JP5745626B2 - ホストベースのモビリティおよびマルチホーミングプロトコルに対する軽量セキュリティソリューションのための方法および装置 - Google Patents
ホストベースのモビリティおよびマルチホーミングプロトコルに対する軽量セキュリティソリューションのための方法および装置 Download PDFInfo
- Publication number
- JP5745626B2 JP5745626B2 JP2013518456A JP2013518456A JP5745626B2 JP 5745626 B2 JP5745626 B2 JP 5745626B2 JP 2013518456 A JP2013518456 A JP 2013518456A JP 2013518456 A JP2013518456 A JP 2013518456A JP 5745626 B2 JP5745626 B2 JP 5745626B2
- Authority
- JP
- Japan
- Prior art keywords
- random
- message
- key
- nonce
- mobility
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims description 26
- 230000011664 signaling Effects 0.000 claims description 18
- 230000004044 response Effects 0.000 claims description 17
- 230000008859 change Effects 0.000 claims description 8
- 238000004891 communication Methods 0.000 claims description 7
- 230000002093 peripheral effect Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000009977 dual effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 229920001690 polydopamine Polymers 0.000 description 3
- 230000005055 memory storage Effects 0.000 description 2
- 238000013508 migration Methods 0.000 description 2
- 230000005012 migration Effects 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
- H04W12/0471—Key exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
- H04W60/005—Multiple registrations, e.g. multihoming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/15—Setup of multiple wireless link connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/14—Mobility data transfer between corresponding nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Description
メッセージを送信および受信するように構成された第1のデバイスと、メッセージを送信および受信するように構成された第2のデバイスとを備え、第1のデバイスにより生成されたメッセージiは、前のメッセージi−1で第1のデバイスから第2のデバイスに送信されたHash(Ri−1)への秘密Ri−1を含み、メッセージiはランダム鍵Ai−1により署名され、ランダム鍵は鍵Ai−2の更新から導かれており、前のメッセージi−1は鍵Ai−2により署名される。第1のデバイスは、以前のネットワークロケーションにおいて維持された前のメッセージを通じて第2のデバイスとの関連を証明するために、異なるネットワークロケーションからメッセージを送信することができる。
Claims (9)
- モビリティセッションにおいてネットワークにわたりコレスポンデントノードCNに接続されたモビリティノードMNでセキュリティプロトコルを動作させる方法であって、
MNにおいてランダムナンスRiを引き継がれた暗号ハッシュを生成し、及び、ランダムナンスRiをキャッシュに入れることと、
モビリティセッション中に、一連のメッセージのうちの、第i番目のMNメッセージをCNに送信することを含み、第i番目のMNメッセージは、ランダムナンスRiの暗号ハッシュ、ランダムナンスRi−1及び、キャッシュされたランダム鍵Ai−1に基づくハッシュベースのメッセージ認証コード(HMAC(Ai−1 |MSG))を含み、さらに、
ランダム鍵dAとHMAC(Ai−1 |MSG)を含む第i番目のCNメッセージを、CNから受信することと、
MNにおいて、ランダム鍵dAをキャッシュされたランダム鍵Ai−1に加えることにより、ランダム鍵Aiを生成し、ランダム鍵Aiをキャッシュに入れることと、
新しいランダムナンスRi+1を生成することと、
第i+1番目のMNメッセージをMNからCNに送信することを含み、第i+1番目のMNメッセージが、新しいランダムナンスRi+1の暗号ハッシュ、ランダムナンスRiと、ランダム鍵Aiに基づくHMAC(Ai |MSG)を含む、方法。 - CNから第i+1番目のメッセージを受信するステップをさらに備え、前記メッセージは新しいランダム鍵dAとランダム鍵Aiに基づくHMAC(Ai |MSG)を含む、請求項1に記載の方法。
- MNが、接続ポイントにおいてネットワークノードに動作可能に接続された周辺デバイスを含み、周辺デバイスがIPアドレスを有する、請求項1に記載の方法。
- ランダムナンスRi−1が初期ナンスである、請求項1に記載の方法。
- モビリティノード(MN)であって、
メッセージを処理するために、MNに動作可能に接続されたコンピュータプロセッサと、
コレスポンデントノード(CN)とメッセージを交換するために、コンピュータプロセッサに動作可能に接続された通信インタフェースとを有し、
コンピュータプロセッサが、MNのIPアドレスが変化した場合にIPアドレス更新をCNに送信するための信号伝達メッセージを生成し、
MNからCNへ送られた第i番目のMNメッセージが、少なくともコンピュータプロセッサにより生成されキャッシュされたランダムナンスRiの暗号ハッシュ、第i−1番目のMNメッセージのランダムナンスRi−1、及び、第i−1番目のMNメッセージのCNから受信されたランダム増分dAを使用して計算された鍵Ai−1に基づくMAC(メッセージ認証コード)を含む、モビリティノード。 - モビリティセッションにおいてネットワークにわたりモビリティノードMNに接続されたコレスポンデントノードCNでセキュリティプロトコルを動作させる方法であって、
モビリティセッション中に、ランダムナンスRiの暗号ハッシュ、ランダムナンスRi−1及び、キャッシュされたランダム鍵Ai−1に基づくハッシュベースのメッセージ認証コード(HMAC(Ai−1 |MSG))を含む第i番目のMNメッセージを受信することと、
受信したランダムナンスRi−1 から計算した暗号ハッシュが、キャッシュに入れられたランダムナンスR i−1 の暗号ハッシュと同一であることを確認することと、
ランダムナンスRiの暗号ハッシュをキャッシュに入れることと、
ランダム鍵dAを生成しおよび、AiがAi−1とランダム鍵dAの和と等しくなるようにランダム鍵Aiを計算し、CNでランダム鍵Aiをキャッシュに入れることと、
ランダム鍵dAとHMAC(Ai−1 |MSG)を含む応答メッセージをMNへ送信することと、
MNから第i+1番目のMNメッセージを受信することを有し、第i+1番目のMNメッセージは、新しいランダムナンスRi+1の暗号ハッシュ、ランダムナンスRi及び、HMAC(Ai |MSG)を含む、方法。 - 受信したランダムナンスRi から計算した暗号ハッシュが、キャッシュに入れられたランダムナンスR i の暗号ハッシュと同一であることを確認するステップと、
HMAC(Ai |MSG)を確認するステップと、
新しいランダムナンスRi+1の暗号ハッシュをキャッシュに入れるステップと、
第2のランダム鍵dAを生成しおよび、Ai+1がAiと第2のランダム鍵dAの和と等しくなるようにランダム鍵Ai+1を計算し、ランダム鍵Ai+1をキャッシュに入れるステップと、
MNへ第2のランダム鍵dAとHMAC(Ai |MSG)を転送するステップとをさらに含む、請求項6に記載の方法。 - MNから後続のメッセージを受信した後、後続のランダム鍵dAをMNに、CNによって送信するステップをさらに備える、請求項7に記載の方法。
- トランスポート接続がCNからMNに形成され、CNがトランスポート接続を介してモビリティセッション中にCNの接続ポイントへの変更でMNを更新する、請求項7に記載の方法。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/803,504 US8699708B2 (en) | 2010-06-29 | 2010-06-29 | Light-weight security solution for host-based mobility and multihoming protocols |
US12/803,504 | 2010-06-29 | ||
PCT/US2011/041028 WO2012005930A2 (en) | 2010-06-29 | 2011-06-20 | Light-weight security solution for host-based mobility & multihoming protocols |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2013535862A JP2013535862A (ja) | 2013-09-12 |
JP5745626B2 true JP5745626B2 (ja) | 2015-07-08 |
Family
ID=44584604
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2013518456A Expired - Fee Related JP5745626B2 (ja) | 2010-06-29 | 2011-06-20 | ホストベースのモビリティおよびマルチホーミングプロトコルに対する軽量セキュリティソリューションのための方法および装置 |
Country Status (6)
Country | Link |
---|---|
US (1) | US8699708B2 (ja) |
EP (1) | EP2589197B1 (ja) |
JP (1) | JP5745626B2 (ja) |
KR (1) | KR101454986B1 (ja) |
CN (1) | CN103069768B (ja) |
WO (1) | WO2012005930A2 (ja) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9148409B2 (en) | 2005-06-30 | 2015-09-29 | The Chamberlain Group, Inc. | Method and apparatus to facilitate message transmission and reception using different transmission characteristics |
US8422667B2 (en) | 2005-01-27 | 2013-04-16 | The Chamberlain Group, Inc. | Method and apparatus to facilitate transmission of an encrypted rolling code |
USRE48433E1 (en) | 2005-01-27 | 2021-02-09 | The Chamberlain Group, Inc. | Method and apparatus to facilitate transmission of an encrypted rolling code |
US9998545B2 (en) * | 2011-04-02 | 2018-06-12 | Open Invention Network, Llc | System and method for improved handshake protocol |
EP2634991B1 (en) | 2012-02-28 | 2017-08-02 | Alcatel Lucent | Content-centric networking |
US9075953B2 (en) * | 2012-07-31 | 2015-07-07 | At&T Intellectual Property I, L.P. | Method and apparatus for providing notification of detected error conditions in a network |
US9363320B2 (en) * | 2012-12-05 | 2016-06-07 | Microsoft Technology Licensing, Llc | Persistent connection between network devices |
KR101943989B1 (ko) | 2015-06-05 | 2019-01-30 | 삼성전자주식회사 | 데이터를 송수신하는 방법, 서버 및 단말기 |
EP3574608B1 (en) * | 2017-01-25 | 2022-03-30 | Koninklijke KPN N.V. | Guaranteeing authenticity and integrity in signalling exchange between mobile networks |
CN110493774B (zh) * | 2017-05-06 | 2023-09-26 | 华为技术有限公司 | 密钥配置方法、装置以及系统 |
GB2564878B (en) * | 2017-07-25 | 2020-02-26 | Advanced Risc Mach Ltd | Parallel processing of fetch blocks of data |
US10652743B2 (en) | 2017-12-21 | 2020-05-12 | The Chamberlain Group, Inc. | Security system for a moveable barrier operator |
US11074773B1 (en) | 2018-06-27 | 2021-07-27 | The Chamberlain Group, Inc. | Network-based control of movable barrier operators for autonomous vehicles |
US11423717B2 (en) | 2018-08-01 | 2022-08-23 | The Chamberlain Group Llc | Movable barrier operator and transmitter pairing over a network |
US10997810B2 (en) | 2019-05-16 | 2021-05-04 | The Chamberlain Group, Inc. | In-vehicle transmitter training |
WO2020245830A1 (en) * | 2019-06-05 | 2020-12-10 | Nitromia Ltd | Dictionary-attack-resistant database encryption |
US11683182B2 (en) * | 2020-05-08 | 2023-06-20 | International Business Machines Corporation | Message embedment in random values |
US11641336B2 (en) * | 2020-05-29 | 2023-05-02 | Dell Products L.P. | Lightweight host multihoming |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06224897A (ja) * | 1993-01-26 | 1994-08-12 | Nippon Telegr & Teleph Corp <Ntt> | 閉域放送システム |
US20030211842A1 (en) * | 2002-02-19 | 2003-11-13 | James Kempf | Securing binding update using address based keys |
KR100636318B1 (ko) * | 2004-09-07 | 2006-10-18 | 삼성전자주식회사 | CoA 바인딩 프로토콜을 이용한 어드레스 오너쉽인증방법 및 그 시스템 |
US20100325709A1 (en) * | 2005-10-21 | 2010-12-23 | Michael Lee Kawase | Method to store and distribute digital entertainment media data on a portable non-volatile solid-state storage device with a customer pre-selected security indentifier and content management system |
CN101150572B (zh) | 2006-09-22 | 2011-08-10 | 华为技术有限公司 | 移动节点和通信对端绑定更新的方法及装置 |
EP1914953B1 (en) | 2006-10-20 | 2014-07-30 | Panasonic Intellectual Property Corporation of America | Care-of address registration and detection of spoofed binding cache entries |
US9344438B2 (en) * | 2008-12-22 | 2016-05-17 | Qualcomm Incorporated | Secure node identifier assignment in a distributed hash table for peer-to-peer networks |
US9590961B2 (en) * | 2009-07-14 | 2017-03-07 | Alcatel Lucent | Automated security provisioning protocol for wide area network communication devices in open device environment |
-
2010
- 2010-06-29 US US12/803,504 patent/US8699708B2/en active Active
-
2011
- 2011-06-20 JP JP2013518456A patent/JP5745626B2/ja not_active Expired - Fee Related
- 2011-06-20 EP EP11730800.7A patent/EP2589197B1/en not_active Not-in-force
- 2011-06-20 KR KR1020127034145A patent/KR101454986B1/ko active IP Right Grant
- 2011-06-20 WO PCT/US2011/041028 patent/WO2012005930A2/en active Application Filing
- 2011-06-20 CN CN201180032671.0A patent/CN103069768B/zh not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN103069768B (zh) | 2016-06-22 |
KR101454986B1 (ko) | 2014-10-28 |
EP2589197A2 (en) | 2013-05-08 |
WO2012005930A2 (en) | 2012-01-12 |
EP2589197B1 (en) | 2016-08-31 |
US8699708B2 (en) | 2014-04-15 |
CN103069768A (zh) | 2013-04-24 |
JP2013535862A (ja) | 2013-09-12 |
KR20130032878A (ko) | 2013-04-02 |
US20110320803A1 (en) | 2011-12-29 |
WO2012005930A3 (en) | 2012-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5745626B2 (ja) | ホストベースのモビリティおよびマルチホーミングプロトコルに対する軽量セキュリティソリューションのための方法および装置 | |
CN101965722B (zh) | 安全性关联的重新建立 | |
US8126148B2 (en) | Securing home agent to mobile node communication with HA-MN key | |
Deng et al. | Defending against redirect attacks in mobile IP | |
EP2285041B1 (en) | Communication establishing method, system and device | |
US8711843B2 (en) | Cryptographically generated addresses using backward key chain for secure route optimization in mobile internet protocol | |
Modares et al. | A survey of secure protocols in mobile IPv6 | |
WO2008034368A1 (fr) | Procédé, système, noeud mobile et noeud correspondant pour la production d'une clé de gestion de liaison | |
Praptodiyono et al. | Mobile IPv6 vertical handover specifications, threats, and mitigation methods: A survey | |
Shah et al. | A TOTP‐Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead | |
WO2006102565A2 (en) | Optimized derivation of handover keys in mobile ipv6 | |
CN100536471C (zh) | 一种家乡代理信令消息有效保护方法 | |
Oryema et al. | Secure mobility management using CoAP in the Internet of Things | |
Jara et al. | Secure mobility management scheme for 6lowpan id/locator split architecture | |
Brian et al. | Security scheme for mobility management in the internet of things | |
Dhawale et al. | A Robust Secured Mechanism for Mobile IPv6 Threats | |
Heer | LHIP–Lightweight Authentication for the Host Identity Protocol | |
Park | A robust secured Mobile IPv6 mechanism for multimedia convergence services | |
Hossain et al. | Security vulnerabilities and protection mechanisms of mobility management protocols | |
Hampel et al. | Lightweight security solution for Host-based mobility & multi-homing protocols | |
Hampel et al. | Securing Host-Based Mobility and Multi-Homing Protocols against On-Path Attackers. | |
Georgiades | A security protocol for authentication of binding updates in Mobile IPv6 | |
Roe et al. | Status of this Memo | |
Durr et al. | An analysis of security threats to mobile IPv6 | |
Gupta et al. | Analysis of Mobile IP Protocols Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20140513 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20140811 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20140818 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20141028 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20150106 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20150310 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20150407 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20150501 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5745626 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |