CN102760103A - 信息处理装置、安全模块、信息处理方法和计算机产品 - Google Patents
信息处理装置、安全模块、信息处理方法和计算机产品 Download PDFInfo
- Publication number
- CN102760103A CN102760103A CN2012101141188A CN201210114118A CN102760103A CN 102760103 A CN102760103 A CN 102760103A CN 2012101141188 A CN2012101141188 A CN 2012101141188A CN 201210114118 A CN201210114118 A CN 201210114118A CN 102760103 A CN102760103 A CN 102760103A
- Authority
- CN
- China
- Prior art keywords
- security module
- preset sequence
- encrypted
- program
- signal conditioning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 11
- 238000003672 processing method Methods 0.000 title claims description 9
- 230000003750 conditioning effect Effects 0.000 claims description 133
- 238000000034 method Methods 0.000 claims description 96
- 238000004364 calculation method Methods 0.000 claims description 30
- 238000012545 processing Methods 0.000 claims description 27
- 238000012217 deletion Methods 0.000 claims description 15
- 230000037430 deletion Effects 0.000 claims description 15
- 238000001514 detection method Methods 0.000 claims description 3
- 230000004075 alteration Effects 0.000 claims 2
- 230000015654 memory Effects 0.000 description 65
- 230000006870 function Effects 0.000 description 42
- 238000010586 diagram Methods 0.000 description 38
- 230000008569 process Effects 0.000 description 36
- 238000004458 analytical method Methods 0.000 description 15
- 238000012986 modification Methods 0.000 description 11
- 230000004048 modification Effects 0.000 description 11
- 238000004891 communication Methods 0.000 description 9
- 230000006378 damage Effects 0.000 description 8
- 230000009897 systematic effect Effects 0.000 description 4
- 101100490563 Caenorhabditis elegans adr-1 gene Proteins 0.000 description 3
- 238000013475 authorization Methods 0.000 description 3
- 239000003607 modifier Substances 0.000 description 3
- 230000035943 smell Effects 0.000 description 3
- 101100388220 Caenorhabditis elegans adr-2 gene Proteins 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 239000011248 coating agent Substances 0.000 description 2
- 238000000576 coating method Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 230000001464 adherent effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 230000002045 lasting effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000001172 regenerating effect Effects 0.000 description 1
- 239000011347 resin Substances 0.000 description 1
- 229920005989 resin Polymers 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 239000010409 thin film Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (23)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011-102491 | 2011-04-28 | ||
JP2011102491A JP5775738B2 (ja) | 2011-04-28 | 2011-04-28 | 情報処理装置、セキュアモジュール、情報処理方法、および情報処理プログラム |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102760103A true CN102760103A (zh) | 2012-10-31 |
CN102760103B CN102760103B (zh) | 2016-08-10 |
Family
ID=45976730
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210114118.8A Active CN102760103B (zh) | 2011-04-28 | 2012-04-16 | 信息处理装置、安全模块、信息处理方法和计算机产品 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8984272B2 (zh) |
EP (1) | EP2518658B1 (zh) |
JP (1) | JP5775738B2 (zh) |
KR (1) | KR101333377B1 (zh) |
CN (1) | CN102760103B (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018500679A (ja) * | 2014-12-16 | 2018-01-11 | キンダイ、インコーポレイテッドKyndi, Inc. | コンピュータ命令セット、メモリレジスタ、およびポインタをランダム化するための方法および装置 |
CN108900869A (zh) * | 2018-05-04 | 2018-11-27 | 烽火通信科技股份有限公司 | 一种通信组信息加解密方法及*** |
CN110889110A (zh) * | 2019-11-11 | 2020-03-17 | 北京长城华冠汽车科技股份有限公司 | 车辆的程序控制方法、装置、车辆及存储介质 |
CN112965666A (zh) * | 2021-03-11 | 2021-06-15 | 北京新能源汽车技术创新中心有限公司 | 一种存储方法、***、非易失性存储器、计算机以及车辆 |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014049830A1 (ja) * | 2012-09-28 | 2014-04-03 | 富士通株式会社 | 情報処理装置および半導体装置 |
JP6017287B2 (ja) * | 2012-12-06 | 2016-10-26 | 富士通株式会社 | 制御方法および情報処理装置 |
JP2014235326A (ja) | 2013-06-03 | 2014-12-15 | 富士通セミコンダクター株式会社 | システム、情報処理装置、セキュアモジュール、および検証方法 |
US9225739B2 (en) * | 2013-06-26 | 2015-12-29 | Microsoft Technology Licensing, Llc | Providing user-specific malware assessment based on social interactions |
JP6083348B2 (ja) * | 2013-07-31 | 2017-02-22 | 株式会社ソシオネクスト | プログラム実行方法および復号装置 |
US20150100494A1 (en) * | 2013-10-08 | 2015-04-09 | A-Men Technology Corporation | Point transaction system and method for mobile communication device |
US20150293862A1 (en) * | 2014-04-10 | 2015-10-15 | Andes Technology Corporation | Hardware configuration apparatus |
US10310870B2 (en) * | 2015-08-20 | 2019-06-04 | Appdome Ltd. | Method for creating a revised application by adding code functionality to an existing application executable |
GB2581070A (en) | 2017-10-17 | 2020-08-05 | Appdome Ltd | Automated mobile application integration |
JP7101500B2 (ja) * | 2018-03-12 | 2022-07-15 | 岸本 珠子 | 暗号化装置、暗号化システム、及び暗号化方法 |
US11362824B2 (en) * | 2018-05-25 | 2022-06-14 | Intertrust Technologies Corporation | Content management systems and methods using proxy reencryption |
WO2020097573A1 (en) | 2018-11-08 | 2020-05-14 | Appdome Ltd. | Artificial intelligence mobile integration |
US11831631B2 (en) | 2018-11-08 | 2023-11-28 | Appdome Ltd. | Single sign-on for mobile applications using direct brokering for identity authentication |
CN110851888A (zh) * | 2019-10-12 | 2020-02-28 | 天津光电聚能专用通信设备有限公司 | 一种具有双路异构功能的高性能安全加密*** |
JP7010543B1 (ja) * | 2020-11-19 | 2022-01-26 | Necプラットフォームズ株式会社 | コンピュータシステム、ソフトウェア改竄検証方法、及び、プログラム |
JP7205793B2 (ja) * | 2021-03-27 | 2023-01-17 | セーラ・ネットワークス株式会社 | 情報提供システム、情報提供方法及び情報提供プログラム |
US12013970B2 (en) | 2022-05-16 | 2024-06-18 | Bank Of America Corporation | System and method for detecting and obfuscating confidential information in task logs |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4459664A (en) * | 1981-02-25 | 1984-07-10 | U.S. Philips Corporation | Multiprocessor computer system with dynamic allocation of multiprocessing tasks and processor for use in such multiprocessor computer system |
US20080072332A1 (en) * | 2002-07-30 | 2008-03-20 | Fujitsu Limited | Method of and apparatus for reproducing information, and security module |
US20100037066A1 (en) * | 2008-08-07 | 2010-02-11 | Yasuo Miyabe | Information processing apparatus, method, program, and information processing system |
CN1871568B (zh) * | 2003-08-26 | 2010-04-28 | 松下电器产业株式会社 | 程序执行设备 |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5058162A (en) * | 1990-08-09 | 1991-10-15 | Hewlett-Packard Company | Method of distributing computer data files |
JP3627384B2 (ja) * | 1996-01-17 | 2005-03-09 | 富士ゼロックス株式会社 | ソフトウェアの保護機能付き情報処理装置及びソフトウェアの保護機能付き情報処理方法 |
JP4080079B2 (ja) | 1998-11-20 | 2008-04-23 | 大日本印刷株式会社 | Icカード |
EP1076279A1 (en) * | 1999-08-13 | 2001-02-14 | Hewlett-Packard Company | Computer platforms and their methods of operation |
JP4153653B2 (ja) * | 2000-10-31 | 2008-09-24 | 株式会社東芝 | マイクロプロセッサおよびデータ保護方法 |
JP4226816B2 (ja) * | 2001-09-28 | 2009-02-18 | 株式会社東芝 | マイクロプロセッサ |
JP4128348B2 (ja) * | 2001-10-25 | 2008-07-30 | 富士通株式会社 | データ管理システム |
JP4408601B2 (ja) | 2001-12-27 | 2010-02-03 | 富士通株式会社 | 情報再生装置およびセキュアモジュール |
JP4582682B2 (ja) * | 2002-07-08 | 2010-11-17 | 株式会社日立製作所 | セキュリティウォールシステム |
JP4576100B2 (ja) | 2002-07-30 | 2010-11-04 | 富士通株式会社 | 情報再生装置、セキュアモジュールおよび情報再生方法 |
JP4475894B2 (ja) | 2002-08-01 | 2010-06-09 | パナソニック株式会社 | 暗号化データを復号して実行用メモリ空間に配置する装置、およびその方法 |
JP2004206269A (ja) * | 2002-12-24 | 2004-07-22 | Sony Corp | 情報処理装置および方法 |
JP4502359B2 (ja) * | 2003-08-22 | 2010-07-14 | 株式会社ハイパーテック | 暗号化プログラム復号方法及び暗号化プログラム復号プログラム |
JP2005135265A (ja) * | 2003-10-31 | 2005-05-26 | Fujitsu Ltd | 情報処理装置 |
KR101037006B1 (ko) * | 2003-11-28 | 2011-05-25 | 파나소닉 주식회사 | 데이터 처리장치 |
JP2007233426A (ja) * | 2004-04-05 | 2007-09-13 | Matsushita Electric Ind Co Ltd | アプリケーション実行装置 |
JP4447977B2 (ja) * | 2004-06-30 | 2010-04-07 | 富士通マイクロエレクトロニクス株式会社 | セキュアプロセッサ、およびセキュアプロセッサ用プログラム。 |
JP4860619B2 (ja) * | 2005-05-09 | 2012-01-25 | パナソニック株式会社 | メモリカード、アプリケーションプログラム保持方法、及び保持プログラム |
JP4923925B2 (ja) * | 2006-09-29 | 2012-04-25 | 富士通株式会社 | チェックプログラム、監視装置および監視方法 |
US9270781B2 (en) * | 2007-02-15 | 2016-02-23 | Citrix Systems, Inc. | Associating virtual machines on a server computer with particular users on an exclusive basis |
JP2009032191A (ja) * | 2007-07-30 | 2009-02-12 | Panasonic Corp | 情報処理装置 |
JP5374751B2 (ja) * | 2008-07-31 | 2013-12-25 | 株式会社ハイパーテック | メモリ管理方法 |
US8291430B2 (en) * | 2009-07-10 | 2012-10-16 | International Business Machines Corporation | Optimizing system performance using spare cores in a virtualized environment |
-
2011
- 2011-04-28 JP JP2011102491A patent/JP5775738B2/ja active Active
-
2012
- 2012-02-28 KR KR1020120020369A patent/KR101333377B1/ko active IP Right Grant
- 2012-03-28 EP EP12161867.2A patent/EP2518658B1/en active Active
- 2012-03-29 US US13/434,611 patent/US8984272B2/en active Active
- 2012-04-16 CN CN201210114118.8A patent/CN102760103B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4459664A (en) * | 1981-02-25 | 1984-07-10 | U.S. Philips Corporation | Multiprocessor computer system with dynamic allocation of multiprocessing tasks and processor for use in such multiprocessor computer system |
US20080072332A1 (en) * | 2002-07-30 | 2008-03-20 | Fujitsu Limited | Method of and apparatus for reproducing information, and security module |
CN1871568B (zh) * | 2003-08-26 | 2010-04-28 | 松下电器产业株式会社 | 程序执行设备 |
US20100037066A1 (en) * | 2008-08-07 | 2010-02-11 | Yasuo Miyabe | Information processing apparatus, method, program, and information processing system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018500679A (ja) * | 2014-12-16 | 2018-01-11 | キンダイ、インコーポレイテッドKyndi, Inc. | コンピュータ命令セット、メモリレジスタ、およびポインタをランダム化するための方法および装置 |
CN108900869A (zh) * | 2018-05-04 | 2018-11-27 | 烽火通信科技股份有限公司 | 一种通信组信息加解密方法及*** |
CN108900869B (zh) * | 2018-05-04 | 2021-02-02 | 烽火通信科技股份有限公司 | 一种通信组信息加解密方法及*** |
CN110889110A (zh) * | 2019-11-11 | 2020-03-17 | 北京长城华冠汽车科技股份有限公司 | 车辆的程序控制方法、装置、车辆及存储介质 |
CN112965666A (zh) * | 2021-03-11 | 2021-06-15 | 北京新能源汽车技术创新中心有限公司 | 一种存储方法、***、非易失性存储器、计算机以及车辆 |
Also Published As
Publication number | Publication date |
---|---|
US20120278608A1 (en) | 2012-11-01 |
JP2012234362A (ja) | 2012-11-29 |
KR101333377B1 (ko) | 2013-12-26 |
EP2518658B1 (en) | 2015-11-18 |
JP5775738B2 (ja) | 2015-09-09 |
CN102760103B (zh) | 2016-08-10 |
EP2518658A2 (en) | 2012-10-31 |
EP2518658A3 (en) | 2014-05-14 |
US8984272B2 (en) | 2015-03-17 |
KR20120123640A (ko) | 2012-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102760103A (zh) | 信息处理装置、安全模块、信息处理方法和计算机产品 | |
CN101419652B (zh) | 一种软硬件结合的保护程序的方法 | |
CN105683990B (zh) | 用于保护动态库的方法和装置 | |
US10341091B2 (en) | Secure memory storage | |
CN100386707C (zh) | 生成用在隔离执行环境中的密钥层组 | |
CN100424678C (zh) | 使用隐含中间密钥来认证软件的***和方法 | |
TW445402B (en) | Secure processor with external memory using block chaining and block re-ordering | |
RU2289157C2 (ru) | Способ и система распределенной разработки программы для программируемого портативного носителя информации | |
EP3238415B1 (en) | Software tampering detection and reporting process | |
CN108781210A (zh) | 具有可信执行环境的移动设备 | |
CN102118512A (zh) | 一种手机应用程序防破解方法及*** | |
CN101506815A (zh) | 用于安全***的双处理器结构 | |
CN107851162A (zh) | 用于对安全i/o的密码引擎进行安全编程的技术 | |
CN105450620A (zh) | 一种信息处理方法及装置 | |
CN102347834A (zh) | 受信移动平台体系结构 | |
CN106341228A (zh) | 一种虚拟机迁移方法、***及虚拟机迁入端和迁出端 | |
CN107196907A (zh) | 一种安卓so文件的保护方法及装置 | |
US20150186681A1 (en) | Method of encryption and decryption for shared library in open operating system | |
CN109255259A (zh) | 一种高安全加解密运算能力扩展方法及*** | |
CN100367144C (zh) | 用于加密的应用程序安装的结构 | |
CN104281415A (zh) | 用于空调的数据处理方法和装置 | |
US11023567B2 (en) | Software intellectual property protection systems and methods for embedded platforms | |
CN104392153B (zh) | 一种软件保护方法及*** | |
CN112115491A (zh) | 一种对称加密密钥保护方法、装置、设备及存储介质 | |
CN111625814B (zh) | 风控计算的处理设备、处理方法、处理装置和存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
ASS | Succession or assignment of patent right |
Owner name: SUOSI FUTURE CO., LTD. Free format text: FORMER OWNER: FUJITSU SEMICONDUCTOR CO., LTD. Effective date: 20150609 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20150609 Address after: Kanagawa Applicant after: Fujitsu Ltd. Applicant after: Co., Ltd. Suo Si future Address before: Kanagawa Applicant before: Fujitsu Ltd. Applicant before: Fujitsu Semiconductor Co., Ltd. |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20181102 Address after: Kanagawa Patentee after: Fujitsu Ltd. Address before: Kanagawa Co-patentee before: Co., Ltd. Suo Si future Patentee before: Fujitsu Ltd. |
|
TR01 | Transfer of patent right |