CN103294496A - Burning system - Google Patents
Burning system Download PDFInfo
- Publication number
- CN103294496A CN103294496A CN2012100497797A CN201210049779A CN103294496A CN 103294496 A CN103294496 A CN 103294496A CN 2012100497797 A CN2012100497797 A CN 2012100497797A CN 201210049779 A CN201210049779 A CN 201210049779A CN 103294496 A CN103294496 A CN 103294496A
- Authority
- CN
- China
- Prior art keywords
- burning
- authentication
- encipheror
- eigenwert
- seeds
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a burning system. The burning system comprises an design end and an authentication burning end, wherein the design end is used for sending out an encryption program; the authentication burning end can obtain a characteristic value according to the encryption program, and compares the characteristic value with an authentication seed; and if the characteristic value and the authentication seed are matched, a special processing is performed on the encryption program to generate a program to be burned, and the program to be burned is burned into a chip according to a limitation condition. With the system provided by the invention, loss to software providers, which is caused by unlimited number of burning by burning operators, can be avoided.
Description
Technical field
The present invention relates to a kind of burning device, particularly can treat the burning device of burning program burning in a chip with one relevant for a kind of.
Background technology
Generally speaking, if procedure code will be imported in the chip, typically use a burning device.The provider of software hands to burning person with software, and the burning action is carried out in order.Usually the provider of software collects the charges according to the burning number of times.But for unworthy burning person, it may lie about the burning number of times, or steals software, thereby causes software provider's loss.
Summary of the invention
The invention provides a kind of programming system, it comprises a design end and an authentication burning end.The design end is in order to send an encipheror.Authentication burning end obtains an eigenwert according to encipheror, and comparative feature value and an authentication seeds.If eigenwert coupling authentication seeds is then carried out a particular procedure to encipheror, treat burning program in order to produce one, and according to a restrictive condition, will treat that burning program is burned onto in the chip.
By the present invention, when burning person takes this encipheror, need earlier according to this customizing messages, by an authentication procedure, can prove that its employed burning device is legal, just the software provider approves, and then according to the restrictive condition (as burning number of times or time) of software provider institute standard, carries out the burning action.Therefore, can avoid the unlimited burning of burning person and the loss of bringing for the software provider.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, does not constitute limitation of the invention.In the accompanying drawings:
Fig. 1 is the synoptic diagram of programming system of the present invention;
Fig. 2 is a possible embodiment of authentication burning end of the present invention;
The process that Fig. 3 carries out burning for authentication burning end of the present invention;
Fig. 4 is another possibility embodiment of authentication burning end of the present invention.
Drawing reference numeral:
100: programming system; 110: the design end;
120: authentication burning end; 121: chip;
131: encipheror; 132,133: authentication seeds;
210: the seed generator; 220: control module;
230: storage element; 410: server;
420: burning device.
Embodiment
For the features and advantages of the present invention can be become apparent, cited below particularlyly go out preferred embodiment, and cooperate appended graphicly, be described in detail below.
The present invention is applicable to a burning device, and the provider of software is as long as be packaged into an encipheror with an original program and customizing messages encryption.When burning person takes this encipheror, need earlier according to this customizing messages, by an authentication procedure, can prove that its employed burning device is legal, just the software provider approves, and then according to the restrictive condition (as burning number of times or time) of software provider institute standard, carry out the burning action.
Fig. 1 is the synoptic diagram of programming system of the present invention.In the present embodiment, programming system 100 comprises a design end 110 and one authentication burning end 120.Design end 110 sends an encipheror 131.For example, the program designer writes out an original program according to client's demand.In a possibility embodiment, the program designer is packaged in original program with a customizing messages, and encrypts the result after the packing, in order to produce encipheror 131.The present invention not limit design end 110 sends the method for encipheror 131.In a possibility embodiment, design end 110 is exported encipheror 131 by world-wide web.
Because encipheror 131 has a customizing messages, so authentication burning end 120 can obtain an eigenwert according to encipheror 131.Authentication burning end 120 is compared eigenwert with an authentication seeds.If during eigenwert coupling authentication seeds, 120 pairs of encipherors of authentication burning end 131 carry out a particular procedure, treat burning program in order to produce one, and according to a restrictive condition, will treat that burning program is burned onto in the chip 121.
In a possibility embodiment, restrictive condition is contained in the customizing messages, and is set by design end 110, and the required condition of observing during in order to standard authentication burning end 120 burning/recording chips is burnt record number of times or the recordable time of demonstrate,proving burning end 120 as standard.
Be example with the burning number of times, if default burning number of times is 1000 times (being restrictive condition), then at identical encipheror, 120 at authentication burning end can carry out 1000 times burnings action.When the burning number of times surpassed 1000 times, authentication burning end 120 just can't be with the data burning in chip.
In the present embodiment, authentication burning end 120 can't change restrictive condition, unless authentication burning end 120 receives new encipheror.After authentication burning end 120 receives new encipheror, will carry out the burning action according to new restrictive condition.For example, suppose, authentication burning end 120 successively receives one first encipheror and one second encipheror, and wherein first encipheror corresponds to first restrictive condition (as burning 1000 times), and second encipheror corresponds to one second restrictive condition (as burning 2000 times).
At first encipheror, authentication burning end 120 is met the burning action of carrying out 1000 times together.At second encipheror, authentication burning end 120 is met the burning action of carrying out 2000 times together.Yet the present invention does not limit the order of authentication burning end 120 burnings first or second encipheror.In a possibility embodiment, at same encipheror, authentication burning end 120 can not carry out burning continuously.As long as the burning action of authentication burning end 120 meets restrictive condition.
For example, authentication burning end 120 may be carried out 500 times burning action earlier at first encipheror, again at second encipheror, carries out 2000 times burning action, at last again at first encipheror, carries out 500 times burning action.
Be example with the recordable time, after authentication burning end 120 receives new encipheror, will carry out the burning action according to new restrictive condition.The present invention does not limit the kind of restrictive condition.In a possibility embodiment, suppose, authentication burning end 120 successively receives one first encipheror and one second encipheror, wherein first encipheror corresponds to first restrictive condition (as can carry out burning in a special time, for example 30 days authentication burning ends 120 can carry out the burning action), second encipheror corresponds to one second restrictive condition (can carry out the burning action as 60 days), and then authenticating burning end 120 will carry out the burning action according to first and second restrictive condition.
In other embodiments, design end 110 sets restrictive condition and also can comprise recordable time and burning number of times simultaneously, for example can carry out the number of times of burning in a special time, and it is inferior to carry out burning 1000 as 30 days authentication burning ends 120.
In the present embodiment, 120 pairs of encipherors of authentication burning end 131 carry out a particular procedure, treat burning program in order to produce one.The present invention does not limit the kind of particular procedure.One may embodiment in, after through particular procedure (as decryption processing), authentication burning end 120 obtains an original program, and with this original program direct burning to chip 121.
In another embodiment, except decryption processing, particular procedure has more encryption.In order to improve the security of data, after decryption processing, authentication burning end 120 is encrypted this original program again, treats burning program in order to produce one, and will treat that the burning program burning is in chip 121.
The present invention does not limit authentication burning end 120 employed encryption methods.Authentication burning end 120 employed encryption methods can be same or different from design end 110 employed encryption methods.As long as the data of burning in chip 121 are different from original program, just can reach the function of protection.
In a possibility embodiment, design end 110 produces encipheror 131 according to the authentication seeds 132 that authentication burning end 120 provides.In other embodiments, design end 110 can produce an authentication seeds 133 voluntarily and give authentication burning end 120.In addition, design end 110 authentication seeds that produce 133 may comprise or not comprise a restrictive condition.The different embodiment that produce authentication seeds below will be described.
Fig. 2 is that one of authentication burning end 120 of the present invention may embodiment.In the present embodiment, authentication seeds 132 is produced by authentication burning end 120, and offers design end 110.Design end 110 just is packaged in authentication seeds 132, a restrictive condition and an original program together after receiving authentication seeds 132, and encrypts the result after the packing, in order to produce encipheror 131.In the present embodiment, authentication seeds 132 can be described as a customizing messages with restrictive condition.
In the present embodiment, authentication burning end 120 comprises a seed generator 210, a control module 220, a storage element 230 and a chip 121.Seed generator 210 is in order to produce authentication seeds 132.The present invention does not limit the kind of seed generator 210.As long as the device of authentication information can be provided, all can be used as the seed generator.In a possibility embodiment, seed generator 210 can be a random number producer.Random number producer produces different authentication seeds under different time.In addition, authentication seeds 132 also can be stored in the storage element 230 except offering design end 110.
Control module 220 receives encipheror 131, and encipheror 131 is stored in the storage element 230.Control module 220 obtains an eigenwert (or an identification code) according to encipheror 131, and eigenwert and storage element 230 stored authentication seeds 132 are made comparisons.When eigenwert coupling authentication seeds, 220 pairs of encipherors of control module 131 carry out a particular procedure, and according to a restrictive condition, treat that with one burning program is burned onto in the chip 121.
In a possibility embodiment, the design end is packed a restrictive condition in encipheror 131, and therefore, after finishing particular procedure, control module 220 can obtain a restrictive condition and and treat burning program.Control module 220 treats that with one burning program is burned onto in the chip 121 again according to restrictive condition
The process that Fig. 3 carries out burning for authentication burning end 120 of the present invention.At first, be written into one and treat burning program (step S310).The present invention does not limit the state for the treatment of burning program.For example, treat that burning program can be one and encrypted or the unencryption procedure code.In a possibility embodiment, can utilize the graceful key change method in Di Fei-Hull (Diffie-Hellman key exchange), produce and treat burning program.
Then, be written into a recording status (step S320).In the present embodiment, this recording status is the state of actual burn, as burning number of times or recordable time.Then, judge again whether recording status has met a restrictive condition (step S330).In the present embodiment, restrictive condition is a default burning number of times.
When the actual burn number of times has reached default burning number of times, then stop burning (step S340).If the actual burn number of times does not reach default burning number of times, then continue burning/recording chip (step S350), and amendment record state (step S360).In one embodiment, the actual burn number of times will add 1.Then, store amended recording status (step S370), whether execution in step S320 meets restrictive condition in order to judge recording status again again.
In other embodiments, if be written into the new burning program for the treatment of, then authenticate burning state and the old burning program for the treatment of that burning end 120 can record last time earlier, carry out burning at the burning program of newly treating again, etc. new treat that the burning program burning is finished after, capture the burning state of last time again, to carry out the old burning work for the treatment of burning program.
Fig. 4 is another possibility embodiment of authentication burning end of the present invention.In the present embodiment, design end 110 more provides an authentication seeds 133 to authentication burning end 120 except encipheror 131.In a possibility embodiment, encipheror 131 comprises an original program and a restrictive condition.In other embodiments, encipheror 131 only comprises an original program, and authentication seeds 133 comprises a restrictive condition.For improving security, in a possibility embodiment, authentication seeds 133 is through encryptions.
As shown in the figure, authentication burning end 120 comprises a server (network server) 410 and one burning device 420.Server 410 receives authentication seeds 133.Burning device 420 is handled enciphered datas 131, in order to obtaining an eigenwert, and according to eigenwert, links up with server 410.
In a possibility embodiment, burning device 420 sends a control command and gives server 410 according to eigenwert, judges in order to make server 410 whether burning device 420 is a specific burning device.In the present embodiment, server 410 is learnt out this eigenwert according to the control command that burning device 420 sends, and this eigenwert is compared with authentication seeds 133, again according to comparative result, and restored burning device 420.Burning device 420 determines whether to carry out the burning action according to the answer result of server 410.
For example, if eigenwert coupling authentication seeds 133, then burning device 420 carries out a particular procedure according to the answer of server 410 to encipheror 131, treats burning program in order to produce one.In a possibility embodiment, encipheror 131 has a restrictive condition.Burning device 420 will treat that according to restrictive condition the burning program burning is in chip 121.
In other embodiments, restrictive condition is provided by server 410.For example, if eigenwert coupling authentication seeds 133, then server 410 is replied a restrictive condition and is given burning device 420 according to eigenwert.In addition, after answer, server 410 deletion authentication seeds 133 repeat burning to avoid burning device 420.
In the present embodiment, though burning device 420 receives encipheror 131, before not obtaining authentication as yet (confirming namely whether an eigenwert mates an authentication seeds), can't burning encipheror 131.On the contrary, obtain an eigenwert at burning device 420 according to encipheror 131, and during an authentication seeds 133 coupling on this eigenwert and the server 410, burning device 420 could be handled encipheror 131, and according to a restrictive condition, carries out burning and move.Therefore, after burning person obtains encipheror, need to have only the burning device of coupling could understand the also encipheror of burning correspondence by specific burning device ability burning encipheror.
Unless define in addition, all belong to (comprising technology and science vocabulary) persond having ordinary knowledge in the technical field of the present invention's general understanding at these all vocabulary.In addition, unless clear expression, it is consistent that the definition of vocabulary in general dictionary should be interpreted as in the article with its correlative technology field meaning, and should not be construed as perfect condition or too formal voice.
Though the present invention discloses as above with preferred embodiment; so it is not in order to limit the present invention; have in the technical field under any and know the knowledgeable usually; without departing from the spirit and scope of the invention; when can doing a little change and retouching, so the present invention's protection domain attached claim person of defining after looking is as the criterion.
Claims (11)
1. a programming system is characterized in that, comprising:
One design end is in order to send an encipheror; And
One authentication burning end, according to described encipheror, obtain an eigenwert, and more described eigenwert and an authentication seeds, if described eigenwert is mated described authentication seeds, then described encipheror is carried out a particular procedure, treat burning program in order to produce one, and according to a restrictive condition, the described burning program for the treatment of is burned onto in the chip.
2. programming system as claimed in claim 1 is characterized in that, described restrictive condition is a burning number of times or a recordable time.
3. programming system as claimed in claim 1 is characterized in that, described particular procedure is deciphered described encipheror, in order to produce an original program, encrypt described original program again, in order to produce the described burning program for the treatment of, wherein said encipheror is different from the described burning program for the treatment of.
4. programming system as claimed in claim 3, it is characterized in that, described authentication burning end produces described authentication seeds and gives described design end, and wherein said design end is encrypted and the described authentication seeds of packing, described restrictive condition and described original program, in order to produce described encipheror.
5. programming system as claimed in claim 4 is characterized in that, described authentication burning end comprises:
One seed generator is in order to produce described authentication seeds;
One storage element is in order to store described encipheror and described authentication seeds; And
One control module, according to described encipheror, obtain described eigenwert, and with described eigenwert and the comparison of described authentication seeds, when described eigenwert is mated described authentication seeds, described control module carries out described particular procedure to described encipheror, and according to described restrictive condition, the described burning program for the treatment of is burned onto in the described chip.
6. programming system as claimed in claim 5 is characterized in that, described seed generator is a random number producer.
7. programming system as claimed in claim 1 is characterized in that, described design end produces described authentication seeds, and described authentication seeds is sent to described authentication burning end.
8. programming system as claimed in claim 7 is characterized in that, described authentication burning end comprises:
One server receives described authentication seeds; And
One burning device is handled described enciphered data, in order to obtain described eigenwert, and according to described eigenwert, link up with described server, if described eigenwert is mated described authentication seeds, then described encipheror is carried out described particular procedure, in order to produce the described burning program for the treatment of.
9. programming system as claimed in claim 8 is characterized in that, if described eigenwert is mated described authentication seeds, described server provides described restrictive condition to described burning device according to described eigenwert.
10. programming system as claimed in claim 8 is characterized in that, if described eigenwert is mated described authentication seeds, then burning device is handled described encipheror, in order to learn described restrictive condition and to produce the described burning program for the treatment of.
11. programming system as claimed in claim 8 is characterized in that, if described eigenwert is mated described authentication seeds, then described server is deleted described authentication seeds.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210049779.7A CN103294496B (en) | 2012-02-29 | 2012-02-29 | Programming system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210049779.7A CN103294496B (en) | 2012-02-29 | 2012-02-29 | Programming system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103294496A true CN103294496A (en) | 2013-09-11 |
CN103294496B CN103294496B (en) | 2016-12-14 |
Family
ID=49095435
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210049779.7A Active CN103294496B (en) | 2012-02-29 | 2012-02-29 | Programming system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103294496B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683105A (en) * | 2014-06-05 | 2015-06-03 | 深圳市迈斯威志科技有限公司 | Remote encryption, decryption and writing processing method for MCU writer |
WO2016127606A1 (en) * | 2015-02-11 | 2016-08-18 | 京东方科技集团股份有限公司 | Burning method and burning system |
CN106529309A (en) * | 2016-09-19 | 2017-03-22 | 芯海科技(深圳)股份有限公司 | Method for limiting programming number of programmer by encrypting programming file |
CN107729723A (en) * | 2017-11-08 | 2018-02-23 | 深圳市希顿科技有限公司 | A kind of integrated circuit burning program method and programming system |
CN107783773A (en) * | 2017-11-22 | 2018-03-09 | 广东乐心医疗电子股份有限公司 | Firmware burning method and system |
CN108513172A (en) * | 2018-02-13 | 2018-09-07 | 广州视源电子科技股份有限公司 | Data limit carving method, device, system and server, television set |
CN109326032A (en) * | 2018-10-14 | 2019-02-12 | 浙江鸿利锁业有限公司 | A kind of lockset rent method and the leasing system using it |
CN109901851A (en) * | 2019-02-28 | 2019-06-18 | 广州小鹏汽车科技有限公司 | A kind of firmware burning system and method |
CN110489959A (en) * | 2019-09-06 | 2019-11-22 | 珠海格力电器股份有限公司 | Guard method, method for burn-recording, device, storage medium and the equipment of recordable paper |
CN117633733A (en) * | 2024-01-25 | 2024-03-01 | 九音科技(南京)有限公司 | Method for acquiring software by chip product, computer equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101175269A (en) * | 2006-10-31 | 2008-05-07 | 华为技术有限公司 | Communication terminal and its method and device for system bootstrapping |
CN101281478A (en) * | 2008-05-14 | 2008-10-08 | 北京泰得思达科技发展有限公司 | Method adopting multiplexing technique to perform paralleling burning record |
CN101281477A (en) * | 2008-05-14 | 2008-10-08 | 北京泰得思达科技发展有限公司 | System adopting multiplexing technique to perform paralleling burning record |
-
2012
- 2012-02-29 CN CN201210049779.7A patent/CN103294496B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101175269A (en) * | 2006-10-31 | 2008-05-07 | 华为技术有限公司 | Communication terminal and its method and device for system bootstrapping |
CN101281478A (en) * | 2008-05-14 | 2008-10-08 | 北京泰得思达科技发展有限公司 | Method adopting multiplexing technique to perform paralleling burning record |
CN101281477A (en) * | 2008-05-14 | 2008-10-08 | 北京泰得思达科技发展有限公司 | System adopting multiplexing technique to perform paralleling burning record |
Non-Patent Citations (2)
Title |
---|
徐元哲: "Fs88x6系列加密芯片烧录器的设计与实现", 《中国优秀硕士学位论文》, 31 January 2011 (2011-01-31), pages 15 * |
朱同: "CFP系列芯片的烧录器设计", 《中国优秀硕士学位论文》, 30 September 2008 (2008-09-30), pages 54 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683105A (en) * | 2014-06-05 | 2015-06-03 | 深圳市迈斯威志科技有限公司 | Remote encryption, decryption and writing processing method for MCU writer |
WO2016127606A1 (en) * | 2015-02-11 | 2016-08-18 | 京东方科技集团股份有限公司 | Burning method and burning system |
CN106529309A (en) * | 2016-09-19 | 2017-03-22 | 芯海科技(深圳)股份有限公司 | Method for limiting programming number of programmer by encrypting programming file |
CN107729723A (en) * | 2017-11-08 | 2018-02-23 | 深圳市希顿科技有限公司 | A kind of integrated circuit burning program method and programming system |
CN107783773B (en) * | 2017-11-22 | 2021-01-12 | 广东乐心医疗电子股份有限公司 | Firmware burning method and system |
CN107783773A (en) * | 2017-11-22 | 2018-03-09 | 广东乐心医疗电子股份有限公司 | Firmware burning method and system |
CN108513172A (en) * | 2018-02-13 | 2018-09-07 | 广州视源电子科技股份有限公司 | Data limit carving method, device, system and server, television set |
CN109326032A (en) * | 2018-10-14 | 2019-02-12 | 浙江鸿利锁业有限公司 | A kind of lockset rent method and the leasing system using it |
CN109326032B (en) * | 2018-10-14 | 2021-06-11 | 浙江鸿利锁业有限公司 | Lock leasing method and leasing device applying same |
CN109901851A (en) * | 2019-02-28 | 2019-06-18 | 广州小鹏汽车科技有限公司 | A kind of firmware burning system and method |
CN109901851B (en) * | 2019-02-28 | 2022-07-12 | 广州小鹏汽车科技有限公司 | Firmware burning system and method |
CN110489959A (en) * | 2019-09-06 | 2019-11-22 | 珠海格力电器股份有限公司 | Guard method, method for burn-recording, device, storage medium and the equipment of recordable paper |
CN110489959B (en) * | 2019-09-06 | 2022-04-26 | 珠海格力电器股份有限公司 | Protection method, burning method and device for burning file, storage medium and equipment |
CN117633733A (en) * | 2024-01-25 | 2024-03-01 | 九音科技(南京)有限公司 | Method for acquiring software by chip product, computer equipment and storage medium |
CN117633733B (en) * | 2024-01-25 | 2024-04-12 | 九音科技(南京)有限公司 | Method for acquiring software by chip product, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN103294496B (en) | 2016-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103294496A (en) | Burning system | |
CN109040090B (en) | A kind of data ciphering method and device | |
CN109377244B (en) | Food fast traceability system and method based on multi-chain interconnection block chain network | |
CN110519260B (en) | Information processing method and information processing device | |
CN103546576B (en) | A kind of embedded device remote automatic upgrading method and system | |
CN102138300B (en) | Message authentication code pre-computation with applications to secure memory | |
CN109902494A (en) | Data encryption storage method, device and document storage system | |
EP2506488A2 (en) | Secure dynamic on-chip key programming | |
CN107483419A (en) | Method, apparatus, system, server and the computer-readable recording medium of server authentication access terminal | |
CN110912877B (en) | Data transmitting and receiving method and device based on IEC61850 model in transformer substation | |
CN104168116A (en) | Database identity authentication method and system | |
CN109274661A (en) | A kind of bidirectional identity authentication prevents the key storage and extracting method of Replay Attack | |
CN111837372A (en) | System and method for privacy preserving data retrieval for connected power tools | |
CN109753770A (en) | Determine method and device, method for burn-recording and device, the electronic equipment of burning data | |
CN107948186A (en) | A kind of safety certifying method and device | |
JP6930053B2 (en) | Data encryption method and system using device authentication key | |
CN105653932B (en) | The method and apparatus of software upgrading verification | |
CN106257859A (en) | A kind of password using method | |
CN110232570B (en) | Information supervision method and device | |
JP6246516B2 (en) | Information processing system | |
CN110880965A (en) | Outgoing electronic document encryption method, system, terminal and storage medium | |
CN107358067B (en) | Method for realizing encryption and decryption by deriving SCK with L icense in dongle | |
TWI499929B (en) | Programming system | |
CN103378966A (en) | Secret key programming on safety dynamic piece | |
US11720693B2 (en) | System and method for securely transferring data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |