JP5980950B2 - マスタートークンの品質にサブトークンに関するメカニズムを利用するアプリケーションログイン - Google Patents
マスタートークンの品質にサブトークンに関するメカニズムを利用するアプリケーションログイン Download PDFInfo
- Publication number
- JP5980950B2 JP5980950B2 JP2014550434A JP2014550434A JP5980950B2 JP 5980950 B2 JP5980950 B2 JP 5980950B2 JP 2014550434 A JP2014550434 A JP 2014550434A JP 2014550434 A JP2014550434 A JP 2014550434A JP 5980950 B2 JP5980950 B2 JP 5980950B2
- Authority
- JP
- Japan
- Prior art keywords
- user
- token
- sub
- app
- master token
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000007246 mechanism Effects 0.000 title description 7
- 238000000034 method Methods 0.000 claims description 39
- 230000008569 process Effects 0.000 claims description 18
- 230000004044 response Effects 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 description 15
- 230000006855 networking Effects 0.000 description 14
- 238000012545 processing Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000003466 anti-cipated effect Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 240000001398 Typha domingensis Species 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002207 retinal effect Effects 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/384—Payment protocols; Details thereof using social networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/127—Shopping or accessing services according to a time-limitation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Economics (AREA)
- Development Economics (AREA)
- User Interface Of Digital Computer (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
Description
Claims (17)
- 方法を実施するようにコンピュータに命令するためのコンピュータ可読コードを格納するコンピュータ可読記憶媒体であって、
前記方法は、
サービスプロバイダとネットワーク上で通信するユーザデバイスを介してユーザを認証することと、
前記ユーザデバイス上にマスタートークンを生成することと、
前記マスタートークンにスコアを関係付けることと、
前記ユーザデバイス上に前記マスタートークンが存在するか否かをチェックすることと、
前記ユーザデバイス上で前記ユーザによって起動された複数のアプリに対して、前記マスタートークンの複数のサブトークンを生成することであって、前記複数のアプリのうちの1つのアプリを起動することは、前記1つのアプリが取引の検証へ直接進行するように、前記複数のサブトークンのうちの1つのサブトークンに応じて、前記1つのアプリによるログインプロセスをスキップすることを含む、ことと、
前記取引を検証することと、
を含む、ことを特徴とするコンピュータ可読記憶媒体。 - 前記スコアは、前記ユーザの前記認証に基づいて、前記ユーザデバイスに割り当てられる、ことを特徴とする請求項1に記載のコンピュータ可読記憶媒体。
- 前記ユーザデバイスを介して前記ユーザを認証することは、ユーザ名およびパスワード入力以上に前記ユーザを認証することをさらに含む、ことを特徴とする請求項1に記載のコンピュータ可読記憶媒体。
- 前記ユーザを認証することをさらに含み、必要とされる認証の強度は、前記スコアに従って決定される、ことを特徴とする請求項1に記載のコンピュータ可読記憶媒体。
- 前記スコアは、複数の登録パラメータに基づいて、前記ユーザデバイスに割り当てられ、
起動されたとき、前記1つのアプリによる前記ログインプロセスをスキップすることは、前記ユーザが前記ユーザの任意の証明の入力を求められないように、前記マスタートークンからの前記スコアの値が前記サービスプロバイダのポリシーに則していることに応じて、前記ユーザが認証されたと判定することを含む、
ことを特徴とする請求項1に記載のコンピュータ可読記憶媒体。 - ユーザ名およびパスワード入力以上に前記ユーザを認証することをさらに含み、前記認証は、前記ユーザのバイオメトリック識別を含む、ことを特徴とする請求項1に記載のコンピュータ可読記憶媒体。
- 前記マスタートークンは、それを超えると有効でなくなる有効期限を有し、
前記アプリに対する前記マスタートークンの前記サブトークンは、前記マスタートークンとは異なる有効期限を有し、
前記アプリに対する前記サブトークンの前記有効期限は、前記スコアに基づいて決定される、
ことを特徴とする請求項1に記載のコンピュータ可読記憶媒体。 - 前記マスタートークンは、特定の条件に応じて無効化され、
前記マスタートークンが無効化されたのに応じて、前記サブトークンがキャンセルされる、
ことを特徴とする請求項1に記載のコンピュータ可読記憶媒体。 - サービスプロバイダとネットワーク上で通信するユーザデバイスを介してユーザを認証することと、
前記ユーザデバイス上にマスタートークンを生成することと、
前記マスタートークンにスコアを関係付けることと、
前記マスタートークンが前記ユーザデバイス上に存在するか否かをチェックすることと、
前記ユーザデバイス上で前記ユーザによって起動された複数のアプリに対して、前記マスタートークンの複数のサブトークンを生成することであって、前記複数のアプリのうちの1つのアプリを起動することは、前記1つのアプリが取引の検証へ直接進行するように、前記複数のサブトークンのうちの1つのサブトークンに応じて、前記1つのアプリによるログインプロセスをスキップすることを含む、ことと、
前記取引を検証することと、
を含む、ことを特徴とする方法。 - 前記スコアは、前記ユーザの前記認証に基づいて、前記ユーザデバイスに割り当てられる、ことを特徴とする請求項9に記載の方法。
- 前記ユーザデバイスを介して前記ユーザを認証することは、ユーザ名およびパスワード入力以上に前記ユーザを認証することをさらに含む、ことを特徴とする請求項9に記載の方法。
- 前記ユーザを認証することをさらに含み、必要とされる認証の強度は前記スコアに従って決定される、ことを特徴とする請求項9に記載の方法。
- ユーザ名およびパスワード入力以上に前記ユーザを認証することをさらに含み、前記認証は前記ユーザのバイオメトリック識別を含む、ことを特徴とする請求項9に記載の方法。
- ユーザ名およびパスワード入力以上に前記ユーザを認証することをさらに含み、前記認証はデバイス識別を含む、ことを特徴とする請求項9に記載の方法。
- 前記スコアは、複数の登録パラメータに基づいて前記ユーザデバイスに割り当てられ、
起動されたとき、前記1つのアプリによる前記ログインプロセスをスキップすることは、前記ユーザの任意の証明の入力を前記ユーザが求められないように、前記マスタートークンからの前記スコアの値が前記サービスプロバイダのポリシーに則していることに応じて、前記ユーザが認証されたと判定することを含む、
ことを特徴とする請求項9に記載の方法。 - 前記マスタートークンは、それを超えると有効でなくなる有効期限を有し、
前記アプリに対する前記マスタートークンの前記サブトークンは、前記マスタートークンとは異なる有効期限を有し、
前記アプリに対する前記サブトークンの前記有効期限は、前記スコアに基づいて決定される、
ことを特徴とする請求項9に記載の方法。 - 前記マスタートークンは、特定の条件に応じて無効化され、
前記マスタートークンが無効化されたのに応じて、前記サブトークンがキャンセルされる、
ことを特徴とする請求項9に記載の方法。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/340,521 US8689310B2 (en) | 2011-12-29 | 2011-12-29 | Applications login using a mechanism relating sub-tokens to the quality of a master token |
US13/340,521 | 2011-12-29 | ||
PCT/US2012/071673 WO2013101843A2 (en) | 2011-12-29 | 2012-12-26 | Applications login using a mechanism relating sub-tokens to the quality of a master token |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2015512068A JP2015512068A (ja) | 2015-04-23 |
JP5980950B2 true JP5980950B2 (ja) | 2016-08-31 |
Family
ID=48696083
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2014550434A Active JP5980950B2 (ja) | 2011-12-29 | 2012-12-26 | マスタートークンの品質にサブトークンに関するメカニズムを利用するアプリケーションログイン |
Country Status (8)
Country | Link |
---|---|
US (5) | US8689310B2 (ja) |
EP (1) | EP2798515A4 (ja) |
JP (1) | JP5980950B2 (ja) |
KR (1) | KR20140135693A (ja) |
CN (2) | CN104641345B (ja) |
AU (1) | AU2012362502B2 (ja) |
CA (2) | CA2862334C (ja) |
WO (1) | WO2013101843A2 (ja) |
Families Citing this family (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10867298B1 (en) | 2008-10-31 | 2020-12-15 | Wells Fargo Bank, N.A. | Payment vehicle with on and off function |
US20100114768A1 (en) | 2008-10-31 | 2010-05-06 | Wachovia Corporation | Payment vehicle with on and off function |
US9172693B2 (en) * | 2010-11-11 | 2015-10-27 | Paypal, Inc. | Quick payment using mobile device binding |
US8689310B2 (en) | 2011-12-29 | 2014-04-01 | Ebay Inc. | Applications login using a mechanism relating sub-tokens to the quality of a master token |
US20130282588A1 (en) * | 2012-04-22 | 2013-10-24 | John Hruska | Consumer, Merchant and Mobile Device Specific, Real-Time Dynamic Tokenization Activation within a Secure Mobile-Wallet Financial Transaction System |
US9818161B2 (en) * | 2012-06-05 | 2017-11-14 | Apple Inc. | Creating a social network message from an interface of a mobile device operating system |
US20140136419A1 (en) * | 2012-11-09 | 2014-05-15 | Keith Shoji Kiyohara | Limited use tokens granting permission for biometric identity verification |
US20140208407A1 (en) * | 2013-01-19 | 2014-07-24 | Lenovo (Singapore) Pte. Ltd. | Single sign-on between device application and browser |
US20140245408A1 (en) * | 2013-02-26 | 2014-08-28 | Lsi Corporation | Biometric approach to track credentials of anonymous user of a mobile device |
SG10201800626RA (en) | 2013-07-24 | 2018-02-27 | Visa Int Service Ass | Systems and methods for interoperable network token processing |
US10291472B2 (en) | 2015-07-29 | 2019-05-14 | AppFormix, Inc. | Assessment of operational states of a computing environment |
US10355997B2 (en) | 2013-09-26 | 2019-07-16 | Appformix Inc. | System and method for improving TCP performance in virtualized environments |
US10581687B2 (en) | 2013-09-26 | 2020-03-03 | Appformix Inc. | Real-time cloud-infrastructure policy implementation and management |
US10891610B2 (en) | 2013-10-11 | 2021-01-12 | Visa International Service Association | Network token system |
US9807609B2 (en) * | 2013-11-15 | 2017-10-31 | Successfactors, Inc. | Multiple profiles on a shared computing device |
US9124575B2 (en) | 2013-11-27 | 2015-09-01 | Sap Se | Self-single sign-on |
CN105099984B (zh) * | 2014-04-16 | 2019-07-02 | 百度在线网络技术(北京)有限公司 | 一种app间账号互通的方法和装置 |
US11023890B2 (en) | 2014-06-05 | 2021-06-01 | Visa International Service Association | Identification and verification for provisioning mobile application |
US10484345B2 (en) | 2014-07-31 | 2019-11-19 | Visa International Service Association | System and method for identity verification across mobile applications |
US10320781B2 (en) * | 2016-12-08 | 2019-06-11 | Sensoriant, Inc. | System and methods for sharing and trading user data and preferences between computer programs and other entities while preserving user privacy |
CN105592011B (zh) * | 2014-10-23 | 2019-12-24 | 阿里巴巴集团控股有限公司 | 一种账号登录方法及装置 |
US9544311B2 (en) * | 2014-11-14 | 2017-01-10 | Sap Se | Secure identity propagation in a cloud-based computing environment |
US11429975B1 (en) | 2015-03-27 | 2022-08-30 | Wells Fargo Bank, N.A. | Token management system |
US11170364B1 (en) | 2015-07-31 | 2021-11-09 | Wells Fargo Bank, N.A. | Connected payment card systems and methods |
CN105656984A (zh) * | 2015-10-22 | 2016-06-08 | 乐视致新电子科技(天津)有限公司 | 多设备间会员权益同步的方法、设备、服务器及系统 |
CN105791259B (zh) * | 2015-10-26 | 2018-11-16 | 北京中金国盛认证有限公司 | 一种个人信息保护的方法 |
KR102436509B1 (ko) | 2015-12-07 | 2022-08-25 | 삼성전자주식회사 | 임시 계정 정보를 제공하는 방법, 장치 및 시스템 |
US10402549B1 (en) * | 2015-12-17 | 2019-09-03 | Symantec Corporation | Systems and methods for creating validated identities for dependent users |
US11120507B2 (en) | 2016-04-14 | 2021-09-14 | Sensoriant, Inc. | Confirmation and rating of user generated activities |
EP3466017B1 (en) * | 2016-06-03 | 2021-05-19 | Visa International Service Association | Subtoken management system for connected devices |
US10992679B1 (en) | 2016-07-01 | 2021-04-27 | Wells Fargo Bank, N.A. | Access control tower |
US11935020B1 (en) | 2016-07-01 | 2024-03-19 | Wells Fargo Bank, N.A. | Control tower for prospective transactions |
US11386223B1 (en) | 2016-07-01 | 2022-07-12 | Wells Fargo Bank, N.A. | Access control tower |
US11615402B1 (en) | 2016-07-01 | 2023-03-28 | Wells Fargo Bank, N.A. | Access control tower |
US11886611B1 (en) | 2016-07-01 | 2024-01-30 | Wells Fargo Bank, N.A. | Control tower for virtual rewards currency |
US10462124B2 (en) * | 2016-12-30 | 2019-10-29 | Google Llc | Authenticated session management across multiple electronic devices using a virtual session manager |
US10868742B2 (en) | 2017-03-29 | 2020-12-15 | Juniper Networks, Inc. | Multi-cluster dashboard for distributed virtualization infrastructure element monitoring and policy control |
US10878014B2 (en) * | 2017-03-29 | 2020-12-29 | International Business Machines Corporation | Protocol based user data management |
US11068314B2 (en) | 2017-03-29 | 2021-07-20 | Juniper Networks, Inc. | Micro-level monitoring, visibility and control of shared resources internal to a processor of a host machine for a virtual environment |
US11323327B1 (en) | 2017-04-19 | 2022-05-03 | Juniper Networks, Inc. | Virtualization infrastructure element monitoring and policy control in a cloud environment using profiles |
US11556936B1 (en) | 2017-04-25 | 2023-01-17 | Wells Fargo Bank, N.A. | System and method for card control |
US11062388B1 (en) | 2017-07-06 | 2021-07-13 | Wells Fargo Bank, N.A | Data control tower |
US11509692B2 (en) | 2017-07-13 | 2022-11-22 | Cybereason Inc. | Creation and optimization of security applications for cyber threats detection, investigation and mitigation |
US11188887B1 (en) | 2017-11-20 | 2021-11-30 | Wells Fargo Bank, N.A. | Systems and methods for payment information access management |
CN108712372B (zh) * | 2018-04-03 | 2021-06-25 | 福建天泉教育科技有限公司 | 一种客户端接入web第三方登录的方法及系统 |
CN109120597B (zh) * | 2018-07-18 | 2020-09-01 | 阿里巴巴集团控股有限公司 | 身份校验、登录方法、装置及计算机设备 |
US11017100B2 (en) * | 2018-08-03 | 2021-05-25 | Verizon Patent And Licensing Inc. | Identity fraud risk engine platform |
CN109525561B (zh) * | 2018-10-26 | 2021-08-20 | 深圳点猫科技有限公司 | 一种用于教育操作系统的授权登录方法及装置 |
CN109462501B (zh) * | 2018-10-29 | 2021-02-02 | 北京芯盾时代科技有限公司 | 一种认证流程控制方法及系统 |
TWI725352B (zh) * | 2018-11-05 | 2021-04-21 | 緯創資通股份有限公司 | 驗證及授權的方法及驗證伺服器 |
CN109302422B (zh) * | 2018-11-22 | 2022-02-25 | 北京顺丰同城科技有限公司 | 一种登录移动应用的方法、移动终端、电子设备、系统及存储介质 |
US11070548B2 (en) * | 2018-12-21 | 2021-07-20 | Paypal, Inc. | Tokenized online application sessions |
US11057778B2 (en) | 2019-02-28 | 2021-07-06 | Ebay Inc. | Complex composite tokens |
US11017064B2 (en) | 2019-05-14 | 2021-05-25 | Bank Of America Corporation | Authentication using interprogram communication |
US11165585B2 (en) * | 2019-06-11 | 2021-11-02 | International Business Machines Corporation | Token repository and integration |
US11750598B2 (en) | 2019-07-19 | 2023-09-05 | Ebay Inc. | Multi-legged network attribution using tracking tokens and attribution stack |
CN111770084A (zh) * | 2020-06-28 | 2020-10-13 | 福建健康之路信息技术有限公司 | 一种免登陆为用户提供服务方法和装置 |
US12045375B2 (en) | 2020-08-24 | 2024-07-23 | Analog Devices, Inc. | Techniques of tracking software usage on a remote device |
US10992606B1 (en) | 2020-09-04 | 2021-04-27 | Wells Fargo Bank, N.A. | Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets |
US11546338B1 (en) | 2021-01-05 | 2023-01-03 | Wells Fargo Bank, N.A. | Digital account controls portal and protocols for federated and non-federated systems and devices |
US12120233B2 (en) | 2021-12-13 | 2024-10-15 | Paypal, Inc. | Interactive token of things |
CN114466355B (zh) * | 2021-12-21 | 2024-06-04 | 奇安盘古(上海)信息技术有限公司 | 云服务数据取证方法及装置 |
US20240121232A1 (en) * | 2022-10-11 | 2024-04-11 | Jpmorgan Chase Bank, N.A. | Method and system for frictionless application authentication |
EP4425830A1 (en) * | 2023-03-03 | 2024-09-04 | Basf Se | Authentication in a distributed manufacturing automation system |
Family Cites Families (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6070141A (en) * | 1995-05-08 | 2000-05-30 | Image Data, Llc | System and method of assessing the quality of an identification transaction using an identificaion quality score |
US6279111B1 (en) * | 1998-06-12 | 2001-08-21 | Microsoft Corporation | Security model using restricted tokens |
WO2001063567A2 (en) | 2000-02-25 | 2001-08-30 | Identix Incorporated | Secure transaction system |
JP4087126B2 (ja) * | 2002-02-27 | 2008-05-21 | 株式会社日立製作所 | 安全性保証付き生体認証方法及び認証サービスを行う装置 |
EP1525522A2 (en) * | 2002-06-06 | 2005-04-27 | Green Border Technologies | Method and system for implementing a secure application execution environment using derived user accounts for internet content |
US8745715B2 (en) * | 2003-04-16 | 2014-06-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Password-based authentication system and method in group network |
US7437726B2 (en) | 2003-04-23 | 2008-10-14 | Micron Technology, Inc. | Method for rounding values for a plurality of parallel processing elements |
US20050210270A1 (en) * | 2004-03-19 | 2005-09-22 | Ceelox, Inc. | Method for authenticating a user profile for providing user access to restricted information based upon biometric confirmation |
US7720864B1 (en) * | 2004-03-25 | 2010-05-18 | Symantec Operating Corporation | Expiration of access tokens for quiescing a distributed system |
GB0407369D0 (en) * | 2004-03-31 | 2004-05-05 | British Telecomm | Trust tokens |
JP4443985B2 (ja) | 2004-04-07 | 2010-03-31 | 本田技研工業株式会社 | 制御装置 |
JP2008506139A (ja) * | 2004-07-09 | 2008-02-28 | 松下電器産業株式会社 | ユーザ認証及びサービス承認を管理し、シングル・サイン・オンを実現して、複数のネットワーク・インタフェースにアクセスするためのシステム及び方法 |
US7324976B2 (en) * | 2004-07-19 | 2008-01-29 | Amazon Technologies, Inc. | Automatic authorization of programmatic transactions |
US20060110011A1 (en) * | 2004-11-19 | 2006-05-25 | Cohen Mark S | Method and apparatus for producing a biometric identification reference template |
US8996423B2 (en) * | 2005-04-19 | 2015-03-31 | Microsoft Corporation | Authentication for a commercial transaction using a mobile module |
US7588197B2 (en) * | 2005-07-19 | 2009-09-15 | Finell Rebecca M | Spout cover |
JP2007094548A (ja) * | 2005-09-27 | 2007-04-12 | Softbank Telecom Corp | アクセス制御システム |
US20110179477A1 (en) * | 2005-12-09 | 2011-07-21 | Harris Corporation | System including property-based weighted trust score application tokens for access control and related methods |
US20080031447A1 (en) * | 2006-08-04 | 2008-02-07 | Frank Geshwind | Systems and methods for aggregation of access to network products and services |
JP4845660B2 (ja) * | 2006-09-26 | 2011-12-28 | 株式会社野村総合研究所 | ログイン処理装置、ログイン処理システム、プログラム、及び記録媒体 |
US8032922B2 (en) * | 2006-12-18 | 2011-10-04 | Oracle International Corporation | Method and apparatus for providing access to an application-resource |
US20080168539A1 (en) * | 2007-01-05 | 2008-07-10 | Joseph Stein | Methods and systems for federated identity management |
US20080313707A1 (en) | 2007-06-18 | 2008-12-18 | Techporch, Inc. | Token-based system and method for secure authentication to a service provider |
WO2009070430A2 (en) | 2007-11-08 | 2009-06-04 | Suridx, Inc. | Apparatus and methods for providing scalable, dynamic, individualized credential services using mobile telephones |
US20090192944A1 (en) * | 2008-01-24 | 2009-07-30 | George Sidman | Symmetric verification of web sites and client devices |
US8635662B2 (en) * | 2008-01-31 | 2014-01-21 | Intuit Inc. | Dynamic trust model for authenticating a user |
US8402508B2 (en) * | 2008-04-02 | 2013-03-19 | Microsoft Corporation | Delegated authentication for web services |
US8141140B2 (en) * | 2008-05-23 | 2012-03-20 | Hsbc Technologies Inc. | Methods and systems for single sign on with dynamic authentication levels |
CN101605030B (zh) * | 2008-06-13 | 2012-09-05 | 新奥特(北京)视频技术有限公司 | 一种面向电视台应用的基于Active Directory的统一认证实现方法 |
US8281379B2 (en) * | 2008-11-13 | 2012-10-02 | Vasco Data Security, Inc. | Method and system for providing a federated authentication service with gradual expiration of credentials |
US8364970B2 (en) * | 2009-02-18 | 2013-01-29 | Nokia Corporation | Method and apparatus for providing enhanced service authorization |
DE102009027682A1 (de) * | 2009-07-14 | 2011-01-20 | Bundesdruckerei Gmbh | Verfahren zur Erzeugung eines Soft-Tokens |
US8312157B2 (en) * | 2009-07-16 | 2012-11-13 | Palo Alto Research Center Incorporated | Implicit authentication |
JP2011133951A (ja) * | 2009-12-22 | 2011-07-07 | Hitachi Ltd | 認証状態継承システム |
US8862515B2 (en) * | 2010-05-04 | 2014-10-14 | Sony Corporation | Geographic internet asset filtering for internet video client |
US9792425B2 (en) * | 2010-11-02 | 2017-10-17 | Ca, Inc. | System and method for controlling state tokens |
US8533796B1 (en) * | 2011-03-16 | 2013-09-10 | Google Inc. | Providing application programs with access to secured resources |
US8839395B2 (en) * | 2011-05-13 | 2014-09-16 | Cch Incorporated | Single sign-on between applications |
CN102833214A (zh) * | 2011-06-14 | 2012-12-19 | 赛酷特(北京)信息技术有限公司 | 一种基于令牌的网页登陆系统以及方法 |
US9635028B2 (en) * | 2011-08-31 | 2017-04-25 | Facebook, Inc. | Proxy authentication |
US9495533B2 (en) * | 2011-09-29 | 2016-11-15 | Oracle International Corporation | Mobile application, identity relationship management |
US8689310B2 (en) * | 2011-12-29 | 2014-04-01 | Ebay Inc. | Applications login using a mechanism relating sub-tokens to the quality of a master token |
US8844026B2 (en) * | 2012-06-01 | 2014-09-23 | Blackberry Limited | System and method for controlling access to secure resources |
US9589399B2 (en) * | 2012-07-02 | 2017-03-07 | Synaptics Incorporated | Credential quality assessment engine systems and methods |
US9124575B2 (en) * | 2013-11-27 | 2015-09-01 | Sap Se | Self-single sign-on |
US9852276B2 (en) * | 2014-07-03 | 2017-12-26 | Scayl. Inc. | System and methods for validating and managing user identities |
US10484345B2 (en) * | 2014-07-31 | 2019-11-19 | Visa International Service Association | System and method for identity verification across mobile applications |
US20160212115A1 (en) * | 2015-01-19 | 2016-07-21 | Dell Products, Lp | System and Method for Providing Confidence Scores in a Persistent Framework |
US10404735B2 (en) * | 2017-02-02 | 2019-09-03 | Aetna Inc. | Individualized cybersecurity risk detection using multiple attributes |
-
2011
- 2011-12-29 US US13/340,521 patent/US8689310B2/en active Active
-
2012
- 2012-12-26 CA CA2862334A patent/CA2862334C/en active Active
- 2012-12-26 CN CN201280065571.2A patent/CN104641345B/zh active Active
- 2012-12-26 CA CA3103839A patent/CA3103839C/en active Active
- 2012-12-26 KR KR20147021197A patent/KR20140135693A/ko not_active Application Discontinuation
- 2012-12-26 JP JP2014550434A patent/JP5980950B2/ja active Active
- 2012-12-26 CN CN201810361104.3A patent/CN108804906B/zh active Active
- 2012-12-26 WO PCT/US2012/071673 patent/WO2013101843A2/en active Application Filing
- 2012-12-26 AU AU2012362502A patent/AU2012362502B2/en active Active
- 2012-12-26 EP EP12863382.3A patent/EP2798515A4/en not_active Withdrawn
-
2014
- 2014-02-12 US US14/178,716 patent/US9111083B2/en active Active
-
2015
- 2015-08-17 US US14/828,239 patent/US10133858B2/en active Active
-
2018
- 2018-11-20 US US16/196,847 patent/US10474806B2/en active Active
-
2019
- 2019-11-11 US US16/680,473 patent/US10853468B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP2798515A4 (en) | 2016-02-17 |
CA3103839A1 (en) | 2013-07-04 |
CA3103839C (en) | 2022-07-19 |
US9111083B2 (en) | 2015-08-18 |
JP2015512068A (ja) | 2015-04-23 |
AU2012362502B2 (en) | 2018-04-26 |
US20150358319A1 (en) | 2015-12-10 |
US20140165179A1 (en) | 2014-06-12 |
US20190087560A1 (en) | 2019-03-21 |
AU2012362502A1 (en) | 2014-07-24 |
CN108804906B (zh) | 2021-11-02 |
US20200151313A1 (en) | 2020-05-14 |
US10853468B2 (en) | 2020-12-01 |
US8689310B2 (en) | 2014-04-01 |
EP2798515A2 (en) | 2014-11-05 |
CN108804906A (zh) | 2018-11-13 |
CN104641345A (zh) | 2015-05-20 |
CN104641345B (zh) | 2018-05-22 |
US10133858B2 (en) | 2018-11-20 |
AU2012362502A8 (en) | 2014-08-07 |
WO2013101843A3 (en) | 2015-01-08 |
CA2862334C (en) | 2021-02-16 |
US10474806B2 (en) | 2019-11-12 |
KR20140135693A (ko) | 2014-11-26 |
WO2013101843A2 (en) | 2013-07-04 |
US20130174244A1 (en) | 2013-07-04 |
CA2862334A1 (en) | 2013-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5980950B2 (ja) | マスタートークンの品質にサブトークンに関するメカニズムを利用するアプリケーションログイン | |
US20220188786A1 (en) | Systems and methods for user data management across multiple devices | |
CN107533708B (zh) | 跨应用程序统一登录 | |
US8387119B2 (en) | Secure application network | |
KR102420969B1 (ko) | 네트워크 아키텍처 내에 인증 서비스를 통합하기 위한 시스템 및 방법 | |
US20160308856A1 (en) | Two factor authentication using a one-time password | |
US8613055B1 (en) | Methods and apparatus for selecting an authentication mode at time of issuance of an access token | |
US9552580B2 (en) | Modular device payment system | |
US11539526B2 (en) | Method and apparatus for managing user authentication in a blockchain network | |
US20170372310A1 (en) | Secure key based trust chain among user devices | |
US10397214B2 (en) | Collaborative sign-on | |
CN113273133A (zh) | 用于通信通道交互期间的自动认证的令牌管理层 | |
US20190149541A1 (en) | Systems and methods for performing biometric registration and authentication of a user to provide access to a secure network | |
US20130151411A1 (en) | Digital authentication and security method and system | |
US20160117682A1 (en) | Secure seamless payments | |
JP6542672B2 (ja) | オンライン取引プラットフォームのアカウントを制御すること |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20150918 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20151027 |
|
A711 | Notification of change in applicant |
Free format text: JAPANESE INTERMEDIATE CODE: A711 Effective date: 20151224 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160121 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20160628 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20160727 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5980950 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |