[go: up one dir, main page]

JP2002304610A - Embedded type delegation method - Google Patents

Embedded type delegation method

Info

Publication number
JP2002304610A
JP2002304610A JP2001107994A JP2001107994A JP2002304610A JP 2002304610 A JP2002304610 A JP 2002304610A JP 2001107994 A JP2001107994 A JP 2001107994A JP 2001107994 A JP2001107994 A JP 2001107994A JP 2002304610 A JP2002304610 A JP 2002304610A
Authority
JP
Japan
Prior art keywords
authority
card
actor
transfer
embedded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2001107994A
Other languages
Japanese (ja)
Other versions
JP4201107B2 (en
Inventor
Yoshiki Wada
義毅 和田
Kazu Yoshida
吉田  壱
Katsuhiko Suzuki
勝彦 鈴木
Ryutaro Taji
龍太郎 田路
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nippon Telegraph and Telephone Corp
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Priority to JP2001107994A priority Critical patent/JP4201107B2/en
Publication of JP2002304610A publication Critical patent/JP2002304610A/en
Application granted granted Critical
Publication of JP4201107B2 publication Critical patent/JP4201107B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Landscapes

  • Credit Cards Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

PROBLEM TO BE SOLVED: To transfer operation authority for an IC card to another trader and to perform operation for the card with the authority of the trader. SOLUTION: Information for authenticating the transfer-destination trader and information on operation authority to be allowed are recorded on the IC card and when the operation is done, execution control over the operation is performed by performing signature authentication of the transfer-destination or the authentication of the transfer-destination authentication.

Description

【発明の詳細な説明】DETAILED DESCRIPTION OF THE INVENTION

【0001】[0001]

【発明の属する技術分野】本発明はICカードに対するオ
ペレーション権限を他の事業者に委譲するための方式に
関するものである。
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a system for transferring operation authority for an IC card to another business operator.

【0002】[0002]

【従来の技術】近年、公共、金融、通信、交通、医療の
分野、そしてインターネット上の電子商取引等におい
て、セキュリティ上安全で大きな記憶容量を有するICカ
ードの利用が広まりつつある。ICカードに複数のアプリ
ケーションを搭載し、複数のサービスを利用することが
できるようにしたマルチアプリケーションICカードシス
テムも出現している。斯種のICカードシステムでは、カ
ード発行者、サービス提供者及びアプリケーションを審
査・保証するための登録・認定機関を核として、カード利
用者、サービス提供者及びカード発行者が相互に自由に
連携して、例えば、ICカードの発行後にもネットワーク
を通じてカードにアプリケーションをダウンロードさせ
たり、アプリケーションの実行期間・実行回数の制御、
メモリ資源が少なくなった場合に利用者への警告を行な
うといった多様なオペレーション制御が簡単且つ柔軟に
でき、さまざまなビジネスモデルを構築することができ
るようにしている。そこで、このように1枚のカードで
多数のサービスを安全、且つ確実に利用することができ
るICカードの需要が急速に高まっている。
2. Description of the Related Art In recent years, in the fields of public, finance, communication, transportation, medical care, electronic commerce on the Internet, and the like, the use of IC cards having security and large storage capacity has become widespread. A multi-application IC card system in which a plurality of applications are mounted on an IC card so that a plurality of services can be used has also appeared. In this type of IC card system, card users, service providers, and card issuers freely cooperate with each other, with a registration / authorization body for examining and guaranteeing the card issuer, service provider, and application at the core. For example, after an IC card is issued, the application can be downloaded to the card via a network, or the execution period and the number of executions of the application can be controlled.
Various operation controls, such as giving a warning to the user when the memory resources become low, can be easily and flexibly controlled, and various business models can be constructed. Thus, the demand for an IC card that can safely and reliably use many services with one card is rapidly increasing.

【0003】しかしながら、斯種のICカードに、例えば
アプリケーションを搭載したりするようなオペレーショ
ン権限は、サービス提供者である権限所持事業者(通常
はICカード発行者やICカードシステム運用者)にのみ与
えられ、このようなオペレーション権限を他のサービス
提供者である事業者に委譲する従来の権限委譲方式で
は、これまで権限を所持していた事業者が署名してアプ
リケーションに埋め込んだオペレーションの許可証明書
を用いて実行制御を行なうようにしている。このオペレ
ーションの許可証明書の発行者である権限所持事業者は
ICカードの発行時に決定されて、予めICカードに登録さ
れており、この権限所持事業者はカード発行後に追加、
変更及び削除することはできなかった。
[0003] However, the operation authority for mounting an application on such an IC card, for example, is limited to an authorized business operator (usually an IC card issuer or an IC card system operator) that is a service provider. In the conventional authority transfer method in which the operation authority is given to such a service provider as another service provider, the operator who has the authority in the past signs and certifies the permission of the operation embedded in the application. The execution control is performed using a certificate. The competent business that issued the authorization certificate for this operation
Determined at the time of issuance of the IC card, it is registered in advance in the IC card, and this business with authority is added after the card is issued,
It could not be changed or deleted.

【0004】[0004]

【発明が解決しようとする課題】本発明の目的は、ICカ
ードに対するオペレーション権限を他の事業者に委譲し
て、カードに対するオペレーションを他の事業者の権限
で行うことができるようにする埋め込み型権限委譲方式
を提供することにある。
SUMMARY OF THE INVENTION It is an object of the present invention to provide an embedded type which delegates the operation authority for an IC card to another business operator so that the operation for the card can be performed with the authority of another business operator. It is to provide an authority transfer method.

【0005】[0005]

【課題を解決するための手段】本発明は、ICカードに対
するオペレーション権限を他の事業者に委譲するための
方式であって、ICカードに委譲先事業者の認証用情報と
許可するオペレーション権限情報を記録し、オペレーシ
ョン時に、委譲先事業者の署名検証もしくは、委譲先事
業者の認証を行なってオペレーションの実行制御を行な
うことを特徴とする埋め込み型権限委譲方式にある。
SUMMARY OF THE INVENTION The present invention is a method for transferring the operation authority for an IC card to another business, and includes information for authentication of the transfer-destination business and information on the operation authority permitted to the IC card. The embedding type authority transfer method is characterized in that, during operation, the execution of the operation is controlled by verifying the signature of the transferee business or authenticating the transferee business.

【0006】本発明の好適例では、前記ICカードにさら
に他の委譲先事業者の認証情報も記録するようにする。
[0006] In a preferred embodiment of the present invention, authentication information of another transferee business is recorded on the IC card.

【0007】このような本発明による権限委譲方式で
は、ICカードに対するオペレーション権限を他の事業者
に貸与するために、委譲先事業者の認証情報をICカード
に埋め込むことにより、委譲先事業者は、カードに対す
る操作を自分の権限で行なうことができるようになる。
また、第3者の事業者に対して、オペレーションの許可
証を用いた権限委譲を行なうこともできるようになる。
In the authority transfer method according to the present invention, in order to lend the operation authority for the IC card to another business, the authentication information of the transfer business is embedded in the IC card. The user can operate the card with his / her own authority.
In addition, authority can be transferred to a third party using an operation permit.

【0008】[0008]

【発明の実施の形態】次ぎに図面を参照して本発明の実
施例を説明するに、図1は本発明による埋め込み型権限
委譲方式における埋め込み情報の設定手順の例を示し、
図2はオペレーション権限を委譲された委譲先事業者が
ICカードに対するオペレーションを実行する場合の手順
を示す図である。
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS An embodiment of the present invention will be described below with reference to the accompanying drawings. FIG. 1 shows an example of a procedure for setting embedded information in an embedded authority delegation system according to the present invention.
Figure 2 shows the delegated company to which the operation authority has been delegated.
FIG. 6 is a diagram showing a procedure for executing an operation on an IC card.

【0009】図1に示すように、ICカード1には、埋め
込み情報管理部2と、権限判定部3と、オペレーション
実行部4を用意する。ICカード1には、カード利用者に
複数のサービスを提供するための複数のアプリケーショ
ンが搭載され、例えば、これらのアプリケーションをカ
ード1にダウンロードさせたり、アプリケーションの実
行期間・実行回数の制御、メモリ資源が少なくなった場
合に利用者への警告を行なうといった多様なオペレーシ
ョン権限は、権限所持事業者5(以後、「アクタA」と
も称する)にある。このような権限を所持するアクタA
が、後にその権限を他の事業者6(以後、「アクタB」
とも称する)に委譲し得るようにするために、本発明に
よる権限委譲方式では、権限委譲先のアクタBの公開鍵
を権限所持アクタAに予め登録しておく。
As shown in FIG. 1, an IC card 1 is provided with an embedded information management unit 2, an authority judgment unit 3, and an operation execution unit 4. The IC card 1 has a plurality of applications for providing a plurality of services to the card user. For example, the IC card 1 can download these applications to the card 1, control the execution period and the number of executions of the applications, and use memory resources. The various operating authorities, such as issuing a warning to the user when the number of users has decreased, belong to the authority-holding business operator 5 (hereinafter, also referred to as "actor A"). Actor A with such authority
Later, the authority of other operators 6 (hereinafter, "Acta B"
In the authority transfer method according to the present invention, the public key of the actor B of the authority transfer destination is registered in the actor A having authority in advance.

【0010】権限所持アクタAが、許可するオペレーシ
ョン権限をアクタBに委譲する場合には、先ず、アクタA
がICカード1へ許可するオペレーション権限情報として
埋め込み型権限委譲コマンドを送信する。このコマンド
には、権限委譲先であるアクタBの公開鍵と権限所持ア
クタAの署名が含まれている。ICカード1のオペレーシ
ョン実行部4は、権限所持アクタAからの権限委譲コマ
ンドを解析し、このコマンド中の権限所持アクタAの署
名の検証を権限判定部3に依頼する。埋め込み情報管理
部2には事前に権限所持アクタAの公開鍵が登録されて
いる。
When the authorized actor A transfers the permitted operating authority to the actor B, first, the actor A
Transmits an embedded authority transfer command as operation authority information permitted to the IC card 1. This command includes the public key of actor B to which the authority is to be transferred and the signature of actor A having the authority. The operation execution unit 4 of the IC card 1 analyzes the authority transfer command from the authorized actor A, and requests the authority determination unit 3 to verify the signature of the authorized actor A in the command. The public key of the actor A having the authority is registered in the embedded information management unit 2 in advance.

【0011】権限判定部3は、オペレーション実行部4
から転送された権限所持アクタAの署名を埋め込み情報
管理部2に登録されている権限所持アクタAの公開鍵を
用いて検証し、この署名が正しい場合には、権限所持ア
クタAからICカード1へ送信された埋め込み型権限委譲
コマンドの実行権限があると判断する。
The authority determining unit 3 includes an operation executing unit 4
Is verified using the public key of the authorized actor A registered in the embedded information management unit 2. If the signature is correct, the authorized actor A transmits the signature to the IC card 1. It is determined that the user has the execution authority of the embedded authority delegation command transmitted to.

【0012】このようにして、ICカード1における権限
判定部3がコマンドの実行権があると判断した場合、オ
ペレーション実行部4は、埋め込み情報管理部2に対し
て権限委譲先アクタBの公開鍵を認証用情報として登録
する。これにより、ICカード1に権限委譲先アクタBの
公開鍵が設定される。
In this way, when the authority judging unit 3 in the IC card 1 judges that the command execution right is present, the operation executing unit 4 sends the embedded information managing unit 2 the public key of the actor B to which the authority is transferred. Is registered as authentication information. As a result, the public key of the actor B to which the authority is transferred is set in the IC card 1.

【0013】権限を委譲されたアクタBがICカード1に
対してオペレーションを実行する場合には、図2に示す
ように権限委譲先アクタBがICカード1に対するコマン
ドに自分(アクタB)の秘密鍵で署名をつけてICカード
1のオペレーション実行部4へ送信する。オペレーショ
ン実行部4は、権限委譲先アクタBからのコマンドを解
析し、このコマンド中の権限委譲先アクタBの署名検証
を権限判定部3に依頼する。権限判定部3では、先の権
限所持アクタAからICカード1に送信されて、このカー
ドの埋め込み情報管理部2に登録されている(埋め込み
型権限委譲コマンドで設定された)権限委譲先アクタB
の公開鍵を用いてオペレーション実行部4からの署名を
検証し、この署名が正しい場合には、コマンドの実行権
利があると判断する。
When the actor B to which the authority has been delegated performs an operation on the IC card 1, the actor B to which the authority has been delegated transmits a command of the IC card 1 to the actor B, as shown in FIG. The signature is attached with a key and transmitted to the operation execution unit 4 of the IC card 1. The operation execution unit 4 analyzes the command from the actor B to which the authority is transferred, and requests the authority judging unit 3 to verify the signature of the actor B to which the authority is transferred in the command. In the authority judging unit 3, the authority transfer destination actor B (set by the embedding type authority transfer command) transmitted from the actor A having the authority to the IC card 1 and registered in the embedded information management unit 2 of the card.
The signature from the operation execution unit 4 is verified by using the public key of (1), and if the signature is correct, it is determined that the command execution right is granted.

【0014】本発明では、権限委譲先アクタBが、後に
その権限をさらに第3の権限委譲先アクタCに委譲し得
るように、その権限委譲先のアクタCの公開鍵を現時点
の権限所持者であるアクタBに予め登録しておき、上述
したような方法でICカード1の埋め込み情報管理部2に
権限委譲先アクタCの公開鍵を追加登録することによ
り、この埋め込み情報管理部2に登録されたアクタCへ
権限を委譲することも可能である。
In the present invention, the public key of the delegated actor C is stored in the current authority holder so that the delegated actor B can further delegate the authority to the third delegated actor C later. Is registered in advance in the embedded information management unit 2 by additionally registering the public key of the actor C to which the authority is delegated to the embedded information management unit 2 of the IC card 1 in the manner described above. It is also possible to delegate authority to actor C that has been granted.

【0015】[0015]

【発明の効果】以上説明したように、本発明によれば、
ICカード1の埋め込み情報管理部に権限委譲先アクタの
公開鍵を追加登録することにより、この埋め込み情報管
理部に登録された権限委譲先アクタに対して自分の権限
でオペレーションを実行させることができる環境を提供
することができる。また、本発明では、権限を委譲され
たアクタが、さらに第3者へ権限を委譲することも可能
である。
As described above, according to the present invention,
By additionally registering the public key of the actor to which the authority is delegated to the embedded information management unit of the IC card 1, it is possible to cause the actor to be delegated to the authority registered in the embedded information management unit to execute an operation with its own authority. Environment can be provided. Further, in the present invention, the actor to which the authority has been delegated can further delegate the authority to a third party.

【図面の簡単な説明】[Brief description of the drawings]

【図1】 本発明による埋め込み型権限委譲方式におけ
る埋め込み情報の設定手順を示す図である。
FIG. 1 is a diagram showing a procedure for setting embedded information in an embedded authority transfer method according to the present invention.

【図2】 オペレーション権限を委譲された委譲先事業
者がICカードに対するオペレーションを実行する場合の
手順を示す図である。
FIG. 2 is a diagram illustrating a procedure in a case where a transferee company to which operation authority has been transferred performs an operation on an IC card.

【符号の説明】[Explanation of symbols]

1 ICカード 2 埋め込み情報管理部 3 権利判定部 4 オペレーション実行部 5 権限所持事業者 6 権限委譲先事業者 DESCRIPTION OF SYMBOLS 1 IC card 2 Embedded information management part 3 Rights judgment part 4 Operation execution part 5 Authority possessed company 6 Authority transferee company

───────────────────────────────────────────────────── フロントページの続き (72)発明者 鈴木 勝彦 東京都千代田区大手町二丁目3番1号 日 本電信電話株式会社内 (72)発明者 田路 龍太郎 東京都千代田区大手町二丁目3番1号 日 本電信電話株式会社内 Fターム(参考) 2C005 MA40 SA30 5B017 AA01 AA06 BA09 BB09 CA14 5B035 AA14 BB09 5B058 CA25 KA11 KA40  ──────────────────────────────────────────────────続 き Continuing on the front page (72) Katsuhiko Suzuki, Inventor 2-3-1 Otemachi, Chiyoda-ku, Tokyo Inside Nippon Telegraph and Telephone Corporation (72) Ryutaro Taji 2-3, Otemachi, Chiyoda-ku, Tokyo No. 1 F-term in Nippon Telegraph and Telephone Corporation (reference) 2C005 MA40 SA30 5B017 AA01 AA06 BA09 BB09 CA14 5B035 AA14 BB09 5B058 CA25 KA11 KA40

Claims (4)

【特許請求の範囲】[Claims] 【請求項1】 ICカードに対するオペレーション権限を
他の事業者に委譲するための方式であって、ICカードに
委譲先事業者の認証用情報と許可するオペレーション権
限情報を記録し、オペレーション時に、委譲先事業者の
署名検証もしくは、委譲先事業者の認証を行なってオペ
レーションの実行制御を行なうことを特徴とする埋め込
み型権限委譲方式。
1. A method for transferring the operation authority for an IC card to another business operator, wherein information for authentication of the transfer destination business operator and operation permission information to be permitted are recorded on the IC card, and the transfer is performed at the time of operation. An embedding-type authority transfer method characterized in that the execution of the operation is controlled by verifying the signature of the transferee or authenticating the transferee.
【請求項2】 前記認証用情報を委譲先事業者の公開鍵
とすることを特徴とする請求項1に記載の埋め込み型権
限委譲方式。
2. The embedded authority delegation method according to claim 1, wherein the authentication information is used as a public key of a delegation destination company.
【請求項3】 前記許可するオペレーション権限情報
が、権限委譲先事業者の公開鍵と権限所持事業者の署名
を含むことを特徴とする請求項1に記載の埋め込み型権
限委譲方式。
3. The embedded authority delegation method according to claim 1, wherein the permitted operation authority information includes a public key of the authority transfer destination company and a signature of the authority holding company.
【請求項4】 前記ICカードにさらに他の委譲先事業者
の認証情報を記録することを特徴とする請求項1に記載
の埋め込み型権限委譲方式。
4. The embedded authority transfer method according to claim 1, wherein authentication information of another transferee business is recorded on the IC card.
JP2001107994A 2001-04-06 2001-04-06 Embedded authority delegation method Expired - Lifetime JP4201107B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2001107994A JP4201107B2 (en) 2001-04-06 2001-04-06 Embedded authority delegation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2001107994A JP4201107B2 (en) 2001-04-06 2001-04-06 Embedded authority delegation method

Publications (2)

Publication Number Publication Date
JP2002304610A true JP2002304610A (en) 2002-10-18
JP4201107B2 JP4201107B2 (en) 2008-12-24

Family

ID=18960218

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2001107994A Expired - Lifetime JP4201107B2 (en) 2001-04-06 2001-04-06 Embedded authority delegation method

Country Status (1)

Country Link
JP (1) JP4201107B2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004334542A (en) * 2003-05-08 2004-11-25 Dainippon Printing Co Ltd IC card, IC card program, and method of allocating memory area of IC card
JP2005309780A (en) * 2004-04-21 2005-11-04 Ntt Docomo Inc IC card and authority delegation control method
JP5519086B1 (en) * 2012-02-28 2014-06-11 グーグル・インコーポレーテッド Portable secure element
JP6103169B1 (en) * 2015-11-05 2017-03-29 三菱電機株式会社 Security device and security method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004334542A (en) * 2003-05-08 2004-11-25 Dainippon Printing Co Ltd IC card, IC card program, and method of allocating memory area of IC card
JP2005309780A (en) * 2004-04-21 2005-11-04 Ntt Docomo Inc IC card and authority delegation control method
JP5519086B1 (en) * 2012-02-28 2014-06-11 グーグル・インコーポレーテッド Portable secure element
JP6103169B1 (en) * 2015-11-05 2017-03-29 三菱電機株式会社 Security device and security method
WO2017077611A1 (en) * 2015-11-05 2017-05-11 三菱電機株式会社 Security apparatus and security method
CN108352984A (en) * 2015-11-05 2018-07-31 三菱电机株式会社 Safety device and safety method
US10841087B2 (en) 2015-11-05 2020-11-17 Mitsubishi Electric Corporation Security device, system, and security method
CN108352984B (en) * 2015-11-05 2021-06-01 三菱电机株式会社 Safety device and safety method

Also Published As

Publication number Publication date
JP4201107B2 (en) 2008-12-24

Similar Documents

Publication Publication Date Title
RU2501081C2 (en) Multi-factor content protection
US5778072A (en) System and method to transparently integrate private key operations from a smart card with host-based encryption services
JP3808297B2 (en) IC card system and IC card
US7844819B2 (en) Application authentication system
KR100520476B1 (en) Digital contents issuing system and digital contents issuing method
US7882208B2 (en) Information management apparatus, information management method, and program for managing an integrated circuit
CN102483779B (en) Method for reading attributes from an id token and the computer system
JP4501197B2 (en) Information portable processing system, information portable device access device and information portable device
US8499147B2 (en) Account management system, root-account management apparatus, derived-account management apparatus, and program
US20050137889A1 (en) Remotely binding data to a user device
PT2063675E (en) Robust and flexible digital rights management (drm) involving a tamper-resistant identity module
US6748532B1 (en) Universal smart card access system
US20060080322A1 (en) Information processing apparatus, information processing method, and program
JP2009015875A (en) Method and apparatus for tracking status of resource in system for managing use of resources
KR100544991B1 (en) Autonomous integrated circuit cards
JP2008533547A (en) System and method for managing applications on a multi-function smart card
US20030105969A1 (en) Card system, method for installing an application in a card, and method for confirming application execution
Deng et al. Integrating security in CORBA based object architectures
KR20060056319A (en) Method for securing an electronic certificate
JP2006262393A (en) Tamper resistant device and file generation method
JP2002304610A (en) Embedded type delegation method
JP4118032B2 (en) IC card operation management system
JP4201106B2 (en) Command execution authority transfer method and system
JP3817147B2 (en) IC card operation management method and system
JP5068803B2 (en) Service providing system and method

Legal Events

Date Code Title Description
A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20040929

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20050208

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20050408

A02 Decision of refusal

Free format text: JAPANESE INTERMEDIATE CODE: A02

Effective date: 20050816

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20051017

A911 Transfer to examiner for re-examination before appeal (zenchi)

Free format text: JAPANESE INTERMEDIATE CODE: A911

Effective date: 20051028

A912 Re-examination (zenchi) completed and case transferred to appeal board

Free format text: JAPANESE INTERMEDIATE CODE: A912

Effective date: 20051118

RD02 Notification of acceptance of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7422

Effective date: 20060731

RD04 Notification of resignation of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7424

Effective date: 20070119

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20080404

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20080606

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20081001

R151 Written notification of patent or utility model registration

Ref document number: 4201107

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R151

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20111017

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20111017

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20121017

Year of fee payment: 4

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20121017

Year of fee payment: 4

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20131017

Year of fee payment: 5

S531 Written request for registration of change of domicile

Free format text: JAPANESE INTERMEDIATE CODE: R313531

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

EXPY Cancellation because of completion of term