JP2000511382A - 第1のコンピュータユニットと第2のコンピュータユニットの間の暗号化キー管理方法 - Google Patents
第1のコンピュータユニットと第2のコンピュータユニットの間の暗号化キー管理方法Info
- Publication number
- JP2000511382A JP2000511382A JP10500076A JP50007698A JP2000511382A JP 2000511382 A JP2000511382 A JP 2000511382A JP 10500076 A JP10500076 A JP 10500076A JP 50007698 A JP50007698 A JP 50007698A JP 2000511382 A JP2000511382 A JP 2000511382A
- Authority
- JP
- Japan
- Prior art keywords
- computer unit
- authentication
- security
- computer
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims description 6
- 238000000034 method Methods 0.000 claims abstract description 87
- 238000004891 communication Methods 0.000 description 61
- 238000012790 confirmation Methods 0.000 description 11
- 238000011161 development Methods 0.000 description 8
- 229910000498 pewter Inorganic materials 0.000 description 4
- 239000010957 pewter Substances 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 102100028188 Cystatin-F Human genes 0.000 description 1
- 101710169749 Cystatin-F Proteins 0.000 description 1
- 241001122767 Theaceae Species 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000002045 lasting effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000033764 rhythmic process Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Mobile Radio Communication Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Hardware Redundancy (AREA)
Abstract
Description
Claims (1)
- 【特許請求の範囲】 1.第1のコンピュータユニット(C1)と第2のコンピュータユニット(C 2)との間の暗号化キー管理方法において、 第1のコンピュータユニット(C1)と第2のコンピュータユニット(C2)と の間で、認証を実施し、 第1のコンピュータユニット(C1)と第2のコンピュータユニット(C2)と の間の認証の期間に、認証リファレンス(ARA,ARB)を交換し、該認証レフ ァレンスによって前記コンピュータユニット(C1,C2)の認証を保証し、 第1のコンピュータユニット(C1)と第2のコンピュータユニット(C2)と の間で、セキュリティ・ポリシー(SP)を取り決めおよび/またはキー交換( SA)を実施し、かつ セキュリティ・ポリシー(SP)の取り決めの際および/またはキー交換(SA )の際、前記認証リファレンス(ARA,ARB)の少なくとも1つを使用するこ とを特徴とする方法。 2.前記第1のコンピュータユニット(C1)を第1のセキュリティ・ドメイ ン(S1)に配属させ、 前記第2のコンピュータユニット(C2)を第2のセキュリティ・ドメイン(S 2)に配属させ、 前記第1のセキュリティ・ドメイン(S1)または前 記第2のセキュリティ・ドメイン(S2)の別のコンピュータユニット(Ci) によって、別のセキュリティ・ポリシー(SPi)を取り決め、かつ 前記取り決めの際に、前記認証リファレンス(ARA,ARB)を使用する 請求項1記載の方法。 3.前記第1のコンピュータユニット(C1)を第1のセキュリティ・ドメイ ン(S1)に配属させ、 前記第2のコンピュータユニット(C2)を第2のセキュリティ・ドメイン(S 2)に配属させ、 前記第1のセキュリティ・ドメイン(S1)または前記第2のセキュリティ・ド メイン(S2)の別のコンピュータユニット(Ci)によって、別のキー交換( SAi)を実施し、かつ 該キー交換(SAi)の際に、前記認証リファレンス(ARA,ARB)を使用す る 請求項1または2記載の方法。 4.該方法の範囲で、対称暗号アルゴリズムに基づいているハッシュ関数(h ())を使用する 請求項1から3までのいずれか1項記載の方法。 5.該方法の範囲で、デジタル署名(SIG())を使用する 請求項1から4までのいずれか1項記載の方法。 6.該方法による認証を、X.509方法の強い認証に従って実施する 請求項1から5までのいずれか1項記載の方法。 7.該方法による認証を、ディフィ−ヘルマン方法に従ってキー交換のために 実施し、かつ 前記ディフィ−ヘルマン方法に従って交換されたキーを前記認証リファレンス( ARA,ARB)として使用する 請求項1から6までのいずれか1項記載の方法。 8.接続中断フェーズ(ディスコネクト)を実施し、その枠内で、分配された 秘密、例えば前記交換されたキーまたは前記認証リファレンス(ARA,ARB) を消去する 請求項1から7までのいずれか1項記載の方法。 9.前記交換されたキーを消去する 請求項8記載の方法。 10.引き続いて逐次その他の秘密を消去する請求項9記載の方法。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19622631 | 1996-06-05 | ||
DE19622631.7 | 1996-06-05 | ||
PCT/DE1997/001002 WO1997047109A1 (de) | 1996-06-05 | 1997-05-16 | Verfahren zum kryptographischen schlüsselmanagement zwischen einer ersten computereinheit und einer zweiten computereinheit |
Publications (1)
Publication Number | Publication Date |
---|---|
JP2000511382A true JP2000511382A (ja) | 2000-08-29 |
Family
ID=7796260
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP10500076A Pending JP2000511382A (ja) | 1996-06-05 | 1997-05-16 | 第1のコンピュータユニットと第2のコンピュータユニットの間の暗号化キー管理方法 |
Country Status (13)
Country | Link |
---|---|
US (1) | US6401204B1 (ja) |
EP (1) | EP0903026B1 (ja) |
JP (1) | JP2000511382A (ja) |
KR (1) | KR100363607B1 (ja) |
CN (1) | CN1175615C (ja) |
AT (1) | ATE198114T1 (ja) |
BR (1) | BR9709534A (ja) |
CA (1) | CA2257477C (ja) |
DE (1) | DE59702763D1 (ja) |
ES (1) | ES2153197T3 (ja) |
RU (1) | RU2213367C2 (ja) |
UA (1) | UA53651C2 (ja) |
WO (1) | WO1997047109A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003503864A (ja) * | 1998-11-03 | 2003-01-28 | シーメンス アクチエンゲゼルシヤフト | 第1インスタンスおよび第2インスタンスを認証する方法および装置 |
JP2007506392A (ja) * | 2003-09-22 | 2007-03-15 | イムプシス ディジタル セキュリティ アクチボラゲット | データ通信機密保護の仕組みおよび方法 |
JP2009525647A (ja) * | 2006-01-30 | 2009-07-09 | シーメンス アクチエンゲゼルシヤフト | 第1の通信機と第2の通信機とのあいだでの共通鍵の指定方法、および、第1の通信機と第2の通信機とのあいだでの共通鍵の指定装置 |
Families Citing this family (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2788649A1 (fr) * | 1999-01-18 | 2000-07-21 | Schlumberger Systems & Service | Procede de chargement securise de donnees entre des modules de securite |
FR2789536B1 (fr) * | 1999-02-08 | 2001-03-09 | Bull Sa | Dispositif et procede d'authentification d'un utilisateur a distance |
GB9903123D0 (en) | 1999-02-11 | 1999-04-07 | Nokia Telecommunications Oy | Method of securing communication |
US6289450B1 (en) * | 1999-05-28 | 2001-09-11 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
US7024690B1 (en) * | 2000-04-28 | 2006-04-04 | 3Com Corporation | Protected mutual authentication over an unsecured wireless communication channel |
KR100470915B1 (ko) * | 2001-12-28 | 2005-03-08 | 한국전자통신연구원 | Ip계층에서의 패킷 보안을 위한 인터넷 정보보호시스템의 제어 방법 |
US20040006701A1 (en) * | 2002-04-13 | 2004-01-08 | Advanced Decisions Inc. | Method and apparatus for authentication of recorded audio |
JP3801559B2 (ja) * | 2002-12-26 | 2006-07-26 | ソニー株式会社 | 通信装置および方法、記録媒体、並びにプログラム |
US7631181B2 (en) * | 2003-09-22 | 2009-12-08 | Canon Kabushiki Kaisha | Communication apparatus and method, and program for applying security policy |
US7650509B1 (en) * | 2004-01-28 | 2010-01-19 | Gordon & Howard Associates, Inc. | Encoding data in a password |
RU2329605C2 (ru) * | 2004-02-09 | 2008-07-20 | Корпорация "Самсунг Электроникс" | Система распределения ключей и способ ее функционирования |
US7814320B2 (en) * | 2005-07-19 | 2010-10-12 | Ntt Docomo, Inc. | Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved security against malleability attacks |
RU2285948C1 (ru) * | 2005-10-07 | 2006-10-20 | Закрытое акционерное общество "Аладдин Р. Д." | Способ обеспечения безопасного доступа пользователя к базам данных oracle |
US8122240B2 (en) * | 2005-10-13 | 2012-02-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for establishing a security association |
US20070194881A1 (en) | 2006-02-07 | 2007-08-23 | Schwarz Stanley G | Enforcing payment schedules |
EP2011301B1 (en) * | 2006-04-10 | 2011-06-22 | Trust Integration Services B.V. | Arrangement of and method for secure data transmission. |
GB2442044B8 (en) * | 2006-05-11 | 2011-02-23 | Ericsson Telefon Ab L M | Addressing and routing mechanism for web server clusters. |
US9026267B2 (en) | 2007-03-09 | 2015-05-05 | Gordon*Howard Associates, Inc. | Methods and systems of selectively enabling a vehicle by way of a portable wireless device |
FR2916592B1 (fr) * | 2007-05-25 | 2017-04-14 | Groupe Des Ecoles De Telecommunications(Get)-Ecole Nat Superieure Des Telecommunications(Enst) | Procede de securisation d'echange d'information,dispositif, et produit programme d'ordinateur correspondant |
EP2043015B1 (en) * | 2007-09-27 | 2014-04-23 | Sap Ag | Secure logical vector clocks |
US8686841B2 (en) | 2008-12-12 | 2014-04-01 | Gordon*Howard Associates, Inc. | Methods and systems related to activating geo-fence boundaries and collecting location data |
US8018329B2 (en) | 2008-12-12 | 2011-09-13 | Gordon * Howard Associates, Inc. | Automated geo-fence boundary configuration and activation |
US8581712B2 (en) | 2008-12-12 | 2013-11-12 | Gordon * Howard Associates, Inc . | Methods and systems related to establishing geo-fence boundaries |
US8659404B2 (en) | 2008-12-12 | 2014-02-25 | Gordon Howard Associates, Inc. | Methods and systems related to establishing geo-fence boundaries and collecting data |
CN101662465B (zh) * | 2009-08-26 | 2013-03-27 | 深圳市腾讯计算机系统有限公司 | 一种动态口令验证的方法及装置 |
US9071614B2 (en) * | 2009-11-19 | 2015-06-30 | Hitachi, Ltd. | Computer system, management system and recording medium |
US8581711B2 (en) | 2011-03-22 | 2013-11-12 | Gordon*Howard Associates, Inc. | Methods and systems of rule-based intoxicating substance testing associated with vehicles |
US8781900B2 (en) | 2011-09-09 | 2014-07-15 | Gordon*Howard Associates, Inc. | Method and system of providing information to an occupant of a vehicle |
US9665997B2 (en) | 2013-01-08 | 2017-05-30 | Gordon*Howard Associates, Inc. | Method and system for providing feedback based on driving behavior |
US9378480B2 (en) | 2013-03-14 | 2016-06-28 | Gordon*Howard Associates, Inc. | Methods and systems related to asset identification triggered geofencing |
US9840229B2 (en) | 2013-03-14 | 2017-12-12 | Gordon*Howard Associates, Inc. | Methods and systems related to a remote tamper detection |
US8928471B2 (en) | 2013-03-14 | 2015-01-06 | Gordon*Howard Associates, Inc. | Methods and systems related to remote tamper detection |
US9035756B2 (en) | 2013-03-14 | 2015-05-19 | Gordon*Howard Associates, Inc. | Methods and systems related to remote tamper detection |
US9013333B2 (en) | 2013-06-24 | 2015-04-21 | Gordon*Howard Associates, Inc. | Methods and systems related to time triggered geofencing |
US9701279B1 (en) | 2016-01-12 | 2017-07-11 | Gordon*Howard Associates, Inc. | On board monitoring device |
CN107040367B (zh) * | 2016-02-04 | 2020-11-20 | 宁波巨博信息科技有限公司 | 会话密钥协商的方法、装置和系统 |
US11075949B2 (en) * | 2017-02-02 | 2021-07-27 | Nicira, Inc. | Systems and methods for allocating SPI values |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0277247B1 (en) * | 1986-07-31 | 1994-05-04 | Kabushiki Kaisya Advance | System for generating a shared cryptographic key and a communication system using the shared cryptographic key |
DE3915262A1 (de) * | 1988-05-18 | 1989-11-30 | Asea Brown Boveri | Verfahren zur erzeugung von authentifizierten geheimschluesseln |
CA2011396C (en) * | 1989-03-03 | 1995-01-03 | Kazue Tanaka | Cipher-key distribution system |
US4956863A (en) * | 1989-04-17 | 1990-09-11 | Trw Inc. | Cryptographic method and apparatus for public key exchange with authentication |
US5003593A (en) * | 1989-06-05 | 1991-03-26 | Motorola, Inc. | Teleconferencing method for a secure key management system |
US5224163A (en) * | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
RU2030836C1 (ru) * | 1991-12-26 | 1995-03-10 | Борис Владимирович Березин | Способ шифрования цифровой подписи двоичного сообщения (албер-подпись) |
US5341426A (en) * | 1992-12-15 | 1994-08-23 | Motorola, Inc. | Cryptographic key management apparatus and method |
US5491750A (en) * | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes |
US5416842A (en) * | 1994-06-10 | 1995-05-16 | Sun Microsystems, Inc. | Method and apparatus for key-management scheme for use with internet protocols at site firewalls |
DE19514084C1 (de) * | 1995-04-13 | 1996-07-11 | Siemens Ag | Verfahren zum rechnergestützten Austausch kryptographischer Schlüssel zwischen einer Benutzercomputereinheit U und einer Netzcomputereinheit N |
US6081508A (en) * | 1998-02-25 | 2000-06-27 | Indus River Networks, Inc. | Remote computer communication |
US6182226B1 (en) * | 1998-03-18 | 2001-01-30 | Secure Computing Corporation | System and method for controlling interactions between networks |
US6182142B1 (en) * | 1998-07-10 | 2001-01-30 | Encommerce, Inc. | Distributed access management of information resources |
-
1997
- 1997-05-16 ES ES97924894T patent/ES2153197T3/es not_active Expired - Lifetime
- 1997-05-16 EP EP97924894A patent/EP0903026B1/de not_active Expired - Lifetime
- 1997-05-16 BR BR9709534-6A patent/BR9709534A/pt not_active IP Right Cessation
- 1997-05-16 AT AT97924894T patent/ATE198114T1/de active
- 1997-05-16 CN CNB971970882A patent/CN1175615C/zh not_active Expired - Lifetime
- 1997-05-16 UA UA98126427A patent/UA53651C2/uk unknown
- 1997-05-16 KR KR10-1998-0709952A patent/KR100363607B1/ko not_active Expired - Fee Related
- 1997-05-16 RU RU99100287/09A patent/RU2213367C2/ru active
- 1997-05-16 DE DE59702763T patent/DE59702763D1/de not_active Expired - Lifetime
- 1997-05-16 WO PCT/DE1997/001002 patent/WO1997047109A1/de active IP Right Grant
- 1997-05-16 CA CA002257477A patent/CA2257477C/en not_active Expired - Fee Related
- 1997-05-16 JP JP10500076A patent/JP2000511382A/ja active Pending
- 1997-05-16 US US09/194,678 patent/US6401204B1/en not_active Expired - Lifetime
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003503864A (ja) * | 1998-11-03 | 2003-01-28 | シーメンス アクチエンゲゼルシヤフト | 第1インスタンスおよび第2インスタンスを認証する方法および装置 |
JP2007506392A (ja) * | 2003-09-22 | 2007-03-15 | イムプシス ディジタル セキュリティ アクチボラゲット | データ通信機密保護の仕組みおよび方法 |
JP2009525647A (ja) * | 2006-01-30 | 2009-07-09 | シーメンス アクチエンゲゼルシヤフト | 第1の通信機と第2の通信機とのあいだでの共通鍵の指定方法、および、第1の通信機と第2の通信機とのあいだでの共通鍵の指定装置 |
US8261076B2 (en) | 2006-01-30 | 2012-09-04 | Siemens Aktiengesellschsft | Method and device for agreeing shared key between first communication device and second communication device |
Also Published As
Publication number | Publication date |
---|---|
EP0903026B1 (de) | 2000-12-13 |
CN1227686A (zh) | 1999-09-01 |
ATE198114T1 (de) | 2000-12-15 |
KR20000016378A (ko) | 2000-03-25 |
CA2257477A1 (en) | 1997-12-11 |
CA2257477C (en) | 2006-10-03 |
KR100363607B1 (ko) | 2003-01-24 |
CN1175615C (zh) | 2004-11-10 |
DE59702763D1 (de) | 2001-01-18 |
EP0903026A1 (de) | 1999-03-24 |
ES2153197T3 (es) | 2001-02-16 |
UA53651C2 (uk) | 2003-02-17 |
BR9709534A (pt) | 2000-05-09 |
US6401204B1 (en) | 2002-06-04 |
WO1997047109A1 (de) | 1997-12-11 |
RU2213367C2 (ru) | 2003-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2000511382A (ja) | 第1のコンピュータユニットと第2のコンピュータユニットの間の暗号化キー管理方法 | |
JP3560439B2 (ja) | 暗号キーの回復を実行する装置 | |
JP4527358B2 (ja) | 鍵供託を使用しない、認証された個別暗号システム | |
USRE36946E (en) | Method and apparatus for privacy and authentication in wireless networks | |
EP1376976A1 (en) | Methods for authenticating potential members invited to join a group | |
US20060195402A1 (en) | Secure data transmission using undiscoverable or black data | |
CN110020524B (zh) | 一种基于智能卡的双向认证方法 | |
CN101179380A (zh) | 一种双向认证方法、系统及网络终端 | |
CN109525583B (zh) | 一种用于第三方提供身份管理的服务系统的虚假凭证检测方法及系统 | |
CN119363318B (zh) | 基于区块链的分布式设备身份认证及访问控制方法及系统 | |
WO2023151427A1 (zh) | 量子密钥传输方法、装置及系统 | |
CN116633530A (zh) | 量子密钥传输方法、装置及系统 | |
JP4783340B2 (ja) | 移動ネットワーク環境におけるデータトラフィックの保護方法 | |
CN117201000A (zh) | 基于临时密钥协商的海量数据安全通信方法、设备及介质 | |
CN111224784A (zh) | 一种基于硬件可信根的角色分离的分布式认证授权方法 | |
NL1043779B1 (en) | Method for electronic signing and authenticaton strongly linked to the authenticator factors possession and knowledge | |
CN118540164A (zh) | 互联网密钥交换协议的抗量子安全增强方法 | |
CN110851859B (zh) | 一种具有(n,t)门限的分布式权威节点区块链系统的认证方法 | |
CN119168644B (zh) | 一种支持量子安全的区块链交易签名与验证方法及装置 | |
JP2002519939A (ja) | 鍵共有攻撃防御方法 | |
Liou et al. | T-auth: A novel authentication mechanism for the iot based on smart contracts and pufs | |
JP2004274134A (ja) | 通信方法並びにこの通信方法を用いた通信システム、サーバおよびクライアント | |
US20230143356A1 (en) | Method and system for performing cryptocurrency asset transaction | |
JP2025506640A (ja) | デジタルidを確立するための方法及び構成 | |
WO2022135404A1 (zh) | 身份鉴别方法、装置、存储介质、程序、及程序产品 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20040402 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20061107 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20070205 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20070326 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20070425 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20070911 |