JP5373062B2 - システム管理コマンドを提供するシステム及び方法 - Google Patents
システム管理コマンドを提供するシステム及び方法 Download PDFInfo
- Publication number
- JP5373062B2 JP5373062B2 JP2011509458A JP2011509458A JP5373062B2 JP 5373062 B2 JP5373062 B2 JP 5373062B2 JP 2011509458 A JP2011509458 A JP 2011509458A JP 2011509458 A JP2011509458 A JP 2011509458A JP 5373062 B2 JP5373062 B2 JP 5373062B2
- Authority
- JP
- Japan
- Prior art keywords
- system management
- electronic device
- management command
- security
- information identifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims description 18
- 230000006870 function Effects 0.000 claims description 22
- 230000004044 response Effects 0.000 claims description 4
- 238000011010 flushing procedure Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 2
- 238000011156 evaluation Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- MPDGHEJMBKOTSU-YKLVYJNSSA-N 18beta-glycyrrhetic acid Chemical compound C([C@H]1C2=CC(=O)[C@H]34)[C@@](C)(C(O)=O)CC[C@]1(C)CC[C@@]2(C)[C@]4(C)CC[C@@H]1[C@]3(C)CC[C@H](O)C1(C)C MPDGHEJMBKOTSU-YKLVYJNSSA-N 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 229960003720 enoxolone Drugs 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008672 reprogramming Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4406—Loading of operating system
- G06F9/4408—Boot device selection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Description
Claims (19)
- システム管理コマンドを提供する方法であって、
授権要求元から、電子装置を識別する情報、及びシステム管理コマンドを前記電子装置に発行する要求を、サーバによって受信することと、
前記要求に応じて、前記サーバにより、前記システム管理コマンド、前記システム管理コマンドの発信元を信頼できる発信元として識別する情報、及び前記電子装置を識別する前記情報を提供することと
を含み、
前記システム管理コマンドは、前記授権要求元が、セキュリティ証明書の使用を必要とする前記電子装置に対し、前記セキュリティ証明書を使用することなくシステム管理機能を実行することを可能にする、方法。 - 前記システム管理機能は、前記セキュリティ証明書を受信することができなかった結果として非機能的状態に陥っている前記電子装置のセキュリティ制限されたコンポーネントをリセットすることを含む、請求項1に記載の方法。
- 前記セキュリティ制限されたコンポーネントは、システムボードを含む、請求項2に記載の方法。
- 前記システム管理機能は、システムブートを実行することを含む、請求項1に記載の方法。
- 前記システム管理機能は、システムBIOS(Basic Input-Output System)の領域をフラッシュすることを含む、請求項1に記載の方法。
- 前記セキュリティ証明書は、パスワード、暗号鍵、又はバイオメトリック署名を含む、請求項1〜5のいずれか一項に記載の方法。
- 前記システム管理コマンド、前記システム管理コマンドの前記発信元を識別する前記情報、及び前記電子装置を識別する前記情報を、前記電子装置又は前記授権要求元に送出することを含む、請求項1〜6のいずれか一項に記載の方法。
- 前記システム管理コマンドを実行することにより、前記システム管理コマンドの前記発信元を識別する前記情報、及び前記電子装置を識別する前記情報の評価に基づいて、前記システム管理機能を実行することを含む、請求項1〜7のいずれか一項に記載の方法。
- 前記システム管理コマンドの前記発信元を信頼できる発信元として識別する前記情報は、秘密鍵を使用して前記システム管理コマンドに付加された署名を含む、請求項1〜8のいずれか一項に記載の方法。
- 電子装置であって、
コンポーネントに対しある機能を実行するためにセキュリティ証明書の使用を必要とする前記コンポーネントと、
システム管理コマンド、前記システム管理コマンドを信頼できる発信元として識別する情報、及び前記電子装置を識別する情報を受信したときに、前記システム管理コマンドを実行することにより、前記セキュリティ証明書を使用することなく前記機能を実行するように構成されたシステム管理コマンドプロセッサであって、前記システム管理コマンドが、授権要求元からの要求に応じて提供される、システム管理コマンドプロセッサと
を含む、電子装置。 - 前記機能は、前記セキュリティ証明書を受信することができなかった結果として非機能的状態に陥っている前記コンポーネントをリセットすることを含む、請求項10に記載の電子装置。
- 前記コンポーネントは、システムボードを含む、請求項10又は請求項11に記載の電子装置。
- 前記機能は、システムブートを実行することを含む、請求項10に記載の電子装置。
- 前記機能は、システムBIOS(Basic Input-Output System)の領域をフラッシュすることを含む、請求項10に記載の電子装置。
- 前記電子装置は、前記システム管理コマンド、前記システム管理コマンドの前記発信元を識別する前記情報、及び前記電子装置を識別する前記情報を、信頼できるサーバ又は前記授権要求元から受信する、請求項10〜14のいずれか一項に記載の電子装置。
- 前記システム管理コマンドの前記発信元を信頼できる発信元として認識する前記情報は、秘密鍵を使用して前記システム管理コマンドに付加された署名を含む、請求項10〜15のいずれか一項に記載の電子装置。
- 前記システム管理コマンドプロセッサは、前記システム管理コマンドを実行することにより、前記システム管理コマンドの前記発信元を識別する前記情報、及び前記電子装置を識別する前記情報の評価に基づいて、前記機能を実行する、請求項10〜16のいずれか一項に記載の電子装置。
- 前記セキュリティ証明書は、パスワード、暗号鍵、又はバイオメトリック署名を含む、請求項10〜17のいずれか一項に記載の電子装置。
- 前記システム管理コマンドプロセッサは、システムBIOS(Basic Input-Output System)である、請求項10〜18のいずれか一項に記載の電子装置。
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2008/063854 WO2009139779A1 (en) | 2008-05-16 | 2008-05-16 | System and method for providing a system management command |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2011521351A JP2011521351A (ja) | 2011-07-21 |
JP5373062B2 true JP5373062B2 (ja) | 2013-12-18 |
Family
ID=41318961
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2011509458A Expired - Fee Related JP5373062B2 (ja) | 2008-05-16 | 2008-05-16 | システム管理コマンドを提供するシステム及び方法 |
Country Status (9)
Country | Link |
---|---|
US (1) | US9143328B2 (ja) |
JP (1) | JP5373062B2 (ja) |
KR (1) | KR20110009679A (ja) |
CN (1) | CN102027480B (ja) |
BR (1) | BRPI0822164B1 (ja) |
DE (1) | DE112008003862B4 (ja) |
GB (1) | GB2472169B (ja) |
TW (1) | TWI494785B (ja) |
WO (1) | WO2009139779A1 (ja) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5282477B2 (ja) * | 2008-08-12 | 2013-09-04 | 富士通株式会社 | 認証方法、プログラム、及び認証装置 |
CN101771564B (zh) * | 2008-12-31 | 2013-10-09 | 华为技术有限公司 | 会话上下文的处理方法、装置和系统 |
WO2010138109A1 (en) * | 2009-05-26 | 2010-12-02 | Hewlett-Packard Development Company, L.P. | System and method for performing a management operation |
US8924733B2 (en) * | 2010-06-14 | 2014-12-30 | International Business Machines Corporation | Enabling access to removable hard disk drives |
WO2012023050A2 (en) | 2010-08-20 | 2012-02-23 | Overtis Group Limited | Secure cloud computing system and method |
US9571489B2 (en) * | 2011-08-12 | 2017-02-14 | Sony Corporation | System and method for performing commands from a remote source |
US9378371B2 (en) * | 2013-03-13 | 2016-06-28 | Intel Corporation | Systems and methods for account recovery using a platform attestation credential |
CN106778359B (zh) * | 2015-11-20 | 2019-11-05 | 宏碁股份有限公司 | 重置出厂保护的解除方法及其电子装置 |
US10877673B2 (en) * | 2017-12-15 | 2020-12-29 | Microchip Technology Incorporated | Transparently attached flash memory security |
SE1850155A1 (en) | 2018-02-13 | 2019-08-14 | Fingerprint Cards Ab | Registration of data at a sensor reader and request of data at the sensor reader |
CN110999254B (zh) * | 2019-03-29 | 2023-02-28 | 创新先进技术有限公司 | 安全地执行加密操作 |
EP3616360B1 (en) | 2019-03-29 | 2021-07-07 | Advanced New Technologies Co., Ltd. | Managing cryptographic keys based on identity information |
SG11201908931TA (en) | 2019-03-29 | 2019-10-30 | Alibaba Group Holding Ltd | Cryptographic key management based on identity information |
SG11201908938PA (en) | 2019-03-29 | 2019-10-30 | Alibaba Group Holding Ltd | Cryptography chip with identity verification |
CN116134430A (zh) * | 2020-09-21 | 2023-05-16 | 惠普发展公司,有限责任合伙企业 | 功能激活 |
Family Cites Families (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS62131352A (ja) | 1985-12-04 | 1987-06-13 | Fujitsu Ltd | アドレス変換制御方式 |
JPS62231352A (ja) * | 1986-03-31 | 1987-10-09 | Toppan Moore Co Ltd | Icカ−ド |
JPH06124266A (ja) * | 1992-04-27 | 1994-05-06 | Toshiba Corp | パスワード管理装置及び管理方法 |
US5892906A (en) * | 1996-07-19 | 1999-04-06 | Chou; Wayne W. | Apparatus and method for preventing theft of computer devices |
JPH1185701A (ja) | 1997-09-09 | 1999-03-30 | Fuji Xerox Co Ltd | 情報処理装置 |
US6370650B1 (en) * | 1998-10-08 | 2002-04-09 | International Business Machines Corporation | Method and system in a data processing system for deactivating a password requirement utilizing a wireless signal |
KR20000060992A (ko) | 1999-03-22 | 2000-10-16 | 윤종용 | 고유번호가 저장된 리모트 콘트롤러 및 이를 구비한 컴퓨터 시스템 |
US6715074B1 (en) | 1999-07-27 | 2004-03-30 | Hewlett-Packard Development Company, L.P. | Virus resistant and hardware independent method of flashing system bios |
US7089300B1 (en) * | 1999-10-18 | 2006-08-08 | Apple Computer, Inc. | Method and apparatus for administering the operating system of a net-booted environment |
US6795855B2 (en) | 2001-04-05 | 2004-09-21 | Hewlett-Packard Development Company, L.P. | Non-root users execution of root commands |
US20030070099A1 (en) * | 2001-10-05 | 2003-04-10 | Schwartz Jeffrey D. | System and methods for protection of data stored on a storage medium device |
US7093124B2 (en) * | 2001-10-30 | 2006-08-15 | Intel Corporation | Mechanism to improve authentication for remote management of a computer system |
US20040225883A1 (en) | 2003-05-07 | 2004-11-11 | Weller Michael K. | Method and apparatus providing multiple single levels of security for distributed processing in communication systems |
JP2005332093A (ja) * | 2004-05-18 | 2005-12-02 | Sharp Corp | 保守作業システム管理装置、認証装置、携帯情報端末装置、コンピュータプログラム、記録媒体、及び保守作業システム |
KR100631689B1 (ko) | 2004-07-02 | 2006-10-09 | 엘지전자 주식회사 | 이동통신단말기의 도용 방지 방법 및 시스템 |
US8667580B2 (en) * | 2004-11-15 | 2014-03-04 | Intel Corporation | Secure boot scheme from external memory using internal memory |
US20060129797A1 (en) * | 2004-12-15 | 2006-06-15 | Palo Alto Research Center, Inc. | Hardware-supported secure network boot |
TW200636487A (en) | 2005-04-15 | 2006-10-16 | Uli Electronics Inc | Transmission method of system command in computer system |
US7516478B2 (en) * | 2005-06-03 | 2009-04-07 | Microsoft Corporation | Remote management of mobile devices |
CN100432890C (zh) * | 2005-07-12 | 2008-11-12 | 中国长城计算机深圳股份有限公司 | 计算机开机身份认证系统及其认证方法 |
TW200731088A (en) | 2005-12-01 | 2007-08-16 | Advanced Micro Devices Inc | Low complexity, multi-purpose communications device and information client |
US8973094B2 (en) | 2006-05-26 | 2015-03-03 | Intel Corporation | Execution of a secured environment initialization instruction on a point-to-point interconnect system |
KR100782620B1 (ko) * | 2006-07-11 | 2007-12-06 | 엘지전자 주식회사 | 암호키 생성 장치 및 방법 |
US8220037B2 (en) * | 2006-12-12 | 2012-07-10 | Oracle International Corporation | Centralized browser management |
US7953967B2 (en) * | 2007-01-12 | 2011-05-31 | Konica Minolta Business Technologies, Inc. | Information processing apparatus and program |
US9083624B2 (en) * | 2007-03-02 | 2015-07-14 | Activetrak, Inc. | Mobile device or computer theft recovery system and method |
US8838965B2 (en) * | 2007-08-23 | 2014-09-16 | Barracuda Networks, Inc. | Secure remote support automation process |
US8301907B2 (en) * | 2007-09-28 | 2012-10-30 | Intel Corporation | Supporting advanced RAS features in a secured computing system |
US8543799B2 (en) * | 2008-05-02 | 2013-09-24 | Microsoft Corporation | Client authentication during network boot |
US8666367B2 (en) * | 2009-05-01 | 2014-03-04 | Apple Inc. | Remotely locating and commanding a mobile device |
US8660530B2 (en) * | 2009-05-01 | 2014-02-25 | Apple Inc. | Remotely receiving and communicating commands to a mobile device for execution by the mobile device |
US9258715B2 (en) * | 2009-12-14 | 2016-02-09 | Apple Inc. | Proactive security for mobile devices |
US8935384B2 (en) * | 2010-05-06 | 2015-01-13 | Mcafee Inc. | Distributed data revocation using data commands |
-
2008
- 2008-05-16 WO PCT/US2008/063854 patent/WO2009139779A1/en active Application Filing
- 2008-05-16 CN CN200880129247.6A patent/CN102027480B/zh not_active Expired - Fee Related
- 2008-05-16 US US12/992,856 patent/US9143328B2/en not_active Expired - Fee Related
- 2008-05-16 KR KR20107025737A patent/KR20110009679A/ko not_active Application Discontinuation
- 2008-05-16 BR BRPI0822164A patent/BRPI0822164B1/pt not_active IP Right Cessation
- 2008-05-16 DE DE112008003862.7T patent/DE112008003862B4/de not_active Expired - Fee Related
- 2008-05-16 JP JP2011509458A patent/JP5373062B2/ja not_active Expired - Fee Related
- 2008-05-16 GB GB201019151A patent/GB2472169B/en not_active Expired - Fee Related
-
2009
- 2009-05-12 TW TW098115690A patent/TWI494785B/zh not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
DE112008003862T5 (de) | 2011-05-12 |
TW200949603A (en) | 2009-12-01 |
JP2011521351A (ja) | 2011-07-21 |
CN102027480A (zh) | 2011-04-20 |
BRPI0822164A2 (pt) | 2015-06-16 |
GB2472169B (en) | 2013-03-06 |
BRPI0822164B1 (pt) | 2019-09-10 |
KR20110009679A (ko) | 2011-01-28 |
DE112008003862B4 (de) | 2020-06-25 |
US20110066839A1 (en) | 2011-03-17 |
WO2009139779A1 (en) | 2009-11-19 |
US9143328B2 (en) | 2015-09-22 |
GB2472169A (en) | 2011-01-26 |
GB201019151D0 (en) | 2010-12-29 |
TWI494785B (zh) | 2015-08-01 |
CN102027480B (zh) | 2014-12-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5373062B2 (ja) | システム管理コマンドを提供するシステム及び方法 | |
JP4079200B2 (ja) | 外付機器 | |
US8775808B2 (en) | System and method for performing a management operation | |
US9875113B2 (en) | System and method for managing BIOS setting configurations | |
US20120198538A1 (en) | Multi-enclave token | |
KR20120037406A (ko) | 저장 장치의 원격 액세스 제어 | |
US9767264B2 (en) | Apparatus, method for controlling apparatus, and program | |
US10855451B1 (en) | Removable circuit for unlocking self-encrypting data storage devices | |
US20090158026A1 (en) | Method and device for securely configuring a terminal by means of a startup data storage device | |
US10460110B1 (en) | Systems and methods for unlocking self-encrypting data storage devices | |
US10158623B2 (en) | Data theft deterrence | |
CN112613011B (zh) | U盘系统认证方法、装置、电子设备及存储介质 | |
JP5154646B2 (ja) | 不正使用防止制御のシステム及び方法 | |
US11443075B2 (en) | Secure storage system | |
US8745730B1 (en) | Secure computer provisioning and operation | |
JP2009259133A (ja) | 可搬媒体のアクセス制御方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20101227 |
|
RD03 | Notification of appointment of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7423 Effective date: 20120203 |
|
RD04 | Notification of resignation of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7424 Effective date: 20120210 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20121225 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20130108 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20130408 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20130827 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20130918 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5373062 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |