JP2017516181A - 周辺デバイスを安全にするための挙動分析 - Google Patents
周辺デバイスを安全にするための挙動分析 Download PDFInfo
- Publication number
- JP2017516181A JP2017516181A JP2016556260A JP2016556260A JP2017516181A JP 2017516181 A JP2017516181 A JP 2017516181A JP 2016556260 A JP2016556260 A JP 2016556260A JP 2016556260 A JP2016556260 A JP 2016556260A JP 2017516181 A JP2017516181 A JP 2017516181A
- Authority
- JP
- Japan
- Prior art keywords
- mobile computing
- computing device
- behavior
- peripheral device
- peripheral
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
- G06N20/20—Ensemble learning
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0736—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in functional embedded systems, i.e. in a data processing system designed as a combination of hardware and software dedicated to performing a certain function
- G06F11/0742—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in functional embedded systems, i.e. in a data processing system designed as a combination of hardware and software dedicated to performing a certain function in a data processing system embedded in a mobile device, e.g. mobile phones, handheld devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0751—Error or fault detection not based on redundancy
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3013—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is an embedded system, i.e. a combination of hardware and software dedicated to perform a certain function in mobile devices, printers, automotive or aircraft systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0793—Remedial or corrective actions
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Mathematical Physics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Medical Informatics (AREA)
- Computational Linguistics (AREA)
- Debugging And Monitoring (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/207,754 US10176428B2 (en) | 2014-03-13 | 2014-03-13 | Behavioral analysis for securing peripheral devices |
| US14/207,754 | 2014-03-13 | ||
| PCT/US2015/020228 WO2015138757A1 (en) | 2014-03-13 | 2015-03-12 | Behavioral analysis for securing peripheral devices |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2017516181A true JP2017516181A (ja) | 2017-06-15 |
| JP2017516181A5 JP2017516181A5 (enExample) | 2018-04-05 |
Family
ID=52774587
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2016556260A Pending JP2017516181A (ja) | 2014-03-13 | 2015-03-12 | 周辺デバイスを安全にするための挙動分析 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US10176428B2 (enExample) |
| EP (1) | EP3117361B1 (enExample) |
| JP (1) | JP2017516181A (enExample) |
| KR (1) | KR20160132394A (enExample) |
| CN (1) | CN106104555B (enExample) |
| WO (1) | WO2015138757A1 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPWO2023073910A1 (enExample) * | 2021-10-29 | 2023-05-04 |
Families Citing this family (54)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105100832A (zh) * | 2014-04-24 | 2015-11-25 | 海信集团有限公司 | 一种多媒体资源的推送方法及装置 |
| KR102277772B1 (ko) * | 2014-04-30 | 2021-07-14 | 삼성전자주식회사 | 모바일 기기에서 데이터를 통합 관리하는 장치 및 방법과, 그 모바일 기기 |
| JP6523437B2 (ja) * | 2014-09-15 | 2019-05-29 | 華為技術有限公司Huawei Technologies Co.,Ltd. | ウェアラブルデバイスの通信方法、通信システム、および関連機器 |
| US9774604B2 (en) | 2015-01-16 | 2017-09-26 | Zingbox, Ltd. | Private cloud control |
| US9680646B2 (en) * | 2015-02-05 | 2017-06-13 | Apple Inc. | Relay service for communication between controllers and accessories |
| US10212178B2 (en) | 2015-04-07 | 2019-02-19 | Zingbox, Ltd. | Packet analysis based IoT management |
| CN105243311B (zh) | 2015-10-19 | 2017-02-22 | 广东欧珀移动通信有限公司 | 一种指纹信息的安全调用方法、装置及移动终端 |
| KR102465543B1 (ko) | 2016-02-19 | 2022-11-10 | 삼성전자 주식회사 | 어플리케이션 및 컴포넌트를 제어하는 방법 및 전자장치 |
| US11080706B2 (en) * | 2016-03-07 | 2021-08-03 | International Business Machines Corporation | Blocking fraudulent transactions in an NFC device |
| US10498752B2 (en) * | 2016-03-28 | 2019-12-03 | Cisco Technology, Inc. | Adaptive capture of packet traces based on user feedback learning |
| US11477302B2 (en) * | 2016-07-06 | 2022-10-18 | Palo Alto Research Center Incorporated | Computer-implemented system and method for distributed activity detection |
| US10819719B2 (en) * | 2016-10-11 | 2020-10-27 | General Electric Company | Systems and methods for protecting a physical asset against a threat |
| US10528725B2 (en) * | 2016-11-04 | 2020-01-07 | Microsoft Technology Licensing, Llc | IoT security service |
| US10380348B2 (en) | 2016-11-21 | 2019-08-13 | ZingBox, Inc. | IoT device risk assessment |
| CN106714225A (zh) * | 2016-12-29 | 2017-05-24 | 北京酷云互动科技有限公司 | 网络设备的识别方法及其系统、智能终端 |
| JP7280935B2 (ja) * | 2017-03-21 | 2023-05-24 | 株式会社Preferred Networks | サーバ装置、学習済モデル提供プログラム、学習済モデル提供方法及び学習済モデル提供システム |
| JP6986597B2 (ja) * | 2017-03-21 | 2021-12-22 | 株式会社Preferred Networks | サーバ装置、学習済モデル提供プログラム、学習済モデル提供方法及び学習済モデル提供システム |
| WO2018173121A1 (ja) * | 2017-03-21 | 2018-09-27 | 株式会社Preferred Networks | サーバ装置、学習済モデル提供プログラム、学習済モデル提供方法及び学習済モデル提供システム |
| US20190014137A1 (en) * | 2017-07-10 | 2019-01-10 | ZingBox, Inc. | IoT DEVICE SECURITY |
| IL254573A0 (en) | 2017-09-18 | 2017-11-30 | Cyber Sepio Systems Ltd | Install a method and computer software product for securing a local network from threats posed by foreign or hostile accessories |
| US11544416B2 (en) * | 2017-08-03 | 2023-01-03 | Cyber Sepio Systems Ltd | System and method for securing a computer system from threats introduced by USB devices |
| US10983602B2 (en) * | 2017-09-05 | 2021-04-20 | Microsoft Technology Licensing, Llc | Identifying an input device |
| US11070568B2 (en) | 2017-09-27 | 2021-07-20 | Palo Alto Networks, Inc. | IoT device management visualization |
| US20190104141A1 (en) * | 2017-10-02 | 2019-04-04 | Zuk Avraham | System and Method for Providing and Facilitating an Information Security Marketplace |
| US11082296B2 (en) | 2017-10-27 | 2021-08-03 | Palo Alto Networks, Inc. | IoT device grouping and labeling |
| US11627193B2 (en) * | 2017-12-07 | 2023-04-11 | Oracle International Corporation | Method and system for tracking application activity data from remote devices and generating a corrective action data structure for the remote devices |
| RU2677361C1 (ru) * | 2018-01-17 | 2019-01-16 | Общество с ограниченной ответственностью "Траст" | Способ и система децентрализованной идентификации вредоносных программ |
| US11777965B2 (en) | 2018-06-18 | 2023-10-03 | Palo Alto Networks, Inc. | Pattern match-based detection in IoT security |
| US10536814B1 (en) * | 2018-06-26 | 2020-01-14 | Passport Labs, Inc. | Method for determining presence of a mobile computing device in a vehicle |
| US11562304B2 (en) | 2018-07-13 | 2023-01-24 | Accenture Global Solutions Limited | Preventative diagnosis prediction and solution determination of future event using internet of things and artificial intelligence |
| WO2020051161A1 (en) | 2018-09-04 | 2020-03-12 | ZingBox, Inc. | Iot application learning |
| US10740656B2 (en) * | 2018-09-19 | 2020-08-11 | Hughes Network Systems, Llc | Machine learning clustering models for determining the condition of a communication system |
| EP3867756A4 (en) | 2018-10-15 | 2022-07-06 | Palo Alto Networks, Inc. | MULTIDIMENSIONAL PERIODICITY DETECTION FOR IOT DEVICE BEHAVIOR |
| US11451571B2 (en) | 2018-12-12 | 2022-09-20 | Palo Alto Networks, Inc. | IoT device risk assessment and scoring |
| EP3895466A1 (en) * | 2018-12-13 | 2021-10-20 | Telefonaktiebolaget LM Ericsson (publ) | Autonomous parameter setting |
| US11200318B2 (en) * | 2018-12-28 | 2021-12-14 | Mcafee, Llc | Methods and apparatus to detect adversarial malware |
| US11689573B2 (en) | 2018-12-31 | 2023-06-27 | Palo Alto Networks, Inc. | Multi-layered policy management |
| US20200250580A1 (en) * | 2019-02-01 | 2020-08-06 | Jaxon, Inc. | Automated labelers for machine learning algorithms |
| KR20210026619A (ko) | 2019-08-30 | 2021-03-10 | 삼성전자주식회사 | 전자 장치 및 이의 동작 방법 |
| CN111024708B (zh) * | 2019-09-06 | 2022-02-22 | 腾讯科技(深圳)有限公司 | 产品缺陷检测数据处理方法、装置、系统和设备 |
| US11341238B2 (en) * | 2019-09-09 | 2022-05-24 | Aptiv Technologies Limited | Electronic device intrusion detection |
| US12341790B2 (en) * | 2019-12-10 | 2025-06-24 | Winkk, Inc. | Device behavior analytics |
| US12335399B2 (en) | 2019-12-10 | 2025-06-17 | Winkk, Inc. | User as a password |
| US11574045B2 (en) | 2019-12-10 | 2023-02-07 | Winkk, Inc. | Automated ID proofing using a random multitude of real-time behavioral biometric samplings |
| US11115799B1 (en) | 2020-06-01 | 2021-09-07 | Palo Alto Networks, Inc. | IoT device discovery and identification |
| US12302451B2 (en) | 2020-06-01 | 2025-05-13 | Palo Alto Networks, Inc. | IoT security policy on a firewall |
| US11843943B2 (en) | 2021-06-04 | 2023-12-12 | Winkk, Inc. | Dynamic key exchange for moving target |
| US11552975B1 (en) | 2021-10-26 | 2023-01-10 | Palo Alto Networks, Inc. | IoT device identification with packet flow behavior machine learning model |
| US12301600B2 (en) | 2022-01-18 | 2025-05-13 | Palo Alto Networks, Inc. | IoT device identification by machine learning with time series behavioral and statistical features |
| US12107742B2 (en) | 2022-08-31 | 2024-10-01 | Hughes Network Systems, Llc | Machine learning to enhance satellite terminal performance |
| US12445305B2 (en) | 2022-09-21 | 2025-10-14 | Winkk, Inc. | Authentication process |
| US12432229B2 (en) * | 2023-06-27 | 2025-09-30 | International Business Machines Corporation | Detection of malicious encryption based on machine learning |
| CN117651289B (zh) * | 2024-01-26 | 2024-04-05 | 中国人民解放军军事科学院系统工程研究院 | 一种用于无线电通信设备测试的数据处理方法及装置 |
| CN119011497B (zh) * | 2024-10-24 | 2025-01-07 | 珠海星云智联科技有限公司 | 外围器件互联扩展设备限速系统、设备以及集群 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070192855A1 (en) * | 2006-01-18 | 2007-08-16 | Microsoft Corporation | Finding phishing sites |
| WO2013173001A1 (en) * | 2012-05-14 | 2013-11-21 | Qualcomm Incorporated | Monitoring behavioral features in a mobile multiprocessor platform |
| WO2013173003A2 (en) * | 2012-05-14 | 2013-11-21 | Qualcomm Incorporated | Architecture for client-cloud behavior analyzer |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050177720A1 (en) | 2004-02-10 | 2005-08-11 | Seiichi Katano | Virus protection for multi-function peripherals |
| WO2007117567A2 (en) * | 2006-04-06 | 2007-10-18 | Smobile Systems Inc. | Malware detection system and method for limited access mobile platforms |
| DE202007019129U1 (de) | 2007-10-31 | 2010-09-30 | Concept04 Gmbh | Mobilfunkendgerät mit Filtereinrichtung und Netzwerkelement zur Konfiguration der Filtereinrichtung |
| US8595834B2 (en) | 2008-02-04 | 2013-11-26 | Samsung Electronics Co., Ltd | Detecting unauthorized use of computing devices based on behavioral patterns |
| US8484727B2 (en) * | 2008-11-26 | 2013-07-09 | Kaspersky Lab Zao | System and method for computer malware detection |
| US9100425B2 (en) | 2010-12-01 | 2015-08-04 | Cisco Technology, Inc. | Method and apparatus for detecting malicious software using generic signatures |
| US20120167218A1 (en) * | 2010-12-23 | 2012-06-28 | Rajesh Poornachandran | Signature-independent, system behavior-based malware detection |
| KR20120096983A (ko) * | 2011-02-24 | 2012-09-03 | 삼성전자주식회사 | 악성 프로그램 검출 방법 및 이를 구현하는 휴대 단말기 |
| US9213829B2 (en) | 2011-07-12 | 2015-12-15 | Hewlett-Packard Development Company, L.P. | Computing device including a port and a guest domain |
| EP2610776B1 (en) * | 2011-09-16 | 2019-08-21 | Veracode, Inc. | Automated behavioural and static analysis using an instrumented sandbox and machine learning classification for mobile security |
| US9747440B2 (en) * | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
| US8850589B2 (en) * | 2012-09-25 | 2014-09-30 | International Business Machines Corporation | Training classifiers for program analysis |
-
2014
- 2014-03-13 US US14/207,754 patent/US10176428B2/en active Active
-
2015
- 2015-03-12 CN CN201580012986.7A patent/CN106104555B/zh active Active
- 2015-03-12 KR KR1020167024893A patent/KR20160132394A/ko not_active Withdrawn
- 2015-03-12 JP JP2016556260A patent/JP2017516181A/ja active Pending
- 2015-03-12 EP EP15713096.4A patent/EP3117361B1/en active Active
- 2015-03-12 WO PCT/US2015/020228 patent/WO2015138757A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070192855A1 (en) * | 2006-01-18 | 2007-08-16 | Microsoft Corporation | Finding phishing sites |
| WO2013173001A1 (en) * | 2012-05-14 | 2013-11-21 | Qualcomm Incorporated | Monitoring behavioral features in a mobile multiprocessor platform |
| WO2013173003A2 (en) * | 2012-05-14 | 2013-11-21 | Qualcomm Incorporated | Architecture for client-cloud behavior analyzer |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPWO2023073910A1 (enExample) * | 2021-10-29 | 2023-05-04 | ||
| WO2023073910A1 (ja) * | 2021-10-29 | 2023-05-04 | 日本電気株式会社 | モデル分析装置、モデル分析方法、及び記録媒体 |
| JP7666628B2 (ja) | 2021-10-29 | 2025-04-22 | 日本電気株式会社 | モデル分析装置、モデル分析方法、及びプログラム |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106104555B (zh) | 2019-01-01 |
| EP3117361B1 (en) | 2018-01-10 |
| WO2015138757A1 (en) | 2015-09-17 |
| CN106104555A (zh) | 2016-11-09 |
| US20150262067A1 (en) | 2015-09-17 |
| EP3117361A1 (en) | 2017-01-18 |
| US10176428B2 (en) | 2019-01-08 |
| KR20160132394A (ko) | 2016-11-18 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3117361B1 (en) | Behavioral analysis for securing peripheral devices | |
| JP6227666B2 (ja) | モバイルデバイスの挙動の効率的な分類のためのデバイス固有およびデバイス状態固有の分類器モデルを動的に生成し使用する方法およびシステム | |
| US9721212B2 (en) | Efficient on-device binary analysis for auto-generated behavioral models | |
| JP6345271B2 (ja) | モバイルデバイスにおいて挙動分析動作を実行することによってアプリケーション状態を推論するための方法およびシステム | |
| JP6231688B2 (ja) | 重要なアプリケーションの選択的な保護のためにアプリケーション固有のモデルを生成する方法およびシステム | |
| JP6721596B2 (ja) | 改善されたマルウェア保護のためにモバイルデバイスとの偽ユーザ対話を検出するための方法および装置 | |
| US10104107B2 (en) | Methods and systems for behavior-specific actuation for real-time whitelisting | |
| US9491187B2 (en) | APIs for obtaining device-specific behavior classifier models from the cloud | |
| JP6235000B2 (ja) | クライアントクラウド挙動アナライザのためのアーキテクチャ | |
| US9578049B2 (en) | Methods and systems for using causal analysis for boosted decision stumps to identify and respond to non-benign behaviors | |
| JP2018508071A (ja) | 同様のデバイス内のマルウェア検出に基づくモデル保護レベルオンデバイスの決定 | |
| JP2018514848A (ja) | クラウド対クライアント挙動の差異を通じてマルウェアを特定するための方法およびシステム | |
| CN106663172A (zh) | 用于检测以移动设备的行为安全机制为目标的恶意软件和攻击的方法和系统 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160914 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20180223 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20180223 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20190507 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20191202 |