+

KR101048439B1 - The server that stores the game execution authority authentication method, the recording medium on which the game execution authority authentication program is recorded, and the game execution authority authentication program. - Google Patents

The server that stores the game execution authority authentication method, the recording medium on which the game execution authority authentication program is recorded, and the game execution authority authentication program. Download PDF

Info

Publication number
KR101048439B1
KR101048439B1 KR1020090036185A KR20090036185A KR101048439B1 KR 101048439 B1 KR101048439 B1 KR 101048439B1 KR 1020090036185 A KR1020090036185 A KR 1020090036185A KR 20090036185 A KR20090036185 A KR 20090036185A KR 101048439 B1 KR101048439 B1 KR 101048439B1
Authority
KR
South Korea
Prior art keywords
game execution
game
data
executable file
authority authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
KR1020090036185A
Other languages
Korean (ko)
Other versions
KR20100117428A (en
Inventor
강한
Original Assignee
(주)엠더블유스토리
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)엠더블유스토리 filed Critical (주)엠더블유스토리
Priority to KR1020090036185A priority Critical patent/KR101048439B1/en
Priority to US12/569,761 priority patent/US20100273552A1/en
Publication of KR20100117428A publication Critical patent/KR20100117428A/en
Application granted granted Critical
Publication of KR101048439B1 publication Critical patent/KR101048439B1/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/71Game security or game management aspects using secure communication between game devices and game servers, e.g. by encrypting game data or authenticating players
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/77Game security or game management aspects involving data related to game devices or game servers, e.g. configuration data, software version or amount of memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/50Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
    • A63F2300/53Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers details of basic data processing
    • A63F2300/532Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers details of basic data processing using secure communication, e.g. by encryption, authentication
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/50Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
    • A63F2300/55Details of game data or player data management
    • A63F2300/5586Details of game data or player data management for enforcing rights or rules, e.g. to prevent foul play

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Tourism & Hospitality (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Storage Device Security (AREA)

Abstract

게임 실행 권한 인증 방법, 게임 실행 권한 인증 프로그램이 기록된 기록매체, 및 게임 실행 권한 인증 프로그램이 저장된 서버가 개시된다. 본 발명은, 게임을 실행시키기 위한 암호화된 실행 파일을 복호화하기 위한 복호화 키의 전송을 인증 서버에 요청하고, 인증 서버로부터 수신한 복호화 키로 암호화된 실행 파일을 복호화하여 실행 파일을 생성하며, 획득된 현재시간을 랜덤 데이터와 함께 해쉬하여 해쉬 데이터를 생성하고, 현재시간, 랜덤 데이터, 및 해쉬 데이터를 임의의 고정키로 암호화하여 암호화 데이터를 생성하며, 생성된 암호화 데이터를 실행 파일에 인수로 전달하고, 암호화 데이터를 고정키로 복호화하여 얻어진 현재시간과 랜덤 데이터를 해쉬하여 얻은 해쉬값과 해쉬 데이터의 일치여부를 확인하는 과정을 통해 구현된다. 본 발명에 따르면, 정당한 사용자 이외의 사용자에 의한 게임의 실행을 근원적으로 차단할 수 있게 된다. Disclosed is a game execution authority authentication method, a recording medium on which a game execution authority authentication program is recorded, and a server in which a game execution authority authentication program is stored. According to the present invention, an authentication server is requested to transmit a decryption key for decrypting an encrypted executable file for executing a game, the executable file is decrypted with a decryption key received from the authentication server, and an executable file is obtained. Hash data is generated by hashing the current time with random data, encrypted data is generated by encrypting the current time, random data, and hash data with an arbitrary fixed key, and the generated encrypted data is passed as an argument to the executable file. This is implemented by checking whether the current time obtained by decrypting the encrypted data with the fixed key and the hash value obtained by hashing the random data matches the hash data. According to the present invention, it is possible to fundamentally block the execution of the game by a user other than a legitimate user.

게임, 실행, 인증, 해쉬, 암호화, 복호화, 현재시간, 랜덤 데이터 Game, Run, Authentication, Hash, Encryption, Decryption, Current Time, Random Data

Description

게임 실행 권한 인증 방법, 게임 실행 권한 인증 프로그램이 기록된 기록매체, 및 게임 실행 권한 인증 프로그램이 저장된 서버{Game Executing Authority Authentication Method, Medium that Game Executing Authority Authentication Program is Stored, Server that Game Executing Authority Authentication Program is Stored}Game Executing Authority Authentication Method, Medium that Game Executing Authority Authentication Program is Stored, Server that Game Executing Authority Authentication Program is Stored}

본 발명은 게임 실행 권한 인증 방법, 게임 실행 권한 인증 프로그램이 기록된 기록매체, 및 게임 실행 권한 인증 프로그램이 저장된 서버에 관한 것으로, 더욱 상세하게는 정당한 사용자 이외의 사용자에 의한 게임의 실행을 근원적으로 차단하는 게임 실행 권한 인증 방법, 게임 실행 권한 인증 프로그램이 기록된 기록매체, 및 게임 실행 권한 인증 프로그램이 저장된 서버에 관한 것이다. The present invention relates to a method for authenticating a game execution authority, a recording medium on which a game execution authority authentication program is recorded, and a server in which a game execution authority authentication program is stored, and more specifically, to the execution of a game by a user other than an authorized user. It relates to a game execution authority authentication method for blocking, a recording medium on which a game execution authority authentication program is recorded, and a server in which a game execution authority authentication program is stored.

인터넷을 이용한 온라인게임의 이용이 증가함에 따라, 온라인게임의 타인 아이디(ID) 도용과 이를 통한 게임상의 사이버 재산의 도난 등의 문제가 대두되고 있다.As the use of online games using the Internet has increased, problems such as theft of others' IDs of online games and theft of cyber property in the games have emerged.

종래의 인터넷 온라인게임의 사용자 인증은 사용자 ID와 패스워드 입력에 의해서 이루어져 왔다. 그러나, 이 방법은 사용자 ID와 패스워드가 네트워크 상에서 쉽게 갈취될 수 있다는 문제점이 있었으며, 또한, 다른 사람이 입력과정을 지켜봄으로써 도용할 수 있다는 문제점이 있었다.User authentication of a conventional internet online game has been accomplished by inputting a user ID and password. However, this method has a problem that the user ID and password can be easily extorted on the network, and there is also a problem that other people can steal by watching the input process.

또한, 이러한 문제점을 개선하기 위해 게임을 실행하기 위한 별도의 실행 파일을 사용자가 별도의 인증과정을 거쳐 인증 서버로부터 전송받는 방식을 활용하는 경우에도 해당 실행 파일이 불법복제되어 다른 사용자가 이를 이용하여 게임을 실행할 수 있게 된다는 문제점이 있었다. In addition, in order to improve such a problem, even when a user uses a method of receiving a separate executable file for executing a game from the authentication server through a separate authentication process, the corresponding executable file is illegally copied and used by other users. There was a problem that the game can run.

따라서, 본 발명의 목적은, 정당한 사용자 이외의 사용자에 의한 게임의 실행을 근원적으로 차단하는 게임 실행 권한 인증 방법, 게임 실행 권한 인증 프로그램이 기록된 기록매체, 및 게임 실행 권한 인증 프로그램이 저장된 서버를 제공함에 있다.Accordingly, an object of the present invention is to provide a game execution authority authentication method for fundamentally blocking the execution of a game by a user other than a legitimate user, a recording medium on which a game execution authority authentication program is recorded, and a server storing a game execution authority authentication program. In providing.

상기 목적을 달성하기 위한 본 발명에 따른 게임 실행 권한 인증 방법은, (a)게임을 실행시키기 위한 암호화된 실행 파일을 복호화하기 위한 복호화 키의 전 송을 인증 서버에 요청하는 단계; (b)상기 인증 서버로부터 수신한 상기 복호화 키로 상기 암호화된 실행 파일을 복호화하여 실행 파일을 생성하는 단계; (c)획득된 현재시간을 랜덤 데이터와 함께 해쉬하여 해쉬 데이터를 생성하는 단계; (d)상기 현재시간, 상기 랜덤 데이터, 및 상기 해쉬 데이터를 임의의 고정키로 암호화하여 암호화 데이터를 생성하는 단계; (e)상기 생성된 암호화 데이터를 상기 실행 파일에 인수로 전달하는 단계; 및 (f)상기 암호화 데이터를 상기 고정키로 복호화하여 얻어진 상기 현재시간과상기 랜덤 데이터를 해쉬하여 얻은 해쉬값과 상기 해쉬 데이터의 일치여부를 확인하는 단계를 포함한다.In accordance with another aspect of the present invention, there is provided a game execution authority authentication method comprising: (a) requesting an authentication server to transmit a decryption key for decrypting an encrypted executable file for executing a game; (b) generating an executable file by decrypting the encrypted executable file with the decryption key received from the authentication server; (c) generating hash data by hashing the obtained current time with random data; (d) generating encrypted data by encrypting the current time, the random data, and the hash data with an arbitrary fixed key; (e) passing the generated encrypted data as arguments to the executable file; And (f) checking whether the hash value obtained by hashing the current time and the random data obtained by decrypting the encrypted data with the fixed key matches the hash data.

바람직하게는, 상기 해쉬값과 상기 해쉬 데이터가 불일치하는 경우에 상기 게임의 실행이 취소되는 단계를 더 포함한다.Preferably, the method further includes canceling execution of the game when the hash value and the hash data do not match.

또한, 상기 해쉬값과 상기 해쉬 데이터가 일치하는 경우에, 상기 얻어진 상 기 현재시간과 다시 획득된 현재시간의 시간차를 산출하는 단계를 더 포함한다.The method may further include calculating a time difference between the obtained current time and the obtained current time again when the hash value and the hash data coincide.

또한, 상기 산출된 시간차가 1초 미만인 경우에 상기 실행 파일에 의해 상기 게임이 실행되는 단계를 더 포함한다.The method may further include executing the game by the executable file when the calculated time difference is less than 1 second.

또한, 상기 산출된 시간차가 1초 이상인 경우에 상기 게임의 실행이 취소되는 단계를 더 포함한다.The method may further include canceling the execution of the game when the calculated time difference is 1 second or more.

또한, 상기 실행 파일에 의해 상기 게임이 실행된 경우에 상기 실행 파일이 삭제되는 단계를 더 포함한다.The method may further include deleting the executable file when the game is executed by the executable file.

한편, 본 발명에 따른 기록매체는 상기 각 단계를 실행하는 게임 실행 권한 인증 프로그램이 기록되어 있다. On the other hand, in the recording medium according to the present invention, a game execution authority authentication program for executing each step is recorded.

한편, 본 발명에 따른 서버는, 상기 각 단계를 실행하는 게임 실행 권한 인증 프로그램이 저장되어 있다. On the other hand, the server according to the present invention, the game execution authority authentication program for executing each step is stored.

본 발명에 따르면, 정당한 사용자 이외의 사용자에 의한 게임의 실행을 근원적으로 차단할 수 있게 된다. According to the present invention, it is possible to fundamentally block the execution of the game by a user other than a legitimate user.

이하에서는 도면을 참조하여 본 발명을 보다 상세하게 설명한다. 도면들 중 동일한 구성요소들은 가능한 한 어느 곳에서든지 동일한 부호들로 나타내고 있음에 유의해야 한다. 또한 본 발명의 요지를 불필요하게 흐릴 수 있는 공지 기능 및 구성에 대한 상세한 설명은 생략한다. Hereinafter, with reference to the drawings will be described the present invention in more detail. It should be noted that the same elements in the figures are represented by the same numerals wherever possible. In addition, detailed descriptions of well-known functions and configurations that may unnecessarily obscure the subject matter of the present invention will be omitted.

도 1은 본 발명에 따른 게임 실행 권한 인증 시스템의 구성을 나타내는 도면이다. 도 1을 참조하면, 본 발명에 따른 게임 실행 권한 인증 시스템은 게임실행 장치(100), 및 인증 서버(200)를 포함한다.1 is a view showing the configuration of a game execution authority authentication system according to the present invention. Referring to FIG. 1, a game execution authority authentication system according to the present invention includes a game execution apparatus 100 and an authentication server 200.

게임실행 장치(100)는 사용자가 원하는 게임이 설치되어 해당 게임이 실행되는 장치로써, 일반적으로 네트워크 통신 기능을 구비한 개인용 PC가 될 것이며, 인증 서버(200)와의 통신을 통해 해당 게임의 실행 권한을 인증하는 기능을 수행한다.The game execution apparatus 100 is a device in which a game desired by a user is installed and the game is executed. Generally, the game execution apparatus 100 will be a personal PC having a network communication function, and the execution authority of the game through communication with the authentication server 200. Authenticates.

구체적으로 게임실행 장치(100)에는 본 발명에서의 게임 실행 권한 인증 방법을 실행하는 게임 실행 권한 인증 프로그램이 설치되어 있으며, 본 발명을 실시함에 있어서 해당 프로그램은 별도의 CD를 이용하여 설치되거나, 인증 서버(200)로부터 전송받아 설치될 수 있을 것이다. Specifically, the game execution device 100 is provided with a game execution authority authentication program for executing the game execution authority authentication method in the present invention, in the implementation of the present invention, the program is installed using a separate CD, or authentication Received from the server 200 may be installed.

인증 서버(200)는 게임을 실행시키기 위해 필요한 암호화된 실행 파일에 대한 복호화 키를 게임실행 장치(100)로부터의 요청에 의해 게임실행 장치(100)에 전송하며, 본 발명을 실시함에 있어서, 인증 서버(200)는 본 발명에 따른 게임 실행 권한 인증 프로그램을 저장하고 있으며, 게임실행 장치(100)의 전송 요청에 따라, 해당 프로그램을 게임실행 장치(100)에 전송해 줄 수도 있을 것이다. The authentication server 200 transmits the decryption key for the encrypted executable file necessary to execute the game to the game execution apparatus 100 by a request from the game execution apparatus 100, and in the practice of the present invention, authentication The server 200 stores the game execution authority authentication program according to the present invention, and may transmit the corresponding program to the game execution apparatus 100 according to the transmission request of the game execution apparatus 100.

도 2는 본 발명에 따른 게임 실행 권한 인증 방법을 설명하는 절차 흐름도이다. 도 1 및 도 2를 참조하여, 본 발명에 따른 게임 실행 권한 인증 방법을 설명하면, 먼저, 게임실행 장치(100)는 인증 서버(200)에 접속하여 게임을 실행시키기 위해 필요한 복호화 키의 전송을 요청한다(S300). 2 is a flowchart illustrating a game execution authority authentication method according to the present invention. Referring to FIGS. 1 and 2, the game execution authority authentication method according to the present invention will be described first. First, the game execution apparatus 100 connects to the authentication server 200 and transmits a decryption key required to execute a game. Request (S300).

여기서, 복호화 키는 게임실행 장치(100)에 저장되어 있는 암호화된 실행 파일을 복호화하기 위해 필요한 키이며, 암호화된 실행 파일은 게임실행 장치(100)에 설치되어 있는 사용자가 원하는 게임을 실행시키기 위해 필요한 실행 파일로써, 해당 복호화 키에 의해 암호화된 실행 파일을 의미한다. Here, the decryption key is a key necessary for decrypting the encrypted executable file stored in the game execution device 100, the encrypted executable file is to run the game desired by the user installed in the game execution device 100 As an executable file, it means an executable file encrypted by the corresponding decryption key.

암호화된 실행 파일은 게임실행 장치(100)에 해당 게임이 설치되는 경우에 함께 게임실행 장치(100)에 설치될 수도 있을 것이며, 해당 게임의 설치와는 별도로 인증 서버(200)로부터 전송되어 게임실행 장치(100)에 설치될 수도 있을 것이다.The encrypted executable file may be installed in the game execution device 100 together when the game is installed in the game execution device 100, and is transmitted from the authentication server 200 separately from the installation of the game to execute the game. It may be installed in the device 100.

한편, 인증 서버(200)는 게임실행 장치(100)로부터의 복호화 키의 전송요청이 있는 경우에, 인증 서버(200)에 접속한 사용자의 ID를 통해 해당 사용자의 인증과정을 거친 후에 게임실행 장치(100)에 복호화 키를 전송하게 된다. On the other hand, the authentication server 200, if there is a request for transmission of the decryption key from the game execution device 100, after the authentication process of the user through the user ID connected to the authentication server 200 after the game execution device The decryption key is transmitted to 100.

이에 게임실행 장치(100)는 인증 서버(200)로부터 복호화 키를 수신하게 되며(S305), 수신한 해당 복호화 키를 이용하여 전술한 암호화된 실행 파일을 복호화하여 실행 파일을 생성하게 된다(S310). Accordingly, the game execution device 100 receives a decryption key from the authentication server 200 (S305), and decrypts the above-mentioned encrypted executable file using the received decryption key to generate an executable file (S310). .

그 다음, 게임실행 장치(100)는 게임실행 장치(100)에서 측정되고 있는 현재 시간(Present Time:PT)을 획득하며, 난수 발생 모듈을 통해 랜덤 데이터(Random Data:RT)를 생성하고(S315), 일방향 해쉬함수를 이용하여, 획득된 현재시간과 생성된 랜덤 데이터를 함께 해쉬함으로써 소정의 해쉬 데이터(Hashed Data)를 생성하게 된다(S320).Next, the game execution device 100 obtains the present time (Present Time: PT) being measured by the game execution device 100, generates random data (Random Data: RT) through the random number generation module (S315). By using the one-way hash function, predetermined hash data is generated by hashing the acquired current time and the generated random data together (S320).

그 다음에 게임실행 장치(100)는 전술한 S315 단계에서의 현재시간과 랜덤 데이터를 전술한 S320 단계에서 생성된 해쉬 데이터와 함께 임의의 고정키로 암호화함으로써 암호화 데이터를 생성하게 된다(S325).Next, the game execution apparatus 100 generates encrypted data by encrypting the current time and random data in the above-described step S315 with an arbitrary fixed key together with the hash data generated in the above-mentioned step S320 (S325).

이와 같이 생성된 암호화 데이터는 전술한 S310 단계에서 생성된 실행 파일에 인수로 전달된다(S330).The generated encrypted data is transferred as an argument to the executable file generated in the above-described step S310 (S330).

본 발명에 따른 게임실행 장치(100)는 실행 파일을 이용하여 게임을 실행하기에 앞서 다음과 같은 두단계의 인증과정을 거치게 된다. The game execution apparatus 100 according to the present invention undergoes the following two steps of authentication process before executing a game using an executable file.

-1차 인증과정-1st certification process

먼저, 게임실행 장치(100)는 전술한 S325 단계에서 임의의 고정키로 암호화하여 생성한 암호화 데이터를 해당 고정키를 이용하여 복호화함으로써 전술한 S315 단계에서의 현재시간, 및 랜덤 데이터와 전술한 S320 단계에서 생성된 해쉬 데이터를 얻는다(S335).First, the game execution apparatus 100 decrypts the encrypted data generated by encrypting with a certain fixed key in the above-described step S325 by using the corresponding fixed key, the current time in the above-described step S315, and the random data and the above-described step S320. Hash data generated in step S335 is obtained.

그 다음, 게임실행 장치(100)는 전술한 S335 단계에서 획득한 현재시간, 및 랜덤 데이터를 일방향 해쉬 함수를 이용하여 다시 해쉬함으로써 해쉬값(Hashed Value:HV)을 생성하고(S340), 생성된 해쉬값과 전술한 S335 단계에서 획득한 해쉬 데이터와의 일치여부를 확인한다(S345).Next, the game execution apparatus 100 generates a hash value (HV) by hashing again the current time and the random data obtained in the aforementioned step S335 using a one-way hash function (S340). It is checked whether the hash value coincides with the hash data acquired in the above-described step S335 (S345).

한편, 본 발명을 실시함에 있어서는, 본 발명에 따른 게임 실행 권한 인증 프로그램이 인증 서버(200)로부터 게임실행 장치(100)로 전송되는 경우에 전술한 고정키 및 일방향 해쉬함수 또한 함께 전송되도록 하는 것이 바람직할 것이며, 인증 서버(200)는 각 사용자별로 각기 다른 고정키 및 일방향 해쉬함수를 게임실행 장치(100)에 전송하는 것이 바람직할 것이다. On the other hand, in the practice of the present invention, when the game execution authority authentication program according to the present invention is transmitted from the authentication server 200 to the game execution apparatus 100, the fixed key and the one-way hash function described above are also transmitted. It will be preferable, the authentication server 200 it is preferable to transmit a different fixed key and one-way hash function for each user to the game execution apparatus 100.

만약, 전술한 S310 단계에서 생성된 실행 파일 및 전술한 S325 단계에서 생성된 암호화 데이터가 다른 사용자의 게임실행 장치(100)로 불법 복사된 경우라면, 불법 복사된 실행 파일 및 암호화 데이터를 저장하게 된 다른 사용자의 게임실행 장치(100)에는 전술한 고정키 및 일방향 해쉬함수가 구비되어 있지 않을 것이므로, 전술한 S345 단계에서 일치여부를 확인한 결과 불일치한 것으로 판단될 것이다. 이러한 경우에는 해당 게임의 실행은 취소된다(S350).If the executable file generated in the above-described step S310 and the encrypted data generated in the above-described step S325 are illegally copied to the game execution apparatus 100 of another user, the illegally copied executable file and the encrypted data are stored. Since the game execution apparatus 100 of the other user does not have the above-described fixed key and one-way hash function, it will be determined that the result is inconsistent as a result of checking the match in the aforementioned step S345. In this case, execution of the game is canceled (S350).

그러나, 전술한 S300 단계 내지 S345 단계가 하나의 게임실행 장치(100)에서 수행된 경우라면, 전술한 S345 단계에서 해당 해쉬값과 해쉬 데이터는 일치되는 것으로 확인될 것이며, 이 경우에는 이하에서의 2차 인증과정이 수행된다. However, if the above-described step S300 to step S345 is performed in one game execution device 100, the corresponding hash value and the hash data will be confirmed to be identical in step S345 described above, in which case 2 The second certification process is performed.

-2차 인증과정-2nd certification process

전술한 S345 단계에서 해당 해쉬값과 해쉬 데이터가 일치하는 것으로 확인되는 경우에, 게임실행 장치(100)는 전술한 S335 단계에서 획득된 현재시간과 다시 획득한 현재시간과의 시간차를 산출하며, 산출된 시간차가 1초 미만인지 여부를 판단한다(S355).When it is determined in step S345 that the corresponding hash value and the hash data match, the game execution apparatus 100 calculates a time difference between the current time obtained in step S335 and the current time obtained again, and calculates the result. It is determined whether the time difference is less than 1 second (S355).

산출된 시간차가 1초 미만인 경우에는 전술한 S330 단계에서의 실행 파일에 의해 해당 게임이 실행되며(S360), 게임이 실행된 후에는 전술한 S330 단계에서의 실행 파일은 삭제되도록 하는 것이 바람직하다(S365). If the calculated time difference is less than 1 second, the game is executed by the executable file in step S330 described above (S360), and after the game is executed, it is preferable to delete the executable file in step S330 described above ( S365).

만약, 전술한 S310 단계에서 생성된 실행 파일 및 전술한 S325 단계에서 생성된 암호화 데이터가 다른 사용자의 게임실행 장치(100)로 불법 복사된 경우라면, 불법 복사에 소요되는 시간을 고려할 때, 다른 사용자의 게임실행 장치(100)가 인식하고 있는 현재시간과 전술한 S335 단계에서 획득된 현재시간은 적어도 1초 이상의 차이가 있을 수 밖에 없을 것이다. 이와 같이 산출된 시간차가 1초 이상인 경우에는 해당 게임의 실행을 취소하게 된다(S350). If the executable file generated in the above-described step S310 and the encrypted data generated in the above-described step S325 are illegally copied to the game execution apparatus 100 of another user, when considering the time required for illegal copying, another user The current time recognized by the game execution device 100 of the present time and the current time obtained in the above-described step S335 will have a difference of at least one second or more. If the calculated time difference is 1 second or more, the execution of the game is canceled (S350).

이상에서는 본 발명의 바람직한 실시예 및 응용예에 대하여 도시하고 설명하였지만, 본 발명은 상술한 특정의 실시예 및 응용예에 한정되지 아니하며, 청구범위에서 청구하는 본 발명의 요지를 벗어남이 없이 당해 발명이 속하는 기술분야에서 통상의 지식을 가진자에 의해 다양한 변형실시가 가능한 것은 물론이고, 이러한 변형실시들은 본 발명의 기술적 사상이나 전망으로부터 개별적으로 이해되어져서는 안될 것이다.While the above has been shown and described with respect to preferred embodiments and applications of the present invention, the present invention is not limited to the specific embodiments and applications described above, the invention without departing from the gist of the invention claimed in the claims Various modifications can be made by those skilled in the art, and these modifications should not be individually understood from the technical spirit or the prospect of the present invention.

도 1은 본 발명에 따른 게임 실행 권한 인증 시스템의 구성을 나타내는 도면, 및1 is a view showing the configuration of a game execution authority authentication system according to the present invention, and

도 2는 본 발명에 따른 게임 실행 권한 인증 방법을 설명하는 절차 흐름도이다. 2 is a flowchart illustrating a game execution authority authentication method according to the present invention.

Claims (8)

(a)게임실행 장치가, 게임을 실행시키기 위한 암호화된 실행 파일을 복호화하기 위한 복호화 키의 전송을 인증 서버에 요청하는 단계;(a) requesting, by the game execution device, the authentication server to transmit a decryption key for decrypting an encrypted executable file for executing the game; (b)상기 게임실행 장치가, 상기 인증 서버로부터 수신한 상기 복호화 키로 상기 암호화된 실행 파일을 복호화하여 실행 파일을 생성하는 단계;(b) generating, by the game execution device, an executable file by decrypting the encrypted executable file with the decryption key received from the authentication server; (c)상기 게임실행 장치가, 획득된 현재시간을 랜덤 데이터와 함께 해쉬하여 해쉬 데이터를 생성하는 단계;(c) generating, by the game execution device, hash data of the acquired current time together with random data; (d)상기 게임실행 장치가, 상기 현재시간, 상기 랜덤 데이터, 및 상기 해쉬 데이터를 임의의 고정키로 암호화하여 암호화 데이터를 생성하는 단계;(d) generating, by the game execution device, encrypted data by encrypting the current time, the random data, and the hash data with an arbitrary fixed key; (e)상기 게임실행 장치가, 상기 생성된 암호화 데이터를 상기 실행 파일에 인수로 전달하는 단계; 및(e) transmitting, by the game execution device, the generated encrypted data as an argument to the executable file; And (f)상기 게임실행 장치가, 상기 암호화 데이터를 상기 고정키로 복호화하여 얻어진 상기 현재시간과 상기 랜덤 데이터를 해쉬하여 얻은 해쉬값과 상기 해쉬 데이터의 일치여부를 확인하는 단계(f) checking, by the game execution device, whether the hash value obtained by hashing the current time and the random data obtained by decrypting the encrypted data with the fixed key matches the hash data; 를 포함하는 게임 실행 권한 인증 방법.Game execution permission authentication method comprising a. 제1항에 있어서,The method of claim 1, 상기 게임실행 장치가, 상기 해쉬값과 상기 해쉬 데이터가 불일치하는 경우에 상기 게임의 실행을 취소시키는 단계를 더 포함하는 게임 실행 권한 인증 방법.And canceling execution of the game by the game execution device when the hash value and the hash data do not match. 제1항에 있어서,The method of claim 1, 상기 게임실행 장치가, 상기 해쉬값과 상기 해쉬 데이터가 일치하는 경우에, 상기 (f)단계에서 복호화하여 얻어진 상기 현재시간과 상기 게임실행 장치에 의해 다시 획득된 현재시간의 시간차를 산출하는 단계를 더 포함하는 게임 실행 권한 인증 방법.Calculating, by the game execution device, a time difference between the current time obtained by decoding in the step (f) and the current time obtained again by the game execution device when the hash value and the hash data coincide. Game execution permission authentication method further comprising. 제3항에 있어서,The method of claim 3, 상기 게임실행 장치가, 상기 산출된 시간차가 1초 미만인 경우에 상기 실행 파일에 의해 상기 게임을 실행시키는 단계를 더 포함하는 게임 실행 권한 인증 방법.And executing the game by the executable file when the calculated time difference is less than 1 second. 제3항에 있어서,The method of claim 3, 상기 게임실행 장치가, 상기 산출된 시간차가 1초 이상인 경우에 상기 게임의 실행을 취소시키는 단계를 더 포함하는 게임 실행 권한 인증 방법.The game execution device further comprises the step of canceling the execution of the game when the calculated time difference is more than 1 second. 제4항에 있어서,5. The method of claim 4, 상기 게임실행 장치가, 상기 실행 파일에 의해 상기 게임이 실행된 경우에 상기 실행 파일을 삭제하는 단계를 더 포함하는 게임 실행 권한 인증 방법.And deleting, by the game execution device, the executable file when the game is executed by the executable file. 제1항 내지 제6항 중 어느 한 항에서의 상기 각 단계를 실행하는 게임 실행 권한 인증 프로그램이 기록된 기록매체.A recording medium on which a game execution authority authentication program for executing each of the steps of any one of claims 1 to 6 is recorded. 제1항 내지 제6항 중 어느 한 항에서의 상기 각 단계를 실행하는 게임 실행 권한 인증 프로그램이 저장된 서버.A server in which a game execution authority authentication program for executing each step of any one of claims 1 to 6 is stored.
KR1020090036185A 2009-04-24 2009-04-24 The server that stores the game execution authority authentication method, the recording medium on which the game execution authority authentication program is recorded, and the game execution authority authentication program. Expired - Fee Related KR101048439B1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
KR1020090036185A KR101048439B1 (en) 2009-04-24 2009-04-24 The server that stores the game execution authority authentication method, the recording medium on which the game execution authority authentication program is recorded, and the game execution authority authentication program.
US12/569,761 US20100273552A1 (en) 2009-04-24 2009-09-29 Method for Authentication of Game Executing Authority Recording Medium for Storing Authentication Program of Game Executing Authority, and Server for Storing Authentication Program of Game Executing Authority

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020090036185A KR101048439B1 (en) 2009-04-24 2009-04-24 The server that stores the game execution authority authentication method, the recording medium on which the game execution authority authentication program is recorded, and the game execution authority authentication program.

Publications (2)

Publication Number Publication Date
KR20100117428A KR20100117428A (en) 2010-11-03
KR101048439B1 true KR101048439B1 (en) 2011-07-11

Family

ID=42992615

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020090036185A Expired - Fee Related KR101048439B1 (en) 2009-04-24 2009-04-24 The server that stores the game execution authority authentication method, the recording medium on which the game execution authority authentication program is recorded, and the game execution authority authentication program.

Country Status (2)

Country Link
US (1) US20100273552A1 (en)
KR (1) KR101048439B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101416717B1 (en) * 2013-03-28 2014-07-09 (주)엠더블유스토리 System for preventing malicious intrusion based on smart device and method thereof

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5706173B2 (en) * 2011-01-26 2015-04-22 任天堂株式会社 Information processing program, information processing apparatus, information processing method, and information processing system
JP5986371B2 (en) * 2011-12-01 2016-09-06 任天堂株式会社 GAME SYSTEM, GAME DEVICE, GAME PROGRAM, AND GAME CONTROL METHOD
CN104348666B (en) * 2014-10-16 2018-09-11 北京奇虎科技有限公司 Data capture method, apparatus and system
KR102027329B1 (en) 2017-12-13 2019-10-01 (주)네오와인 Program executing authority authentication method and system
JP7115213B2 (en) * 2018-10-19 2022-08-09 富士フイルムビジネスイノベーション株式会社 Information processing system and authentication system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010038208A (en) * 1999-10-22 2001-05-15 정선종 Administrative information management method of X.509-base public key certification authority
KR20040002036A (en) * 2002-06-29 2004-01-07 주식회사 케이티 Simple Binding Authorization Method for Strengthening Security

Family Cites Families (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3548174A (en) * 1966-08-10 1970-12-15 Burroughs Corp Random number generator
US4652998A (en) * 1984-01-04 1987-03-24 Bally Manufacturing Corporation Video gaming system with pool prize structures
US5227874A (en) * 1986-03-10 1993-07-13 Kohorn H Von Method for measuring the effectiveness of stimuli on decisions of shoppers
US7690043B2 (en) * 1994-12-19 2010-03-30 Legal Igaming, Inc. System and method for connecting gaming devices to a network for remote play
US6272223B1 (en) * 1997-10-28 2001-08-07 Rolf Carlson System for supplying screened random numbers for use in recreational gaming in a casino or over the internet
CA2150215C (en) * 1995-05-25 2003-02-25 John Xidos Distributed gaming system
US5643086A (en) * 1995-06-29 1997-07-01 Silicon Gaming, Inc. Electronic casino gaming apparatus with improved play capacity, authentication and security
TR199701723T1 (en) * 1995-06-29 1998-04-21 Silicon Gaming, Inc. Electronic casino gaming system with enhanced gaming capacity.
US5768382A (en) * 1995-11-22 1998-06-16 Walker Asset Management Limited Partnership Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols
US5970143A (en) * 1995-11-22 1999-10-19 Walker Asset Management Lp Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system using cryptographic and other protocols
US6402614B1 (en) * 1995-06-30 2002-06-11 Walker Digital, Llc Off-line remote system for lotteries and games of skill
US5871398A (en) * 1995-06-30 1999-02-16 Walker Asset Management Limited Partnership Off-line remote system for lotteries and games of skill
US20030177347A1 (en) * 1995-11-22 2003-09-18 Bruce Schneier Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons
US5999808A (en) * 1995-12-12 1999-12-07 Aeris Communications, Inc. Wireless gaming method
US6099408A (en) * 1996-12-31 2000-08-08 Walker Digital, Llc Method and apparatus for securing electronic games
US20030054879A1 (en) * 1996-12-31 2003-03-20 Bruce Schneier System and method for securing electronic games
US6104815A (en) * 1997-01-10 2000-08-15 Silicon Gaming, Inc. Method and apparatus using geographical position and universal time determination means to provide authenticated, secure, on-line communication between remote gaming locations
US6119229A (en) * 1997-04-11 2000-09-12 The Brodia Group Virtual property system
US6071190A (en) * 1997-05-21 2000-06-06 Casino Data Systems Gaming device security system: apparatus and method
US6125185A (en) * 1997-05-27 2000-09-26 Cybercash, Inc. System and method for encryption key generation
US6030288A (en) * 1997-09-02 2000-02-29 Quixotic Solutions Inc. Apparatus and process for verifying honest gaming transactions over a communications network
US6805634B1 (en) * 1998-10-14 2004-10-19 Igt Method for downloading data to gaming devices
US6270410B1 (en) * 1999-02-10 2001-08-07 Demar Michael Remote controlled slot machines
US6036601A (en) * 1999-02-24 2000-03-14 Adaboy, Inc. Method for advertising over a computer network utilizing virtual environments of games
US6468160B2 (en) * 1999-04-08 2002-10-22 Nintendo Of America, Inc. Security system for video game system with hard disk drive and internet access capability
US6253122B1 (en) * 1999-06-14 2001-06-26 Sun Microsystems, Inc. Software upgradable dashboard
US6508709B1 (en) * 1999-06-18 2003-01-21 Jayant S. Karmarkar Virtual distributed multimedia gaming method and system based on actual regulated casino games
US6899627B2 (en) * 1999-10-06 2005-05-31 Igt USB device protocol for a gaming machine
US6889209B1 (en) * 2000-11-03 2005-05-03 Shieldip, Inc. Method and apparatus for protecting information and privacy
US7168089B2 (en) * 2000-12-07 2007-01-23 Igt Secured virtual network in a gaming environment
US20070136817A1 (en) * 2000-12-07 2007-06-14 Igt Wager game license management in a peer gaming network
US7515718B2 (en) * 2000-12-07 2009-04-07 Igt Secured virtual network in a gaming environment
US20080214300A1 (en) * 2000-12-07 2008-09-04 Igt Methods for electronic data security and program authentication
US7127069B2 (en) * 2000-12-07 2006-10-24 Igt Secured virtual network in a gaming environment
US6640204B2 (en) * 2001-04-06 2003-10-28 Barry E. Feldman Method and system for using cooperative game theory to resolve statistical joint effects
US6722985B2 (en) * 2001-04-19 2004-04-20 Igt Universal player tracking system
US7918728B2 (en) * 2001-06-15 2011-04-05 Igt Personal gaming device and method of presenting a game
US7785194B2 (en) * 2001-09-18 2010-08-31 Igt Player specific rewards
CA2425881A1 (en) * 2001-09-28 2003-04-10 Acres Gaming Incorporated System for awarding a bonus to a gaming device on a wide area network
US7727070B2 (en) * 2001-09-28 2010-06-01 Igt Method and apparatus for authenticating and verifying communication on a network of gaming devices
US6846238B2 (en) * 2001-09-28 2005-01-25 Igt Wireless game player
CA2469839A1 (en) * 2001-11-26 2003-06-05 Igt Pass-through live validation device and method
JP3466596B2 (en) * 2002-03-13 2003-11-10 コナミ株式会社 Network game system
US7370194B2 (en) * 2002-06-10 2008-05-06 Microsoft Corporation Security gateway for online console-based gaming
US7455591B2 (en) * 2002-06-28 2008-11-25 Igt Redundant gaming network mediation
US7815507B2 (en) * 2004-06-18 2010-10-19 Igt Game machine user interface using a non-contact eye motion recognition device
US7907729B2 (en) * 2002-09-13 2011-03-15 Bally Gaming, Inc. Rollback attack prevention system and method
US7337330B2 (en) * 2003-03-10 2008-02-26 Cyberview Technology, Inc. Universal game download system for legacy gaming machines
CA2724141A1 (en) * 2003-03-10 2004-09-23 Mudalla Technology, Inc. Dynamic configuration of a gaming system
US7927210B2 (en) * 2003-03-17 2011-04-19 Wms Gaming Inc. Accounting service in a service-oriented gaming network environment
US20040266523A1 (en) * 2003-04-16 2004-12-30 Gentles Thomas A Secured networks in a gaming system environment
CA2464797A1 (en) * 2003-04-16 2004-10-16 Wms Gaming Inc. Remote authentication of gaming software in a gaming system environment
WO2004102353A2 (en) * 2003-05-12 2004-11-25 Gtech Rhode Island Corporation Method and system for authentication
US7392422B2 (en) * 2003-10-20 2008-06-24 Sony Computer Entertainment America Inc., Violations in a peer-to-peer relay network
US7942744B2 (en) * 2004-08-19 2011-05-17 Igt Virtual input system
US7819749B1 (en) * 2004-12-21 2010-10-26 Aol Inc. Using a participant list to invite players to an on-line game
US7828661B1 (en) * 2004-12-21 2010-11-09 Aol Inc. Electronic invitations for an on-line game
US7775875B2 (en) * 2005-04-18 2010-08-17 Igt Gaming methods and systems
US7640297B2 (en) * 2005-07-14 2009-12-29 Gemini Mobile Technologies, Inc. Protocol optimization for wireless networks
US9196116B2 (en) * 2006-03-09 2015-11-24 Szrek2Solutions Llc Securing gaming transactions
US7753795B2 (en) * 2006-03-20 2010-07-13 Sony Computer Entertainment America Llc Maintaining community integrity
US8070582B2 (en) * 2007-03-01 2011-12-06 Cfph, Llc Automatic game play
US8393954B2 (en) * 2006-12-29 2013-03-12 Cfph, Llc Top performers
US7780522B2 (en) * 2007-02-23 2010-08-24 Cfph, Llc Game at cash register
US20080234047A1 (en) * 2007-03-21 2008-09-25 Igt Wager game license management in a game table
USD631100S1 (en) * 2007-08-17 2011-01-18 Paltronics, Inc. Portion of a navigation/player tracking/payment panel for a gambling unit
US20090093300A1 (en) * 2007-10-05 2009-04-09 Lutnick Howard W Game of chance processing apparatus

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010038208A (en) * 1999-10-22 2001-05-15 정선종 Administrative information management method of X.509-base public key certification authority
KR20040002036A (en) * 2002-06-29 2004-01-07 주식회사 케이티 Simple Binding Authorization Method for Strengthening Security

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101416717B1 (en) * 2013-03-28 2014-07-09 (주)엠더블유스토리 System for preventing malicious intrusion based on smart device and method thereof
WO2014157826A1 (en) * 2013-03-28 2014-10-02 (주)엠더블유스토리 System and method for blocking attack of smart device-based malicious code
US9875356B2 (en) 2013-03-28 2018-01-23 Mwstory Co., Ltd. System for preventing malicious intrusion based on smart device and method thereof

Also Published As

Publication number Publication date
KR20100117428A (en) 2010-11-03
US20100273552A1 (en) 2010-10-28

Similar Documents

Publication Publication Date Title
KR101366243B1 (en) Method for transmitting data through authenticating and apparatus therefor
US9607131B2 (en) Secure and efficient content screening in a networked environment
US7877604B2 (en) Proof of execution using random function
CA2948895C (en) Provisioning drm credentials on a client device using an update server
CN100576196C (en) Content encryption method, system and method for providing content over network using the encryption method
CN101872399B (en) Dynamic digital copyright protection method based on dual identity authentication
KR101495535B1 (en) Method and system for transmitting data through checking revocation of contents device and data server thereof
KR101311059B1 (en) Revocation information management
JP2009529832A (en) Undiscoverable, ie secure data communication using black data
TW200402981A (en) Methods for remotely changing a communications password
KR101048439B1 (en) The server that stores the game execution authority authentication method, the recording medium on which the game execution authority authentication program is recorded, and the game execution authority authentication program.
KR20090064698A (en) Drm method and system using trust platform module
CN103237010B (en) The server end of digital content is cryptographically provided
CN102546528B (en) Stream media playing method and stream media playing equipment
CN116167020A (en) Software authorization method and system
CN108462699A (en) Based on the encrypted Quick Response Code generation of sequential and verification method and system
KR20100114321A (en) Digital content transaction-breakdown the method thereof
JP2009290508A (en) Electronized information distribution system, client device, server device and electronized information distribution method
CN103916390B (en) License control method and device in cloud computing system
KR20140071775A (en) Cryptography key management system and method thereof
KR100765794B1 (en) Method and apparatus for sharing content using shared license
CN108960385A (en) Two dimensional code generation and verification method and system based on the encryption of multiple code key
KR20100102032A (en) Apparatus and method for mutual authentication in downloadable conditional access system
JP2016019120A (en) Decoding device, communication system, decoding method, and program

Legal Events

Date Code Title Description
A201 Request for examination
PA0109 Patent application

St.27 status event code: A-0-1-A10-A12-nap-PA0109

PA0201 Request for examination

St.27 status event code: A-1-2-D10-D11-exm-PA0201

R18-X000 Changes to party contact information recorded

St.27 status event code: A-3-3-R10-R18-oth-X000

D13-X000 Search requested

St.27 status event code: A-1-2-D10-D13-srh-X000

D14-X000 Search report completed

St.27 status event code: A-1-2-D10-D14-srh-X000

E902 Notification of reason for refusal
PE0902 Notice of grounds for rejection

St.27 status event code: A-1-2-D10-D21-exm-PE0902

PG1501 Laying open of application

St.27 status event code: A-1-1-Q10-Q12-nap-PG1501

P11-X000 Amendment of application requested

St.27 status event code: A-2-2-P10-P11-nap-X000

P13-X000 Application amended

St.27 status event code: A-2-2-P10-P13-nap-X000

E701 Decision to grant or registration of patent right
PE0701 Decision of registration

St.27 status event code: A-1-2-D10-D22-exm-PE0701

GRNT Written decision to grant
PR0701 Registration of establishment

St.27 status event code: A-2-4-F10-F11-exm-PR0701

PR1002 Payment of registration fee

St.27 status event code: A-2-2-U10-U11-oth-PR1002

Fee payment year number: 1

PG1601 Publication of registration

St.27 status event code: A-4-4-Q10-Q13-nap-PG1601

R18-X000 Changes to party contact information recorded

St.27 status event code: A-5-5-R10-R18-oth-X000

P22-X000 Classification modified

St.27 status event code: A-4-4-P10-P22-nap-X000

S20-X000 Security interest recorded

St.27 status event code: A-4-4-S10-S20-lic-X000

FPAY Annual fee payment

Payment date: 20140715

Year of fee payment: 4

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 4

FPAY Annual fee payment

Payment date: 20151016

Year of fee payment: 5

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 5

R17-X000 Change to representative recorded

St.27 status event code: A-5-5-R10-R17-oth-X000

R18-X000 Changes to party contact information recorded

St.27 status event code: A-5-5-R10-R18-oth-X000

FPAY Annual fee payment

Payment date: 20160705

Year of fee payment: 6

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 6

PN2301 Change of applicant

St.27 status event code: A-5-5-R10-R13-asn-PN2301

St.27 status event code: A-5-5-R10-R11-asn-PN2301

FPAY Annual fee payment

Payment date: 20170426

Year of fee payment: 7

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 7

FPAY Annual fee payment

Payment date: 20180711

Year of fee payment: 8

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 8

FPAY Annual fee payment

Payment date: 20191021

Year of fee payment: 9

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 9

PC1903 Unpaid annual fee

St.27 status event code: A-4-4-U10-U13-oth-PC1903

Not in force date: 20200706

Payment event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE

PC1903 Unpaid annual fee

St.27 status event code: N-4-6-H10-H13-oth-PC1903

Ip right cessation event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE

Not in force date: 20200706

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载