiers |
US20050010680A1 (en) * | 2003-06-18 | 2005-01-13 | Zick Donald A. | Enhanced shared secret provisioning protocol |
JP2006025374A (ja) * | 2004-07-09 | 2006-01-26 | Fujitsu Ltd | ワイヤレス通信不正使用検証システム |
Non-Patent Citations (3)
Title |
---|
JPN6012004131; T. Zhiqi and A.B. Ruighaver: 'Wireless Intrusion Detection: Not as easy as traditional network intrusion detection' 2005 IEEE Region 10 Conference , 200511 * |
JPN7011002340; C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt: 'A specification-based intrusion detection system for AODV' Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , 2003, pp. 125-134 * |
JPN7012000293; W. Xu, W. Trappe, Y. Zhang and T. Wood: 'The feasibility of launching and detecting jamming attacks in wireless networks' Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing , 200505, pp. 46-57 * |
Also Published As
Publication number | Publication date |
---|---|
US9614820B2 (en) | 2017-04-04 |
ES2386040T3 (es) | 2012-08-07 |
EP2011302B1 (de) | 2012-05-02 |
EP2011302A1 (de) | 2009-01-07 |
RU2445746C2 (ru) | 2012-03-20 |
US20090103733A1 (en) | 2009-04-23 |
CN101427545A (zh) | 2009-05-06 |
RU2008146501A (ru) | 2010-06-10 |
DE102006019466B4 (de) | 2009-07-30 |
KR101476995B1 (ko) | 2015-01-06 |
JP5595036B2 (ja) | 2014-09-24 |
ATE556549T1 (de) | 2012-05-15 |
DE102006019466A1 (de) | 2007-10-31 |
CN105120459A (zh) | 2015-12-02 |
KR20090012248A (ko) | 2009-02-02 |
WO2007124965A1 (de) | 2007-11-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vanhoef et al. | Key reinstallation attacks: Forcing nonce reuse in WPA2 | |
JP6378365B2 (ja) | ネットワークで秘密または鍵を生成する方法 | |
US10567165B2 (en) | Secure key transmission protocol without certificates or pre-shared symmetrical keys | |
JP5595036B2 (ja) | 不正操作に対し保護された暗号鍵生成方法および暗号鍵生成システム | |
US7987363B2 (en) | Secure wireless communications system and related method | |
CN108599925B (zh) | 一种基于量子通信网络的改进型aka身份认证系统和方法 | |
US7660419B1 (en) | System and method for security association between communication devices within a wireless personal and local area network | |
JP4734344B2 (ja) | 他と共有されないジョイント乱数性(jrnso)を用いて暗号鍵を導出する方法とシステム | |
TWI454112B (zh) | 通信網路金鑰管理 | |
US9917692B2 (en) | Key exchange system, key exchange method, key exchange device, control method thereof, and recording medium for storing control program | |
KR101343248B1 (ko) | 교환 세션의 총체적 보안 | |
US8583809B2 (en) | Destroying a secure session maintained by a server on behalf of a connection owner | |
CN108923927A (zh) | 用于对摄像机供给动态qr码和ble连接的系统和方法 | |
US20060209843A1 (en) | Secure spontaneous associations between networkable devices | |
CN101997679A (zh) | 加密信息协商方法、设备及网络系统 | |
WO2019219862A1 (en) | Internet of things security with multi-party computation (mpc) | |
JP2012235214A (ja) | 暗号通信装置および暗号通信システム | |
Rabiah et al. | A lightweight authentication and key exchange protocol for IoT | |
CN102111411A (zh) | P2p网络中对等用户结点间的加密安全数据交换方法 | |
KR20180006664A (ko) | 의료 기기, 게이트웨이 기기 및 이를 이용한 프로토콜 보안 방법 | |
JP7451738B2 (ja) | 鍵更新方法および関連装置 | |
KR101704540B1 (ko) | M2m 환경의 다중 디바이스 데이터 공유를 위한 그룹키 관리 방법 | |
KR101451163B1 (ko) | 무선 네트워크 접속 인증 방법 및 그 시스템 | |
Stulman et al. | Spraying diffie-hellman for secure key exchange in manets | |
KR101502652B1 (ko) | 무선 단말기와 유선 단말기 사이의 비밀키 교환 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RD04 | Notification of resignation of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7424 Effective date: 20101228 Free format text: JAPANESE INTERMEDIATE CODE: A7424 Effective date: 20101227 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20110706 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20111004 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20111012 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20111107 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20111114 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20111205 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20111212 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20111221 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20120203 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20120502 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20120511 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20120604 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20120611 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20120629 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20120706 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20120731 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20121012 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140610 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20140805 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5595036 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |