JP2022517046A - DoS攻撃に対抗する計算パズル - Google Patents
DoS攻撃に対抗する計算パズル Download PDFInfo
- Publication number
- JP2022517046A JP2022517046A JP2021562440A JP2021562440A JP2022517046A JP 2022517046 A JP2022517046 A JP 2022517046A JP 2021562440 A JP2021562440 A JP 2021562440A JP 2021562440 A JP2021562440 A JP 2021562440A JP 2022517046 A JP2022517046 A JP 2022517046A
- Authority
- JP
- Japan
- Prior art keywords
- puzzle
- node
- solution
- network
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims abstract description 125
- 230000005540 biological transmission Effects 0.000 claims description 30
- 238000004590 computer program Methods 0.000 claims description 16
- 230000008569 process Effects 0.000 claims description 15
- 238000007906 compression Methods 0.000 claims description 3
- 230000006835 compression Effects 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 49
- 230000006870 function Effects 0.000 description 20
- 238000012545 processing Methods 0.000 description 17
- 238000003860 storage Methods 0.000 description 16
- 238000007726 management method Methods 0.000 description 8
- 238000009826 distribution Methods 0.000 description 7
- 230000001360 synchronised effect Effects 0.000 description 7
- 238000004364 calculation method Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 230000011664 signaling Effects 0.000 description 4
- 238000012384 transportation and delivery Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 108700009949 PTP protocol Proteins 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000007123 defense Effects 0.000 description 2
- 238000002716 delivery method Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000011144 upstream manufacturing Methods 0.000 description 2
- 241001465754 Metazoa Species 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- QVFWZNCVPCJQOP-UHFFFAOYSA-N chloralodol Chemical compound CC(O)(C)CC(C)OC(O)C(Cl)(Cl)Cl QVFWZNCVPCJQOP-UHFFFAOYSA-N 0.000 description 1
- 230000001143 conditioned effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000009472 formulation Methods 0.000 description 1
- 238000007429 general method Methods 0.000 description 1
- 239000006249 magnetic particle Substances 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/141—Denial of service attacks against endpoints in a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/144—Detection or countermeasures against botnets
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims (15)
- コンピュータネットワークにおいてデータを送信する方法であって、前記コンピュータネットワークの第1のノードにおいて、
前記第1のノードと異なる前記コンピュータネットワークのパズルサーバノードからコンピューティングパズルのノンスを受信することと、
前記パズルサーバノードと異なる前記コンピュータネットワークの第2のノードにメッセージを送信するための前記コンピューティングパズルの少なくとも1つの解を、前記ノンスを使用して求めることと、
データを前記第2のノードに送信することであって、送信されるデータは、メッセージと、前記コンピューティングパズルの求められた解とを含むことと、
を含む、方法。 - コンピュータネットワークにおいてデータを受信する方法であって、前記コンピュータネットワークの第2のノードにおいて、
前記第2のノードと異なる前記コンピュータネットワークのパズルサーバノードからコンピューティングパズルのノンスを受信することと、
前記パズルサーバノードと異なる前記コンピュータネットワークの第1のノードからデータを受信することであって、前記受信されるデータは、メッセージと、前記コンピューティングパズルの解とを含むことと、
受信された前記コンピューティングパズルの解が有効であるか否かを受信されたノンスに基づいて判断することと、
受信された前記コンピューティングパズルの解が有効であると判断すると、受信されたメッセージに含まれる要求を処理することと、
を含む、方法。 - 受信された前記コンピューティングパズルの解が有効でないと判断すると、受信されたメッセージを廃棄することを更に含む、請求項2に記載の方法。
- 前記メッセージは前記コンピューティングパズルの解を含む、請求項1~3のいずれか1項に記載の方法。
- 前記ノンスはノンス値を含む、請求項1~4のいずれか1項に記載の方法。
- 前記ノンス値は、前記コンピューティングパズルの送信時刻に基づいている、請求項5に記載の方法。
- 新たなコンピューティングパズルが、既定の周期に従って周期的に受信される、請求項6に記載の方法。
- 前記ノンス値は、時刻同期メッセージに含まれるタイムスタンプ情報に基づいている、請求項6又は7に記載の方法。
- 前記コンピュータネットワークにおいて時刻同期情報に基づいて取得される時刻値が、受信された前記ノンスとともに、前記コンピューティングパズルのパラメータとして使用される、請求項1~8のいずれか1項に記載の方法。
- 受信された前記コンピューティングパズルの解が前記コンピュータネットワークのいずれかのノードから既に受信されたものであるか否かを判断することを更に含む、請求項2~9のいずれか1項に記載の方法。
- データストリーム識別子が、受信された前記ノンスとともに、前記コンピューティングパズルのパラメータとして使用される、請求項1~10のいずれか1項に記載の方法。
- 請求項1~11のいずれか1項に記載の方法を実行するように構成されるコンピュータネットワークにおけるネットワークノードのプロセッサ。
- プロセッサと、前記プロセッサに作動的に結合されたメモリと、コンピュータネットワーク内で通信するネットワークインターフェースとを備える装置であって、請求項1~11のいずれか1項に記載の方法を実行するように構成される、装置。
- コンピュータ可読媒体内に有形に具現されるコンピュータプログラムコードを含むコンピュータプログラムであって、前記コンピュータプログラムコードは、コンピュータシステムに与えられ、実行されると、前記コンピュータシステムに、請求項1~11のいずれか1項に記載の方法を実行させる命令を含む、コンピュータプログラム。
- 請求項14に記載のコンピュータプログラムを圧縮又は符号化を通じて表すデータセット。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP19305427.7A EP3716570B1 (en) | 2019-03-29 | 2019-03-29 | Computational puzzles against dos attacks |
EP19305427.7 | 2019-03-29 | ||
PCT/JP2020/004445 WO2020202780A1 (en) | 2019-03-29 | 2020-01-30 | Computational puzzles against dos attacks |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2022517046A true JP2022517046A (ja) | 2022-03-03 |
JP7427689B2 JP7427689B2 (ja) | 2024-02-05 |
Family
ID=66951865
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2021562440A Active JP7427689B2 (ja) | 2019-03-29 | 2020-01-30 | DoS攻撃に対抗する計算パズル |
Country Status (7)
Country | Link |
---|---|
US (1) | US11785043B2 (ja) |
EP (1) | EP3716570B1 (ja) |
JP (1) | JP7427689B2 (ja) |
KR (1) | KR102581039B1 (ja) |
CN (1) | CN113632435B (ja) |
TW (1) | TWI770483B (ja) |
WO (1) | WO2020202780A1 (ja) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3716570B1 (en) * | 2019-03-29 | 2022-07-27 | Mitsubishi Electric R&D Centre Europe B.V. | Computational puzzles against dos attacks |
US11962703B2 (en) * | 2022-02-08 | 2024-04-16 | International Business Machines Corporation | Cooperative session orchestration |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100031315A1 (en) * | 2003-08-26 | 2010-02-04 | Wu-Chang Feng | Systems and methods for protecting against denial of service attacks |
US20140365775A1 (en) * | 2013-03-15 | 2014-12-11 | Robert Bosch Gmbh | System and Method for Mitigation of Denial of Service Attacks in Networked Computing Systems |
JP2018011370A (ja) * | 2016-07-11 | 2018-01-18 | 株式会社日立製作所 | 電力系統監視システム、方法および装置 |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6944765B1 (en) * | 1999-12-21 | 2005-09-13 | Qualcomm, Inc. | Method of authentication anonymous users while reducing potential for “middleman” fraud |
KR100828372B1 (ko) * | 2005-12-29 | 2008-05-08 | 삼성전자주식회사 | 서비스 거부 공격으로부터 서버를 보호하는 방법 및 장치 |
US8793497B2 (en) | 2008-05-09 | 2014-07-29 | Qualcomm Incorporated | Puzzle-based authentication between a token and verifiers |
US8547848B2 (en) * | 2008-07-09 | 2013-10-01 | Telefonaktiebolaget L M Ericsson (Publ) | Traffic control within a network architecture providing many-to-one transmission with denial-of-service protection |
CN107534997B (zh) * | 2015-04-16 | 2021-08-03 | 瑞典爱立信有限公司 | 网络节点中的向设备提供对网络的访问的方法 |
CN107534642B (zh) * | 2015-04-16 | 2020-11-10 | 瑞典爱立信有限公司 | 用于对用在客户端和服务器之间的通信中的计算难题进行建立的方法和设备 |
US10462138B2 (en) * | 2016-02-19 | 2019-10-29 | Google Llc | Application programming interface access controls |
KR102223563B1 (ko) * | 2016-09-23 | 2021-03-04 | 애플 인크. | 네트워크 타이밍 동기화 |
CN108270821A (zh) * | 2016-12-30 | 2018-07-10 | 深圳瀚德创客金融投资有限公司 | 用于区块链网络中的区块生成方法和网络节点 |
CN106850603B (zh) * | 2017-01-19 | 2020-01-07 | 北京梆梆安全科技有限公司 | 一种白盒密码双向身份认证方法、终端、服务端及系统 |
US11270276B1 (en) * | 2017-01-25 | 2022-03-08 | State Farm Mutual Automobile Insurance Company | Systems and methods for blockchain-based payments |
US10861015B1 (en) * | 2017-01-25 | 2020-12-08 | State Farm Mutual Automobile Insurance Company | Blockchain based account funding and distribution |
EP3425845A1 (de) * | 2017-07-05 | 2019-01-09 | Siemens Aktiengesellschaft | Verfahren und vorrichtung zum erzeugen eines kryptographischen zeitstempels für ein digitales dokument auf mehrheitsbasis |
US11171791B2 (en) * | 2019-01-15 | 2021-11-09 | 0Chain, LLC | Systems and methods of aggregate signing of digital signatures on multiple messages simultaneously using key splitting |
US11979490B2 (en) * | 2017-10-24 | 2024-05-07 | 0Chain Corp. | Non-fungible token blockchain processing |
CN107888615B (zh) * | 2017-12-01 | 2021-07-02 | 郑州云海信息技术有限公司 | 一种节点注册的安全认证方法 |
US20190197130A1 (en) * | 2017-12-21 | 2019-06-27 | Microsoft Technology Licensing, Llc | Ensuring consistency in distributed incremental content publishing |
KR102610127B1 (ko) * | 2018-04-26 | 2023-12-04 | 주식회사 넥슨코리아 | 전자 지갑을 이용한 암호화폐의 거래 서비스를 제공하는 장치 및 방법 |
CN108876332B (zh) * | 2018-06-04 | 2020-09-22 | 清华大学 | 一种基于生物特征标记认证的区块链安全交易方法及装置 |
US11153070B2 (en) * | 2018-09-11 | 2021-10-19 | International Business Machines Corporation | Access to data broadcast in encrypted form based on blockchain |
GB2585816A (en) * | 2018-12-12 | 2021-01-27 | Univ York | Proof-of-work for blockchain applications |
WO2020120672A1 (en) * | 2018-12-14 | 2020-06-18 | Sony Corporation | Communication network node, methods, and a mobile terminal |
US20200210584A1 (en) * | 2018-12-31 | 2020-07-02 | Shape Security, Inc. | Deterministic Reproduction of Client/Server Computer State or Output Sent to One or More Client Computers |
EP3683713B1 (de) * | 2019-01-16 | 2020-12-30 | Siemens Aktiengesellschaft | Verfahren, vorrichtungen und system zum sicherheitsgeschützten bereitstellen von datensätzen |
US20220103369A1 (en) * | 2019-02-05 | 2022-03-31 | Ethopass, Llc | Security system and related methods |
US20220148111A1 (en) * | 2019-03-04 | 2022-05-12 | nChain Holdings Limited | Method of using a blockchain |
EP3713189A1 (de) * | 2019-03-22 | 2020-09-23 | Siemens Aktiengesellschaft | Intrusionserkennung bei computersystemen |
EP3716570B1 (en) * | 2019-03-29 | 2022-07-27 | Mitsubishi Electric R&D Centre Europe B.V. | Computational puzzles against dos attacks |
-
2019
- 2019-03-29 EP EP19305427.7A patent/EP3716570B1/en active Active
-
2020
- 2020-01-30 JP JP2021562440A patent/JP7427689B2/ja active Active
- 2020-01-30 US US17/427,724 patent/US11785043B2/en active Active
- 2020-01-30 WO PCT/JP2020/004445 patent/WO2020202780A1/en active Application Filing
- 2020-01-30 CN CN202080024045.6A patent/CN113632435B/zh active Active
- 2020-01-30 KR KR1020217029537A patent/KR102581039B1/ko active IP Right Grant
- 2020-03-23 TW TW109109604A patent/TWI770483B/zh active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100031315A1 (en) * | 2003-08-26 | 2010-02-04 | Wu-Chang Feng | Systems and methods for protecting against denial of service attacks |
US20140365775A1 (en) * | 2013-03-15 | 2014-12-11 | Robert Bosch Gmbh | System and Method for Mitigation of Denial of Service Attacks in Networked Computing Systems |
JP2018011370A (ja) * | 2016-07-11 | 2018-01-18 | 株式会社日立製作所 | 電力系統監視システム、方法および装置 |
Non-Patent Citations (2)
Title |
---|
BRENT WATERS ET AL.: "New Client Puzzle Outsourcing Techniques for DoS Resistance", CCS'04: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, JPN7022003261, 25 October 2004 (2004-10-25), pages 246 - 256, XP058347824, ISSN: 0004824536, DOI: 10.1145/1030083.1030117 * |
渡辺 龍 ほか: "セキュアなアドホックネットワーク構築のためのプライバシ保護を考慮した鍵管理手法の実装と評価", コンピュータセキュリティシンポジウム2007 論文集, vol. 2007, no. 10, JPN6022028783, 31 October 2007 (2007-10-31), JP, pages 661 - 666, ISSN: 0004824535 * |
Also Published As
Publication number | Publication date |
---|---|
US20220116418A1 (en) | 2022-04-14 |
CN113632435B (zh) | 2023-04-18 |
EP3716570A1 (en) | 2020-09-30 |
KR20210127971A (ko) | 2021-10-25 |
KR102581039B1 (ko) | 2023-09-20 |
JP7427689B2 (ja) | 2024-02-05 |
TW202037125A (zh) | 2020-10-01 |
US11785043B2 (en) | 2023-10-10 |
EP3716570B1 (en) | 2022-07-27 |
CN113632435A (zh) | 2021-11-09 |
TWI770483B (zh) | 2022-07-11 |
WO2020202780A1 (en) | 2020-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | Security vulnerabilities in LoRaWAN | |
JP6858749B2 (ja) | 負荷平衡システムにおいて接続を確立するデバイス及び方法 | |
US8745723B2 (en) | System and method for providing unified transport and security protocols | |
Law et al. | Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks | |
JP2007089147A (ja) | 認証方法 | |
US7139679B1 (en) | Method and apparatus for cryptographic protection from denial of service attacks | |
EP3442195B1 (en) | Reliable and secure parsing of packets | |
Zhang et al. | Shortmac: efficient data-plane fault localization. | |
JP7427689B2 (ja) | DoS攻撃に対抗する計算パズル | |
US9667650B2 (en) | Anti-replay checking with multiple sequence number spaces | |
Hassan et al. | The improvement of the protection for 6LoWPAN in IoT through non-causal hash function scheme | |
US11863535B2 (en) | Methods, devices, and systems for secure communications over a network | |
EP3766223B1 (en) | Defeating man-in-the-middle attacks in one leg of 1+1 redundant network paths | |
Zhang et al. | Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-based Industrial IoT | |
Groza et al. | On the use of one-way chain based authentication protocols in secure control systems | |
KR20210069494A (ko) | IoT 디바이스를 인증하며 IoT 디바이스의 무결성을 검증하는 방법 및 이를 이용한 컨트롤 디바이스 | |
Bradbury et al. | Trust assessment in 32 KiB of RAM: Multi-application trust-based task offloading for resource-constrained IoT nodes | |
CN114826602B (zh) | 安全感知的时间敏感网络调度方法、系统、装置及介质 | |
CN114567484B (zh) | 一种报文处理方法、装置、电子设备及存储介质 | |
Guštin | CAN Bus Security protocol specification | |
Huang | Loft: Low-overhead freshness transmission in sensor networks | |
Ashraf et al. | Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks | |
Ansa et al. | Combating Intra-Region DoS Attacks in Delay Tolerant Networks using Energy-Efficient Mechanisms | |
Atiiq | Adaptive Counteraction Against Denial of Service Attack | |
Kumar et al. | Network System Protection Against Internet Protocol Spoofing Based Distributed Denial Of Services Attacks During Socket Based Packet Transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20210705 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20210705 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20220617 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20220712 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20220912 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20221213 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20230309 |
|
C60 | Trial request (containing other claim documents, opposition documents) |
Free format text: JAPANESE INTERMEDIATE CODE: C60 Effective date: 20230309 |
|
A911 | Transfer to examiner for re-examination before appeal (zenchi) |
Free format text: JAPANESE INTERMEDIATE CODE: A911 Effective date: 20230322 |
|
C21 | Notice of transfer of a case for reconsideration by examiners before appeal proceedings |
Free format text: JAPANESE INTERMEDIATE CODE: C21 Effective date: 20230328 |
|
A912 | Re-examination (zenchi) completed and case transferred to appeal board |
Free format text: JAPANESE INTERMEDIATE CODE: A912 Effective date: 20230519 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20231122 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20240124 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 7427689 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |