KR100623552B1 - 자동침입대응시스템에서의 위험수준 분석 방법 - Google Patents
자동침입대응시스템에서의 위험수준 분석 방법 Download PDFInfo
- Publication number
- KR100623552B1 KR100623552B1 KR1020030099103A KR20030099103A KR100623552B1 KR 100623552 B1 KR100623552 B1 KR 100623552B1 KR 1020030099103 A KR1020030099103 A KR 1020030099103A KR 20030099103 A KR20030099103 A KR 20030099103A KR 100623552 B1 KR100623552 B1 KR 100623552B1
- Authority
- KR
- South Korea
- Prior art keywords
- information
- risk
- attack
- intrusion detection
- knowledge base
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
- G06N7/01—Probabilistic graphical models, e.g. probabilistic networks
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Mathematical Optimization (AREA)
- Software Systems (AREA)
- Evolutionary Computation (AREA)
- Pure & Applied Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Computational Mathematics (AREA)
- Mathematical Physics (AREA)
- Mathematical Analysis (AREA)
- Artificial Intelligence (AREA)
- Algebra (AREA)
- Probability & Statistics with Applications (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (7)
- 동적 네트워크 환경에서 컴퓨터 관련 보안을 제공하는 자동침입대응시스템에서의 위험수준 분석 방법에 있어서,침입 주체의 위험도 및 공격 대상의 중요도를 분석할 수 있도록 IDMEF 데이터 모델을 이용하여 침입 탐지 정보를 그 속성에 따라 공격 정보, 취약성 정보, 근원지 정보 및 목적지 정보로 분류하는 단계(a);상기 공격 정보, 취약성 정보, 근원지 정보 및 목적지 정보를 저장하기 위한 위험평가 지식 베이스를 구축하는 단계(b);상기 지식 베이스 내의 규칙들을 학습하는 단계로서, 상기 학습 단계는, 외부 공격의 위험도를 분석하기 위한 기준이 되는 속성을 선정하기 위해 상기 위험평가 지식 베이스에 저장된 공격 정보, 취약성 정보, 근원지 정보 및 목적지 정보에 대한 불확실성(Entropy) 값과 정보획득(Information Gain) 값을 구하는 단계를 포함하는 단계(c); 및상기 학습된 지식 베이스로부터 외부 공격의 위험도를 분류하되, 상기 공격 정보, 취약성 정보, 근원지 정보 및 목적지 정보 중에서 정보획득 값이 가장 높은 정보를 먼저 선정하여 분류하는 단계(d)를 포함하는 것을 특징으로 하는 위험수준 분석 방법.
- 제 1 항에 있어서, 상기 위험수준 분석은 상기 위험수준은 침입탐지 정보, 취약성 정보, 네트워크 대역폭, 시스템의 성능과 중요도, 및 공격의 빈도 등에 의하여 결정되는 것을 특징으로 하는 방법.
- 제 1 항에 있어서, 상기 동적 네트워크 환경은 대규모 분산 네트워크 환경인 것을 특징으로 하는 방법.
- 제 1 항에 있어서, 상기 IDMEF 데이터 모델에는 상기 자동침입대응시스템에 구비되어 있는 침입탐지시스템, 대응시스템 및 관리시스템 사이의 정보를 공유하기 위한 데이터 형식 및 교환 절차가 정의되어 있는 것을 특징으로 하는 방법.
- 삭제
- 제 1 항에 있어서, 상기 지식 베이스 내의 규칙들을 학습하는 단계(c)는 C4.5 기계학습 기법을 이용하는 것을 특징으로 하는 방법.
- 제 1 항에 있어서, 상기 학습된 지식 베이스로부터 외부 공격의 위험도를 분류하는 단계(d)는 에이다부스트 메타 학습 기법을 이용하는 것을 특징으로 하는 방법.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020030099103A KR100623552B1 (ko) | 2003-12-29 | 2003-12-29 | 자동침입대응시스템에서의 위험수준 분석 방법 |
| US11/009,207 US20050144480A1 (en) | 2003-12-29 | 2004-12-10 | Method of risk analysis in an automatic intrusion response system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020030099103A KR100623552B1 (ko) | 2003-12-29 | 2003-12-29 | 자동침입대응시스템에서의 위험수준 분석 방법 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| KR20050068052A KR20050068052A (ko) | 2005-07-05 |
| KR100623552B1 true KR100623552B1 (ko) | 2006-09-18 |
Family
ID=34698673
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| KR1020030099103A Expired - Fee Related KR100623552B1 (ko) | 2003-12-29 | 2003-12-29 | 자동침입대응시스템에서의 위험수준 분석 방법 |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US20050144480A1 (ko) |
| KR (1) | KR100623552B1 (ko) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR102064371B1 (ko) * | 2018-11-14 | 2020-01-09 | 고려대학교 산학협력단 | 환경디자인을 이용한 사이버 범죄 예방 방법, 이를 수행하기 위한 기록매체 및 장치 |
| KR102108960B1 (ko) * | 2019-04-12 | 2020-05-13 | 주식회사 이글루시큐리티 | 기계학습 기반 빈도형 보안정책 생성시스템 및 그 방법 |
| KR20210065687A (ko) | 2019-11-27 | 2021-06-04 | 국방과학연구소 | 시스템 운용 상태 정보를 이용한 사이버 자산 피해 분석 장치, 방법, 기록 매체 및 컴퓨터 프로그램 |
Families Citing this family (64)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7366919B1 (en) | 2003-04-25 | 2008-04-29 | Symantec Corporation | Use of geo-location data for spam detection |
| US7640590B1 (en) * | 2004-12-21 | 2009-12-29 | Symantec Corporation | Presentation of network source and executable characteristics |
| US7739494B1 (en) | 2003-04-25 | 2010-06-15 | Symantec Corporation | SSL validation and stripping using trustworthiness factors |
| US20070180101A1 (en) * | 2006-01-10 | 2007-08-02 | A10 Networks Inc. | System and method for storing data-network activity information |
| US8151322B2 (en) | 2006-05-16 | 2012-04-03 | A10 Networks, Inc. | Systems and methods for user access authentication based on network access point |
| US8332947B1 (en) | 2006-06-27 | 2012-12-11 | Symantec Corporation | Security threat reporting in light of local security tools |
| US8935380B2 (en) * | 2006-09-22 | 2015-01-13 | Oracle America, Inc. | Automated product knowledge catalog |
| KR100798923B1 (ko) * | 2006-09-29 | 2008-01-29 | 한국전자통신연구원 | 컴퓨터 및 네트워크 보안을 위한 공격 분류 방법 및 이를수행하는 프로그램을 기록한 기록 매체 |
| US7716378B2 (en) | 2006-10-17 | 2010-05-11 | A10 Networks, Inc. | System and method to associate a private user identity with a public user identity |
| US8312507B2 (en) | 2006-10-17 | 2012-11-13 | A10 Networks, Inc. | System and method to apply network traffic policy to an application session |
| DE602007013747D1 (de) * | 2007-08-10 | 2011-05-19 | Alcatel Lucent | Verfahren und Vorrichtung zur Klassifizierung von Datenverkehr in IP-Netzen |
| US8171554B2 (en) * | 2008-02-04 | 2012-05-01 | Yuval Elovici | System that provides early detection, alert, and response to electronic threats |
| US20100114649A1 (en) * | 2008-10-31 | 2010-05-06 | Asher Michael L | Buffer Analysis Model For Asset Protection |
| US20100161359A1 (en) * | 2008-12-18 | 2010-06-24 | At&T Intellectual Property I, L.P. | Risk Management for Cable Protection Via Dynamic Buffering |
| US9742778B2 (en) * | 2009-09-09 | 2017-08-22 | International Business Machines Corporation | Differential security policies in email systems |
| KR101156011B1 (ko) * | 2010-12-24 | 2012-06-18 | 고려대학교 산학협력단 | 네트워크 트래픽 분석을 통한 봇넷 위험도 산정 시스템 및 그 방법 |
| CN102014141B (zh) * | 2010-12-30 | 2013-02-06 | 电子科技大学 | 一种网络终端设备安全的实现方法 |
| US9426169B2 (en) * | 2012-02-29 | 2016-08-23 | Cytegic Ltd. | System and method for cyber attacks analysis and decision support |
| KR20130126814A (ko) * | 2012-04-26 | 2013-11-21 | 한국전자통신연구원 | 데이터마이닝을 이용한 트래픽 폭주 공격 탐지 및 심층적 해석 장치 및 방법 |
| US9609456B2 (en) | 2012-05-14 | 2017-03-28 | Qualcomm Incorporated | Methods, devices, and systems for communicating behavioral analysis information |
| US9690635B2 (en) | 2012-05-14 | 2017-06-27 | Qualcomm Incorporated | Communicating behavior information in a mobile computing device |
| US9324034B2 (en) | 2012-05-14 | 2016-04-26 | Qualcomm Incorporated | On-device real-time behavior analyzer |
| US9202047B2 (en) | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
| US9298494B2 (en) | 2012-05-14 | 2016-03-29 | Qualcomm Incorporated | Collaborative learning for efficient behavioral analysis in networked mobile device |
| CN104509034B (zh) * | 2012-07-31 | 2017-12-12 | 慧与发展有限责任合伙企业 | 模式合并以识别恶意行为 |
| US9747440B2 (en) | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
| US9495537B2 (en) | 2012-08-15 | 2016-11-15 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
| US9319897B2 (en) | 2012-08-15 | 2016-04-19 | Qualcomm Incorporated | Secure behavior analysis over trusted execution environment |
| US9330257B2 (en) | 2012-08-15 | 2016-05-03 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
| CN103020529B (zh) * | 2012-10-31 | 2015-12-09 | 中国航天科工集团第二研究院七○六所 | 一种基于场景模型的软件漏洞分析方法 |
| US10089582B2 (en) | 2013-01-02 | 2018-10-02 | Qualcomm Incorporated | Using normalized confidence values for classifying mobile device behaviors |
| US9686023B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors |
| US9684870B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors |
| US9742559B2 (en) | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
| US9491187B2 (en) | 2013-02-15 | 2016-11-08 | Qualcomm Incorporated | APIs for obtaining device-specific behavior classifier models from the cloud |
| US9122853B2 (en) | 2013-06-24 | 2015-09-01 | A10 Networks, Inc. | Location determination for user authentication |
| US11165770B1 (en) | 2013-12-06 | 2021-11-02 | A10 Networks, Inc. | Biometric verification of a human internet user |
| US20160048580A1 (en) * | 2014-08-14 | 2016-02-18 | Verizon Patent And Licensing Inc. | Method and system for providing delegated classification and learning services |
| US10162969B2 (en) * | 2014-09-10 | 2018-12-25 | Honeywell International Inc. | Dynamic quantification of cyber-security risks in a control system |
| US10021125B2 (en) | 2015-02-06 | 2018-07-10 | Honeywell International Inc. | Infrastructure monitoring tool for collecting industrial process control and automation system risk data |
| US10075474B2 (en) | 2015-02-06 | 2018-09-11 | Honeywell International Inc. | Notification subsystem for generating consolidated, filtered, and relevant security risk-based notifications |
| US10075475B2 (en) | 2015-02-06 | 2018-09-11 | Honeywell International Inc. | Apparatus and method for dynamic customization of cyber-security risk item rules |
| US10021119B2 (en) | 2015-02-06 | 2018-07-10 | Honeywell International Inc. | Apparatus and method for automatic handling of cyber-security risk events |
| US20160234240A1 (en) * | 2015-02-06 | 2016-08-11 | Honeywell International Inc. | Rules engine for converting system-related characteristics and events into cyber-security risk assessment values |
| US10298608B2 (en) | 2015-02-11 | 2019-05-21 | Honeywell International Inc. | Apparatus and method for tying cyber-security risk analysis to common risk methodologies and risk levels |
| US10699018B2 (en) * | 2015-02-16 | 2020-06-30 | G-Software, Inc. | Automated and continuous risk assessment related to a cyber liability insurance transaction |
| US10320813B1 (en) | 2015-04-30 | 2019-06-11 | Amazon Technologies, Inc. | Threat detection and mitigation in a virtualized computing environment |
| US9800604B2 (en) | 2015-05-06 | 2017-10-24 | Honeywell International Inc. | Apparatus and method for assigning cyber-security risk consequences in industrial process control environments |
| US10135855B2 (en) | 2016-01-19 | 2018-11-20 | Honeywell International Inc. | Near-real-time export of cyber-security risk information |
| KR101863569B1 (ko) * | 2016-11-04 | 2018-06-01 | 한국인터넷진흥원 | 머신 러닝 기반의 취약점 정보를 분류하는 방법 및 장치 |
| EP3402153A1 (en) * | 2017-05-12 | 2018-11-14 | Nokia Solutions and Networks Oy | Cloud infrastructure vulnerabilities assessment background |
| CN107317824B (zh) * | 2017-08-01 | 2023-07-25 | 北京观数科技有限公司 | 一种风险可控的实网攻防演练系统 |
| CN107425945A (zh) * | 2017-08-18 | 2017-12-01 | 太仓宏璟瑞远物业管理有限公司 | 一种通讯系统的风险性评估和校正方法 |
| CN107465691A (zh) * | 2017-09-14 | 2017-12-12 | 西安电子科技大学 | 基于路由器日志分析的网络攻击检测系统及检测方法 |
| KR101893029B1 (ko) * | 2018-05-28 | 2018-10-04 | 한국인터넷진흥원 | 머신 러닝 기반의 취약점 정보를 분류하는 방법 및 장치 |
| KR102055843B1 (ko) * | 2018-11-28 | 2020-01-22 | 주식회사 이글루시큐리티 | 이벤트 기반 보안정책 실시간 최적화 시스템 및 그 방법 |
| CN110059939A (zh) * | 2018-12-13 | 2019-07-26 | 成都亚信网络安全产业技术研究院有限公司 | 一种风险检测方法及装置 |
| US12488098B2 (en) | 2018-12-14 | 2025-12-02 | BreachRX, Inc. | Breach response data management system and method |
| US11244045B2 (en) * | 2018-12-14 | 2022-02-08 | BreachRX, Inc. | Breach response data management system and method |
| CN110290122B (zh) * | 2019-06-13 | 2020-07-17 | 中国科学院信息工程研究所 | 入侵响应策略生成方法及装置 |
| CN110855682A (zh) * | 2019-11-18 | 2020-02-28 | 南京邮电大学 | 网络攻击检测方法 |
| US11948114B2 (en) * | 2020-06-09 | 2024-04-02 | Innovation Associates Inc. | Audit-based compliance detection for healthcare sites |
| CN113596006A (zh) * | 2021-07-22 | 2021-11-02 | 安徽力盾网络科技有限公司 | 一种网络边界安全防御设备 |
| CN114666101B (zh) * | 2022-03-01 | 2024-03-22 | 国网新疆电力有限公司信息通信公司 | 一种攻击溯源检测系统及方法 |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20000010253A (ko) * | 1998-07-31 | 2000-02-15 | 최종욱 | 조정자 에이젼트를 이용한 침입 탐지 시스템 및 침입 탐지 시스템의 침입 탐지 모듈 |
| KR20000065547A (ko) * | 1999-04-07 | 2000-11-15 | 이종성 | 분산 침입 탐지 에이전트를 기반으로 한 지능형 침입탐지시스템 |
| JP2002342276A (ja) * | 2001-05-17 | 2002-11-29 | Ntt Data Corp | ネットワーク侵入検知システムおよびその方法 |
| KR20030048933A (ko) * | 2001-12-13 | 2003-06-25 | 주식회사 이글루시큐리티 | 위험도 추론 침입탐지시스템 |
| KR20030052511A (ko) * | 2001-12-21 | 2003-06-27 | 한국전자통신연구원 | 가변적인 보안 상황을 반영하는 보안 등급 설정방법 및이를 위한 기록 매체 |
| KR20030052512A (ko) * | 2001-12-21 | 2003-06-27 | 한국전자통신연구원 | 공격에 대한 연관성 분석방법 및 이를 위한 기록매체 |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6829613B1 (en) * | 1996-02-09 | 2004-12-07 | Technology Innovations, Llc | Techniques for controlling distribution of information from a secure domain |
| US7024033B2 (en) * | 2001-12-08 | 2006-04-04 | Microsoft Corp. | Method for boosting the performance of machine-learning classifiers |
| KR100456634B1 (ko) * | 2002-10-31 | 2004-11-10 | 한국전자통신연구원 | 정책기반 침입 탐지 및 대응을 위한 경보 전달 장치 및 방법 |
-
2003
- 2003-12-29 KR KR1020030099103A patent/KR100623552B1/ko not_active Expired - Fee Related
-
2004
- 2004-12-10 US US11/009,207 patent/US20050144480A1/en not_active Abandoned
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20000010253A (ko) * | 1998-07-31 | 2000-02-15 | 최종욱 | 조정자 에이젼트를 이용한 침입 탐지 시스템 및 침입 탐지 시스템의 침입 탐지 모듈 |
| KR20000065547A (ko) * | 1999-04-07 | 2000-11-15 | 이종성 | 분산 침입 탐지 에이전트를 기반으로 한 지능형 침입탐지시스템 |
| JP2002342276A (ja) * | 2001-05-17 | 2002-11-29 | Ntt Data Corp | ネットワーク侵入検知システムおよびその方法 |
| KR20030048933A (ko) * | 2001-12-13 | 2003-06-25 | 주식회사 이글루시큐리티 | 위험도 추론 침입탐지시스템 |
| KR20030052511A (ko) * | 2001-12-21 | 2003-06-27 | 한국전자통신연구원 | 가변적인 보안 상황을 반영하는 보안 등급 설정방법 및이를 위한 기록 매체 |
| KR20030052512A (ko) * | 2001-12-21 | 2003-06-27 | 한국전자통신연구원 | 공격에 대한 연관성 분석방법 및 이를 위한 기록매체 |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR102064371B1 (ko) * | 2018-11-14 | 2020-01-09 | 고려대학교 산학협력단 | 환경디자인을 이용한 사이버 범죄 예방 방법, 이를 수행하기 위한 기록매체 및 장치 |
| KR102108960B1 (ko) * | 2019-04-12 | 2020-05-13 | 주식회사 이글루시큐리티 | 기계학습 기반 빈도형 보안정책 생성시스템 및 그 방법 |
| KR20210065687A (ko) | 2019-11-27 | 2021-06-04 | 국방과학연구소 | 시스템 운용 상태 정보를 이용한 사이버 자산 피해 분석 장치, 방법, 기록 매체 및 컴퓨터 프로그램 |
Also Published As
| Publication number | Publication date |
|---|---|
| KR20050068052A (ko) | 2005-07-05 |
| US20050144480A1 (en) | 2005-06-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR100623552B1 (ko) | 자동침입대응시스템에서의 위험수준 분석 방법 | |
| Mukkamala et al. | Intrusion detection using neural networks and support vector machines | |
| US9807109B2 (en) | Profiling cyber threats detected in a target environment and automatically generating one or more rule bases for an expert system usable to profile cyber threats detected in a target environment | |
| Kumar et al. | Intrusion Detection System using decision tree algorithm | |
| Dickerson et al. | Fuzzy intrusion detection | |
| Zhu et al. | Alert correlation for extracting attack strategies | |
| Omar | Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree | |
| Kornyo et al. | Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms | |
| WO2021170249A1 (en) | Cyberattack identification in a network environment | |
| Wang et al. | Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack | |
| Walling et al. | A survey on intrusion detection systems: Types, datasets, machine learning methods for NIDS and challenges | |
| Sumanth et al. | Raspberry pi based intrusion detection system using k-means clustering algorithm | |
| Mohammadzad et al. | MAGD: Minimal attack graph generation dynamically in cyber security | |
| Beigh et al. | Intrusion Detection and Prevention System: Classification and Quick | |
| Kazienko et al. | Intrusion detection systems (IDS) Part 2-Classification; methods; techniques | |
| Kang et al. | Actdetector: A sequence-based framework for network attack activity detection | |
| Mixia et al. | Network security situation assessment based on data fusion | |
| KR100615080B1 (ko) | 컴퓨터 네트워크상에서 악성 봇과 웜에 대한 규칙기반탐지패턴을 자동 생성하기 위한 방법 | |
| Neri | Mining TCP/IP traffic for network intrusion detection by using a distributed genetic algorithm | |
| CN117813800A (zh) | 用于网络威胁情报的入侵检测和预防的装置和方法 | |
| Ghazi et al. | Performance and efficacy of Snort versus Suricata in intrusion detection: A benchmark analysis | |
| STIAWAN1&2 et al. | Intrusion prevention system: a survey | |
| Shin et al. | Alert correlation analysis in intrusion detection | |
| Shin et al. | An alert data mining framework for network-based intrusion detection system | |
| CN115348042B (zh) | 监测方法、装置、电子设备及存储介质 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A201 | Request for examination | ||
| PA0109 | Patent application |
St.27 status event code: A-0-1-A10-A12-nap-PA0109 |
|
| PA0201 | Request for examination |
St.27 status event code: A-1-2-D10-D11-exm-PA0201 |
|
| D13-X000 | Search requested |
St.27 status event code: A-1-2-D10-D13-srh-X000 |
|
| PG1501 | Laying open of application |
St.27 status event code: A-1-1-Q10-Q12-nap-PG1501 |
|
| D14-X000 | Search report completed |
St.27 status event code: A-1-2-D10-D14-srh-X000 |
|
| E902 | Notification of reason for refusal | ||
| PE0902 | Notice of grounds for rejection |
St.27 status event code: A-1-2-D10-D21-exm-PE0902 |
|
| T11-X000 | Administrative time limit extension requested |
St.27 status event code: U-3-3-T10-T11-oth-X000 |
|
| E13-X000 | Pre-grant limitation requested |
St.27 status event code: A-2-3-E10-E13-lim-X000 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| E701 | Decision to grant or registration of patent right | ||
| PE0701 | Decision of registration |
St.27 status event code: A-1-2-D10-D22-exm-PE0701 |
|
| GRNT | Written decision to grant | ||
| PR0701 | Registration of establishment |
St.27 status event code: A-2-4-F10-F11-exm-PR0701 |
|
| PR1002 | Payment of registration fee |
St.27 status event code: A-2-2-U10-U11-oth-PR1002 Fee payment year number: 1 |
|
| PG1601 | Publication of registration |
St.27 status event code: A-4-4-Q10-Q13-nap-PG1601 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 4 |
|
| PN2301 | Change of applicant |
St.27 status event code: A-5-5-R10-R11-asn-PN2301 |
|
| PN2301 | Change of applicant |
St.27 status event code: A-5-5-R10-R14-asn-PN2301 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 5 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 6 |
|
| FPAY | Annual fee payment |
Payment date: 20120713 Year of fee payment: 7 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 7 |
|
| FPAY | Annual fee payment |
Payment date: 20130830 Year of fee payment: 8 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 8 |
|
| FPAY | Annual fee payment |
Payment date: 20140829 Year of fee payment: 9 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 9 |
|
| FPAY | Annual fee payment |
Payment date: 20150828 Year of fee payment: 10 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 10 |
|
| LAPS | Lapse due to unpaid annual fee | ||
| PC1903 | Unpaid annual fee |
St.27 status event code: A-4-4-U10-U13-oth-PC1903 Not in force date: 20160907 Payment event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE |
|
| PC1903 | Unpaid annual fee |
St.27 status event code: N-4-6-H10-H13-oth-PC1903 Ip right cessation event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE Not in force date: 20160907 |



