1. Field of the Invention
The present invention relates to an encryption method, a communication system, a transmission device, and a data input device.
2. Description of the Related Art
More and more communication has become wireless between a computer and its peripheral devices such as a keyboard and a mouse. Such communication is conducted by infrared or at high radio frequencies. Unlike wire communication, however, information is subject to intercept in wireless communication. Therefore, the contents of communication are concealed.
Japanese Laid-Open Patent Application No. 9-190264, for instance, discloses a wireless data input system. According to this system, the contents of communication are concealed by encoding keyed-in data based on a security code.
According to this system, however, the data is single-encoded with a fixed ID, so that the data may be decoded with relative ease by processing the data rows.
Accordingly, it is a general object of the present invention to provide an encryption method in which the above-described disadvantage is eliminated.
A more specific object of the present invention is to provide an encryption method of high confidentiality, and a communication system, a transmission device, and a data input device that employ such an encryption method.
Another more specific object of the present invention is to provide a transmission device and a data input device using a phase-locked loop (PLL) in which the PLL becomes locked in a shorter period of time than conventionally and an error in the PLL can be recognized easily.
The above objects of the present invention are achieved by an encryption method including the steps of (a) generating random data including a first part and a second part, the first part specifying an operation to be performed on plain text data and the second part being used in the operation, (b) performing the specified operation on the plain text data using the second part of the random data, and (c) transmitting a result of the operation together with the random data.
The above-described encryption method realizes high confidentiality by generating the random data including the operation data and the operand data and encrypting the plain text data by using the random data.
The above-described objects of the present invention are also achieved by a communication system including a transmission device encrypting and transmitting original data and a reception device receiving and decrypting the encrypted data transmitted from the transmission device, wherein the transmission device includes: a random data generation part generating random data including operation data and operand data, the operation data specifying an operation to be performed on the original data and the operand data; an operation part performing the operation specified by the operation data on the original data and the operand data and generating the encrypted data as a result of the operation; and a transmission part transmitting the random data and the encrypted data; and the reception part includes: a reception part receiving the encrypted data and the random data; and a reverse operation part decrypting the encrypted data by performing thereon, based on the random data, a reverse operation of the operation performed by the operation part of the transmission device.
The above-described communication system realizes high confidentiality by forming the operation data specifying the operation to be performed and the operand data used in the operation into the random data. According to the above-described communication system, since the transmission device transmits the encrypted data and the random data used for encrypting the original data, the reception device can decrypt the encrypted data by performing thereon, based on the random data, the reverse operation of the operation performed on the original data by the transmission device.
The above objects of the present invention are also achieved by a transmission device having an oscillator employing a phase-locked loop (PLL), the transmission device including a control part digitizing a control voltage of a voltage-controlled oscillator in the PLL, and a transmission part transmitting the control voltage digitized by the control part.
According to the above-described transmission device, the control voltage of the voltage-controlled oscillator is digitized and transmitted by the transmission part, thereby allowing the receiver side to detect an abnormality in the transmission device.
The above objects of the present invention are further achieved by a data input device transmitting input data, the data input device including: a random data generation part generating random data including operation data and operand data, the operation data specifying an operation to be performed on the original input data and the operand data; an operation part performing the operation specified by the operation data on the original input data and the operand data and generating encrypted data as a result of the operation; and a transmission part transmitting the random data and the encrypted data.
According to the above-described data input device, the operation data specifying the operation to be performed and the operand data used in the operation together with the original data are formed into the random data, so that the above-described data input device realizes high confidentiality of communication.
Other objects, features and advantages of the present invention will become more apparent from the following detailed description when read in conjunction with the accompanying drawings, in which:
A description will now be given, with reference to the accompanying drawings, of an embodiment of the present invention.
As will be described later, the wireless keyboard 14 and the wireless mouse 16 each have a radio communication part so as to communicate with the wireless communication device 12 by radio. Each of the wireless keyboard 14 and the wireless mouse 16 transmits input data or coordinate information to the wireless communication device 12. The wireless communication device 12 receives the data transmitted from the wireless keyboard 14 or the wireless mouse 16, and transmits the received data to the PC 10. The PC 10 receives the data and uses the received data in its processing.
Next,
The wireless communication device 12 has the radio communication part 20 receive the encrypted data transmitted by radio from the wireless keyboard 14 or the wireless mouse 16, and transmits the decrypted data to the PC 10 if the ID included in the received data is identical to the ID prestored in the wireless communication device 12.
Next,
The wireless keyboard 14 obtains keyed-in data from the key matrix 30 and encrypts the keyed-in data in the MCU 25. The ID set by the ID setting part 28 is added to the encrypted data, and the encrypted data with the ID is transmitted from the radio communication part 32.
Next,
The wireless mouse 16 obtains input coordinate data from the coordinate determination part 40 and encrypts the coordinate data in the MCU 34. The ID set by the ID setting part 38 is added to the encrypted data, and the encrypted data with the ID is transmitted from the radio communication part 42.
As described above, each of the wireless keyboard 14 and the wireless mouse 16 secures the confidentiality of the contents of communication with the wireless communication device 12 by encrypting the contents of communication. Communication between the wireless communication device 12 and the wireless keyboard 14 or the wireless mouse 16 employs weak radio waves so that the contents of communication may be less subject to interception, thereby increasing the confidentiality of communication.
The encryption method is as follows. The transmitter of data generates random data in which an operation to be performed is specified by given bits, which are data specifying the type or method of operation (hereinafter, operation data). The part of the random data other than the operation data specifying the operation to be performed is data (hereinafter, operand data) used in the operation to be performed. The specified operation is performed on (plain text) data to be transmitted and the operand data, and then the encrypted data, which is the result of the operation, is transmitted together with the random data.
Receiving the encrypted data and the random data, the receiver decrypts the encrypted data by performing a reverse operation on the encrypted data and the operand data, the operand data being included in the received random data.
The random data also includes the operation data. Accordingly, the random data includes both the operand data and the operation data. A detailed description will be given below, with reference to the wireless keyboard 14, of the encryption method.
First, a description will be given, with reference to
The operand data 46 is provided for performing an operation corresponding to the operation data 48 on data to be encrypted, such as the keyed-in data.
The operation data 48 is composed of two bits; a bit F0 and a bit F1. Each of the bits F0 and F1 of the operation data 48 is determined by a table of operations shown in
In
As shown in
Next,
In
The thus generated encrypted data 54 is transmitted, together with the random data 44 and an ID 56 of the wireless keyboard 14, from the wireless keyboard 14 to the wireless communication device 12.
First, the operation data 48 of the random data 44 is referred to. Since both bits F0 and F1 are “0”s, the operation specified by the operation data 48 is addition.
Therefore, by performing subtraction, which is the reverse operation of addition, on the encrypted data 54 and the operand data 46, the encrypted data 54 can be decrypted to the data 58.
First, in step S101, the data 58 is keyed in. Then, in step S102, the random data 44 shown in
In step S103, the operation specified by the operation data 48 is performed on the keyed-in data 58 and the operand data 46, so that the encrypted data 54 is generated.
Next, in step S104, the random data 44 and the encrypted data 54 are transmitted with the ID 56, which is identification information, being added thereto. The wireless keyboard 14 performs the above-described operation to encrypt and transmit the keyed-in data. Likewise, the wireless mouse 16 encrypts and transmits data. If the operation to be performed is predetermined between the transmitter and the receiver in this encryption method, the bits F0 and F1 specifying the operation to be performed are omittable.
Next, a description will be given, with reference to the flowchart of
First, in step S201, the data 52 composed of the encrypted data 54, the random data 44, and the ID is received. Next, in step S202, collation of the ID 56 is performed for device identification. If the received ID 56 is not identical to the ID of the wireless keyboard 14 prestored in the wireless communication device 12, in step S203, sleep mode is entered so that the operation is stopped.
If the ID 56 is identical to the ID of the wireless keyboard 14, in step S204, the reverse operation of the operation specified by the operation data 48 included in the random data 44 is performed on the encrypted data 54 and the operand data 46 included in the random data 44, so that the encrypted data 54 is decrypted. As a result, in step S205, the decrypted data (original keyed-in data 58) is obtained.
Next, a description will be given of the ID 56 added to and transmitted with the encrypted data 54 and the random data 44. In the case of radio communication as in this embodiment, if computers are provided next to each other, input data such as keyed-in data transmitted from a keyboard or a mouse belonging to a given one of the computers may wrongly be input to another one of the computers.
In the case of radio communication, in order to avoid such an input error, not only data to be transmitted is encrypted to increase the security of communication, but also, normally, an ID for identifying the device transmitting the encrypted data is transmitted in addition to the encrypted data.
Next, a description will be given of ID setting operations of the ID setting parts 28 and 38.
Conventionally, an ID is stored in a ROM in most cases. However, the ID 56 may be set by using general-purpose ports of the MCU 25 included in the wireless keyboard 14 or the MCU 34 included in the wireless mouse 16 without using a special ROM.
The ID setting part 28 includes resistors 80, 82, and 84 and switches SW0, SW1, and SW2. The resistors 80, 82, and 84 are connected in series to the switches SW0, SW1, and SW2, respectively. Each of a series circuit formed of the resistor 80 and the switch SW0, a series circuit formed of the resistor 82 and the switch SW1, and a series circuit formed of the resistor 84 and the switch SW2 is connected between a power supply 88 and ground.
A connecting point of the resistor 80 and the switch SW0 is connected to a general-purpose port P0 of the MCU 25, a connecting point of the resistor 82 and the switch SW1 is connected to a general-purpose port P1 of the MCU 25, and a connecting point of the resistor 84 and the switch SW2 is connected to a general-purpose port P2 of the MCU 25.
The MCU 25 recognizes a logical value “0” or “1” from the level of each of the general-purpose ports P0 through P2, and recognizes a three-bit array of the logical values of the general-purpose ports P0 through P2 as the ID 56.
When all of the switches SW0 through SW2 are switched OFF, for instance, an electric current is supplied from the power supply 88 to the general-purpose ports P0 through P2 via the resistors 80, 82, and 84, respectively. Accordingly, the electric current is supplied to the general-purpose ports P0 through P2, so that all of the general-purpose ports P0 through P2 have their levels set to HIGH. Therefore, the MCU 25 recognizes each of the general-purpose ports P0 through P2 as the logical value “1”, thus setting the ID 56 to “111”.
When the switch SW0 is switched ON while the switches SW1 and SW2 are switched OFF, the general-purpose port P0 is grounded to have its level set to LOW. Therefore, the MCU 25 recognizes the general-purpose port P0 as the logical value “0”. At this point, the switches SW1 and SW2 are switched OFF, so that the general-purpose ports P1 and P2 have their levels set to HIGH. Therefore, the MCU 25 recognizes each of the general-purpose ports P1 and P2 as the logical value “1”. Accordingly, the MCU 25 sets the ID 56 to “011”.
When the switches SW0 and SW1 are switched ON while the switch SW2 is switched OFF, both general-purpose ports P0 and P1 are grounded to have their levels set to LOW. Therefore, the MCU 25 recognizes each of the general-purpose ports P0 and P1 as the logical value “0”. At this point, the switch SW2 is switched OFF, so that the general-purpose port P2 have its level set to HIGH. Therefore, the MCU 25 recognizes the general-purpose port P2 as the logical value “1”. Accordingly, the MCU 25 sets the ID 56 to “001”.
When the switches SW0 and SW2 are switched ON while the switch SW1 is switched OFF, both general-purpose ports P0 and P2 are grounded to have their levels set to LOW. Therefore, the MCU 25 recognizes each of the general-purpose ports P0 and P2 as the logical value “0”. At this point, the switch SW1 is switched OFF, so that the general-purpose port P1 have its level set to HIGH. Therefore, the MCU 25 recognizes the general-purpose port P1 as the logical value “1”. Accordingly, the MCU 25 sets the ID 56 to “010”.
When the switch SW1 is switched ON while the switches SW0 and SW2 are switched OFF, the general-purpose port P1 is grounded to have its level set to LOW. Therefore, the MCU 25 recognizes the general-purpose port P1 as the logical value “0”. At this point, the switches SW0 and SW2 are switched OFF, so that the general-purpose ports P0 and P2 have their levels set to HIGH. Therefore, the MCU 25 recognizes each of the general-purpose ports P0 and P2 as the logical value “1”. Accordingly, the MCU 25 sets the ID 56 to “101”.
When the switch SW2 is switched ON while the switches SW0 and SW1 are switched OFF, the general-purpose port P2 is grounded to have its level set to LOW. Therefore, the MCU 25 recognizes the general-purpose port P2 as the logical value “0”. At this point, the switches SW0 and SW1 are switched OFF, so that the general-purpose ports P0 and P1 have their levels set to HIGH. Therefore, the MCU 25 recognizes each of the general-purpose ports P0 and P1 as the logical value “1”. Accordingly, the MCU 25 sets the ID 56 to “110”.
When the switches SW1 and SW2 are switched ON while the switch SW0 is switched OFF, both general-purpose ports P1 and P2 are grounded to have their levels set to LOW. Therefore, the MCU 25 recognizes each of the general-purpose ports P1 and P2 as the logical value “0”. At this point, the switch SW0 is switched OFF, so that the general-purpose port P0 has its level set to HIGH. Therefore, the MCU 25 recognizes the general-purpose port P0 as the logical value “1”. Accordingly, the MCU 25 sets the ID 56 to “100”.
When all of the switches SW0 through SW2 are switched ON, all of the general-purpose ports P0 through P2 of the MCU 25 have their levels set to LOW. Therefore, the MCU 25 recognizes each of the general-purpose ports P0 through P2 as the logical value “0”, thus setting the ID 56 to “000”.
Thus, the ID 56 can be set to the eight different values by the three general-purpose ports P0 through P2.
Therefore, the ID 56 can be set easily without using a special ROM. Further, the ID 56 can also be set by using, for instance, the wiring pattern of a circuit board instead of the switches SW0 through SW2.
In such a case, the switches SW0 through SW2 of
The above-described configuration applied to the wireless keyboard 14 is also applicable to the wireless mouse 16.
Further, the random data 44, which is generated by the operation of the MCU 25 or 34 in this embodiment, may also be generated by using the voltage of the internal circuit of the wireless keyboard 14 or the wireless mouse 16.
Next, a description will be given of a method of generating the random data 44 used in the above-described encryption method by using the voltage of the internal circuit of the wireless keyboard 14 or the wireless mouse 16.
The variation of the wireless keyboard 14 has an MCU 70 and a radio communication part 60 different in configuration from the MCU 25 and the radio communication part 32 of the wireless keyboard 14 of
The radio communication part 60 of the variation includes a PLL circuit 61, an amplifier 67, and an antenna 69.
The PLL circuit 61, which is connected to general-purpose ports 72 and 74 of the MCU 70, frequency-modulates a reference frequency by data to be transmitted and supplies the modulated signal to the amplifier 67. The amplifier 67 amplifies the output modulated signal of the PLL circuit 61. The frequency-modulated signal amplified by the amplifier 67 is radiated outward from the antenna 69.
A detailed description will now be given of the PLL circuit 61.
The PLL circuit 61 includes a reference oscillator 62, a phase comparator 64, a low-pass filter 65a, a superposition circuit 65b, and a voltage-controlled oscillator (VCO) 66.
The reference oscillator 62 includes a crystal oscillator and outputs the reference frequency corresponding to the carrier frequency.
The signal of the reference frequency output from the reference oscillator 62 is supplied to the phase comparator 64, to which the output signal of the VCO 66 is supplied. The phase comparator 64 compares the reference frequency supplied from the reference oscillator 62 and the frequency of the output signal of the VCO 66, and outputs a voltage corresponding to the phase difference. The output voltage of the phase comparator 64 is pulled up to a given bias voltage. The phase comparator 64 outputs a voltage lower than the bias voltage when the frequency of the output signal of the VCO 66 is higher than the reference frequency of the reference oscillator 62, and outputs a voltage higher than the bias voltage when the frequency of the output signal of the VCO 66 is lower than the reference frequency of the reference oscillator 62.
The output voltage of the phase comparator 64 is supplied to the low-pass filter 65a. The low-pass filter 65a includes resistors 86, 88, and 90 and a capacitor 98, and passes the lower-frequency components of the output signal of the phase comparator 64.
The output of the low-pass filter 65a is supplied to the superposition circuit 65b.
The superposition circuit 65b includes resistors 92, 94, 96, and 100. The superposition circuit 65b, which is connected to general-purpose ports 72 and 74 of the MCU 70, combines the output voltages of the low-pass filter 65a and the general-purpose ports 72 and 74 of the MCU 70 and supplies the resultant composite voltage to the VCO 66.
The VCO 66 oscillates at a frequency corresponding to the control voltage supplied from the superposition circuit 65b.
Next, a description will be given of a key-in operation.
The following description will be given with reference to the wireless keyboard 14.
First, in step S401, data is keyed in. Next, in step S402, the radio communication part 60 is activated by the key-in of the data. At this point, the MCU 70 starts a built-in timer. The built-in timer counts time required for completion of the lockup of the PLL circuit 61 after the activation of the radio communication part 60.
Then, in step S403, the MCU 70 has the level of its general-purpose port 72 set to HIGH. Step S403 corresponds to a time to shown in
The level of the general-purpose port 72 is set to HIGH in step S403 so that the control voltage supplied to the VCO 66 rises to the bias voltage. By setting the level of the general-purpose port 72 to HIGH, the PLL circuit 61 can enter a lockup state in a shorter period of time.
By setting the voltage level of the general-purpose port 72 to HIGH with the startup of the PLL circuit 61, the control voltage supplied to the VCO 66 can rise sharply to the bias level. Thereby, the output frequency of the VCO 66 quickly matches the reference frequency generated by the reference oscillator 64, so that time required to achieve the lockup of the PLL circuit 61 can be reduced. For instance, the PLL circuit 61 can be locked at a time t1, which is shorter by a period T0 than a time t2 at which the PLL circuit 61 becomes locked, as indicated by the broken line in
In step S404 of
Next, in step S406, the random data 44 of
The frequency of the VCO 66 of the PLL circuit 61 varies in accordance with ambient temperature. Therefore, the control voltage is never constant, and is ever-changing in accordance with the surrounding environment such as ambient temperature. Accordingly, the digital data into which the control voltage of the VCO 66 is converted can be employed as the random data 44.
The general-purpose port 74 has its level set to LOW when a bit forming the encrypted data 54 is “0”, and to HIGH when a bit forming the encrypted data 54 is “1”. When the general-purpose port 74 has its level set to LOW, the control voltage of the VCO 66 is lowered, so that the output frequency of the VCO 66 becomes lower. When the general-purpose port 74 has its level set to HIGH, the control voltage of the VCO 66 is raised, so that the output frequency of the VCO 66 becomes higher. At this point, the output frequency of the VCO 66 is controlled to be constant by the loop of the PLL circuit 61. Since the frequency of the encrypted data 54 is set to be sufficiently higher than the response frequency of the PLL circuit 61, the output of the VCO 66 is a signal frequency-modulated in accordance with the encrypted data 54.
In this embodiment, the random data 44 is generated from the control voltage of the PLL circuit 61, while it is also possible to use the voltage of a desired connecting point in the circuit forming the wireless keyboard 14 in order to generate the random data 44. That is, the voltage of any connecting point may be used as far as the voltage varies in accordance with the surrounding environment.
In the above-described variation of the wireless keyboard 14, the control voltage of the VCO 66 is monitored. Therefore, an abnormality in the PLL circuit 61 can be detected by determining the lockup state of the PLL circuit 61 from the results of monitoring the control voltage.
First, in step S301, the MCU 70 detects a control voltage value VC at a connecting point A1 from the general-purpose port 72. Next, in step S302, it is determined whether the control voltage value VC falls within a predetermined normal range of an upper limit value VH to a lower limit value VL.
If it is determined as a result of step S302 that the control voltage value VC falls within the normal range, in step S304, the control voltage value VC is treated as normal data. If the control voltage value VC does not fall within the normal range, it is determined that the control voltage value VC is abnormal, and in step S303, the MCU 70 generates a given code indicating abnormality of the control voltage. The code is transmitted to the PC 10 via the wireless communication device 12. The PC 10, which has been informed of the abnormality, displays the abnormality, for instance.
Thereby, an abnormality in the radio communication part 60 of the variation of the wireless keyboard 14 can be transmitted.
In the above-described variation, the operand data 46 of the random data 44 is the digitized control voltage at the time of the lockup of the PLL circuit 61. Therefore, abnormality determination as shown in steps S302 through 304 of
In the above-described variation, the control voltage is raised and detected by using the general-purpose port 72 and the encrypted data 54 is transmitted by using the general-purpose port 74. On the other hand, since raising and detection of the control voltage and transmission of the encrypted data 54 are performed separately in timing, those operations may be performed by switching a single general-purpose port. Further, since the control voltage is detected by using the general-purpose port 72, no specific port is required to detect the control voltage.
Further, in the above-described variation, the operand data 46 included in the random data 44 is prepared by using the control voltage of the PLL circuit 61, while the count value of a clock may be used as the operand data 46.
For instance, the count value of a real-time clock (RTC) housed in the MCU 70 is used as the operand data 46. The RTC is a counter that counts real time and generates an interrupt signal to a CPU housed in the MCU 70 at regular intervals.
Since the random data 44 is generated based on the voltage value or the count value that varies and is recognizable only inside the wireless keyboard 14, the random data 44 cannot be recognized from outside at the time of encrypting the data to be transmitted.
In this embodiment, one of the four operations, addition, subtraction, multiplication, and division, can be selected as the operation to be performed on the data to be transmitted and the operand data 46. The plain text data to be transmitted is encrypted by one of the four operations determined at random. Therefore, in the case of encrypting data by using the same operand data 46, the data is encrypted differently depending on the selected operation, thereby providing a communication system realizing high confidentiality. The above-described four operations may be employed in combination, or other operations such as exponential calculation may be employed. Further, the operation data 48 may be selected at random as the operand data 46 is selected.
The present invention is not limited to the specifically disclosed embodiment, but variations and modifications may be made without departing from the scope of the present invention.
In the present invention, the operand data 46 included in the random data 44 should be generated differently each time keyed-in data is supplied.
The present application is based on Japanese priority application No. 2001-254421 filed on Aug. 24, 2001, the entire contents of which are hereby incorporated by reference.
Number | Date | Country | Kind |
---|---|---|---|
2001-254421 | Aug 2001 | JP | national |
Number | Name | Date | Kind |
---|---|---|---|
4278837 | Best | Jul 1981 | A |
4358857 | Gleason et al. | Nov 1982 | A |
4431865 | Bernede et al. | Feb 1984 | A |
4467140 | Fathauer et al. | Aug 1984 | A |
4599647 | George et al. | Jul 1986 | A |
5008629 | Ohba et al. | Apr 1991 | A |
5019813 | Kip et al. | May 1991 | A |
5189543 | Lin et al. | Feb 1993 | A |
5432849 | Johnson et al. | Jul 1995 | A |
RE35078 | Ryan | Oct 1995 | E |
5751811 | Magnotti et al. | May 1998 | A |
5774065 | Mabuchi et al. | Jun 1998 | A |
5838797 | Iwasaki | Nov 1998 | A |
5963104 | Buer | Oct 1999 | A |
5995539 | Miller | Nov 1999 | A |
6038321 | Torigai et al. | Mar 2000 | A |
6044462 | Zubeldia et al. | Mar 2000 | A |
6088800 | Jones et al. | Jul 2000 | A |
6105006 | Davis et al. | Aug 2000 | A |
6128386 | Satterfield | Oct 2000 | A |
6170001 | Hinds et al. | Jan 2001 | B1 |
6195752 | Pfab | Feb 2001 | B1 |
6298136 | Den Boer | Oct 2001 | B1 |
6367012 | Atkinson et al. | Apr 2002 | B1 |
6411715 | Liskov et al. | Jun 2002 | B1 |
6438252 | Miller | Aug 2002 | B2 |
6442525 | Silverbrook et al. | Aug 2002 | B1 |
6477683 | Killian et al. | Nov 2002 | B1 |
6526145 | Marzahn | Feb 2003 | B2 |
6675298 | Folmsbee | Jan 2004 | B1 |
6742052 | Himmel et al. | May 2004 | B2 |
6807553 | Oerlemans | Oct 2004 | B2 |
6889325 | Sipman et al. | May 2005 | B1 |
6963644 | Matsuzaki et al. | Nov 2005 | B1 |
6985582 | Sano et al. | Jan 2006 | B1 |
6988197 | Persson et al. | Jan 2006 | B1 |
7050580 | Ferre Herrero | May 2006 | B1 |
7076065 | Sherman et al. | Jul 2006 | B2 |
7171693 | Tucker et al. | Jan 2007 | B2 |
20010047480 | Tanimoto et al. | Nov 2001 | A1 |
20020025036 | Sato | Feb 2002 | A1 |
20020159588 | Kauffman et al. | Oct 2002 | A1 |
Number | Date | Country |
---|---|---|
9-18467 | Jan 1997 | JP |
9-190264 | Jul 1997 | JP |
Number | Date | Country | |
---|---|---|---|
20030039356 A1 | Feb 2003 | US |