JP4912879B2 - プロセッサの保護された資源へのアクセスに対するセキュリティ保護方法 - Google Patents
プロセッサの保護された資源へのアクセスに対するセキュリティ保護方法 Download PDFInfo
- Publication number
- JP4912879B2 JP4912879B2 JP2006520365A JP2006520365A JP4912879B2 JP 4912879 B2 JP4912879 B2 JP 4912879B2 JP 2006520365 A JP2006520365 A JP 2006520365A JP 2006520365 A JP2006520365 A JP 2006520365A JP 4912879 B2 JP4912879 B2 JP 4912879B2
- Authority
- JP
- Japan
- Prior art keywords
- encrypted
- memory
- firmware
- manufacturer
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1011—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Description
本出願は、2002年7月30日出願の米国仮出願第60/399,592号、バラード他発明による“ファームウェアのランタイム認証”の同時継続の出願日の利点を主張するものである。
なし。
本発明とその利点をより完全に理解できるように、添付図と併せて以下の記述を参照する。
Claims (13)
- 計算機装置の資源へのアクセスのセキュリティを確保する方法であって、
チップ上に発生されるランダム番号の値が誰にも知られぬように、計算機装置の製造の間に前記ランダム番号を発生するステップと、
計算機装置内の永久メモリ内に前記ランダム番号を格納するステップと、
暗号化されたアクセスコードを発生するために前記ランダム番号を用いるステップと、
計算機装置内の不揮発性メモリ内に前記暗号化されたアクセスコードを格納するステップと、
前記資源にアクセスするために、パスワードを計算機装置内に受取るステップと、
暗号化されたパスワードを生成するために、前記パスワードを計算機装置内に暗号化するステップと、
前記暗号化されたパスワードと前記暗号化されたアクセスコードとを計算機装置内で比較するステップと、
前記暗号化されたアクセスコードが前記暗号化されたパスワードに一致した場合に、計算機装置内の前記資源へのアクセスを許可するステップと、
を含む、方法。 - 請求項1記載の方法において、暗号化されたアクセスコードは、外部から変更が不可能なメモリに格納される、方法。
- 請求項1記載の方法において、アクセスを許可するステップは、前記暗号化されたアクセスコードが前記暗号化されたパスワードと一致した場合に、計算機装置内の性能設定へのアクセスを許可するステップを含む、方法。
- 請求項3記載の方法において、前記性能設定が、メモリ性能設定、バス速度、処理速度の少なくとも1つを含む、方法。
- ランダム番号の値が誰にも知られないように、計算機装置の製造の間にチップ上に発生される前記ランダム番号を格納する永久メモリと、
前記永久メモリに結合される処理回路と、
前記処理回路に結合され、前記ランダム番号を用いて発生された暗号化されたアクセスコードを格納するメモリと、
前記処理回路に結合され、資源にアクセスするためのパスワードを受取る入力回路と、
を含む計算機装置であって、
処理回路は、
暗号化されたパスワードを生成するために前記パスワードを暗号化し、
前記暗号化されたパスワードと前記暗号化されたアクセスコードとを比較し、
前記暗号化されたアクセスコードが前記暗号化されたパスワードと一致した場合に、前記資源へのアクセスを許可する、
計算機装置。 - 請求項5記載の計算機装置において、前記暗号化されたアクセスコードが、前記暗号化されたパスワードと一致した場合に、前記処理回路が、計算機装置内の性能設定へのアクセスを許可する、計算機装置。
- 請求項6記載の計算機装置において、前記性能設定が、メモリ性能設定、バス速度、処理速度の少なくとも1つ含む、計算機装置。
- 請求項1記載の方法において、前記メモリがメモリアレイを含み、前記メモリアレイにデータが書き込まれた後、前記データが上書きされないように、特定のメモリ位置への更なる書き込みが禁止される、方法。
- 請求項8記載の方法において、前記メモリアレイの幾つかの部分は、外部からアクセス不能であり、修正不能である、方法。
- 請求項8記載の方法において、前記メモリアレイに暗号化鍵が格納される、方法。
- 請求項5記載の計算機装置において、前記メモリがメモリアレイを含み、前記メモリアレイにデータが書き込まれた後、前記データが上書きされないように、特定のメモリ位置への更なる書き込みが禁止される、計算機装置。
- 請求項11記載の計算機装置において、前記メモリアレイの幾つかの部分は、外部からアクセス不能であり、修正不能である、計算機装置。
- 請求項12記載の計算機装置において、前記メモリアレイに暗号化鍵が格納される、計算機装置。
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/618,861 US20040025027A1 (en) | 2002-07-30 | 2003-07-14 | Secure protection method for access to protected resources in a processor |
| US10/618,861 | 2003-07-14 | ||
| PCT/US2004/022890 WO2005019974A2 (en) | 2003-07-14 | 2004-07-14 | Secure protection method for access to protected resources in a processor |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2007535015A JP2007535015A (ja) | 2007-11-29 |
| JP4912879B2 true JP4912879B2 (ja) | 2012-04-11 |
Family
ID=34216275
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2006520365A Expired - Fee Related JP4912879B2 (ja) | 2003-07-14 | 2004-07-14 | プロセッサの保護された資源へのアクセスに対するセキュリティ保護方法 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US20040025027A1 (ja) |
| EP (1) | EP1668472A4 (ja) |
| JP (1) | JP4912879B2 (ja) |
| KR (1) | KR20090109589A (ja) |
| WO (1) | WO2005019974A2 (ja) |
Families Citing this family (36)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7822995B2 (en) * | 2005-03-03 | 2010-10-26 | Seagate Technology Llc | Apparatus and method for protecting diagnostic ports of secure devices |
| US7907531B2 (en) * | 2005-06-13 | 2011-03-15 | Qualcomm Incorporated | Apparatus and methods for managing firmware verification on a wireless device |
| US7743409B2 (en) | 2005-07-08 | 2010-06-22 | Sandisk Corporation | Methods used in a mass storage device with automated credentials loading |
| US7363564B2 (en) * | 2005-07-15 | 2008-04-22 | Seagate Technology Llc | Method and apparatus for securing communications ports in an electronic device |
| US7536540B2 (en) * | 2005-09-14 | 2009-05-19 | Sandisk Corporation | Method of hardware driver integrity check of memory card controller firmware |
| KR101014179B1 (ko) * | 2005-09-14 | 2011-02-14 | 디스크레틱스 테크놀로지스 엘티디. | 플래시 대용량 저장 메모리를 가진 보안 장치를 위한 보안 및 적응형 시스템 구조 |
| JP5089593B2 (ja) * | 2005-09-14 | 2012-12-05 | サンディスク テクノロジィース インコーポレイテッド | メモリカードコントローラファームウェアのハードウェアドライバ完全性チェック |
| US7934049B2 (en) * | 2005-09-14 | 2011-04-26 | Sandisk Corporation | Methods used in a secure yet flexible system architecture for secure devices with flash mass storage memory |
| US7814538B2 (en) | 2005-12-13 | 2010-10-12 | Microsoft Corporation | Two-way authentication using a combined code |
| US7844997B2 (en) * | 2006-01-12 | 2010-11-30 | Honeywell International Inc. | Securing standard test access port with an independent security key interface |
| US8099629B2 (en) * | 2006-07-14 | 2012-01-17 | Marvell World Trade Ltd. | System-on-a-chip (SoC) test interface security |
| US7971241B2 (en) * | 2006-12-22 | 2011-06-28 | Hitachi Global Storage Technologies Netherlands, B.V. | Techniques for providing verifiable security in storage devices |
| US8176473B2 (en) | 2007-05-14 | 2012-05-08 | Microsoft Corporation | Transformations for software obfuscation and individualization |
| KR101393307B1 (ko) * | 2007-07-13 | 2014-05-12 | 삼성전자주식회사 | 보안 부팅 방법 및 그 방법을 사용하는 반도체 메모리시스템 |
| US20090024784A1 (en) * | 2007-07-20 | 2009-01-22 | Wang Liang-Yun | Method for writing data into storage on chip and system thereof |
| US8315394B2 (en) * | 2007-10-24 | 2012-11-20 | Hitachi Global Storage Technologies Netherlands, B.V. | Techniques for encrypting data on storage devices using an intermediate key |
| US8612729B2 (en) * | 2007-12-17 | 2013-12-17 | Advanced Micro Devices, Inc. | Known good code for on-chip device management |
| US8844023B2 (en) * | 2008-12-02 | 2014-09-23 | Micron Technology, Inc. | Password protected built-in test mode for memories |
| US8484451B2 (en) | 2010-03-11 | 2013-07-09 | St-Ericsson Sa | Method and apparatus for software boot revocation |
| EP2503459B1 (en) * | 2011-03-23 | 2021-01-20 | Volvo Car Corporation | Complete and compatible function |
| WO2012159191A1 (en) | 2011-05-20 | 2012-11-29 | Research In Motion Limited | Verifying passwords on a mobile device |
| CN104823207B (zh) | 2012-09-25 | 2019-02-22 | 谷歌有限责任公司 | 通过与随机成分组合来保护用于移动支付应用程序的个人识别号码 |
| US9292713B2 (en) * | 2013-03-13 | 2016-03-22 | Intel Corporation | Tiered access to on chip features |
| US10657262B1 (en) * | 2014-09-28 | 2020-05-19 | Red Balloon Security, Inc. | Method and apparatus for securing embedded device firmware |
| US9811356B2 (en) * | 2015-01-30 | 2017-11-07 | Appdynamics Llc | Automated software configuration management |
| US9893885B1 (en) | 2015-03-13 | 2018-02-13 | Amazon Technologies, Inc. | Updating cryptographic key pair |
| US9674162B1 (en) * | 2015-03-13 | 2017-06-06 | Amazon Technologies, Inc. | Updating encrypted cryptographic key pair |
| US9639700B2 (en) | 2015-03-20 | 2017-05-02 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Unified extensible firmware interface (UEFI) database for secure bootstrap of a computer |
| US10003467B1 (en) * | 2015-03-30 | 2018-06-19 | Amazon Technologies, Inc. | Controlling digital certificate use |
| US9479340B1 (en) | 2015-03-30 | 2016-10-25 | Amazon Technologies, Inc. | Controlling use of encryption keys |
| US10158955B2 (en) * | 2015-07-02 | 2018-12-18 | Gn Hearing A/S | Rights management in a hearing device |
| JP6629999B2 (ja) * | 2016-04-12 | 2020-01-15 | ガードノックス・サイバー・テクノロジーズ・リミテッドGuardKnox Cyber Technologies Ltd. | セキュアロックダウンを実装するように構成された関連装置を有する特別にプログラムされたコンピューティングシステムおよびその使用方法 |
| TWM575145U (zh) * | 2018-09-04 | 2019-03-01 | 威盛電子股份有限公司 | 保全儲存資料的系統 |
| WO2020176093A1 (en) | 2019-02-28 | 2020-09-03 | Hewlett-Packard Development Company, L.P. | Signed change requests to remotely configure settings |
| US12086257B2 (en) * | 2020-04-24 | 2024-09-10 | Omnissa, Llc | Trusted firmware verification |
| US12072379B2 (en) * | 2022-03-14 | 2024-08-27 | Duke University | Dynamic scan obfuscation for integrated circuit protections |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0222752A (ja) * | 1988-07-11 | 1990-01-25 | Mitsubishi Electric Corp | ビデオインターフェイス装置 |
| JPH02216595A (ja) * | 1989-02-17 | 1990-08-29 | Mitsubishi Electric Corp | Icカード |
| JPH09293024A (ja) * | 1996-04-26 | 1997-11-11 | Yamaha Corp | 半導体集積回路 |
| JP2001005729A (ja) * | 1999-06-24 | 2001-01-12 | Fujitsu Ltd | 不正読み出しを防止した不揮発性メモリ |
| JP2001023300A (ja) * | 1999-07-09 | 2001-01-26 | Fujitsu Ltd | 記憶装置、記録媒体のアクセス制御装置および記録媒体のアクセス制御方法 |
| JP2002217892A (ja) * | 2001-01-24 | 2002-08-02 | Toyo Commun Equip Co Ltd | 鍵データ入力方式 |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| AU671986B2 (en) * | 1992-03-30 | 1996-09-19 | Telstra Corporation Limited | A cryptographic communications method and system |
| US5421006A (en) * | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software |
| US5768373A (en) * | 1996-05-06 | 1998-06-16 | Symantec Corporation | Method for providing a secure non-reusable one-time password |
| US5944821A (en) * | 1996-07-11 | 1999-08-31 | Compaq Computer Corporation | Secure software registration and integrity assessment in a computer system |
| US6268788B1 (en) * | 1996-11-07 | 2001-07-31 | Litronic Inc. | Apparatus and method for providing an authentication system based on biometrics |
| US5887131A (en) * | 1996-12-31 | 1999-03-23 | Compaq Computer Corporation | Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password |
| US6314521B1 (en) * | 1997-11-26 | 2001-11-06 | International Business Machines Corporation | Secure configuration of a digital certificate for a printer or other network device |
| US6553548B1 (en) * | 1999-12-14 | 2003-04-22 | International Business Machines Corporation | System and method for recovering from design errors in integrated circuits |
| US6477043B2 (en) * | 2000-12-21 | 2002-11-05 | Gateway, Inc. | Data and power storage device |
| US6824051B2 (en) * | 2001-06-07 | 2004-11-30 | Contentguard Holdings, Inc. | Protected content distribution system |
-
2003
- 2003-07-14 US US10/618,861 patent/US20040025027A1/en not_active Abandoned
-
2004
- 2004-07-14 EP EP04801898A patent/EP1668472A4/en not_active Withdrawn
- 2004-07-14 JP JP2006520365A patent/JP4912879B2/ja not_active Expired - Fee Related
- 2004-07-14 KR KR1020097019006A patent/KR20090109589A/ko not_active Ceased
- 2004-07-14 WO PCT/US2004/022890 patent/WO2005019974A2/en not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0222752A (ja) * | 1988-07-11 | 1990-01-25 | Mitsubishi Electric Corp | ビデオインターフェイス装置 |
| JPH02216595A (ja) * | 1989-02-17 | 1990-08-29 | Mitsubishi Electric Corp | Icカード |
| JPH09293024A (ja) * | 1996-04-26 | 1997-11-11 | Yamaha Corp | 半導体集積回路 |
| JP2001005729A (ja) * | 1999-06-24 | 2001-01-12 | Fujitsu Ltd | 不正読み出しを防止した不揮発性メモリ |
| JP2001023300A (ja) * | 1999-07-09 | 2001-01-26 | Fujitsu Ltd | 記憶装置、記録媒体のアクセス制御装置および記録媒体のアクセス制御方法 |
| JP2002217892A (ja) * | 2001-01-24 | 2002-08-02 | Toyo Commun Equip Co Ltd | 鍵データ入力方式 |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2005019974A3 (en) | 2006-11-16 |
| EP1668472A4 (en) | 2007-09-05 |
| KR20090109589A (ko) | 2009-10-20 |
| EP1668472A2 (en) | 2006-06-14 |
| US20040025027A1 (en) | 2004-02-05 |
| WO2005019974A2 (en) | 2005-03-03 |
| JP2007535015A (ja) | 2007-11-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP4912879B2 (ja) | プロセッサの保護された資源へのアクセスに対するセキュリティ保護方法 | |
| US7539868B2 (en) | Run-time firmware authentication | |
| KR101795457B1 (ko) | 보안 기능이 강화된 디바이스의 초기화 방법 및 디바이스의 펌웨어 업데이트 방법 | |
| US9281949B2 (en) | Device using secure processing zone to establish trust for digital rights management | |
| US7886355B2 (en) | Subsidy lock enabled handset device with asymmetric verification unlocking control and method thereof | |
| CA2450844C (en) | A method for securing an electronic device, a security system and an electronic device | |
| RU2356169C2 (ru) | Привязка программного обеспечения к аппаратным средствам с использованием криптографии | |
| KR102239711B1 (ko) | 보안 파라미터들에 기초한 작업 보안 키의 생성 | |
| CN101351807B (zh) | 用于把嵌入式安全芯片与计算机相关联的方法和系统 | |
| US8281115B2 (en) | Security method using self-generated encryption key, and security apparatus using the same | |
| US20080003980A1 (en) | Subsidy-controlled handset device via a sim card using asymmetric verification and method thereof | |
| JP2007512787A (ja) | トラステッド・モバイル・プラットフォーム・アーキテクチャ | |
| WO2010089005A1 (en) | Cryptographic protection of usage restrictions in electronic devices | |
| JP2004508619A (ja) | トラステッド・デバイス | |
| CN111819561A (zh) | 集成电路数据保护 | |
| JP2004280284A (ja) | 制御プロセッサ、電子機器及び電子機器のプログラム起動方法、並びに電子機器のシステムモジュール更新方法 | |
| US8667278B2 (en) | Information processing apparatus and data transmission method of information processing apparatus | |
| CN120874061A (zh) | 一种服务器启动控制方法及电子设备 | |
| KR20070059891A (ko) | 어플리케이션 인증 보안 시스템 및 그 인증 보안 방법 | |
| KR20070017455A (ko) | 프로세서 내에서의 보호된 리소스들로의 억세스에 대한안전한 보호 방법 | |
| CN121637524A (zh) | 访问控制方法及装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20100226 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20100326 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20100628 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20100705 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20100726 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20100802 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20100825 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20101026 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20110126 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20110202 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20110225 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20110304 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20110323 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20110330 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20110426 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20110610 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20110912 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20110920 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20111011 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20111018 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20111110 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20111117 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20111212 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20120113 |
|
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20120118 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 4912879 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20150127 Year of fee payment: 3 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| LAPS | Cancellation because of no payment of annual fees |
