JP2019512958A - 認証通知を生成する方法、認証方法、認証機器及び認証ベース機器 - Google Patents
認証通知を生成する方法、認証方法、認証機器及び認証ベース機器 Download PDFInfo
- Publication number
- JP2019512958A JP2019512958A JP2018548902A JP2018548902A JP2019512958A JP 2019512958 A JP2019512958 A JP 2019512958A JP 2018548902 A JP2018548902 A JP 2018548902A JP 2018548902 A JP2018548902 A JP 2018548902A JP 2019512958 A JP2019512958 A JP 2019512958A
- Authority
- JP
- Japan
- Prior art keywords
- notification
- authentication
- key sequence
- initialization notification
- received
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/108—Encryption
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mechanical Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
は、以下のように論理排他的に「OR」(XOR)とみなされうる。
は、この論理によれば、論理「AND」と解釈される。
式中、cvacは、真空光速度又は無線波の伝搬速度である。
Claims (20)
- 認証通知(316)を生成する方法であって、
送信された初期化通知(303)を受信する工程(102)と、
中間通知(312)を得るために、第一暗号化方法を用いて、受信された前記初期化通知(303)を暗号化する工程(104)と、
前記認証通知(316)を得るために、第二暗号化方法を用いて前記中間通知(312)を暗号化する工程(106)と
を含む、方法。 - 前記第一暗号化方法は第一鍵シーケンス(306)を用い、前記第二暗号化方法は第二鍵シーケンス(308)を用いる、請求項1に記載の方法。
- 前記第一暗号化方法は、前記第一鍵シーケンス(306)を前記初期化通知(303)に加算する工程を含み、
前記第二暗号化方法は、前記第二鍵シーケンス(308)を前記中間通知(312)に乗算する工程を含む、
請求項2に記載の方法。 - 前記第一暗号化方法は、前記第一鍵シーケンス(306)を前記初期化通知(303)に乗算する工程を含み、
前記第二暗号化方法は、前記第二鍵シーケンス(308)を前記中間通知(312)に加算する工程を含む、
請求項2に記載の方法。 - 前記第一鍵シーケンス(306)及び前記第二鍵シーケンス(308)は、アナログ信号形態として用いられる、請求項1から4のいずれか一項に記載の方法。
- 前記第一鍵シーケンス(306)の振幅及び/又は前記第二鍵シーケンス(308)の振幅は、前記初期化通知(303)の振幅との差異が20%未満である、請求項5に記載の方法。
- 前記第一鍵シーケンス(306)の帯域幅及び/又は前記第二鍵シーケンス(308)の帯域幅は、前記初期化通知(303)の帯域幅との差異が20%未満である、請求項5又は6に記載の方法。
- 前記第一鍵シーケンス(306)及び前記第二鍵シーケンス(308)は、デジタル表現として用いられる、請求項1から7のいずれか一項に記載の方法。
- 前記第一鍵シーケンス(306)の第一長さ及び前記第二鍵シーケンス(308)の第二長さは、前記初期化通知の長さとの差異が20%未満である、請求項1から8のいずれか一項に記載の方法。
- 認証方法であって、
初期化通知(703)を送信する工程(202)と、
認証通知(701)を受信する工程(204)と、
受信された中間通知(707)を得るために、第二暗号化方法を用いて前記認証通知(701)を復号する工程(206)と、
受信された初期化通知(709)を得るために、第一暗号化方法を用いて、受信された前記中間通知(707)を復号する工程と、
前記認証通知を認証するとみなす決定をするために、受信された前記初期化通知(709)と送信された前記初期化通知(703)とを比較する工程と、
を含む方法。 - 受信された前記初期化通知(709)と送信された前記初期化通知(703)とが互いに対応する場合に、前記認証通知(701)を認証するとみなす、請求項10に記載の方法。
- 受信された前記初期化通知(709)と送信された前記初期化通知(703)とは、双方の差異が許容可能なビット数未満である場合に、互いに対応している、請求項11に記載の方法。
- さらに、前記初期化通知(703)を送信する工程と、前記認証通知(701)を受信する工程との間の信号伝搬時間を計測する工程を含む、請求項10から12のいずれか一項に記載の方法。
- 前記信号伝搬時間が所定の閾値未満である場合にのみ、前記認証通知(701)を認証するとみなす、請求項13に記載の方法。
- 送信された初期化通知(303)を受信するように形成された受信機(302)と、
中間通知(312)を得るために、第一暗号化方法を用いて、送信された前記初期化通知を暗号化するように形成された第一暗号化モジュール(310)と、
前記認証通知(316)を得るために、第二暗号化方法を用いて前記中間通知(312)を暗号化するように形成された第二暗号化モジュール(314)と、
前記認証通知(316)を送信するように形成された送信機(324)と、
を具備する認証機器(300;400;500;600)。 - 請求項15に記載の認証機器(300;400;500;600)を備えた自動車(800)用の鍵(806)。
- 初期化通知(703)を送信するように形成された送信機(702)と、
認証通知(701)を受信するように形成された受信機(704)と、
受信された中間通知(707)を得るために、第二暗号化方法を用いて前記認証通知(701)を復号するように形成された第一復号モジュール(706)と、
受信された初期化通知(709)を得るために、第一暗号化方法を用いて、受信された前記中間通知(707)を復号するように形成された第二復号モジュール(708)と、
前記認証通知(701)を認証するとみなすか否かを決定するために、受信された前記初期化通知(709)と送信された前記初期化通知(703)とを比較するように形成された決定モジュール(710)と、
を具備する認証ベース機器(700)。 - さらに、前記初期化通知(703)の前記送信と、前記認証通知(701)の前記受信との間の信号伝搬時間を計測するように形成された時間計測モジュール(720)とを具備する、請求項13に記載の認証ベース機器(700)。
- 前記決定モジュールは、前記信号伝搬時間が所定の閾値未満の場合にのみ、前記認証通知を認証するとみなすように、形成されている、請求項14に記載の認証ベース機器。
- 請求項14から16のいずれか一項に記載の認証ベース機器(700)を備えた自動車(800)。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102016104771.6 | 2016-03-15 | ||
DE102016104771.6A DE102016104771A1 (de) | 2016-03-15 | 2016-03-15 | Verfahren zum Erzeugen einer Authentifizierungsnachricht, Verfahren zum Authentifizieren, Authentifizierungsgerät und Authentifizierungsbasisgerät |
PCT/EP2017/052056 WO2017157563A1 (de) | 2016-03-15 | 2017-01-31 | Verfahren zum erzeugen einer authentifizierungsnachricht, verfahren zum authentifizieren, authentifizierungsgerät und authentifizierungsbasisgerät |
Publications (1)
Publication Number | Publication Date |
---|---|
JP2019512958A true JP2019512958A (ja) | 2019-05-16 |
Family
ID=57965918
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2018548902A Pending JP2019512958A (ja) | 2016-03-15 | 2017-01-31 | 認証通知を生成する方法、認証方法、認証機器及び認証ベース機器 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20190074973A1 (ja) |
EP (1) | EP3430764A1 (ja) |
JP (1) | JP2019512958A (ja) |
DE (1) | DE102016104771A1 (ja) |
WO (1) | WO2017157563A1 (ja) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11163050B2 (en) | 2013-08-09 | 2021-11-02 | The Board Of Trustees Of The Leland Stanford Junior University | Backscatter estimation using progressive self interference cancellation |
KR20190075093A (ko) * | 2016-10-25 | 2019-06-28 | 더 보드 어브 트러스티스 어브 더 리랜드 스탠포드 주니어 유니버시티 | 후방 산란 주변 ism 대역 신호 |
DE102018002157A1 (de) * | 2018-03-16 | 2019-09-19 | Zf Active Safety Gmbh | Vorrichtung und Verfahren zur verschlüsselten Übertragung eines digitalen Steuersignals von einem Kraftfahrzeugschlüssel an ein Kraftfahrzeug |
DE102018004997A1 (de) | 2018-06-22 | 2019-12-24 | Giesecke+Devrient Mobile Security Gmbh | Diebstahlschutz eines Automobils mittels Kontextmodellierung eines berechtigten Benutzers |
US10594727B2 (en) | 2018-07-17 | 2020-03-17 | Levl Technologies, Inc. | Relay attack prevention |
US10693576B2 (en) | 2018-08-27 | 2020-06-23 | Levl Technologies, Inc. | Carrier frequency offset modeling for radio frequency fingerprinting |
WO2020070594A1 (en) | 2018-10-03 | 2020-04-09 | Levl Technologies, Inc. | Carrier frequency estimation for radio frequency fingerprinting |
US10742449B1 (en) | 2019-06-12 | 2020-08-11 | Apple Inc. | Real time analog front end response estimation for sensing applications |
CN114026901B (zh) * | 2019-07-30 | 2023-12-19 | 艾迈斯-欧司朗亚太私人有限公司 | 通过飞行时间认证邻近性 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH01122227A (ja) * | 1987-11-06 | 1989-05-15 | Konica Corp | 伝送装置 |
DE19501004A1 (de) * | 1994-05-03 | 1995-11-09 | Telefunken Microelectron | Verfahren zum Betrieb eines Datenübertragungssystems aus einem Transponder und einem Lesegerät |
JP2001069136A (ja) * | 1999-08-26 | 2001-03-16 | Toshiba Corp | 映像信号処理システム |
JP2011052412A (ja) * | 2009-08-31 | 2011-03-17 | Tokai Rika Co Ltd | 車両の電子キーシステム |
JP2011523798A (ja) * | 2008-05-26 | 2011-08-18 | エヌエックスピー ビー ヴィ | トランスポンダの応答時間の測定とその認証との分離 |
WO2012176408A1 (ja) * | 2011-06-24 | 2012-12-27 | 日本電気株式会社 | 署名検証方法、署名検証システム及び署名検証プログラム |
JP2013138304A (ja) * | 2011-12-28 | 2013-07-11 | Toyota Motor Corp | セキュリティシステム及び鍵データの運用方法 |
US9177153B1 (en) * | 2005-10-07 | 2015-11-03 | Carnegie Mellon University | Verifying integrity and guaranteeing execution of code on untrusted computer platform |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5120939A (en) * | 1989-11-09 | 1992-06-09 | At&T Bell Laboratories | Databaseless security system |
DE19523009C2 (de) * | 1995-06-24 | 1998-03-12 | Megamos F & G Sicherheit | Authentifizierungssystem |
DE19530393A1 (de) * | 1995-08-18 | 1997-02-20 | Antonius Dr Rer Nat Klingler | Verfahren zur vocoderlosen Ver- und Entschlüsselung von analogen und digitalen Kommunikationssignalen auf der Basis deterministisch erzeugten Rauschens |
FR2748144B1 (fr) * | 1996-04-25 | 1998-06-12 | Sagem | Procede de transmission securisee entre un emetteur et un recepteur, emetteur et recepteur pour la mise en oeuvre du procede |
DE19632025C2 (de) * | 1996-08-08 | 1998-07-23 | Daimler Benz Ag | Authentikationseinrichtung mit elektronischer Authentikationskommunikation |
FR2867289A1 (fr) * | 2004-03-02 | 2005-09-09 | France Telecom | Procede et dispositif pour accomplir une operation cryptographique |
EP2247024B1 (en) * | 2009-04-30 | 2015-08-19 | Nxp B.V. | Determining the validity of a connection between a reader and a transponder |
DE102012219112A1 (de) * | 2012-10-19 | 2014-04-24 | Siemens Aktiengesellschaft | Verwenden einer PUF zur Prüfung einer Authentisierung, insbesondere zum Schutz vor unberechtigtem Zugriff auf eine Funktion eines ICs oder Steuergerätes |
-
2016
- 2016-03-15 DE DE102016104771.6A patent/DE102016104771A1/de active Pending
-
2017
- 2017-01-31 US US16/084,649 patent/US20190074973A1/en not_active Abandoned
- 2017-01-31 EP EP17703363.6A patent/EP3430764A1/de not_active Withdrawn
- 2017-01-31 JP JP2018548902A patent/JP2019512958A/ja active Pending
- 2017-01-31 WO PCT/EP2017/052056 patent/WO2017157563A1/de active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH01122227A (ja) * | 1987-11-06 | 1989-05-15 | Konica Corp | 伝送装置 |
DE19501004A1 (de) * | 1994-05-03 | 1995-11-09 | Telefunken Microelectron | Verfahren zum Betrieb eines Datenübertragungssystems aus einem Transponder und einem Lesegerät |
JP2001069136A (ja) * | 1999-08-26 | 2001-03-16 | Toshiba Corp | 映像信号処理システム |
US9177153B1 (en) * | 2005-10-07 | 2015-11-03 | Carnegie Mellon University | Verifying integrity and guaranteeing execution of code on untrusted computer platform |
JP2011523798A (ja) * | 2008-05-26 | 2011-08-18 | エヌエックスピー ビー ヴィ | トランスポンダの応答時間の測定とその認証との分離 |
JP2011052412A (ja) * | 2009-08-31 | 2011-03-17 | Tokai Rika Co Ltd | 車両の電子キーシステム |
WO2012176408A1 (ja) * | 2011-06-24 | 2012-12-27 | 日本電気株式会社 | 署名検証方法、署名検証システム及び署名検証プログラム |
JP2013138304A (ja) * | 2011-12-28 | 2013-07-11 | Toyota Motor Corp | セキュリティシステム及び鍵データの運用方法 |
Non-Patent Citations (1)
Title |
---|
STEFAN BRANDS ET AL.: "Distance-Bounding Protocols (Extended abstract)", LNCS, WORKSHOP ON THE THEORY AND APPLICATION OF CRYPTOGRAPHIC TECHNIQUES, EUROCRYPT 1993, vol. 765, JPN6019032437, 1994, pages 344 - 359, ISSN: 0004100919 * |
Also Published As
Publication number | Publication date |
---|---|
US20190074973A1 (en) | 2019-03-07 |
WO2017157563A1 (de) | 2017-09-21 |
DE102016104771A1 (de) | 2017-10-05 |
EP3430764A1 (de) | 2019-01-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2019512958A (ja) | 認証通知を生成する方法、認証方法、認証機器及び認証ベース機器 | |
EP3425867B1 (en) | Communication devices and associated method | |
EP3642997B1 (en) | Secure communications providing forward secrecy | |
Alahmadi et al. | Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard | |
CN106411521B (zh) | 用于量子密钥分发过程的身份认证方法、装置及*** | |
Li et al. | Securing wireless systems via lower layer enforcements | |
Mathur et al. | Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks] | |
EP2416524B1 (en) | System and method for secure transaction of data between wireless communication device and server | |
US7349545B2 (en) | Key agreement method in secure communication system using multiple access method | |
US11156704B2 (en) | Method, device and system for secure distance measurement | |
Zhang et al. | An improved authentication scheme for mobile satellite communication systems | |
KR101675332B1 (ko) | 차량용 데이터 통신 방법 및 그를 이용하는 차량용 전자 제어 장치 및 시스템 | |
US11888832B2 (en) | System and method to improve user authentication for enhanced security of cryptographically protected communication sessions | |
US11516655B2 (en) | Physical layer key generation | |
CN105553650B (zh) | 用于产生秘密密钥的方法和装置 | |
Shawky et al. | Adaptive chaotic map-based key extraction for efficient cross-layer authentication in VANETs | |
Tsouri et al. | Threshold constraints on symmetric key extraction from rician fading estimates | |
CN107979460B (zh) | 用于生成密码密钥的方法和装置 | |
Peeters et al. | Toward more secure and reliable access control | |
KR20170032210A (ko) | 차량용 데이터 통신 방법 및 그를 이용하는 차량용 전자 제어 장치 및 시스템 | |
Tahir et al. | Wireless physical layer security using channel state information | |
Shabani et al. | An intelligent RFID-enabled authentication protocol in VANET | |
de Ree et al. | Data confidentiality for IoT networks: cryptographic gaps and physical-layer opportunities | |
KR20220012914A (ko) | 비행 시간을 통한 근접의 인증 | |
Allam | Improving secret key generation for wireless communications in FDD mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20180914 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20190821 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20190827 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20191127 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20200127 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20200526 |