JP7426031B2 - 鍵セキュリティ管理システムおよび方法、媒体、ならびにコンピュータプログラム - Google Patents

鍵セキュリティ管理システムおよび方法、媒体、ならびにコンピュータプログラム Download PDF

Info

Publication number
JP7426031B2
JP7426031B2 JP2021537206A JP2021537206A JP7426031B2 JP 7426031 B2 JP7426031 B2 JP 7426031B2 JP 2021537206 A JP2021537206 A JP 2021537206A JP 2021537206 A JP2021537206 A JP 2021537206A JP 7426031 B2 JP7426031 B2 JP 7426031B2
Authority
JP
Japan
Prior art keywords
key pair
request
key
user
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2021537206A
Other languages
English (en)
Japanese (ja)
Other versions
JP2022515467A (ja
JPWO2020135853A5 (enExample
Inventor
グ,ジャンリャン
マ,バンギャ
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Weilian Information Technology Co Ltd
Original Assignee
Shanghai Weilian Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Weilian Information Technology Co Ltd filed Critical Shanghai Weilian Information Technology Co Ltd
Publication of JP2022515467A publication Critical patent/JP2022515467A/ja
Publication of JPWO2020135853A5 publication Critical patent/JPWO2020135853A5/ja
Application granted granted Critical
Publication of JP7426031B2 publication Critical patent/JP7426031B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0847Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
JP2021537206A 2018-12-29 2019-12-30 鍵セキュリティ管理システムおよび方法、媒体、ならびにコンピュータプログラム Active JP7426031B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201811633995.X 2018-12-29
CN201811633995.XA CN109687959B (zh) 2018-12-29 2018-12-29 密钥安全管理系统和方法、介质和计算机程序
PCT/CN2019/129769 WO2020135853A1 (zh) 2018-12-29 2019-12-30 密钥安全管理系统和方法、介质和计算机程序

Publications (3)

Publication Number Publication Date
JP2022515467A JP2022515467A (ja) 2022-02-18
JPWO2020135853A5 JPWO2020135853A5 (enExample) 2022-12-28
JP7426031B2 true JP7426031B2 (ja) 2024-02-01

Family

ID=66191138

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2021537206A Active JP7426031B2 (ja) 2018-12-29 2019-12-30 鍵セキュリティ管理システムおよび方法、媒体、ならびにコンピュータプログラム

Country Status (6)

Country Link
US (1) US12058252B2 (enExample)
EP (1) EP3879747A4 (enExample)
JP (1) JP7426031B2 (enExample)
CN (1) CN109687959B (enExample)
SG (1) SG11202106514TA (enExample)
WO (1) WO2020135853A1 (enExample)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109687975B (zh) * 2018-12-29 2020-11-03 飞天诚信科技股份有限公司 一种硬件钱包可脱机进行初始化的实现方法及装置
CN109687959B (zh) 2018-12-29 2021-11-12 上海唯链信息科技有限公司 密钥安全管理系统和方法、介质和计算机程序
US11100497B2 (en) * 2019-08-20 2021-08-24 Anchor Labs, Inc. Risk mitigation for a cryptoasset custodial system using a hardware security key
CN110519256B (zh) * 2019-08-21 2021-09-24 上海唯链信息科技有限公司 一种DApp访问USB私钥管理设备的方法及装置
KR20210023601A (ko) * 2019-08-23 2021-03-04 삼성전자주식회사 블록체인 계좌 정보를 제공하는 전자 장치와 이의 동작 방법
CN110401544A (zh) * 2019-08-29 2019-11-01 北京艾摩瑞策科技有限公司 知识付费平台用户的区块链私钥的代签方法及其装置
EP3886383A1 (en) * 2020-03-23 2021-09-29 Nokia Solutions and Networks Oy Apparatus, method and computer program for routing data in a dual or multi-connectivity configuration
CN111934858B (zh) * 2020-07-09 2022-03-18 中国电子科技集团公司第三十研究所 一种可监管的随机公钥派生方法
CN112187466B (zh) * 2020-09-01 2023-05-12 深信服科技股份有限公司 一种身份管理方法、装置、设备及存储介质
US11444771B2 (en) * 2020-09-08 2022-09-13 Micron Technology, Inc. Leveraging a trusted party third-party HSM and database to securely share a key
US11575508B2 (en) * 2021-06-02 2023-02-07 International Business Machines Corporation Unified HSM and key management service
CN113364589B (zh) * 2021-08-10 2021-11-02 深圳致星科技有限公司 用于联邦学习安全审计的密钥管理系统、方法及存储介质
CN113641494B (zh) * 2021-08-11 2025-07-15 京东科技控股股份有限公司 服务器的控制方法、装置和服务器
CN114978774B (zh) * 2022-07-28 2022-10-04 四川九洲空管科技有限责任公司 基于嵌套式保护结构的多层级密钥管理方法
CN116384999B (zh) * 2023-04-19 2024-08-30 山东高速信联科技股份有限公司 轻量级支持隐形地址的分层确定性钱包模型及方法
FR3149103A1 (fr) * 2023-05-26 2024-11-29 Ledger Système de gestion mutualisée de comptes de cryptoactifs à signature multipartite
FR3149104A1 (fr) * 2023-05-26 2024-11-29 Ledger Système de gestion mutualisée de comptes de cryptoactifs, ayant des modules matériels de gouvernance et de signature distincts

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009500905A (ja) 2005-06-30 2009-01-08 アドバンスト・マイクロ・ディバイシズ・インコーポレイテッド セキュアパッチシステム
US20100191970A1 (en) 2009-01-27 2010-07-29 Noam Singer Generating protected access credentials
US20140050317A1 (en) 2012-08-16 2014-02-20 Digicert, Inc. Cloud Key Management System
JP2014045465A (ja) 2012-08-29 2014-03-13 Hitachi Ltd 記録媒体、プログラム、及び、情報配信装置
JP2018504806A (ja) 2014-12-17 2018-02-15 アマゾン・テクノロジーズ、インコーポレイテッド 期待値を有するデータセキュリティ処理
JP2018507652A (ja) 2015-03-02 2018-03-15 セールスフォース ドット コム インコーポレイティッド データの安全を確保するためのシステムおよび方法

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002021409A1 (en) * 2000-09-08 2002-03-14 Tallent Guy S System and method for transparently providing certificate validation and other services within an electronic transaction
AU2002332671A1 (en) 2001-08-13 2003-03-03 Board Of Trustees Of The Leland Stanford Junior University Systems and methods for identity-based encryption and related cryptographic techniques
US20050114686A1 (en) 2003-11-21 2005-05-26 International Business Machines Corporation System and method for multiple users to securely access encrypted data on computer system
US7697691B2 (en) 2004-07-14 2010-04-13 Intel Corporation Method of delivering Direct Proof private keys to devices using an on-line service
CN100346249C (zh) * 2004-12-31 2007-10-31 联想(北京)有限公司 生成数字证书及应用该所生成的数字证书的方法
CN1925401B (zh) * 2006-10-12 2011-06-15 中国联合网络通信有限公司北京市分公司 互联网接入系统及接入方法
CN101426190A (zh) * 2007-11-01 2009-05-06 华为技术有限公司 一种服务访问认证方法和系统
CN101459505B (zh) * 2007-12-14 2011-09-14 华为技术有限公司 生成用户私钥的方法、系统及用户设备、密钥生成中心
CN101359991A (zh) * 2008-09-12 2009-02-04 湖北电力信息通信中心 基于标识的公钥密码体制私钥托管系统
CN101557289A (zh) * 2009-05-13 2009-10-14 大连理工大学 基于身份认证的存储安全密钥管理方法
CN102215488B (zh) * 2011-05-27 2013-11-06 中国联合网络通信集团有限公司 智能手机数字证书的应用方法和系统
US9094431B2 (en) * 2012-11-01 2015-07-28 Miiicasa Taiwan Inc. Verification of network device position
US9311500B2 (en) 2013-09-25 2016-04-12 Amazon Technologies, Inc. Data security using request-supplied keys
CN103580872B (zh) * 2013-11-11 2016-12-07 北京华大智宝电子系统有限公司 一种用于密钥生成与管理的系统及方法
CN106161017A (zh) * 2015-03-20 2016-11-23 北京虎符科技有限公司 标识认证安全管理系统
US9882726B2 (en) * 2015-05-22 2018-01-30 Motorola Solutions, Inc. Method and apparatus for initial certificate enrollment in a wireless communication system
US10461940B2 (en) 2017-03-10 2019-10-29 Fmr Llc Secure firmware transaction signing platform apparatuses, methods and systems
CN105373955B (zh) * 2015-12-08 2020-07-10 布比(北京)网络技术有限公司 基于多重签名的数字资产处理方法及装置
CN106921496A (zh) * 2015-12-25 2017-07-04 卓望数码技术(深圳)有限公司 一种数字签名方法和系统
KR20170091951A (ko) 2016-02-02 2017-08-10 에스프린팅솔루션 주식회사 전자 디바이스에게 보안을 제공하기 위한 방법 및 장치
CN105915338B (zh) * 2016-05-27 2018-12-28 北京中油瑞飞信息技术有限责任公司 生成密钥的方法和系统
US10284378B2 (en) * 2016-10-05 2019-05-07 The Toronto-Dominion Bank Certificate authority master key tracking on distributed ledger
CN106686004B (zh) 2017-02-28 2019-07-12 飞天诚信科技股份有限公司 一种登录认证方法及系统
CN107508680B (zh) 2017-07-26 2021-02-05 创新先进技术有限公司 数字证书管理方法、装置及电子设备
CN107395349A (zh) 2017-08-16 2017-11-24 深圳国微技术有限公司 一种基于自认证公钥体制的区块链网络密钥分发方法
US11012237B1 (en) * 2018-01-09 2021-05-18 Jpmorgan Chase Bank, N.A. Systems and methods for inter-service authentication
CN108830711A (zh) * 2018-05-07 2018-11-16 国网浙江省电力有限公司嘉兴供电公司 一种基于区块链的能源互联网交易账本管理方法及系统
CN108847937B (zh) * 2018-09-04 2021-06-15 捷德(中国)科技有限公司 密钥处理方法、装置、设备及介质
CN109067801B (zh) * 2018-09-29 2021-09-03 平安科技(深圳)有限公司 一种身份认证方法、身份认证装置及计算机可读介质
CN109064151A (zh) * 2018-10-23 2018-12-21 北京金山安全软件有限公司 一种转账方法、装置、电子设备及存储介质
CN109687959B (zh) 2018-12-29 2021-11-12 上海唯链信息科技有限公司 密钥安全管理系统和方法、介质和计算机程序

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009500905A (ja) 2005-06-30 2009-01-08 アドバンスト・マイクロ・ディバイシズ・インコーポレイテッド セキュアパッチシステム
US20100191970A1 (en) 2009-01-27 2010-07-29 Noam Singer Generating protected access credentials
US20140050317A1 (en) 2012-08-16 2014-02-20 Digicert, Inc. Cloud Key Management System
JP2014045465A (ja) 2012-08-29 2014-03-13 Hitachi Ltd 記録媒体、プログラム、及び、情報配信装置
JP2018504806A (ja) 2014-12-17 2018-02-15 アマゾン・テクノロジーズ、インコーポレイテッド 期待値を有するデータセキュリティ処理
JP2018507652A (ja) 2015-03-02 2018-03-15 セールスフォース ドット コム インコーポレイティッド データの安全を確保するためのシステムおよび方法

Also Published As

Publication number Publication date
CN109687959B (zh) 2021-11-12
US20220078009A1 (en) 2022-03-10
EP3879747A4 (en) 2022-08-10
CN109687959A (zh) 2019-04-26
US12058252B2 (en) 2024-08-06
JP2022515467A (ja) 2022-02-18
WO2020135853A1 (zh) 2020-07-02
SG11202106514TA (en) 2021-07-29
EP3879747A1 (en) 2021-09-15

Similar Documents

Publication Publication Date Title
JP7426031B2 (ja) 鍵セキュリティ管理システムおよび方法、媒体、ならびにコンピュータプログラム
US12015716B2 (en) System and method for securely processing an electronic identity
US12093419B2 (en) Methods and devices for managing user identity authentication data
US11652608B2 (en) System and method to protect sensitive information via distributed trust
CN110692214B (zh) 用于使用区块链的所有权验证的方法和系统
US10567377B2 (en) Multifactor privacy-enhanced remote identification using a rich credential
US9130926B2 (en) Authorization messaging with integral delegation data
US11870898B2 (en) Split keys for wallet recovery
JP2020009500A (ja) データセキュリティサービス
KR20110079660A (ko) 태그 데이터 요소의 암호화와 동작 제어 프로세스-1
CN113347008B (zh) 一种加法同态加密的贷款信息存储方法
CN114666168B (zh) 去中心化身份凭证验证方法、装置,以及,电子设备
CN109447809A (zh) 一种结合区块链的视频主动识别方法
US20030046213A1 (en) Anonymous processing of usage rights with variable degrees of privacy and accuracy
AU2021101878A4 (en) Computerized design model for encryption in blockchain transaction systems
US11522722B2 (en) Communication apparatus and communication method
CN110445756B (zh) 云存储中可搜索加密审计日志的实现方法
CN116830181A (zh) 服务提供系统
HK40050164A (en) Key security management system and method, medium, and computer program
CN114218547A (zh) 接入访问方法、装置及电子设备
HK40061618A (en) Using a contactless card to securely share personal data stored in a blockchain
HK40046077A (en) Methods and devices for managing user identity authentication data
KR20080014795A (ko) 태그 데이터 요소의 암호화와 동작 제어 프로세스
KR20180105324A (ko) 공인인증서 비밀번호를 관리하는 방법 및 애플리케이션

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20221216

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20221216

TRDD Decision of grant or rejection written
A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20231225

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20231226

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20240111

R150 Certificate of patent or registration of utility model

Ref document number: 7426031

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150