JP2012503805A - 脅威管理システムおよび方法 - Google Patents
脅威管理システムおよび方法 Download PDFInfo
- Publication number
- JP2012503805A JP2012503805A JP2011528092A JP2011528092A JP2012503805A JP 2012503805 A JP2012503805 A JP 2012503805A JP 2011528092 A JP2011528092 A JP 2011528092A JP 2011528092 A JP2011528092 A JP 2011528092A JP 2012503805 A JP2012503805 A JP 2012503805A
- Authority
- JP
- Japan
- Prior art keywords
- customer
- threat
- module
- managed service
- asset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
- Investigating Or Analyzing Materials Using Thermal Means (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
本願は、同一出願人による、2008年9月23日出願の「Policy Management System and Method」という名称の米国特許出願第12/236436号に関連する。本願は、2008年9月23日出願の米国特許出願第12/236439号の優先権を主張する。これらの先願の内容は、参照により本明細書に組み込まれる。
250 インシデント解決管理モジュール
252 モジュール
254 証拠保持モジュール
256 アクセスおよびインシデント協調モジュール
258 ヘルプデスク統合モジュール
260 知識ベースモジュール
262 識別モジュール
264 解析モジュール
266 位置特定および反撃モジュール
268 顧客特有応答情報モジュール
270 多次元相関モジュール
272 統計的相関モジュール
274 履歴相関モジュール
280 脅威視覚化モジュール
282 ユーザインターフェース
284 リスクダッシュボード
286 装置ステータスビューア
288 グローバル脅威ダッシュボード
290 ログデータモジュール
292 レポーティングおよび分析モジュール
Claims (18)
- ネットワーク脅威応答を自動化する方法であって、
ネットワークアタックの影響を受けやすい資産のタイプを識別する段階と、
資産の前記タイプのそれぞれに資産値を割り当てる段階と、
ネットワークアタックの脅威のタイプを識別する段階と、
脅威の前記タイプのそれぞれに脅威値を割り当てる段階と、
複数の顧客のそれぞれについて、資産の前記タイプのうちの1つと、脅威の前記タイプのうちの1つの少なくともいくつかの組合せについて、前記組合せのどれが脅威応答の価値があるかを判定する段階と
を含む方法。 - 前記判定に従って、前記ネットワークへのアクセスを選択的にブロックする段階をさらに含む請求項1に記載の方法。
- 前記選択的にブロックする段階が、特定のインターネットポートへのアクセスをブロックする段階を含む請求項2に記載の方法。
- 前記判定する段階が、前記組合せのそれぞれに脅威値を割り当てる段階と、前記脅威値を所定のしきい値と比較する段階とを含む請求項2に記載の方法。
- 前記選択的にブロックする段階が、前記所定のしきい値を超える各脅威値について実施される請求項4に記載の方法。
- 資産値を割り当てる前記段階が、それぞれの前記顧客について、その顧客に関連する各資産タイプに関する資産値を割り当てる段階を含む請求項1に記載の方法。
- 異なる顧客が、少なくとも1つの共通資産タイプを有することができるが、異なる資産値が1つの共通資産タイプにそれぞれ割り当てられる請求項1に記載の方法。
- 異なる顧客が、少なくとも1つの共通資産タイプを有することができるが、異なる資産値が前記少なくとも1つの共通資産タイプにそれぞれ割り当てられる請求項1に記載の方法。
- マネージドサービスの顧客が前記資産値を割り当てる請求項1に記載の方法。
- マネージドサービスの顧客が前記脅威値を割り当てる請求項1に記載の方法。
- マネージドサービスプロバイダが、マネージドサービスの顧客の特徴を他のマネージドサービスの顧客の特徴と比較することによって前記資産値を割り当てる請求項1に記載の方法。
- マネージドサービスプロバイダが、マネージドサービスの顧客の特徴を他のマネージドサービスの顧客の特徴と比較することによって前記脅威値を割り当てる請求項1に記載の方法。
- 複数の顧客にマネージドサービスを提供するマネージドサービスシステムにおいて、
資産タイプおよびセキュリティ脅威に関連する脅威解決策を保持する知識ベースモジュールと、
各顧客について、顧客の資産と、前記顧客の資産が直面する脅威とを相関させ、その顧客に関する脅威値を求める相関モジュールと、
前記相関モジュールと共に働いて、前記セキュリティ脅威に対する応答を管理する管理モジュールと、
前記相関モジュールと共に働いて、前記マネージドサービスシステム内のセキュリティ脅威を解決するインシデント解決モジュールと
を備える自動化ネットワーク脅威応答システム。 - 前記マネージドサービス内の前記顧客に対する脅威の視覚化を容易にする視覚化モジュールをさらに備える請求項12に記載のシステム。
- 前記マネージドサービスシステム内の脅威イベントを記録するログデータモジュールをさらに備える請求項12に記載のシステム。
- マネージドサービスプロバイダが、前記知識ベースモジュール内に含まれる脅威解決策を開発する請求項12に記載のシステム。
- 前記相関モジュールが、前記顧客自身の評価に基づいて、前記顧客から前記脅威値を得る請求項12に記載のシステム。
- 前記相関モジュールが、前記顧客自身の評価に基づいて、前記顧客から前記資産値を得る請求項12に記載のシステム。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/236,439 | 2008-09-23 | ||
US12/236,439 US8220056B2 (en) | 2008-09-23 | 2008-09-23 | Threat management system and method |
PCT/US2009/058022 WO2010036701A1 (en) | 2008-09-23 | 2009-09-23 | Threat management system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2012503805A true JP2012503805A (ja) | 2012-02-09 |
JP5631881B2 JP5631881B2 (ja) | 2014-11-26 |
Family
ID=42060063
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2011528092A Expired - Fee Related JP5631881B2 (ja) | 2008-09-23 | 2009-09-23 | 脅威管理システムおよび方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8220056B2 (ja) |
EP (1) | EP2329397A4 (ja) |
JP (1) | JP5631881B2 (ja) |
SG (1) | SG179495A1 (ja) |
WO (1) | WO2010036701A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11593475B2 (en) | 2017-01-30 | 2023-02-28 | Nec Corporation | Security information analysis device, security information analysis method, security information analysis program, security information evaluation device, security information evaluation method, security information analysis system, and recording medium |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8312549B2 (en) * | 2004-09-24 | 2012-11-13 | Ygor Goldberg | Practical threat analysis |
US20110238587A1 (en) * | 2008-09-23 | 2011-09-29 | Savvis, Inc. | Policy management system and method |
US8997234B2 (en) * | 2011-07-27 | 2015-03-31 | Mcafee, Inc. | System and method for network-based asset operational dependence scoring |
US8732840B2 (en) * | 2011-10-07 | 2014-05-20 | Accenture Global Services Limited | Incident triage engine |
US10044582B2 (en) | 2012-01-28 | 2018-08-07 | A10 Networks, Inc. | Generating secure name records |
US9258321B2 (en) | 2012-08-23 | 2016-02-09 | Raytheon Foreground Security, Inc. | Automated internet threat detection and mitigation system and associated methods |
US9392003B2 (en) * | 2012-08-23 | 2016-07-12 | Raytheon Foreground Security, Inc. | Internet security cyber threat reporting system and method |
WO2014052756A2 (en) | 2012-09-28 | 2014-04-03 | Level 3 Communications, Llc | Apparatus, system and method for identifying and mitigating malicious network threats |
US20150215334A1 (en) * | 2012-09-28 | 2015-07-30 | Level 3 Communications, Llc | Systems and methods for generating network threat intelligence |
US9912555B2 (en) | 2013-03-15 | 2018-03-06 | A10 Networks, Inc. | System and method of updating modules for application or content identification |
US9722918B2 (en) | 2013-03-15 | 2017-08-01 | A10 Networks, Inc. | System and method for customizing the identification of application or content type |
US9838425B2 (en) | 2013-04-25 | 2017-12-05 | A10 Networks, Inc. | Systems and methods for network access control |
US9294503B2 (en) | 2013-08-26 | 2016-03-22 | A10 Networks, Inc. | Health monitor based distributed denial of service attack mitigation |
US20150120908A1 (en) * | 2013-10-29 | 2015-04-30 | International Business Machines Corporation | Real-time, distributed administration of information describing dependency relationships among configuration items in a data center |
US9906422B2 (en) | 2014-05-16 | 2018-02-27 | A10 Networks, Inc. | Distributed system to determine a server's health |
US10122687B2 (en) | 2014-09-14 | 2018-11-06 | Sophos Limited | Firewall techniques for colored objects on endpoints |
US9967282B2 (en) * | 2014-09-14 | 2018-05-08 | Sophos Limited | Labeling computing objects for improved threat detection |
US10965711B2 (en) | 2014-09-14 | 2021-03-30 | Sophos Limited | Data behavioral tracking |
US9756071B1 (en) | 2014-09-16 | 2017-09-05 | A10 Networks, Inc. | DNS denial of service attack protection |
US9699201B2 (en) | 2014-09-25 | 2017-07-04 | International Business Machines Corporation | Automated response to detection of threat to cloud virtual machine |
US9537886B1 (en) | 2014-10-23 | 2017-01-03 | A10 Networks, Inc. | Flagging security threats in web service requests |
CN104378364B (zh) * | 2014-10-30 | 2018-02-27 | 广东电子工业研究院有限公司 | 一种信息安全管理中心的协同分析方法 |
US9621575B1 (en) * | 2014-12-29 | 2017-04-11 | A10 Networks, Inc. | Context aware threat protection |
US9900343B1 (en) | 2015-01-05 | 2018-02-20 | A10 Networks, Inc. | Distributed denial of service cellular signaling |
US9848013B1 (en) | 2015-02-05 | 2017-12-19 | A10 Networks, Inc. | Perfect forward secrecy distributed denial of service attack detection |
US10063591B1 (en) | 2015-02-14 | 2018-08-28 | A10 Networks, Inc. | Implementing and optimizing secure socket layer intercept |
US10693914B2 (en) | 2015-06-26 | 2020-06-23 | Micro Focus Llc | Alerts for communities of a security information sharing platform |
EP3314805A1 (en) | 2015-06-26 | 2018-05-02 | Entit Software LLC | Sharing of community-based security information |
US9787581B2 (en) | 2015-09-21 | 2017-10-10 | A10 Networks, Inc. | Secure data flow open information analytics |
US10469594B2 (en) | 2015-12-08 | 2019-11-05 | A10 Networks, Inc. | Implementation of secure socket layer intercept |
US10333962B1 (en) | 2016-03-30 | 2019-06-25 | Amazon Technologies, Inc. | Correlating threat information across sources of distributed computing systems |
US10108803B2 (en) | 2016-03-31 | 2018-10-23 | International Business Machines Corporation | Automatic generation of data-centric attack graphs |
US10812348B2 (en) | 2016-07-15 | 2020-10-20 | A10 Networks, Inc. | Automatic capture of network data for a detected anomaly |
US10341118B2 (en) | 2016-08-01 | 2019-07-02 | A10 Networks, Inc. | SSL gateway with integrated hardware security module |
US10382562B2 (en) | 2016-11-04 | 2019-08-13 | A10 Networks, Inc. | Verification of server certificates using hash codes |
US10250475B2 (en) | 2016-12-08 | 2019-04-02 | A10 Networks, Inc. | Measurement of application response delay time |
US10397270B2 (en) | 2017-01-04 | 2019-08-27 | A10 Networks, Inc. | Dynamic session rate limiter |
US10187377B2 (en) | 2017-02-08 | 2019-01-22 | A10 Networks, Inc. | Caching network generated security certificates |
US10623433B1 (en) * | 2017-09-25 | 2020-04-14 | Amazon Technologies, Inc. | Configurable event-based compute instance security assessments |
US10721266B1 (en) * | 2017-10-30 | 2020-07-21 | EMC IP Holding Company LLC | Automated security incident remediation recommender |
CN112202764B (zh) * | 2020-09-28 | 2023-05-19 | 中远海运科技股份有限公司 | 网络攻击链路可视化系统、方法和服务器 |
CN112887303B (zh) * | 2021-01-25 | 2022-09-30 | 中国人民解放军92493部队参谋部 | 一种串入式威胁接入管控系统及方法 |
US20230224275A1 (en) * | 2022-01-12 | 2023-07-13 | Bank Of America Corporation | Preemptive threat detection for an information system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004272319A (ja) * | 2003-03-05 | 2004-09-30 | Hitachi Ltd | セキュリティ性向上と管理容易化のための装置をもった計算機と方法 |
JP2005071087A (ja) * | 2003-08-25 | 2005-03-17 | Nec Soft Ltd | 侵害に対する意思決定装置と方法、及びプログラム |
JP2005135239A (ja) * | 2003-10-31 | 2005-05-26 | Fujitsu Social Science Laboratory Ltd | 情報セキュリティ管理プログラム、情報セキュリティ管理装置および管理方法 |
JP2006268544A (ja) * | 2005-03-24 | 2006-10-05 | Ntt Communications Kk | ネットワーク接続制御システム、ネットワーク接続制御方法、およびネットワーク接続制御プログラム |
JP2007122408A (ja) * | 2005-10-28 | 2007-05-17 | Hitachi Ltd | クライアントセキュリティ管理システム |
WO2007091305A1 (ja) * | 2006-02-08 | 2007-08-16 | Fujitsu Limited | ワーム対策プログラム、ワーム対策装置、ワーム対策方法 |
WO2008004498A1 (fr) * | 2006-07-06 | 2008-01-10 | Nec Corporation | Système, dispositif, procédé et programme de gestion des risques de sécurité |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7185368B2 (en) * | 2000-11-30 | 2007-02-27 | Lancope, Inc. | Flow-based detection of network intrusions |
AU2002243763A1 (en) * | 2001-01-31 | 2002-08-12 | Internet Security Systems, Inc. | Method and system for configuring and scheduling security audits of a computer network |
US20030005326A1 (en) * | 2001-06-29 | 2003-01-02 | Todd Flemming | Method and system for implementing a security application services provider |
US7373666B2 (en) * | 2002-07-01 | 2008-05-13 | Microsoft Corporation | Distributed threat management |
US7685254B2 (en) * | 2003-06-10 | 2010-03-23 | Pandya Ashish A | Runtime adaptable search processor |
US7138914B2 (en) * | 2003-08-01 | 2006-11-21 | Spectrum Tracking Systems, Inc. | Method and system for providing tracking services to locate an asset |
US20050193429A1 (en) * | 2004-01-23 | 2005-09-01 | The Barrier Group | Integrated data traffic monitoring system |
US20050257269A1 (en) * | 2004-05-03 | 2005-11-17 | Chari Suresh N | Cost effective incident response |
US7735140B2 (en) * | 2004-06-08 | 2010-06-08 | Cisco Technology, Inc. | Method and apparatus providing unified compliant network audit |
US8312549B2 (en) * | 2004-09-24 | 2012-11-13 | Ygor Goldberg | Practical threat analysis |
US20060129810A1 (en) * | 2004-12-14 | 2006-06-15 | Electronics And Telecommunications Research Institute | Method and apparatus for evaluating security of subscriber network |
US7594270B2 (en) * | 2004-12-29 | 2009-09-22 | Alert Logic, Inc. | Threat scoring system and method for intrusion detection security networks |
JP4545647B2 (ja) * | 2005-06-17 | 2010-09-15 | 富士通株式会社 | 攻撃検知・防御システム |
US8781930B2 (en) * | 2005-10-07 | 2014-07-15 | Sap Ag | Enterprise integrity simulation |
US7461036B2 (en) * | 2006-01-18 | 2008-12-02 | International Business Machines Corporation | Method for controlling risk in a computer security artificial neural network expert system |
US7996447B2 (en) * | 2007-07-24 | 2011-08-09 | Dell Products L.P. | Method and system for optimal file system performance |
US20090070880A1 (en) * | 2007-09-11 | 2009-03-12 | Harris David E | Methods and apparatus for validating network alarms |
-
2008
- 2008-09-23 US US12/236,439 patent/US8220056B2/en active Active
-
2009
- 2009-09-23 WO PCT/US2009/058022 patent/WO2010036701A1/en active Application Filing
- 2009-09-23 EP EP09816789.3A patent/EP2329397A4/en not_active Withdrawn
- 2009-09-23 JP JP2011528092A patent/JP5631881B2/ja not_active Expired - Fee Related
- 2009-09-23 SG SG2012018750A patent/SG179495A1/en unknown
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004272319A (ja) * | 2003-03-05 | 2004-09-30 | Hitachi Ltd | セキュリティ性向上と管理容易化のための装置をもった計算機と方法 |
JP2005071087A (ja) * | 2003-08-25 | 2005-03-17 | Nec Soft Ltd | 侵害に対する意思決定装置と方法、及びプログラム |
JP2005135239A (ja) * | 2003-10-31 | 2005-05-26 | Fujitsu Social Science Laboratory Ltd | 情報セキュリティ管理プログラム、情報セキュリティ管理装置および管理方法 |
JP2006268544A (ja) * | 2005-03-24 | 2006-10-05 | Ntt Communications Kk | ネットワーク接続制御システム、ネットワーク接続制御方法、およびネットワーク接続制御プログラム |
JP2007122408A (ja) * | 2005-10-28 | 2007-05-17 | Hitachi Ltd | クライアントセキュリティ管理システム |
WO2007091305A1 (ja) * | 2006-02-08 | 2007-08-16 | Fujitsu Limited | ワーム対策プログラム、ワーム対策装置、ワーム対策方法 |
WO2008004498A1 (fr) * | 2006-07-06 | 2008-01-10 | Nec Corporation | Système, dispositif, procédé et programme de gestion des risques de sécurité |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11593475B2 (en) | 2017-01-30 | 2023-02-28 | Nec Corporation | Security information analysis device, security information analysis method, security information analysis program, security information evaluation device, security information evaluation method, security information analysis system, and recording medium |
Also Published As
Publication number | Publication date |
---|---|
EP2329397A1 (en) | 2011-06-08 |
SG179495A1 (en) | 2012-04-27 |
US20110239303A1 (en) | 2011-09-29 |
US8220056B2 (en) | 2012-07-10 |
JP5631881B2 (ja) | 2014-11-26 |
EP2329397A4 (en) | 2015-07-08 |
WO2010036701A1 (en) | 2010-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5631881B2 (ja) | 脅威管理システムおよび方法 | |
US8799462B2 (en) | Insider threat correlation tool | |
US9038187B2 (en) | Insider threat correlation tool | |
Kebande et al. | Real-time monitoring as a supplementary security component of vigilantism in modern network environments | |
US20120004947A1 (en) | Integrated data management for network service providers and customers | |
Miloslavskaya | Security operations centers for information security incident management | |
Jouini et al. | A multidimensional approach towards a quantitative assessment of security threats | |
US11785036B2 (en) | Real-time validation of data transmissions based on security profiles | |
Blum et al. | Institute resilience through detection, response, and recovery | |
Bezas et al. | Comparative analysis of open source security information & event management systems (SIEMs) | |
Torres | Incident response: How to fight back | |
Crowley et al. | The Definition of SOC-cess | |
Dorigo | Security information and event management | |
Kanstrén et al. | A study on the state of practice in security situational awareness | |
Jouini et al. | A security risk management model for cloud computing systems: infrastructure as a service | |
Flynn et al. | Cloud service provider methods for managing insider threats: Analysis phase ii, expanded analysis and recommendations | |
Masvosvere et al. | Using a standard approach to the design of next generation e-Supply Chain Digital Forensic Readiness systems | |
Catescu | Detecting insider threats using security information and event management (SIEM) | |
Thompson et al. | Hipaa security rule and cybersecurity operations | |
Motlhabi et al. | Context-aware cyber threat intelligence exchange platform | |
Patil et al. | USER BEHAVIOUR ANALYSIS | |
Irfan et al. | Information Security Framework Targeting DDOS attacks in Financial Institutes | |
Bordi et al. | The Evolution from SOC and CERT to the Cyber Defence Operation Center | |
Kizza et al. | Security Assessment, Analysis, and Assurance | |
Chowdhury | Author’s declaration of originality |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20120718 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20131030 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140204 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20140303 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140616 |
|
A911 | Transfer to examiner for re-examination before appeal (zenchi) |
Free format text: JAPANESE INTERMEDIATE CODE: A911 Effective date: 20140625 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20140908 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20141008 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5631881 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313113 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |