JP6880017B2 - 信頼できないコンピュータ上でプライベートプログラムを実行するためのシステム及びプロセス - Google Patents

信頼できないコンピュータ上でプライベートプログラムを実行するためのシステム及びプロセス Download PDF

Info

Publication number
JP6880017B2
JP6880017B2 JP2018523361A JP2018523361A JP6880017B2 JP 6880017 B2 JP6880017 B2 JP 6880017B2 JP 2018523361 A JP2018523361 A JP 2018523361A JP 2018523361 A JP2018523361 A JP 2018523361A JP 6880017 B2 JP6880017 B2 JP 6880017B2
Authority
JP
Japan
Prior art keywords
computer
operand
obfuscated
result
operations
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2018523361A
Other languages
English (en)
Japanese (ja)
Other versions
JP2018522291A5 (enExample
JP2018522291A (ja
Inventor
アシュミート シダナ
アシュミート シダナ
プリヤダーシャン コルテ
プリヤダーシャン コルテ
カルヴァン リン
カルヴァン リン
Original Assignee
バッフル インコーポレイテッド
バッフル インコーポレイテッド
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by バッフル インコーポレイテッド, バッフル インコーポレイテッド filed Critical バッフル インコーポレイテッド
Publication of JP2018522291A publication Critical patent/JP2018522291A/ja
Publication of JP2018522291A5 publication Critical patent/JP2018522291A5/ja
Application granted granted Critical
Publication of JP6880017B2 publication Critical patent/JP6880017B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/046Masking or blinding of operations, operands or results of the operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
JP2018523361A 2015-07-21 2016-07-20 信頼できないコンピュータ上でプライベートプログラムを実行するためのシステム及びプロセス Active JP6880017B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/804,713 2015-07-21
US14/804,713 US10110566B2 (en) 2015-07-21 2015-07-21 Systems and processes for executing private programs on untrusted computers
PCT/US2016/043117 WO2017015357A1 (en) 2015-07-21 2016-07-20 Systems and processes for executing private programs on untrusted computers

Publications (3)

Publication Number Publication Date
JP2018522291A JP2018522291A (ja) 2018-08-09
JP2018522291A5 JP2018522291A5 (enExample) 2019-08-29
JP6880017B2 true JP6880017B2 (ja) 2021-06-02

Family

ID=57834671

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2018523361A Active JP6880017B2 (ja) 2015-07-21 2016-07-20 信頼できないコンピュータ上でプライベートプログラムを実行するためのシステム及びプロセス

Country Status (10)

Country Link
US (2) US10110566B2 (enExample)
EP (1) EP3326345B1 (enExample)
JP (1) JP6880017B2 (enExample)
KR (1) KR102315831B1 (enExample)
CN (1) CN108476198B (enExample)
AU (1) AU2016297559B2 (enExample)
CA (1) CA2998323C (enExample)
DK (1) DK3326345T3 (enExample)
IL (1) IL257040B (enExample)
WO (1) WO2017015357A1 (enExample)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10348503B2 (en) * 2016-12-12 2019-07-09 Sap Portals Israel Ltd. Client side actions validation
CN111801670B (zh) * 2017-12-18 2024-12-13 中佛罗里达大学研究基金会有限公司 操作在公共计算机上加密数据的代码的安全执行技术
US11232224B2 (en) 2018-03-15 2022-01-25 Servicenow, Inc. Database encryption
CN109446828B (zh) * 2018-11-07 2020-10-13 北京邮电大学 一种安全多方计算方法及装置
US11042634B2 (en) * 2018-12-21 2021-06-22 Fujitsu Limited Determining information leakage of computer-readable programs
CN113632082B (zh) * 2019-01-23 2025-11-28 皇家飞利浦有限公司 机器学习模型验证和认证
WO2020240246A1 (en) * 2019-05-29 2020-12-03 Commissariat A L 'energie Atomique Et Aux Energies Alternatives A computer-implemented method for obfuscating a program code
US11456855B2 (en) * 2019-10-17 2022-09-27 Arm Limited Obfuscating data at-transit
US11973743B2 (en) 2019-12-13 2024-04-30 TripleBlind, Inc. Systems and methods for providing a systemic error in artificial intelligence algorithms
US12149510B1 (en) 2019-12-13 2024-11-19 Tripleblind Holdings, Inc. Systems and methods for providing a private multi-modal artificial intelligence platform
US11431688B2 (en) 2019-12-13 2022-08-30 TripleBlind, Inc. Systems and methods for providing a modified loss function in federated-split learning
US11582203B2 (en) 2019-12-13 2023-02-14 TripleBlind, Inc. Systems and methods for encrypting data and algorithms
US11853793B2 (en) 2020-10-09 2023-12-26 Samsung Electronics Co., Ltd. Methods and system for on-device AI model parameter run-time protection
EP4050471A1 (en) 2021-02-26 2022-08-31 Zama SAS Encrypted scalar multiplication
JPWO2023007633A1 (enExample) * 2021-07-28 2023-02-02
US12288157B2 (en) 2022-02-03 2025-04-29 Selfiee Corporation Systems and methods for quantifying data leakage from a split layer
US12086246B2 (en) * 2022-07-01 2024-09-10 Nxp B.V. Method for protecting a machine learning model from a side channel attack
KR20240087103A (ko) * 2022-12-12 2024-06-19 삼성전자주식회사 스토리지 장치 및 이를 포함하는 스토리지 시스템

Family Cites Families (79)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6067620A (en) * 1996-07-30 2000-05-23 Holden; James M. Stand alone security device for computer networks
US6477648B1 (en) * 1997-03-23 2002-11-05 Novell, Inc. Trusted workstation in a networked client/server computing system
US6957341B2 (en) * 1998-05-14 2005-10-18 Purdue Research Foundation Method and system for secure computational outsourcing and disguise
US7430670B1 (en) 1999-07-29 2008-09-30 Intertrust Technologies Corp. Software self-defense systems and methods
AU2001243365A1 (en) * 2000-03-02 2001-09-12 Alarity Corporation System and method for process protection
US7895643B2 (en) * 2002-03-16 2011-02-22 Trustedflow Systems, Inc. Secure logic interlocking
US8220058B2 (en) * 2003-09-25 2012-07-10 Oracle America, Inc. Rendering and encryption engine for application program obfuscation
US7353499B2 (en) * 2003-09-25 2008-04-01 Sun Microsystems, Inc. Multiple instruction dispatch tables for application program obfuscation
US7363620B2 (en) * 2003-09-25 2008-04-22 Sun Microsystems, Inc. Non-linear execution of application program instructions for application program obfuscation
US7415618B2 (en) * 2003-09-25 2008-08-19 Sun Microsystems, Inc. Permutation of opcode values for application program obfuscation
US20050069138A1 (en) * 2003-09-25 2005-03-31 Sun Microsystems, Inc., A Delaware Corporation Application program obfuscation
US9525666B2 (en) * 2005-01-31 2016-12-20 Unisys Corporation Methods and systems for managing concurrent unsecured and cryptographically secure communications across unsecured networks
DE102005021749A1 (de) * 2005-05-11 2006-11-16 Fachhochschule Dortmund Verfahren und Vorrichtung zur programmgesteuerten Informationsverarbeitung
JP5113169B2 (ja) * 2006-07-12 2013-01-09 イルデト・コーポレート・ビー・ヴイ 暗号関数を難読化する方法およびシステム
US20090249492A1 (en) * 2006-09-21 2009-10-01 Hans Martin Boesgaard Sorensen Fabrication of computer executable program files from source code
US9411976B2 (en) * 2006-12-01 2016-08-09 Maidsafe Foundation Communication system and method
US9124650B2 (en) 2006-12-13 2015-09-01 Quickplay Media Inc. Digital rights management in a mobile environment
US8538012B2 (en) * 2007-03-14 2013-09-17 Intel Corporation Performing AES encryption or decryption in multiple modes with a single instruction
US8312518B1 (en) * 2007-09-27 2012-11-13 Avaya Inc. Island of trust in a service-oriented environment
US8762736B1 (en) * 2008-04-04 2014-06-24 Massachusetts Institute Of Technology One-time programs
US8209744B2 (en) * 2008-05-16 2012-06-26 Microsoft Corporation Mobile device assisted secure computer network communication
US8171306B2 (en) * 2008-11-05 2012-05-01 Microsoft Corporation Universal secure token for obfuscation and tamper resistance
EP2462507B1 (en) * 2009-08-04 2019-07-24 Carnegie Mellon University Methods and apparatuses for user-verifiable trusted path in the presence of malware
US8347398B1 (en) * 2009-09-23 2013-01-01 Savvystuff Property Trust Selected text obfuscation and encryption in a local, network and cloud computing environment
US20110202765A1 (en) * 2010-02-17 2011-08-18 Microsoft Corporation Securely move virtual machines between host servers
US9703586B2 (en) * 2010-02-17 2017-07-11 Microsoft Technology Licensing, Llc Distribution control and tracking mechanism of virtual machine appliances
US8862895B2 (en) * 2010-04-27 2014-10-14 Fuji Xerox Co., Ltd. Systems and methods for communication, storage, retrieval, and computation of simple statistics and logical operations on encrypted data
EP2577936A2 (en) * 2010-05-28 2013-04-10 Lawrence A. Laurich Accelerator system for use with secure data storage
US20110296164A1 (en) * 2010-05-28 2011-12-01 Mcafee, Inc. System and method for providing secure network services
ES2581548T3 (es) * 2010-08-18 2016-09-06 Security First Corp. Sistemas y procedimientos para asegurar entornos informáticos de máquinas virtuales
US8681973B2 (en) * 2010-09-15 2014-03-25 At&T Intellectual Property I, L.P. Methods, systems, and computer program products for performing homomorphic encryption and decryption on individual operations
US8762964B2 (en) 2010-12-17 2014-06-24 Cisco Technology, Inc. Optimizing symbol manipulation language-based executable applications for distributed execution
US8700906B2 (en) * 2011-01-14 2014-04-15 Microsoft Corporation Secure computing in multi-tenant data centers
US20120278872A1 (en) 2011-04-27 2012-11-01 Woelfel John Harold System and method of federated authentication with reverse proxy
US9077525B2 (en) * 2011-06-24 2015-07-07 Microsoft Technology Licensing, Llc User-controlled data encryption with obfuscated policy
WO2013009290A1 (en) * 2011-07-11 2013-01-17 Hewlett-Packard Development Company, Lp Policy based data management
US20130019092A1 (en) * 2011-07-14 2013-01-17 Barracuda Inc. System to Embed Enhanced Security / Privacy Functions Into a User Client
GB2497070B (en) * 2011-11-17 2015-11-25 Advanced Risc Mach Ltd Cryptographic support instructions
EP2786292B1 (en) * 2011-11-28 2016-06-08 Porticor Ltd. Methods and devices for securing keys for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management
US9208319B2 (en) * 2011-12-15 2015-12-08 Microsoft Technology Licensing, Llc Code base partitioning system
WO2013104969A1 (en) * 2012-01-09 2013-07-18 Koninklijke Philips N.V. Virtual machine device having key driven obfuscation and method
US8615656B2 (en) * 2012-01-09 2013-12-24 The Mitre Corporation Secure remote peripheral encryption tunnel
US9454666B2 (en) * 2012-03-26 2016-09-27 Irdeto B.V. Method for protecting data
EP2645618A1 (en) * 2012-03-30 2013-10-02 British Telecommunications Public Limited Company Method and system for network data access
EP2672672A1 (en) * 2012-06-07 2013-12-11 Alcatel-Lucent Secure data processing
EP2672673B1 (en) * 2012-06-07 2016-05-25 Alcatel Lucent Apparatus and method for secure data processing
US8656482B1 (en) * 2012-08-20 2014-02-18 Bitdefender IPR Management Ltd. Secure communication using a trusted virtual machine
US20140195804A1 (en) * 2012-10-12 2014-07-10 Safelylocked, Llc Techniques for secure data exchange
US9176838B2 (en) * 2012-10-19 2015-11-03 Intel Corporation Encrypted data inspection in a network environment
GB2508894A (en) * 2012-12-14 2014-06-18 Ibm Preventing a trusted boot device from being booted in a virtual machine
US9535715B2 (en) * 2012-12-14 2017-01-03 Microsoft Technology Licensing, Llc Booting from a trusted network image
US8909967B1 (en) * 2012-12-31 2014-12-09 Emc Corporation Technique for secure computation
US9503268B2 (en) * 2013-01-22 2016-11-22 Amazon Technologies, Inc. Securing results of privileged computing operations
US10063380B2 (en) * 2013-01-22 2018-08-28 Amazon Technologies, Inc. Secure interface for invoking privileged operations
US9055038B1 (en) * 2013-02-04 2015-06-09 Stealth Software Technologies, Inc. Apparatus, system, and method to garble programs
US9141823B2 (en) * 2013-03-15 2015-09-22 Veridicom, Sa De Cv Abstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation
US9361456B2 (en) * 2013-04-01 2016-06-07 Uniquesoft, Llc Secure computing device using a library of programs
US10275593B2 (en) * 2013-04-01 2019-04-30 Uniquesoft, Llc Secure computing device using different central processing resources
US9104862B2 (en) * 2013-04-01 2015-08-11 Uniquesoft, Llc Secure computing device using new software versions
US9424421B2 (en) 2013-05-03 2016-08-23 Visa International Service Association Security engine for a secure operating environment
US9530009B2 (en) * 2013-06-27 2016-12-27 Visa International Service Association Secure execution and update of application module code
EP3036680B1 (en) * 2013-08-21 2018-07-18 Intel Corporation Processing data privately in the cloud
CN103559458B (zh) * 2013-10-09 2016-08-17 广州华迅网络科技有限公司 数据散列获取方法及其系统
US9235692B2 (en) * 2013-12-13 2016-01-12 International Business Machines Corporation Secure application debugging
AU2015277000C1 (en) * 2014-06-18 2019-11-28 Visa International Service Association Efficient methods for authenticated communication
CN111756533B (zh) * 2014-08-29 2023-07-04 维萨国际服务协会 用于安全密码生成的系统、方法和存储介质
US9584517B1 (en) * 2014-09-03 2017-02-28 Amazon Technologies, Inc. Transforms within secure execution environments
CN104243166A (zh) * 2014-09-05 2014-12-24 深圳市中兴移动通信有限公司 录音加密方法和装置
US9735968B2 (en) * 2014-10-20 2017-08-15 Microsoft Technology Licensing, Llc Trust service for a client device
CN107408072B (zh) * 2014-12-16 2021-07-09 凯恩迪股份有限公司 用于随机化指令的方法、介质和装置
WO2016131056A1 (en) * 2015-02-13 2016-08-18 Visa International Service Association Confidential communication management
US9596263B1 (en) * 2015-02-23 2017-03-14 Amazon Technolgies, Inc. Obfuscation and de-obfuscation of identifiers
US10484168B2 (en) * 2015-03-02 2019-11-19 Dell Products L.P. Methods and systems for obfuscating data and computations defined in a secure distributed transaction ledger
US9712503B1 (en) * 2015-03-23 2017-07-18 Amazon Technologies, Inc. Computing instance migration
US20160294794A1 (en) * 2015-04-04 2016-10-06 Aleksandar Mancic Security System For Data Communications Including Key Management And Privacy
CA2982244C (en) * 2015-04-14 2024-01-23 Gigavation, Inc. Paravirtualized security threat protection of a computer-driven system with networked devices
JP6397590B2 (ja) * 2015-05-19 2018-09-26 クリプトムーヴ, インコーポレイテッドCryptomove, Inc. データ隠蔽によるセキュリティ
US20180089415A1 (en) * 2015-06-11 2018-03-29 International Business Machines Corporation User trusted device for detecting a virtualized environment
US9667606B2 (en) * 2015-07-01 2017-05-30 Cyphermatrix, Inc. Systems, methods and computer readable medium to implement secured computational infrastructure for cloud and data center environments

Also Published As

Publication number Publication date
IL257040B (en) 2020-02-27
EP3326345A1 (en) 2018-05-30
EP3326345B1 (en) 2021-10-06
EP3326345A4 (en) 2019-03-27
US10110566B2 (en) 2018-10-23
KR20180084732A (ko) 2018-07-25
CN108476198A (zh) 2018-08-31
US10652216B2 (en) 2020-05-12
AU2016297559B2 (en) 2020-09-03
CA2998323A1 (en) 2017-01-26
US20190044915A1 (en) 2019-02-07
KR102315831B1 (ko) 2021-10-22
US20170026342A1 (en) 2017-01-26
CA2998323C (en) 2022-06-07
WO2017015357A1 (en) 2017-01-26
DK3326345T3 (da) 2021-10-11
JP2018522291A (ja) 2018-08-09
IL257040A (en) 2018-03-29
AU2016297559A1 (en) 2018-03-15
CN108476198B (zh) 2020-09-22

Similar Documents

Publication Publication Date Title
JP6880017B2 (ja) 信頼できないコンピュータ上でプライベートプログラムを実行するためのシステム及びプロセス
US20250330308A1 (en) Symmetric cryptographic system and method, and encryption and decryption modules therefor
US11575501B2 (en) Preserving aggregation using homomorphic encryption and trusted execution environment, secure against malicious aggregator
US10367637B2 (en) Modular exponentiation with transparent side channel attack countermeasures
Tsoutsos et al. The HEROIC framework: Encrypted computation without shared keys
Bugiel et al. Twin Clouds: Secure Cloud Computing with Low Latency: (Full Version)
CN101751243B (zh) 用于指令级软件加密的方法和设备
US8976960B2 (en) Methods and apparatus for correlation protected processing of cryptographic operations
Kounavis et al. Encrypting the internet
JP2018036418A (ja) 暗号システム、暗号方法及び暗号プログラム
CN103258152A (zh) 执行包括已加密指令的软件应用程序的系统、装置和方法
US11496287B2 (en) Privacy preserving fully homomorphic encryption with circuit verification
CA3056814A1 (en) Symmetric cryptographic method and system and applications thereof
Dangwal et al. SoK: Opportunities for software-hardware-security codesign for next generation secure computing
Bokhari et al. Securing IoT Communications: A Novel Lightweight Stream Cipher Using DNA Cryptography and Grain-80 Cipher
Elrabaa et al. A protection and pay-per-use licensing scheme for on-cloud FPGA circuit IPs
Pal et al. MORSA: An Innovative Modified and Optimized RSA Framework Using Parallel Computing Environment.
Selo et al. Private function evaluation using intel’s sgx
Xu et al. End-to-end big data processing protection in cloud environment using black boxes—An FPGA approach
Anil et al. Securing Cloud Data With a Blockchain: Innovating AES Encryption via Modified Sine Map Rounds
Ahuja et al. Study of Vulnerabilities in the Cryptography Algorithms
Abou Selo et al. Research Article Private Function Evaluation Using Intel’s SGX
Ruan Building blocks of the security and management engine
Kariapper Cryptography in the Cloud: Securing Data in Cloud with Encryption
KR20140119837A (ko) 인터넷서비스 등에 응용가능한 패턴암호와 이 암호를 이용한 시스템과 비즈니스방법

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20190722

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20190722

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20200819

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20201001

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20210104

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20210222

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20210401

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20210430

R150 Certificate of patent or registration of utility model

Ref document number: 6880017

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250