JP4818345B2 - セキュリティーキー変更を処理する方法及び通信装置 - Google Patents
セキュリティーキー変更を処理する方法及び通信装置 Download PDFInfo
- Publication number
- JP4818345B2 JP4818345B2 JP2008307854A JP2008307854A JP4818345B2 JP 4818345 B2 JP4818345 B2 JP 4818345B2 JP 2008307854 A JP2008307854 A JP 2008307854A JP 2008307854 A JP2008307854 A JP 2008307854A JP 4818345 B2 JP4818345 B2 JP 4818345B2
- Authority
- JP
- Japan
- Prior art keywords
- key
- key change
- security
- rrc
- security key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Transceivers (AREA)
Description
2. UEがLTE_ACTIVE状態で長時間動作した場合、ユーザープレーンまたはRRC暗号化/完全性保護に用いられるシーケンス番号がまだラップアラウンドしていなくても、セキュリティーキーが解読されるのを避けるために、セキュリティーキーを更新しなければならない。
3. ベースキーKASMEの寿命が所定の有効期間までくると、同じベースキーの長時間使用を避けるために、セキュリティーキーを更新しなければならない。
4. UEがGERAN/UTRAN(第二世代/第三世代)からLTEに移動した場合、すなわちRAT間ハンドオーバーの完成後、数秒以内にセキュリティーキー更新を完成させなければならない。
ステップ402:eNBで起動されるRRCプロセスで、セキュリティーキー変更を起動する。
ステップ404:前記RRCプロセスを利用し、前記セキュリティーキー変更と、当該セキュリティーキー変更に対応するAKAプロセスの随伴関係を取得する。
ステップ406:終了。
以上は本発明に好ましい実施例であって、本発明の実施の範囲を限定するものではない。よって、当業者のなし得る修正、もしくは変更であって、本発明の精神の下においてなされ、本発明に対して均等の効果を有するものは、いずれも本発明の特許請求の範囲に属するものとする。
100 無線通信装置
102 入力装置
104 出力装置
106 制御回路
108 CPU
110 記憶装置
112 プログラム
114 トランシーバー
200 アプリケーション層
202 第三層
206 第二層
218 第一層
220 キー変更処理プログラム
222 RRCエンティティー
Claims (6)
- 無線通信システムのUE(ユーザー端末)においてセキュリティーキー変更を処理する方法であって、
ハンドオーバープロセスで前記セキュリティーキー変更を起動し、前記ハンドオーバープロセスは、前記セキュリティーキー変更に、前記セキュリティーキー変更に対応するAKA(認証及びキー同意)プロセスが伴うかまたはAKAプロセスが伴わないかを示し、
前記方法は、
前記ハンドオーバープロセスで前記セキュリティーキー変更を起動するためのハンドオーバーメッセージを受信する段階を含み、
前記ハンドオーバーメッセージは、前記セキュリティーキー変更に前記AKAプロセスが伴うかどうかを示す指示子を含む、セキュリティーキー変更の処理方法。 - 前記方法は更に、
前記指示子に基づいて、前記セキュリティーキー変更に、対応するAKAプロセスが伴うかどうかを判断する段階と、
前記セキュリティーキー変更に、対応するAKAプロセスが伴った場合に、前記AKAプロセスに対応するベースキー(KASME)に基づいてAS(アクセスセキュリティー)キーセットを生成する段階と、
前記セキュリティーキー変更に、対応するAKAプロセスが伴わなかった場合に、前の基地局キー(KeNB)または前のベースキーに基づいて前記ASキーセットを生成する段階と、を含み、
前記ASキーセットはユーザープレーンキー(KeNB−UP−enc)とRRCキー(KeNB−RRC−int)、(KeNB−RRC−enc)を含む、請求項1に記載のセキュリティーキー変更の処理方法。 - 前記UEはRRC_CONNECTED状態またはLTE_ACTIVE状態で動作する、請求項1又は請求項2に記載のセキュリティーキー変更の処理方法。
- 無線通信システムにおいてセキュリティーキー変更を実行するための通信装置であって、
処理プロセスを実行するCPU(中央処理装置)と、
前記CPUに結合され、前記処理プロセスを実行するためのプログラムを記録する記憶装置と、を含み、
ハンドオーバープロセスで前記セキュリティーキー変更を起動し、前記ハンドオーバープロセスは、前記セキュリティーキー変更に、前記セキュリティーキー変更に対応するAKAプロセスが伴うかまたはAKAプロセスが伴わないかを示し、
前記処理プロセスは、前記ハンドオーバープロセスで前記セキュリティーキー変更を起動するためのハンドオーバーメッセージを受信する段階を含み、前記ハンドオーバーメッセージは、前記セキュリティーキー変更に前記AKAプロセスが伴うかどうかを示す指示子を含む、通信装置。 - 前記処理プロセスは更に、
前記指示子に基づいて、前記セキュリティーキー変更に、対応するAKAプロセスが伴うかどうかを判断する段階と、
前記セキュリティーキー変更にAKAプロセスが伴った場合に、前記AKAプロセスに対応するベースキー(KASME)に基づいてASキーセットを生成する段階と、
前記セキュリティーキー変更に、対応するAKAプロセスが伴わなかった場合に、前の基地局キー(KeNB)または前のベースキーに基づいて前記ASキーセットを生成する段階と、を含み、
前記ASキーセットはユーザープレーンキー(KeNB−UP−enc)とRRCキー(KeNB−RRC−int)、(KeNB−RRC−enc)を含む、請求項4に記載の通信装置。 - 前記通信装置はRRC_CONNECTED状態またはLTE_ACTIVE状態で動作する、請求項4又は請求項5に記載の通信装置。
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US99267507P | 2007-12-05 | 2007-12-05 | |
| US60/992,675 | 2007-12-05 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2009141958A JP2009141958A (ja) | 2009-06-25 |
| JP4818345B2 true JP4818345B2 (ja) | 2011-11-16 |
Family
ID=40491018
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2008307854A Active JP4818345B2 (ja) | 2007-12-05 | 2008-12-02 | セキュリティーキー変更を処理する方法及び通信装置 |
Country Status (8)
| Country | Link |
|---|---|
| US (2) | US8045715B2 (ja) |
| EP (1) | EP2071885B1 (ja) |
| JP (1) | JP4818345B2 (ja) |
| KR (1) | KR101091793B1 (ja) |
| CN (1) | CN101453732B (ja) |
| ES (1) | ES2764994T3 (ja) |
| PL (1) | PL2071885T3 (ja) |
| TW (1) | TWI383639B (ja) |
Families Citing this family (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2087634B1 (en) | 2006-11-01 | 2016-07-20 | Telefonaktiebolaget LM Ericsson (publ) | Telecommunication systems and encryption of control messages in such systems |
| US8462953B2 (en) * | 2007-12-24 | 2013-06-11 | Institute For Information Industry | Communication system and method thereof |
| CN101616408B (zh) * | 2008-06-23 | 2012-04-18 | 华为技术有限公司 | 密钥衍生方法、设备及系统 |
| US20100173610A1 (en) * | 2009-01-05 | 2010-07-08 | Qualcomm Incorporated | Access stratum security configuration for inter-cell handover |
| US8566593B2 (en) * | 2009-07-06 | 2013-10-22 | Intel Corporation | Method and apparatus of deriving security key(s) |
| CN101945384B (zh) * | 2009-07-09 | 2013-06-12 | 中兴通讯股份有限公司 | Rrc连接重建立时的安全密钥处理方法、装置及系统 |
| CN102056157B (zh) * | 2009-11-04 | 2013-09-11 | 电信科学技术研究院 | 一种确定密钥和密文的方法、系统及装置 |
| CN102264065A (zh) * | 2010-05-27 | 2011-11-30 | 中兴通讯股份有限公司 | 一种实现接入层安全算法同步的方法及系统 |
| CN102271126B (zh) * | 2010-06-03 | 2014-02-26 | 泰歆科技有限公司 | 包容式金钥认证方法 |
| WO2012032218A1 (en) * | 2010-09-09 | 2012-03-15 | Nokia Corporation | Methods and apparatuses for handling an unavailable key |
| CN102469454A (zh) * | 2010-11-08 | 2012-05-23 | 华为技术有限公司 | Rnc切换中的密钥设置方法及无线网络控制器、终端 |
| EP2853106A4 (en) | 2012-05-23 | 2015-12-23 | Nokia Technologies Oy | KEY DISPOSAL METHOD AND DEVICE FOR LOCAL ACCESS CONTROL OF A CELLULAR NETWORK |
| CN102752104B (zh) * | 2012-06-07 | 2017-10-31 | 中国电子科技集团公司第三十研究所 | 一种基于智能卡cos的对称密码服务实现方法 |
| EP2873188B1 (en) * | 2012-07-10 | 2016-09-14 | ABB Research Ltd. | Methods and devices for security key renewal in a communication system |
| EP2910044B1 (en) | 2012-10-19 | 2020-12-09 | Nokia Technologies Oy | Method and device of generating a key for device-to-device communication between a first user equipment and a second user equipment |
| US9154481B1 (en) * | 2012-12-13 | 2015-10-06 | Emc Corporation | Decryption of a protected resource on a cryptographic device using wireless communication |
| WO2014179367A1 (en) * | 2013-04-29 | 2014-11-06 | Hughes Network Systems, Llc | Data encryption protocols for mobile satellite communications |
| KR102078866B1 (ko) | 2013-08-09 | 2020-02-19 | 삼성전자주식회사 | 듀얼 커넥티비티 지원을 위한 pdcp 분산 구조의 보안 키 생성 및 관리 방안 |
| CN104427496B (zh) * | 2013-08-29 | 2018-06-26 | 成都鼎桥通信技术有限公司 | Td-lte集群通信系统加密传输方法、装置和系统 |
| JP6337965B2 (ja) | 2013-12-24 | 2018-06-06 | 日本電気株式会社 | Sceのための装置、システム、及び方法 |
| ES2759428T3 (es) | 2014-01-28 | 2020-05-11 | Huawei Tech Co Ltd | Método de cambio de clave de seguridad y equipo de usuario |
| US9686675B2 (en) * | 2015-03-30 | 2017-06-20 | Netscout Systems Texas, Llc | Systems, methods and devices for deriving subscriber and device identifiers in a communication network |
| US10588019B2 (en) * | 2016-05-05 | 2020-03-10 | Qualcomm Incorporated | Secure signaling before performing an authentication and key agreement |
| KR102358918B1 (ko) | 2016-07-04 | 2022-02-07 | 삼성전자 주식회사 | 무선 통신 시스템에서 서비스에 따른 보안 관리 방법 및 장치 |
| US10671764B2 (en) * | 2016-09-15 | 2020-06-02 | Nuts Holdings, Llc | NUTS: eNcrypted Userdata Transit and Storage |
| US10123210B2 (en) * | 2017-03-17 | 2018-11-06 | Nokia Of America Corporation | System and method for dynamic activation and deactivation of user plane integrity in wireless networks |
| IL319115A (en) | 2020-04-09 | 2025-04-01 | Nuts Holdings Llc | (Encrypted User Data Transit and Storage Policy): Flexible Hierarchy Object Graphs |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2001339386A (ja) * | 2000-05-25 | 2001-12-07 | Nec Corp | 無線通信システム、無線ネットワーク制御装置、ユーザ端末装置 |
| CA2501125C (en) * | 2002-10-04 | 2009-07-28 | M-Stack Limited | Access stratum manager |
| US8369525B2 (en) * | 2002-10-24 | 2013-02-05 | At&T Mobility Ii Llc | Dynamic password update for wireless encryption system |
| CN101180828B (zh) * | 2005-05-16 | 2012-12-05 | 艾利森电话股份有限公司 | 用于在综合网络中加密和传输数据的装置与方法 |
| US20090268722A1 (en) * | 2008-04-29 | 2009-10-29 | Gallagher Michael D | User Equipment and System Architecture for Voice over Long Term Evolution via Generic Access |
| US20110312299A1 (en) * | 2010-06-18 | 2011-12-22 | Qualcomm Incorporated | Methods and apparatuses facilitating synchronization of security configurations |
-
2008
- 2008-12-02 JP JP2008307854A patent/JP4818345B2/ja active Active
- 2008-12-05 ES ES08021197T patent/ES2764994T3/es active Active
- 2008-12-05 KR KR1020080123500A patent/KR101091793B1/ko active Active
- 2008-12-05 TW TW097147302A patent/TWI383639B/zh active
- 2008-12-05 US US12/328,772 patent/US8045715B2/en active Active
- 2008-12-05 PL PL08021197T patent/PL2071885T3/pl unknown
- 2008-12-05 CN CN2008101798494A patent/CN101453732B/zh active Active
- 2008-12-05 EP EP08021197.2A patent/EP2071885B1/en active Active
-
2011
- 2011-10-20 US US13/277,770 patent/US8472628B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| CN101453732B (zh) | 2012-10-10 |
| JP2009141958A (ja) | 2009-06-25 |
| US8045715B2 (en) | 2011-10-25 |
| EP2071885A2 (en) | 2009-06-17 |
| PL2071885T3 (pl) | 2020-05-18 |
| KR101091793B1 (ko) | 2011-12-08 |
| CN101453732A (zh) | 2009-06-10 |
| TW200926717A (en) | 2009-06-16 |
| US8472628B2 (en) | 2013-06-25 |
| ES2764994T3 (es) | 2020-06-05 |
| EP2071885A3 (en) | 2009-11-25 |
| KR20090059074A (ko) | 2009-06-10 |
| TWI383639B (zh) | 2013-01-21 |
| US20120033815A1 (en) | 2012-02-09 |
| US20090147951A1 (en) | 2009-06-11 |
| EP2071885B1 (en) | 2019-11-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP4818345B2 (ja) | セキュリティーキー変更を処理する方法及び通信装置 | |
| US11564100B2 (en) | Security protection method and apparatus | |
| CN106134231B (zh) | 密钥生成方法、设备及系统 | |
| US10798082B2 (en) | Network authentication triggering method and related device | |
| EP3917187A1 (en) | Security implementation method and related apparatus | |
| CN102404721B (zh) | Un接口的安全保护方法、装置和基站 | |
| US11082843B2 (en) | Communication method and communications apparatus | |
| CN108605225B (zh) | 一种安全处理方法及相关设备 | |
| CN107113608B (zh) | 使用密钥扩展乘数来生成多个共享密钥的方法和装置 | |
| CN115885496B (zh) | 一种通信方法及相关装置 | |
| US20190149326A1 (en) | Key obtaining method and apparatus | |
| CN116941263A (zh) | 一种通信方法及装置 | |
| CN116782211A (zh) | 切换密钥的确定方法、切换方法及装置 | |
| CN109819439A (zh) | 密钥更新的方法及相关实体 | |
| US20170201506A1 (en) | Communication Method, Apparatus, and System | |
| US20250219837A1 (en) | Information processing method and apparatus, communication device, and storage medium | |
| EP3614709B1 (en) | Key generation method and related devices | |
| CN102378168B (zh) | 多系统核心网通知密钥的方法和多系统网络 | |
| CN101771990B (zh) | 一种密钥获取方法、设备和系统 | |
| Cao et al. | The design of communication encryption module based on NB-IoT |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A711 | Notification of change in applicant |
Free format text: JAPANESE INTERMEDIATE CODE: A711 Effective date: 20090319 |
|
| RD03 | Notification of appointment of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7423 Effective date: 20110119 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20110601 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20110614 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20110713 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20110802 |
|
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20110830 |
|
| FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20140909 Year of fee payment: 3 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 4818345 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20140909 Year of fee payment: 3 |
|
| S531 | Written request for registration of change of domicile |
Free format text: JAPANESE INTERMEDIATE CODE: R313531 |
|
| FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20140909 Year of fee payment: 3 |
|
| R360 | Written notification for declining of transfer of rights |
Free format text: JAPANESE INTERMEDIATE CODE: R360 |
|
| FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20140909 Year of fee payment: 3 |
|
| R370 | Written measure of declining of transfer procedure |
Free format text: JAPANESE INTERMEDIATE CODE: R370 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| S531 | Written request for registration of change of domicile |
Free format text: JAPANESE INTERMEDIATE CODE: R313531 |
|
| S634 | Written request for registration of reclamation of nationality |
Free format text: JAPANESE INTERMEDIATE CODE: R313634 |
|
| R360 | Written notification for declining of transfer of rights |
Free format text: JAPANESE INTERMEDIATE CODE: R360 |
|
| R370 | Written measure of declining of transfer procedure |
Free format text: JAPANESE INTERMEDIATE CODE: R370 |
|
| S531 | Written request for registration of change of domicile |
Free format text: JAPANESE INTERMEDIATE CODE: R313531 |
|
| S634 | Written request for registration of reclamation of nationality |
Free format text: JAPANESE INTERMEDIATE CODE: R313634 |
|
| R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |