KR20090125754A - 무선 메시 및 센서 네트워크에서 탄력적 패킷 역추적을 위한 방법 및 시스템 - Google Patents
무선 메시 및 센서 네트워크에서 탄력적 패킷 역추적을 위한 방법 및 시스템 Download PDFInfo
- Publication number
- KR20090125754A KR20090125754A KR1020097016948A KR20097016948A KR20090125754A KR 20090125754 A KR20090125754 A KR 20090125754A KR 1020097016948 A KR1020097016948 A KR 1020097016948A KR 20097016948 A KR20097016948 A KR 20097016948A KR 20090125754 A KR20090125754 A KR 20090125754A
- Authority
- KR
- South Korea
- Prior art keywords
- node
- sink
- packet
- signature
- nodes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/146—Tracing the source of attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
- H04W84/20—Leader-follower arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
S | 소스 몰 |
M | 소스 몰(S)이 생성한 메시지. 이것은 이벤트, 위치, 타임스탬프를 포함한다. M=E|L|T |
X | 호프 x에서의 결탁 몰(Vx) |
Vi | 호프 1 내지 n에서 회송 노드 |
ki | Vi와 싱크 사이에 공유된 비밀키 |
Mi | 노드 Vi에 의해 그 다음 호프 이웃 Vi+1에 회송된 메시지 |
mi | 노드 i에 의해 Mi_1에 추가된 마크. 이 마크는 Vi'의 ID 및 MAC를 포함할 수 있다. |
Claims (10)
- 네트워크에서 패킷을 역추적하는 방법에 있어서,네트워크 내의 각 노드의 아이덴티티 번호(ID)를 유지하는 것과;각 회송 노드에서 이 노드와 싱크 사이에 공유된 비밀키를 이용하여 서명을 발생시키는 것과;싱크에서 패킷을 수신한 때, 각 패킷의 서명의 정확함을 서명이 추가된 순서의 역순으로 싱크에 의해 검증하는 것과;회송 경로의 서명 유효성을 결정하여 오류 데이터 주입 소스의 위치 및/또는 결탁하는 타협 노드의 위치를 결정하는 것을 포함하는 패킷 역추적 방법.
- 제1항에 있어서, ID는 회송 경로 내의 노드 존재를 표시하고, 서명은 노드가 ID와 관련된 패킷을 전송하였음을 입증하는 것인 패킷 역추적 방법.
- 제1항에 있어서, 키에 따라서 이전 노드로부터의 패킷을 그 전체로서 해시하여 서명을 발생시키는 것을 더 포함하는 패킷 역추적 방법.
- 제1항에 있어서, 서명 유효성을 결정하는 것은 최종 호프 노드의 ID를 검색하는 것과; 최종 호프 노드의 서명을 연산하고 최종 호프 노드의 서명을 검증하는 것과; 최종의 유효 서명이 결정될 때까지 반복하는 것을 포함하는 것인 패킷 역추 적 방법.
- 제1항에 있어서, 아이덴티티 번호(ID)를 유지하는 것은 현재 노드 및 싱크에 의해 알려진 키를 이용하여 ID로부터의 익명 ID를 맵핑하는 것을 포함하는 것인 패킷 역추적 방법.
- 제1항에 있어서, 회송 경로를 통과하는 노드 순서를 제공하기 위해 패킷을 마킹하는 것을 더 포함하는 패킷 역추적 방법.
- 제1항에 있어서, 각 패킷의 서명의 정확함을 검증하는 것은 슬라이딩 윈도우를 이용하여 유효 순서 번호를 결정하는 것을 포함하는 것인 패킷 역추적 방법.
- 제1항에 있어서, 회송 경로로부터 몰을 제거하는 것을 더 포함하는 패킷 역추적 방법.
- 제1항에 있어서, 회송 경로에 복수의 결탁 몰을 배치하는 것을 더 포함하는 패킷 역추적 방법.
- 컴퓨터 판독가능 프로그램을 포함한 컴퓨터 사용가능 매체를 포함한 네트워크에서 패킷을 역추적하기 위한 컴퓨터 프로그램 제품에 있어서,컴퓨터 판독가능 프로그램은, 컴퓨터에서 실행될 때, 컴퓨터로 하여금,네트워크 내의 각 노드의 아이덴티티 번호(ID)를 유지하는 것과;각 회송 노드에서 이 노드와 싱크 사이에 공유된 비밀키를 이용하여 서명을 발생시키는 것과;싱크에서 패킷을 수신한 때, 각 패킷의 서명의 정확함을 서명이 추가된 순서의 역순으로 싱크에 의해 검증하는 것과;회송 경로의 서명 유효성을 결정하여 오류 데이터 주입 소스를 결정하는 것을 수행하게 하는 것인 컴퓨터 프로그램 제품.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/694,388 | 2007-03-30 | ||
US11/694,388 US8695089B2 (en) | 2007-03-30 | 2007-03-30 | Method and system for resilient packet traceback in wireless mesh and sensor networks |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20090125754A true KR20090125754A (ko) | 2009-12-07 |
Family
ID=39796670
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020097016948A Abandoned KR20090125754A (ko) | 2007-03-30 | 2008-03-19 | 무선 메시 및 센서 네트워크에서 탄력적 패킷 역추적을 위한 방법 및 시스템 |
Country Status (9)
Country | Link |
---|---|
US (1) | US8695089B2 (ko) |
EP (1) | EP2140650B1 (ko) |
JP (1) | JP4683383B2 (ko) |
KR (1) | KR20090125754A (ko) |
AT (1) | ATE511295T1 (ko) |
BR (1) | BRPI0808619A2 (ko) |
CA (1) | CA2672696A1 (ko) |
TW (1) | TW200849888A (ko) |
WO (1) | WO2008119672A2 (ko) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107431691A (zh) * | 2015-08-25 | 2017-12-01 | 华为技术有限公司 | 一种数据包传输方法、装置、节点设备以及系统 |
WO2019156278A1 (ko) * | 2018-02-09 | 2019-08-15 | 경희대학교 산학협력단 | 패킷의 무결성을 판단하는 방법 |
Families Citing this family (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8806634B2 (en) * | 2005-04-05 | 2014-08-12 | Donald N. Cohen | System for finding potential origins of spoofed internet protocol attack traffic |
KR100922582B1 (ko) * | 2007-07-20 | 2009-10-21 | 한국전자통신연구원 | 중심점 분할 기법을 이용한 로그 기반의 역추적 시스템 및방법 |
US20090131022A1 (en) * | 2007-08-16 | 2009-05-21 | Research In Motion Limited | Apparatuses and Methods for Anonymous Messaging |
US8094022B2 (en) * | 2007-09-25 | 2012-01-10 | Infinid Technologies, Inc | Active ID tags for increased range and functionality |
US8711729B2 (en) * | 2008-01-11 | 2014-04-29 | Cisco Technology, Inc. | Host route convergence based on sequence values |
US8769267B2 (en) * | 2008-05-30 | 2014-07-01 | The Boeing Company | Geothentication based on new network packet structure |
US8977843B2 (en) * | 2008-05-30 | 2015-03-10 | The Boeing Company | Geolocating network nodes in attenuated environments for cyber and network security applications |
US20230014116A1 (en) * | 2008-08-12 | 2023-01-19 | Truist Bank | Automated webpage confirmation and on-line authentication processes |
US8353034B2 (en) * | 2008-11-25 | 2013-01-08 | At&T Intellectual Property I, L.P. | System and method to locate a prefix hijacker within a one-hop neighborhood |
KR101040469B1 (ko) * | 2009-04-24 | 2011-06-09 | 경희대학교 산학협력단 | 무선 메쉬 네트워크에서 메쉬 라우터의 인증 방법 |
US8185613B2 (en) | 2009-06-08 | 2012-05-22 | Microsoft Corporation | Host accountability using unreliable identifiers |
US20100325424A1 (en) * | 2009-06-19 | 2010-12-23 | Etchegoyen Craig S | System and Method for Secured Communications |
US8495359B2 (en) | 2009-06-22 | 2013-07-23 | NetAuthority | System and method for securing an electronic communication |
JP5475379B2 (ja) * | 2009-09-24 | 2014-04-16 | ホーチキ株式会社 | 無線防災システム、電波中継ノード及び無線防災ノード |
US20110145572A1 (en) * | 2009-12-15 | 2011-06-16 | Christensen Kenneth J | Apparatus and method for protecting packet-switched networks from unauthorized traffic |
KR101292615B1 (ko) * | 2009-12-21 | 2013-08-02 | 한국전자통신연구원 | 고위험 비행자료 패킷 역추적 및 차단 방법 및 이를 위한 장치 |
JP5681028B2 (ja) * | 2010-04-26 | 2015-03-04 | パナソニック株式会社 | 改ざん監視システム、管理装置及び管理方法 |
TWI425795B (zh) * | 2010-07-29 | 2014-02-01 | Univ Nat Chiao Tung | 追蹤網路封包之處理程序的方法 |
US8446834B2 (en) | 2011-02-16 | 2013-05-21 | Netauthority, Inc. | Traceback packet transport protocol |
WO2013072973A1 (ja) * | 2011-11-18 | 2013-05-23 | 富士通株式会社 | 通信ノード、通信制御方法、および通信ノードの制御プログラム |
US8949954B2 (en) | 2011-12-08 | 2015-02-03 | Uniloc Luxembourg, S.A. | Customer notification program alerting customer-specified network address of unauthorized access attempts to customer account |
AU2012100460B4 (en) | 2012-01-04 | 2012-11-08 | Uniloc Usa, Inc. | Method and system implementing zone-restricted behavior of a computing device |
AU2012100462B4 (en) | 2012-02-06 | 2012-11-08 | Uniloc Usa, Inc. | Near field authentication through communication of enclosed content sound waves |
US9237082B2 (en) | 2012-03-26 | 2016-01-12 | Hewlett Packard Enterprise Development Lp | Packet descriptor trace indicators |
WO2013145026A1 (ja) * | 2012-03-30 | 2013-10-03 | 富士通株式会社 | ネットワークシステム、ノード、検証ノードおよび通信方法 |
KR101640210B1 (ko) * | 2013-01-16 | 2016-07-15 | 한국전자통신연구원 | 도메인 내 경로 설정 및 검증을 위한 패킷 처리장치 및 그 방법 |
AU2013100355B4 (en) | 2013-02-28 | 2013-10-31 | Netauthority, Inc | Device-specific content delivery |
CN103428032B (zh) * | 2013-08-19 | 2016-11-09 | 杭州华三通信技术有限公司 | 一种攻击定位、辅助定位装置和方法 |
US20150229618A1 (en) * | 2014-02-11 | 2015-08-13 | Futurewei Technologies, Inc. | System and Method for Securing Source Routing Using Public Key based Digital Signature |
US20160099859A1 (en) * | 2014-10-06 | 2016-04-07 | Futurewei Technologies, Inc. | Reverse Path Validation for Source Routed Networks |
CN104735650B (zh) * | 2015-03-30 | 2018-10-12 | 重庆邮电大学 | 一种扇形域幻影路由的源位置隐私保护方法 |
US10402792B2 (en) * | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
US10225708B2 (en) | 2016-01-06 | 2019-03-05 | King Abdulaziz University | Trust evaluation wireless network for routing data packets |
US10187400B1 (en) * | 2016-02-23 | 2019-01-22 | Area 1 Security, Inc. | Packet filters in security appliances with modes and intervals |
US10038603B1 (en) | 2016-02-23 | 2018-07-31 | Area 1 Security, Inc. | Packet capture collection tasking system |
US10200396B2 (en) * | 2016-04-05 | 2019-02-05 | Blackberry Limited | Monitoring packet routes |
US11108562B2 (en) * | 2016-05-05 | 2021-08-31 | Neustar, Inc. | Systems and methods for verifying a route taken by a communication |
US10366224B2 (en) * | 2016-06-22 | 2019-07-30 | Dell Products, Lp | System and method for securing secure memory allocations in an information handling system |
US10999250B1 (en) | 2016-08-17 | 2021-05-04 | Infersight Llc | System and method for validating a message conveyed via a network |
WO2018055654A1 (en) * | 2016-09-20 | 2018-03-29 | Nec Corporation | Communication apparatus, system, method, and program |
KR101831604B1 (ko) * | 2016-10-31 | 2018-04-04 | 삼성에스디에스 주식회사 | 데이터 전송 방법, 인증 방법 및 이를 수행하기 위한 서버 |
CN108337092B (zh) * | 2017-01-17 | 2021-02-12 | 华为国际有限公司 | 用于在通信网络中执行集体认证的方法和系统 |
JP2019041321A (ja) * | 2017-08-28 | 2019-03-14 | ルネサスエレクトロニクス株式会社 | データ受信装置、データ伝送システム、及び鍵生成装置 |
CN109936867A (zh) * | 2017-12-19 | 2019-06-25 | 英华达(上海)科技有限公司 | 一种定位方法及定位系统 |
WO2019132764A1 (en) * | 2017-12-26 | 2019-07-04 | Agency For Science, Technology And Research | Tracing traffic in the internet |
CN109375514B (zh) * | 2018-11-30 | 2021-11-05 | 沈阳航空航天大学 | 一种存在假数据注入攻击时的最优跟踪控制器设计方法 |
CN111614650B (zh) * | 2020-05-14 | 2022-02-01 | 长沙学院 | 一种无线传感器网络中妥协节点的检测方法及装置 |
CN111917741B (zh) * | 2020-07-15 | 2021-11-05 | 上海大学 | 一种基于Dos和虚拟数据注入攻击的微电网安全防御系统及方法 |
CN111817965B (zh) * | 2020-09-10 | 2020-12-22 | 鹏城实验室 | 报文轨迹跟踪方法、系统及计算机可读存储介质 |
JP7404220B2 (ja) * | 2020-12-09 | 2023-12-25 | 株式会社東芝 | ワイヤレス伝送システム及びワイヤレス伝送方法 |
US20220210048A1 (en) * | 2020-12-28 | 2022-06-30 | Nokia Solutions And Networks Oy | Packet forwarding on non-coherent paths |
EP4195661A1 (en) | 2021-12-10 | 2023-06-14 | Axis AB | Methods of adding and validating a digital signature in a video data segment |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5455865A (en) * | 1989-05-09 | 1995-10-03 | Digital Equipment Corporation | Robust packet routing over a distributed network containing malicious failures |
WO1992003000A1 (en) | 1990-08-02 | 1992-02-20 | Bell Communications Research, Inc. | Method for secure time-stamping of digital documents |
JPH07225550A (ja) | 1994-02-10 | 1995-08-22 | Hitachi Software Eng Co Ltd | データ多段階参照方法およびデータ多段階参照システム |
US5479514A (en) * | 1994-02-23 | 1995-12-26 | International Business Machines Corporation | Method and apparatus for encrypted communication in data networks |
US5805063A (en) * | 1996-02-09 | 1998-09-08 | Interactive Technologies, Inc. | Wireless security sensor transmitter |
US6978223B2 (en) * | 2001-09-06 | 2005-12-20 | Bbnt Solutions Llc | Systems and methods for network performance measurement using packet signature collection |
US6737969B2 (en) * | 2001-11-27 | 2004-05-18 | Ion Digital Llp | Wireless security sensor systems for windows and doors |
US7058796B2 (en) * | 2002-05-20 | 2006-06-06 | Airdefense, Inc. | Method and system for actively defending a wireless LAN against attacks |
US7086089B2 (en) * | 2002-05-20 | 2006-08-01 | Airdefense, Inc. | Systems and methods for network security |
WO2004008700A2 (en) * | 2002-07-12 | 2004-01-22 | The Penn State Research Foundation | Real-time packet traceback and associated packet marking strategies |
FR2845222B1 (fr) | 2002-09-26 | 2004-11-19 | Gemplus Card Int | Identification d'un terminal aupres d'un serveur |
US7421578B1 (en) * | 2003-07-22 | 2008-09-02 | Cisco Technology, Inc. | Method and apparatus for electing a leader node in a computer network |
US8059551B2 (en) * | 2005-02-15 | 2011-11-15 | Raytheon Bbn Technologies Corp. | Method for source-spoofed IP packet traceback |
US7738859B2 (en) * | 2005-03-10 | 2010-06-15 | Interdigital Technology Corporation | Multi-node communication system and method of requesting, reporting and collecting destination-node-based measurements and route-based measurements |
US7455218B2 (en) * | 2005-06-20 | 2008-11-25 | Microsoft Corproation | Rich object model for diverse Auto-ID tags |
US7660296B2 (en) * | 2005-12-30 | 2010-02-09 | Akamai Technologies, Inc. | Reliable, high-throughput, high-performance transport and routing mechanism for arbitrary data flows |
-
2007
- 2007-03-30 US US11/694,388 patent/US8695089B2/en active Active
-
2008
- 2008-03-10 TW TW097108386A patent/TW200849888A/zh unknown
- 2008-03-19 JP JP2010500227A patent/JP4683383B2/ja active Active
- 2008-03-19 WO PCT/EP2008/053325 patent/WO2008119672A2/en active Application Filing
- 2008-03-19 AT AT08718046T patent/ATE511295T1/de not_active IP Right Cessation
- 2008-03-19 CA CA002672696A patent/CA2672696A1/en not_active Abandoned
- 2008-03-19 EP EP08718046A patent/EP2140650B1/en not_active Not-in-force
- 2008-03-19 BR BRPI0808619-2A patent/BRPI0808619A2/pt not_active Application Discontinuation
- 2008-03-19 KR KR1020097016948A patent/KR20090125754A/ko not_active Abandoned
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107431691A (zh) * | 2015-08-25 | 2017-12-01 | 华为技术有限公司 | 一种数据包传输方法、装置、节点设备以及系统 |
WO2019156278A1 (ko) * | 2018-02-09 | 2019-08-15 | 경희대학교 산학협력단 | 패킷의 무결성을 판단하는 방법 |
Also Published As
Publication number | Publication date |
---|---|
ATE511295T1 (de) | 2011-06-15 |
WO2008119672A2 (en) | 2008-10-09 |
JP4683383B2 (ja) | 2011-05-18 |
EP2140650A2 (en) | 2010-01-06 |
TW200849888A (en) | 2008-12-16 |
US8695089B2 (en) | 2014-04-08 |
WO2008119672A3 (en) | 2009-01-22 |
CA2672696A1 (en) | 2008-10-09 |
BRPI0808619A2 (pt) | 2014-08-12 |
EP2140650B1 (en) | 2011-05-25 |
JP2010528496A (ja) | 2010-08-19 |
US20080244739A1 (en) | 2008-10-02 |
WO2008119672A4 (en) | 2009-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20090125754A (ko) | 무선 메시 및 센서 네트워크에서 탄력적 패킷 역추적을 위한 방법 및 시스템 | |
Deng et al. | Defending against path-based DoS attacks in wireless sensor networks | |
Ye et al. | Statistical en-route filtering of injected false data in sensor networks | |
Ye et al. | Catching" moles" in sensor networks | |
Sultana et al. | A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks | |
Wu et al. | What if routers are malicious? mitigating content poisoning attack in ndn | |
US11924043B2 (en) | Establishing trust relationships of IPv6 neighbors using attestation-based methods in IPv6 neighbor discovery | |
CN101867933B (zh) | 一种基于公钥数字签名和路由恶意检测的安全路由方法 | |
Malliga et al. | A hybrid scheme using packet marking and logging for IP traceback | |
Choo et al. | Robustness of DTN against routing attacks | |
Deng et al. | Limiting DoS attacks during multihop data delivery in wireless sensor networks | |
Malliga et al. | A proposal for new marking scheme with its performance evaluation for IP traceback | |
KR101081433B1 (ko) | IPv6 기반 네트워크의 공격 패킷의 역추적 방법 및 그 기록매체 | |
Santhanam et al. | Taxonomy of IP traceback | |
Su et al. | Privacy preserving IP traceback | |
Bhavani et al. | IP traceback through modified probabilistic packet marking algorithm | |
Woungang et al. | A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks | |
Liu et al. | TAP: A Traffic-Aware Probabilistic Packet Marking for Collaborative DDoS Mitigation | |
Fadlallah et al. | A hybrid messaging-based scheme for IP traceback | |
Zhu et al. | A secure and efficient data aggregation scheme for wireless sensor networks | |
Zhang | Secure and efficient network fault localization | |
Chen | A novel marking-based detection and filtering scheme against distributed denial of service attack | |
Gao et al. | A new marking scheme to defend against distributed denial of service attacks | |
Joshi et al. | Network Forensic Attribution | |
Wang et al. | Detecting offensive routers: A straightforward approach |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PA0105 | International application |
Patent event date: 20090813 Patent event code: PA01051R01D Comment text: International Patent Application |
|
A201 | Request for examination | ||
PA0201 | Request for examination |
Patent event code: PA02012R01D Patent event date: 20091013 Comment text: Request for Examination of Application |
|
PG1501 | Laying open of application | ||
E902 | Notification of reason for refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20110217 Patent event code: PE09021S01D |
|
E701 | Decision to grant or registration of patent right | ||
PE0701 | Decision of registration |
Patent event code: PE07011S01D Comment text: Decision to Grant Registration Patent event date: 20110929 |
|
NORF | Unpaid initial registration fee | ||
PC1904 | Unpaid initial registration fee |