JP6701431B2 - セキュアチャネルの確立 - Google Patents
セキュアチャネルの確立 Download PDFInfo
- Publication number
- JP6701431B2 JP6701431B2 JP2019502759A JP2019502759A JP6701431B2 JP 6701431 B2 JP6701431 B2 JP 6701431B2 JP 2019502759 A JP2019502759 A JP 2019502759A JP 2019502759 A JP2019502759 A JP 2019502759A JP 6701431 B2 JP6701431 B2 JP 6701431B2
- Authority
- JP
- Japan
- Prior art keywords
- computing device
- factor
- public key
- key
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 230000006870 function Effects 0.000 claims description 15
- 238000000034 method Methods 0.000 claims description 14
- 230000006854 communication Effects 0.000 claims description 10
- 238000004891 communication Methods 0.000 claims description 10
- 238000009795 derivation Methods 0.000 claims description 5
- 238000013459 approach Methods 0.000 description 9
- 230000003993 interaction Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 230000006378 damage Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000001771 impaired effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3033—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Mobile Radio Communication Systems (AREA)
- Communication Control (AREA)
- Storage Device Security (AREA)
Description
前記第1のコンピューティング装置が匿名因子rを生成し、匿名化された公開鍵R=r.Qcを前記第2のコンピューティング装置に送信するステップと、
前記第2のコンピューティング装置が一時的な秘密鍵dtと対応する一時的な公開鍵Qt=dtGとを生成し、Qtを前記第1のコンピューティング装置に送信するステップと、を有し、
前記第1のコンピューティング装置はKc=KDF(rdc.Qt)を生成し、前記第2のコンピューティング装置はKt=KDF(dt.R)を生成し、KDFは両方の生成動作において使用される鍵導出関数であり、前記第1のコンピューティング装置と前記第2のコンピューティング装置との間でセキュアチャネルを確立し、
Gは楕円曲線群E内の点であり、Eは素数位数の群であるが、E*はEの二次ツイストであり素数位数の群m=z.m'であり、m'は素数でありzは整数であり、
r.dcは、zがr.dcの因子であるように選択される。
Brzuskaら, "An analysis of the EMV channel establishment protocol", ACM Conference on Computer and Communications Security - ACM CCS 2013, 373-386, 2013及びSmart, N., "Questions on the EMV Key Agreement Protocol"(https://www.emvco.com/specifications.aspx?id=285)。
E={(x,y):y2=f(x)=x3+ax+b}
http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdfでの例につき議論されているP-256について既知のものである。フィールド(体)はP-256によって定義された256ビットの素体である。
E*={(x,y):y2=-fP256(x)
・fp256(x)は平方である。よってxはEにおいて対応する点(x,y)を有する。あるいは、
・fp256(x)は平方でない。よってxはEにおいて対応する点を有さないが、E*において対応する(2つの)点(x,y)を有する。
Claims (11)
- 楕円曲線Diffie-Hellmanプロトコルを用いて第1のコンピューティング装置と第2のコンピューティング装置との間の通信でセキュアチャネルを確立する方法であって、Gは楕円曲線生成点であり前記第1のコンピューティング装置は一意の秘密鍵dcを有し、公開鍵Qcは前記秘密鍵d c と前記楕円曲線生成点Gとの積であり、前記公開鍵Q c は前記第2のコンピューティング装置によって信頼された当事者によって証明され、前記方法は、
前記第1のコンピューティング装置が匿名因子rを生成し(520)、匿名化された公開鍵Rを前記第2のコンピューティング装置に送信し(540)、前記匿名化された公開鍵Rは前記匿名因子rと前記公開鍵Q c との積である、ステップと、
前記第2のコンピューティング装置が一時的な秘密鍵dtと対応する一時的な公開鍵Q t とを生成し(510)、Qtを前記第1のコンピューティング装置に送信するステップと、を有し、
前記第1のコンピューティング装置は、前記匿名因子rと前記秘密鍵d c と前記一時的な公開鍵Q t とのKDFを用いてKcを生成し(530)、前記第2のコンピューティング装置は、前記一時的な秘密鍵d t と前記匿名化された公開鍵RとのKDFを用いてK t を生成し(550)、KDFは両方の生成動作において使用される鍵導出関数であり、前記第1のコンピューティング装置と前記第2のコンピューティング装置との間でセキュアチャネルを確立し、
Gは楕円曲線群E内の点であり、Eは素数位数の群であるが、E*はEの二次ツイストであり素数位数の群mであり、mはzとm'との積であり、m'は素数でありzは整数であり、
zが前記匿名因子rと前記秘密鍵d c との積である、方法。 - 請求項1に記載の方法において、zはrの因子である、方法。
- 請求項1に記載の方法において、zはz 1 とz 2 との積であり、z1及びz2は整数であり、z1はrの因子であり、z2はdcの因子である、方法。
- 請求項1乃至3のいずれか1項に記載の方法において、GはNIST P-256の楕円曲線上の点である、方法。
- 請求項1乃至4のいずれか1項に記載の方法において、前記第2のコンピューティング装置は、前記第1のコンピューティング装置から匿名化された公開鍵Rを受信する前に、一時的な公開鍵Qtを前記第1のコンピューティング装置に送信する、方法。
- 請求項5に記載の方法において、前記第1のコンピューティング装置は、前記公開鍵Qcについての暗号化された公開鍵証明書を、前記暗号化された匿名因子rと共に送信する、方法。
- プロセッサ(23)と前記プロセッサに接続されたメモリ(24)とを含むコンピューティング装置であって、前記プロセッサは上記請求項1乃至6のいずれか1項に記載のステップ520、530及び540であって前記第1のコンピューティング装置によって実行されるステップ520、530及び540を実行するよう構成される、コンピューティング装置。
- 請求項7に記載のコンピューティング装置において、前記コンピューティング装置は、外部電源の受動装置である、コンピューティング装置。
- 請求項8に記載のコンピューティング装置において、前記コンピューティング装置は、支払カードである、コンピューティング装置。
- プロセッサと前記プロセッサに接続されたメモリとを含むコンピューティングシステムであって、前記プロセッサは上記請求項1乃至6のいずれか1項に記載のステップであって前記第1のコンピューティング装置及び前記第2のコンピューティング装置によって実行されるステップを実行するよう構成される、コンピューティングシステム。
- 請求項10に記載のコンピューティングシステムにおいて、前記第2のコンピューティング装置はトランザクションシステムの端末である、コンピューティングシステム。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP16180454.7 | 2016-07-20 | ||
EP16180454.7A EP3273635B1 (en) | 2016-07-20 | 2016-07-20 | Secure channel establishment |
PCT/US2017/042042 WO2018017400A1 (en) | 2016-07-20 | 2017-07-14 | Secure channel establishment |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2019521620A JP2019521620A (ja) | 2019-07-25 |
JP6701431B2 true JP6701431B2 (ja) | 2020-05-27 |
Family
ID=56497676
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2019502759A Expired - Fee Related JP6701431B2 (ja) | 2016-07-20 | 2017-07-14 | セキュアチャネルの確立 |
Country Status (9)
Country | Link |
---|---|
US (1) | US10461927B2 (ja) |
EP (1) | EP3273635B1 (ja) |
JP (1) | JP6701431B2 (ja) |
CN (1) | CN109479001A (ja) |
AU (1) | AU2017299473B2 (ja) |
BR (1) | BR112019001011A2 (ja) |
CA (1) | CA3026191C (ja) |
RU (1) | RU2718229C1 (ja) |
WO (1) | WO2018017400A1 (ja) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3273635B1 (en) * | 2016-07-20 | 2019-10-30 | Mastercard International Incorporated | Secure channel establishment |
US10594702B2 (en) | 2016-12-16 | 2020-03-17 | ULedger, Inc. | Electronic interaction authentication and verification, and related systems, devices, and methods |
WO2019246206A1 (en) * | 2018-06-20 | 2019-12-26 | Iot And M2M Technologies, Llc | An ecdhe key exchange for server authentication and a key server |
WO2020006162A1 (en) * | 2018-06-28 | 2020-01-02 | Iot And M2M Technologies, Llc | Ecdhe key exchange for mutual authentication using a key server |
CN109377215B (zh) | 2018-08-06 | 2020-04-21 | 阿里巴巴集团控股有限公司 | 区块链交易方法及装置、电子设备 |
KR102139897B1 (ko) | 2018-11-27 | 2020-07-31 | 알리바바 그룹 홀딩 리미티드 | 정보 보호를 위한 시스템 및 방법 |
US10700850B2 (en) | 2018-11-27 | 2020-06-30 | Alibaba Group Holding Limited | System and method for information protection |
PL3552158T3 (pl) | 2018-11-27 | 2021-07-26 | Advanced New Technologies Co., Ltd. | System i sposób ochrony informacji |
EP3660769A1 (en) * | 2018-11-27 | 2020-06-03 | Mastercard International Incorporated | Trusted communication in transactions |
PL3545644T3 (pl) | 2018-11-27 | 2021-06-28 | Advanced New Technologies Co., Ltd. | System i sposób ochrony informacji |
ES2879855T3 (es) | 2018-11-27 | 2021-11-23 | Advanced New Technologies Co Ltd | Sistema y método para la protección de información |
RU2719423C1 (ru) * | 2018-11-27 | 2020-04-17 | Алибаба Груп Холдинг Лимитед | Система и способ защиты информации |
US10880278B1 (en) | 2019-10-03 | 2020-12-29 | ISARA Corporation | Broadcasting in supersingular isogeny-based cryptosystems |
US10630476B1 (en) * | 2019-10-03 | 2020-04-21 | ISARA Corporation | Obtaining keys from broadcasters in supersingular isogeny-based cryptosystems |
US11785449B2 (en) | 2021-09-30 | 2023-10-10 | Visa International Service Association | Secure on-demand ultra-wideband communication channels systems and methods |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100461670C (zh) * | 2005-12-27 | 2009-02-11 | 中兴通讯股份有限公司 | 应用于分组网络的基于h.323协议的终端接入方法 |
US8503679B2 (en) * | 2008-01-23 | 2013-08-06 | The Boeing Company | Short message encryption |
US8891756B2 (en) * | 2008-10-30 | 2014-11-18 | Certicom Corp. | Collision-resistant elliptic curve hash functions |
FR2946819B1 (fr) * | 2009-06-16 | 2011-07-01 | Sagem Securite | Cryptographie sur une courbe elliptique. |
US9231758B2 (en) * | 2009-11-16 | 2016-01-05 | Arm Technologies Israel Ltd. | System, device, and method of provisioning cryptographic data to electronic devices |
CN103780385B (zh) * | 2012-10-23 | 2017-02-15 | 航天信息股份有限公司 | 基于椭圆曲线的盲签名方法和装置 |
GB201309702D0 (en) * | 2013-05-30 | 2013-07-17 | Certivox Ltd | Security |
GB201310084D0 (en) * | 2013-06-06 | 2013-07-17 | Mastercard International Inc | Improvements to electronic authentication systems |
CN103813320B (zh) * | 2014-01-14 | 2017-01-11 | 东北大学 | 一种基于簇内分组和主密钥的密钥管理方法 |
US9485093B2 (en) * | 2014-02-10 | 2016-11-01 | Broadcom Corporation | Push button configuration pairing |
CN106664206B (zh) * | 2014-06-18 | 2020-05-12 | 维萨国际服务协会 | 用于已认证的通信的高效方法 |
EP3972311B1 (en) * | 2014-06-24 | 2023-03-29 | Google LLC | Mesh network commissioning |
US20170091148A1 (en) * | 2014-09-26 | 2017-03-30 | Hitachi, Ltd. | Method for calculating elliptic curve scalar multiplication |
US10461933B2 (en) * | 2015-01-27 | 2019-10-29 | Visa International Service Association | Methods for secure credential provisioning |
US9942034B2 (en) * | 2015-02-13 | 2018-04-10 | Visa International Service Association | Confidential communication management |
US10361844B2 (en) * | 2015-04-20 | 2019-07-23 | Certicom Corp. | Generating cryptographic function parameters based on an observed astronomical event |
CN104767624B (zh) * | 2015-04-23 | 2018-02-09 | 北京航空航天大学 | 基于生物特征的远程认证协议方法 |
US20160352689A1 (en) * | 2015-05-26 | 2016-12-01 | Infosec Global Inc. | Key agreement protocol |
RU2018103181A (ru) * | 2015-06-30 | 2019-07-31 | Виза Интернэшнл Сервис Ассосиэйшн | Конфиденциальные аутентификация и обеспечение |
US20170228731A1 (en) * | 2016-02-09 | 2017-08-10 | Fmr Llc | Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems |
US11488147B2 (en) * | 2015-07-14 | 2022-11-01 | Fmr Llc | Computationally efficient transfer processing and auditing apparatuses, methods and systems |
US20180191503A1 (en) * | 2015-07-14 | 2018-07-05 | Fmr Llc | Asynchronous Crypto Asset Transfer and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
US20170109735A1 (en) * | 2015-07-14 | 2017-04-20 | Fmr Llc | Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems |
EP3273635B1 (en) * | 2016-07-20 | 2019-10-30 | Mastercard International Incorporated | Secure channel establishment |
FR3071081B1 (fr) * | 2017-09-13 | 2020-08-21 | Commissariat Energie Atomique | Methode cryptographique sur courbes elliptiques binaires d'edwards. |
-
2016
- 2016-07-20 EP EP16180454.7A patent/EP3273635B1/en active Active
-
2017
- 2017-07-06 US US15/642,762 patent/US10461927B2/en active Active
- 2017-07-14 BR BR112019001011-4A patent/BR112019001011A2/pt not_active Application Discontinuation
- 2017-07-14 RU RU2019104618A patent/RU2718229C1/ru active
- 2017-07-14 AU AU2017299473A patent/AU2017299473B2/en not_active Ceased
- 2017-07-14 JP JP2019502759A patent/JP6701431B2/ja not_active Expired - Fee Related
- 2017-07-14 CN CN201780043949.1A patent/CN109479001A/zh active Pending
- 2017-07-14 CA CA3026191A patent/CA3026191C/en not_active Expired - Fee Related
- 2017-07-14 WO PCT/US2017/042042 patent/WO2018017400A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
BR112019001011A2 (pt) | 2019-05-14 |
EP3273635B1 (en) | 2019-10-30 |
WO2018017400A1 (en) | 2018-01-25 |
EP3273635A1 (en) | 2018-01-24 |
AU2017299473B2 (en) | 2020-07-30 |
US10461927B2 (en) | 2019-10-29 |
JP2019521620A (ja) | 2019-07-25 |
CN109479001A (zh) | 2019-03-15 |
US20180026784A1 (en) | 2018-01-25 |
RU2718229C1 (ru) | 2020-03-31 |
CA3026191C (en) | 2020-12-29 |
CA3026191A1 (en) | 2018-01-25 |
AU2017299473A1 (en) | 2018-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6701431B2 (ja) | セキュアチャネルの確立 | |
US11710120B2 (en) | Secure remote payment transaction processing including consumer authentication | |
US11068608B2 (en) | Mutual authentication of software layers | |
EP3022700B1 (en) | Secure remote payment transaction processing | |
JP6531092B2 (ja) | モバイルアプリケーションとゲートウェイの間の無線通信を安全化する方法 | |
US20150142669A1 (en) | Virtual payment chipcard service | |
US20240214186A1 (en) | Efficient authentic communication system and method | |
US11922428B2 (en) | Security for contactless transactions | |
US11960581B2 (en) | Mobile device secret protection system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20190311 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20191128 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20200107 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20200218 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20200407 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20200501 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6701431 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
LAPS | Cancellation because of no payment of annual fees |