JP4912879B2 - プロセッサの保護された資源へのアクセスに対するセキュリティ保護方法 - Google Patents
プロセッサの保護された資源へのアクセスに対するセキュリティ保護方法 Download PDFInfo
- Publication number
- JP4912879B2 JP4912879B2 JP2006520365A JP2006520365A JP4912879B2 JP 4912879 B2 JP4912879 B2 JP 4912879B2 JP 2006520365 A JP2006520365 A JP 2006520365A JP 2006520365 A JP2006520365 A JP 2006520365A JP 4912879 B2 JP4912879 B2 JP 4912879B2
- Authority
- JP
- Japan
- Prior art keywords
- encrypted
- memory
- firmware
- manufacturer
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims description 83
- 238000012545 processing Methods 0.000 claims description 34
- 238000004519 manufacturing process Methods 0.000 claims description 6
- 230000007334 memory performance Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 description 49
- 238000012360 testing method Methods 0.000 description 17
- 230000006870 function Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 13
- 230000008859 change Effects 0.000 description 12
- 238000012986 modification Methods 0.000 description 6
- 230000004048 modification Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 238000013461 design Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000013478 data encryption standard Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 239000000725 suspension Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Description
本出願は、2002年7月30日出願の米国仮出願第60/399,592号、バラード他発明による“ファームウェアのランタイム認証”の同時継続の出願日の利点を主張するものである。
なし。
本発明とその利点をより完全に理解できるように、添付図と併せて以下の記述を参照する。
Claims (13)
- 計算機装置の資源へのアクセスのセキュリティを確保する方法であって、
チップ上に発生されるランダム番号の値が誰にも知られぬように、計算機装置の製造の間に前記ランダム番号を発生するステップと、
計算機装置内の永久メモリ内に前記ランダム番号を格納するステップと、
暗号化されたアクセスコードを発生するために前記ランダム番号を用いるステップと、
計算機装置内の不揮発性メモリ内に前記暗号化されたアクセスコードを格納するステップと、
前記資源にアクセスするために、パスワードを計算機装置内に受取るステップと、
暗号化されたパスワードを生成するために、前記パスワードを計算機装置内に暗号化するステップと、
前記暗号化されたパスワードと前記暗号化されたアクセスコードとを計算機装置内で比較するステップと、
前記暗号化されたアクセスコードが前記暗号化されたパスワードに一致した場合に、計算機装置内の前記資源へのアクセスを許可するステップと、
を含む、方法。 - 請求項1記載の方法において、暗号化されたアクセスコードは、外部から変更が不可能なメモリに格納される、方法。
- 請求項1記載の方法において、アクセスを許可するステップは、前記暗号化されたアクセスコードが前記暗号化されたパスワードと一致した場合に、計算機装置内の性能設定へのアクセスを許可するステップを含む、方法。
- 請求項3記載の方法において、前記性能設定が、メモリ性能設定、バス速度、処理速度の少なくとも1つを含む、方法。
- ランダム番号の値が誰にも知られないように、計算機装置の製造の間にチップ上に発生される前記ランダム番号を格納する永久メモリと、
前記永久メモリに結合される処理回路と、
前記処理回路に結合され、前記ランダム番号を用いて発生された暗号化されたアクセスコードを格納するメモリと、
前記処理回路に結合され、資源にアクセスするためのパスワードを受取る入力回路と、
を含む計算機装置であって、
処理回路は、
暗号化されたパスワードを生成するために前記パスワードを暗号化し、
前記暗号化されたパスワードと前記暗号化されたアクセスコードとを比較し、
前記暗号化されたアクセスコードが前記暗号化されたパスワードと一致した場合に、前記資源へのアクセスを許可する、
計算機装置。 - 請求項5記載の計算機装置において、前記暗号化されたアクセスコードが、前記暗号化されたパスワードと一致した場合に、前記処理回路が、計算機装置内の性能設定へのアクセスを許可する、計算機装置。
- 請求項6記載の計算機装置において、前記性能設定が、メモリ性能設定、バス速度、処理速度の少なくとも1つ含む、計算機装置。
- 請求項1記載の方法において、前記メモリがメモリアレイを含み、前記メモリアレイにデータが書き込まれた後、前記データが上書きされないように、特定のメモリ位置への更なる書き込みが禁止される、方法。
- 請求項8記載の方法において、前記メモリアレイの幾つかの部分は、外部からアクセス不能であり、修正不能である、方法。
- 請求項8記載の方法において、前記メモリアレイに暗号化鍵が格納される、方法。
- 請求項5記載の計算機装置において、前記メモリがメモリアレイを含み、前記メモリアレイにデータが書き込まれた後、前記データが上書きされないように、特定のメモリ位置への更なる書き込みが禁止される、計算機装置。
- 請求項11記載の計算機装置において、前記メモリアレイの幾つかの部分は、外部からアクセス不能であり、修正不能である、計算機装置。
- 請求項12記載の計算機装置において、前記メモリアレイに暗号化鍵が格納される、計算機装置。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/618,861 | 2003-07-14 | ||
US10/618,861 US20040025027A1 (en) | 2002-07-30 | 2003-07-14 | Secure protection method for access to protected resources in a processor |
PCT/US2004/022890 WO2005019974A2 (en) | 2003-07-14 | 2004-07-14 | Secure protection method for access to protected resources in a processor |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2007535015A JP2007535015A (ja) | 2007-11-29 |
JP4912879B2 true JP4912879B2 (ja) | 2012-04-11 |
Family
ID=34216275
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2006520365A Expired - Fee Related JP4912879B2 (ja) | 2003-07-14 | 2004-07-14 | プロセッサの保護された資源へのアクセスに対するセキュリティ保護方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20040025027A1 (ja) |
EP (1) | EP1668472A4 (ja) |
JP (1) | JP4912879B2 (ja) |
KR (1) | KR20090109589A (ja) |
WO (1) | WO2005019974A2 (ja) |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7822995B2 (en) * | 2005-03-03 | 2010-10-26 | Seagate Technology Llc | Apparatus and method for protecting diagnostic ports of secure devices |
US7907531B2 (en) * | 2005-06-13 | 2011-03-15 | Qualcomm Incorporated | Apparatus and methods for managing firmware verification on a wireless device |
US7743409B2 (en) | 2005-07-08 | 2010-06-22 | Sandisk Corporation | Methods used in a mass storage device with automated credentials loading |
US7363564B2 (en) * | 2005-07-15 | 2008-04-22 | Seagate Technology Llc | Method and apparatus for securing communications ports in an electronic device |
US7934049B2 (en) * | 2005-09-14 | 2011-04-26 | Sandisk Corporation | Methods used in a secure yet flexible system architecture for secure devices with flash mass storage memory |
JP4891324B2 (ja) * | 2005-09-14 | 2012-03-07 | サンディスク コーポレイション | 大容量フラッシュメモリを備える高信頼性デバイスのための、セキュアでありながらフレキシブルなシステムアーキテクチャ |
US8966284B2 (en) * | 2005-09-14 | 2015-02-24 | Sandisk Technologies Inc. | Hardware driver integrity check of memory card controller firmware |
KR100973733B1 (ko) * | 2005-09-14 | 2010-08-04 | 쌘디스크 코포레이션 | 메모리 카드 제어기 펌웨어의 하드웨어 드라이버 무결성체크 |
US7814538B2 (en) | 2005-12-13 | 2010-10-12 | Microsoft Corporation | Two-way authentication using a combined code |
US7844997B2 (en) * | 2006-01-12 | 2010-11-30 | Honeywell International Inc. | Securing standard test access port with an independent security key interface |
US8099629B2 (en) * | 2006-07-14 | 2012-01-17 | Marvell World Trade Ltd. | System-on-a-chip (SoC) test interface security |
US7971241B2 (en) * | 2006-12-22 | 2011-06-28 | Hitachi Global Storage Technologies Netherlands, B.V. | Techniques for providing verifiable security in storage devices |
US8176473B2 (en) * | 2007-05-14 | 2012-05-08 | Microsoft Corporation | Transformations for software obfuscation and individualization |
KR101393307B1 (ko) * | 2007-07-13 | 2014-05-12 | 삼성전자주식회사 | 보안 부팅 방법 및 그 방법을 사용하는 반도체 메모리시스템 |
US20090024784A1 (en) * | 2007-07-20 | 2009-01-22 | Wang Liang-Yun | Method for writing data into storage on chip and system thereof |
US8315394B2 (en) * | 2007-10-24 | 2012-11-20 | Hitachi Global Storage Technologies Netherlands, B.V. | Techniques for encrypting data on storage devices using an intermediate key |
US8612729B2 (en) * | 2007-12-17 | 2013-12-17 | Advanced Micro Devices, Inc. | Known good code for on-chip device management |
US8844023B2 (en) * | 2008-12-02 | 2014-09-23 | Micron Technology, Inc. | Password protected built-in test mode for memories |
US8484451B2 (en) | 2010-03-11 | 2013-07-09 | St-Ericsson Sa | Method and apparatus for software boot revocation |
EP2503459B1 (en) * | 2011-03-23 | 2021-01-20 | Volvo Car Corporation | Complete and compatible function |
EP2700256B1 (en) * | 2011-05-20 | 2017-11-29 | BlackBerry Limited | Verifying passwords on a mobile device |
US9684898B2 (en) | 2012-09-25 | 2017-06-20 | Google Inc. | Securing personal identification numbers for mobile payment applications by combining with random components |
US9292713B2 (en) * | 2013-03-13 | 2016-03-22 | Intel Corporation | Tiered access to on chip features |
US10657262B1 (en) * | 2014-09-28 | 2020-05-19 | Red Balloon Security, Inc. | Method and apparatus for securing embedded device firmware |
US9811356B2 (en) * | 2015-01-30 | 2017-11-07 | Appdynamics Llc | Automated software configuration management |
US9674162B1 (en) * | 2015-03-13 | 2017-06-06 | Amazon Technologies, Inc. | Updating encrypted cryptographic key pair |
US9893885B1 (en) | 2015-03-13 | 2018-02-13 | Amazon Technologies, Inc. | Updating cryptographic key pair |
US9639700B2 (en) | 2015-03-20 | 2017-05-02 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Unified extensible firmware interface (UEFI) database for secure bootstrap of a computer |
US10003467B1 (en) * | 2015-03-30 | 2018-06-19 | Amazon Technologies, Inc. | Controlling digital certificate use |
US9479340B1 (en) * | 2015-03-30 | 2016-10-25 | Amazon Technologies, Inc. | Controlling use of encryption keys |
US10158955B2 (en) * | 2015-07-02 | 2018-12-18 | Gn Hearing A/S | Rights management in a hearing device |
EP3443432A4 (en) * | 2016-04-12 | 2020-04-01 | Guardknox Cyber Technologies Ltd. | SPECIALLY PROGRAMMED COMPUTER SYSTEMS WITH ASSOCIATED DEVICES CONFIGURED TO IMPLEMENT SECURE LOCKINGS AND METHODS OF USING THEM |
TWM575145U (zh) * | 2018-09-04 | 2019-03-01 | 威盛電子股份有限公司 | 保全儲存資料的系統 |
US11657138B2 (en) | 2019-02-28 | 2023-05-23 | Hewlett-Packard Development Company, L.P. | Signed change requests to remotely configure settings |
US20210334380A1 (en) * | 2020-04-24 | 2021-10-28 | Vmware, Inc. | Trusted firmware verification |
US20230288477A1 (en) * | 2022-03-14 | 2023-09-14 | Duke University | Dynamic scan obfuscation for integrated circuit protections |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0222752A (ja) * | 1988-07-11 | 1990-01-25 | Mitsubishi Electric Corp | ビデオインターフェイス装置 |
JPH02216595A (ja) * | 1989-02-17 | 1990-08-29 | Mitsubishi Electric Corp | Icカード |
JPH09293024A (ja) * | 1996-04-26 | 1997-11-11 | Yamaha Corp | 半導体集積回路 |
JP2001005729A (ja) * | 1999-06-24 | 2001-01-12 | Fujitsu Ltd | 不正読み出しを防止した不揮発性メモリ |
JP2001023300A (ja) * | 1999-07-09 | 2001-01-26 | Fujitsu Ltd | 記憶装置、記録媒体のアクセス制御装置および記録媒体のアクセス制御方法 |
JP2002217892A (ja) * | 2001-01-24 | 2002-08-02 | Toyo Commun Equip Co Ltd | 鍵データ入力方式 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1993020538A1 (en) * | 1992-03-30 | 1993-10-14 | Telstra Corporation Limited | A cryptographic communications method and system |
US5421006A (en) * | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software |
US5768373A (en) * | 1996-05-06 | 1998-06-16 | Symantec Corporation | Method for providing a secure non-reusable one-time password |
US5944821A (en) * | 1996-07-11 | 1999-08-31 | Compaq Computer Corporation | Secure software registration and integrity assessment in a computer system |
US6268788B1 (en) * | 1996-11-07 | 2001-07-31 | Litronic Inc. | Apparatus and method for providing an authentication system based on biometrics |
US5887131A (en) * | 1996-12-31 | 1999-03-23 | Compaq Computer Corporation | Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password |
US6314521B1 (en) * | 1997-11-26 | 2001-11-06 | International Business Machines Corporation | Secure configuration of a digital certificate for a printer or other network device |
US6553548B1 (en) * | 1999-12-14 | 2003-04-22 | International Business Machines Corporation | System and method for recovering from design errors in integrated circuits |
US6477043B2 (en) * | 2000-12-21 | 2002-11-05 | Gateway, Inc. | Data and power storage device |
AU2002345577A1 (en) * | 2001-06-07 | 2002-12-23 | Contentguard Holdings, Inc. | Protected content distribution system |
-
2003
- 2003-07-14 US US10/618,861 patent/US20040025027A1/en not_active Abandoned
-
2004
- 2004-07-14 WO PCT/US2004/022890 patent/WO2005019974A2/en active Application Filing
- 2004-07-14 JP JP2006520365A patent/JP4912879B2/ja not_active Expired - Fee Related
- 2004-07-14 EP EP04801898A patent/EP1668472A4/en not_active Withdrawn
- 2004-07-14 KR KR1020097019006A patent/KR20090109589A/ko active Search and Examination
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0222752A (ja) * | 1988-07-11 | 1990-01-25 | Mitsubishi Electric Corp | ビデオインターフェイス装置 |
JPH02216595A (ja) * | 1989-02-17 | 1990-08-29 | Mitsubishi Electric Corp | Icカード |
JPH09293024A (ja) * | 1996-04-26 | 1997-11-11 | Yamaha Corp | 半導体集積回路 |
JP2001005729A (ja) * | 1999-06-24 | 2001-01-12 | Fujitsu Ltd | 不正読み出しを防止した不揮発性メモリ |
JP2001023300A (ja) * | 1999-07-09 | 2001-01-26 | Fujitsu Ltd | 記憶装置、記録媒体のアクセス制御装置および記録媒体のアクセス制御方法 |
JP2002217892A (ja) * | 2001-01-24 | 2002-08-02 | Toyo Commun Equip Co Ltd | 鍵データ入力方式 |
Also Published As
Publication number | Publication date |
---|---|
EP1668472A2 (en) | 2006-06-14 |
KR20090109589A (ko) | 2009-10-20 |
JP2007535015A (ja) | 2007-11-29 |
US20040025027A1 (en) | 2004-02-05 |
WO2005019974A2 (en) | 2005-03-03 |
WO2005019974A3 (en) | 2006-11-16 |
EP1668472A4 (en) | 2007-09-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4912879B2 (ja) | プロセッサの保護された資源へのアクセスに対するセキュリティ保護方法 | |
US7539868B2 (en) | Run-time firmware authentication | |
US9281949B2 (en) | Device using secure processing zone to establish trust for digital rights management | |
US7886355B2 (en) | Subsidy lock enabled handset device with asymmetric verification unlocking control and method thereof | |
KR101795457B1 (ko) | 보안 기능이 강화된 디바이스의 초기화 방법 및 디바이스의 펌웨어 업데이트 방법 | |
CA2450844C (en) | A method for securing an electronic device, a security system and an electronic device | |
RU2356169C2 (ru) | Привязка программного обеспечения к аппаратным средствам с использованием криптографии | |
KR102239711B1 (ko) | 보안 파라미터들에 기초한 작업 보안 키의 생성 | |
US9317708B2 (en) | Hardware trust anchors in SP-enabled processors | |
US8281115B2 (en) | Security method using self-generated encryption key, and security apparatus using the same | |
US20150186679A1 (en) | Secure processor system without need for manufacturer and user to know encryption information of each other | |
US20080003980A1 (en) | Subsidy-controlled handset device via a sim card using asymmetric verification and method thereof | |
JP2007512787A (ja) | トラステッド・モバイル・プラットフォーム・アーキテクチャ | |
WO2010089005A1 (en) | Cryptographic protection of usage restrictions in electronic devices | |
KR20070084326A (ko) | 이동 단말기에서의 구성 파라미터 갱신 | |
JP2004508619A (ja) | トラステッド・デバイス | |
JP2004280284A (ja) | 制御プロセッサ、電子機器及び電子機器のプログラム起動方法、並びに電子機器のシステムモジュール更新方法 | |
KR20070059891A (ko) | 어플리케이션 인증 보안 시스템 및 그 인증 보안 방법 | |
US8667278B2 (en) | Information processing apparatus and data transmission method of information processing apparatus | |
CN111651740A (zh) | 一种面向分布式智能嵌入式系统的可信平台共享系统 | |
KR20070017455A (ko) | 프로세서 내에서의 보호된 리소스들로의 억세스에 대한안전한 보호 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20100226 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20100326 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20100628 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20100705 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20100726 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20100802 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20100825 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20101026 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20110126 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20110202 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20110225 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20110304 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20110323 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20110330 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20110426 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20110610 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20110912 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20110920 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20111011 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20111018 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20111110 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20111117 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20111212 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20120113 |
|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20120118 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 4912879 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20150127 Year of fee payment: 3 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |