CN106209772B - Network data coding method, device, checking method, device and transmission method - Google Patents

Network data coding method, device, checking method, device and transmission method Download PDF

Info

Publication number
CN106209772B
CN106209772B CN201610466589.3A CN201610466589A CN106209772B CN 106209772 B CN106209772 B CN 106209772B CN 201610466589 A CN201610466589 A CN 201610466589A CN 106209772 B CN106209772 B CN 106209772B
Authority
CN
China
Prior art keywords
identifying code
pseudorandom
synchronous
user
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610466589.3A
Other languages
Chinese (zh)
Other versions
CN106209772A (en
Inventor
杨哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou British Mdt Infotech Ltd
Original Assignee
Suzhou British Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou British Mdt Infotech Ltd filed Critical Suzhou British Mdt Infotech Ltd
Priority to CN201610466589.3A priority Critical patent/CN106209772B/en
Publication of CN106209772A publication Critical patent/CN106209772A/en
Application granted granted Critical
Publication of CN106209772B publication Critical patent/CN106209772B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of network data coding method, device, checking method, device and transmission method, to realize safety, the transmission of the data of low overhead.The network data coding method comprising: prepare user data;The synchronous identifying code sequence of pseudorandom being made of a series of synchronous identifying code of pseudorandoms is generated according to by the identifying code seed that server is user's distribution, by the synchronous identifying code of each pseudorandom successively as the synchronous identifying code of current pseudorandom;The synchronous identifying code of current pseudorandom is embedded in the user data;The user identifier of the user data for being embedded in the synchronous identifying code of pseudorandom and user is encapsulated as data packet and is sent to the server.To realize safety, the transmission of the data of low overhead.

Description

Network data coding method, device, checking method, device and transmission method
[technical field]
The present invention relates to communication technique field, in particular to a kind of network data coding method, code device, veritification side Method veritifies device and transmission method.
[background technique]
Network data the problems such as being faced with secrecy, distort, forge, denying, has influenced data transmitting in transmission process Confidentiality, authenticity, integrality and reliability.Prior art, such as data encryption, message authentication, digital signature etc. can be with Certain protection is carried out to network data transmitting, but the problem of data safety in terms of it all only protects some.
Data encryption, the network data that needs can be transmitted by symmetric encipherment algorithm and public key encryption algorithm it is whole into Row encryption, to guarantee the confidentiality of data transmitting.But encryption method only can guarantee the privacy of data, encryption process Expense is big, especially public key encryption algorithm, is not suitable for big data quantity transmitting.
Message authentication can prevent data in network by way of in data trailer Additional Verification code or check code Be maliciously tampered in transmittance process, if recipient recalculates the authentication code or check code of message, and with former message trailer Additional authentication code or check code comparison, so that it may realize whether network data is tampered.But message authentication is only capable of preventing data It is tampered.
Digital signature can prevent data from denying by way of public key algorithm private key encryption public key decryptions Problem, but otherwise safeguard protection is not provided.
If to realize the multiple protective to network data simultaneously, current technology scheme needs integrated application data to add Close, message authentication and digital signature technology generate the authentication code of data by message authentication technology or check code guarantee data Integrality, carrying out public key encryption to authentication code or check code by digital signature technology prevents data from denying, finally by symmetric cryptography Technology to entire data include after digital signature authentication code and check code encrypt, protect the private of data itself and authentication code Close property.This scheme by Multiple techniques integrated application, not only consumption largely calculates and storage resource, but also can generate additional Expense, such as message authentication technology needs encipherment protection its authentication code or check code for generating, digital signature technology and symmetrical Encryption technology needs the algorithm used to require additional key, and key must maintain secrecy.
Therefore, it is necessary to be improved to existing network data coding method and Transmission system.
[summary of the invention]
One of the objects of the present invention is to provide a kind of network data coding method, code device, checking method, veritify dress It sets and transmission method, to realize safety, the transmission of the data of low overhead.
According to an aspect of the present invention, the present invention provides a kind of network data coding method comprising: for user's preparation Need to carry out the user data of safe coding and transmission, the user has unique user identifier;It is based on according to by server The user identifier of the user is that the identifying code seed of user distribution generates the synchronous identifying code sequence of pseudorandom, wherein described The synchronous identifying code sequence of pseudorandom is made of a series of synchronous identifying code of pseudorandoms, by the synchronous identifying code sequence of the pseudorandom In the synchronous identifying code of each pseudorandom successively as the synchronous identifying code of current pseudorandom;By the synchronous identifying code insertion of current pseudorandom In the user data;The user identifier of the user data for being embedded in the synchronous identifying code of pseudorandom and user is encapsulated as data packet hair It send to the server.
Further, there is treaty rule, the treaty rule includes that each pseudorandom is synchronous in the identifying code seed Length l, the life span t of identifying code and initial position p, range w and the mode q for being embedded in user data, according to the agreement The length l of the synchronous identifying code of each pseudorandom in rule generates the synchronous identifying code sequence of pseudorandom;According to the treaty rule In the life span t of the synchronous identifying code of each pseudorandom whether still effectively determine the synchronous identifying code of current pseudorandom, if In vain, then using the synchronous identifying code of next pseudorandom in the synchronous identifying code sequence of the pseudorandom as the same step of current pseudorandom Demonstrate,prove code;According to initial position p, the range w of the insertion user data of the synchronous identifying code of pseudorandom each in the treaty rule and The synchronous identifying code of current pseudorandom is embedded in the user data by mode q.
Further, timing is carried out to the continuous and effective time of current pseudorandom identifying code, in the life span t When, it determines that current pseudorandom identifying code is still effective, when being more than in the life span t, determines current pseudorandom identifying code In vain, using the synchronous identifying code of next pseudorandom in the synchronous identifying code sequence of the pseudorandom as current pseudorandom identifying code, And timing is carried out to the continuous and effective time of current pseudorandom identifying code again.
Further, current pseudorandom is synchronized by identifying code and the user according to the mode q of the insertion user data Data carry out operation.
According to an aspect of the present invention, the present invention provides a kind of network data checking method comprising: it receives from visitor The data packet that family end is sent, and the user data of the user identifier identifying code synchronous with insertion pseudorandom in the data packet is carried out Separation;It is retrieved in the subscriber identity data library of server according to the user identifier isolated;It is marked if there is the user Know, the synchronous identifying code sequence of pseudorandom is generated in the server according to the corresponding identifying code seed of the user identifier, wherein institute It states the synchronous identifying code sequence of pseudorandom to be made of a series of synchronous identifying code of pseudorandoms, by the synchronous identifying code sequence of the pseudorandom The synchronous identifying code of each pseudorandom is successively as the synchronous identifying code of current pseudorandom in column, the corresponding identifying code of the user identifier Seed is distributed in advance according to the user identifier of the user by server;It is same based on the current pseudorandom generated in server Step identifying code verifies the user data of the synchronous identifying code of the insertion pseudorandom isolated from data packet, if verification is logical Later, then restore to obtain the user data from the user data of the synchronous identifying code of the insertion pseudorandom.
Further, there is treaty rule, the treaty rule includes that each pseudorandom is synchronous in the identifying code seed Length l, the life span t of identifying code and initial position p, range w and the mode q for being embedded in user data, according to the agreement The length l of the synchronous identifying code of each pseudorandom in rule generates the synchronous identifying code sequence of pseudorandom in the server;According to The life span t of the synchronous identifying code of each pseudorandom in the treaty rule determines whether current pseudorandom identifying code still has Effect, if in vain, using the synchronous identifying code of next pseudorandom in the synchronous identifying code sequence of the pseudorandom as current puppet with Machine synchronizes identifying code;According to the initial position p of the insertion user data of the synchronous identifying code of pseudorandom each in the treaty rule, Range w and mode q and the synchronous identifying code of the current pseudorandom generated in server are to the insertion puppet isolated from data packet The user data of random synchronism identifying code is verified.
Further, timing is carried out to the continuous and effective time of the synchronous identifying code of current pseudorandom, in the life span t When interior, determine that the synchronous identifying code of current pseudorandom is still effective, when being more than in the life span t, determine current pseudorandom Synchronous identifying code is invalid, using the synchronous identifying code of next pseudorandom in the synchronous identifying code sequence of the pseudorandom as current puppet with Machine synchronizes identifying code, and carries out timing to the continuous and effective time of the synchronous identifying code of current pseudorandom again.
According to an aspect of the present invention, the present invention provides a kind of network data code device comprising: user data mould Block, for needing to carry out the user data of safe coding and transmission for user's preparation, the user has unique user identifier; Code generator is verified, is generated according to the identifying code seed that the user identifier by server based on the user is user distribution Pseudorandom synchronizes identifying code sequence, wherein the synchronous identifying code sequence of the pseudorandom is by a series of synchronous verifying code character of pseudorandoms At by the synchronous identifying code of each pseudorandom in the synchronous identifying code sequence of the pseudorandom successively as the synchronous verifying of current pseudorandom Code;The synchronous identifying code of current pseudorandom is embedded in the user data by identifying code embedded device;Data Synthesis transmitter, will be embedding The user identifier of the user data and user that enter the synchronous identifying code of pseudorandom is encapsulated as data packet and is sent to the server.
Further, there is treaty rule, the treaty rule includes that each pseudorandom is synchronous in the identifying code seed Length l, the life span t of identifying code and initial position p, the range w and mode q for being embedded in user data, the identifying code hair Raw device generates the synchronous identifying code sequence of pseudorandom according to the length l of the synchronous identifying code of each pseudorandom in the treaty rule; The identifying code embedded device determines current pseudo- according to the life span t of the synchronous identifying code of each pseudorandom in the treaty rule Random synchronism identifying code whether still effectively, if in vain, by the synchronous identifying code sequence of the pseudorandom it is next it is pseudo- with The synchronous identifying code of machine is as the synchronous identifying code of current pseudorandom;Identifying code embedded device is according to pseudorandom each in the treaty rule Initial position p, the range w and mode q of the insertion user data of synchronous identifying code are by current pseudorandom synchronous identifying code insertion institute It states in user data.
Further, the network data code device further include: timer holds the synchronous identifying code of current pseudorandom Continuous effective time carries out timing, and when in the life span t, the verifying code generator determines the synchronous verifying of current pseudorandom Code is still effective, when being more than in the life span t, the verifying code generator determine current pseudorandom synchronization identifying code without Effect, using the synchronous identifying code of next pseudorandom in the synchronous identifying code sequence of the pseudorandom as the synchronous verifying of current pseudorandom Code, while the timer carries out timing to the continuous and effective time of the synchronous identifying code of current pseudorandom again.
Further, the identifying code embedded device is synchronous by current pseudorandom according to the mode q of the insertion user data Identifying code and the user data carry out operation.
According to an aspect of the present invention, the present invention provides a kind of network data veritification device comprising: data receiver point From device, for receiving the data packet sent from client, and the user identifier in the data packet is synchronous with insertion pseudorandom The user data of identifying code is separated;Subscriber identity data library, the user according to the user identifier isolated in server mark Know in database and is retrieved;Identifying code kind subpool device, is stored with multiple identifying code seeds, according to the user identifier of the user An identifying code seed is distributed for the user;Code generator is verified, is generated according to the corresponding identifying code seed of the user identifier Pseudorandom synchronizes identifying code sequence, wherein the synchronous identifying code sequence of the pseudorandom is by a series of synchronous verifying code character of pseudorandoms At by the synchronous identifying code of each pseudorandom in the synchronous identifying code sequence of the pseudorandom successively as the synchronous verifying of current pseudorandom Code;Identifying code checker, it is embedding to what is isolated from data packet based on the synchronous identifying code of current pseudorandom generated in server The user data for entering the synchronous identifying code of pseudorandom is verified, if after verification passes through, verified from the insertion pseudorandom is synchronous Restore to obtain the user data in the user data of code.
Further, there is treaty rule, the treaty rule includes that each pseudorandom is synchronous in the identifying code seed Length l, the life span t of identifying code and initial position p, range w and the mode q for being embedded in user data, according to the agreement The length l of the synchronous identifying code of each pseudorandom in rule generates the synchronous identifying code sequence of pseudorandom in the server;According to Whether still the life span t of the synchronous identifying code of each pseudorandom in the treaty rule determines the synchronous identifying code of current pseudorandom So effectively, if in vain, next pseudorandom in the synchronous identifying code sequence of the pseudorandom is synchronized identifying code as current Pseudorandom synchronizes identifying code;According to the start bit of the insertion user data of the synchronous identifying code of pseudorandom each in the treaty rule It sets p, range w and mode q and the synchronous identifying code of the current pseudorandom that generates in server is embedding to what is isolated from data packet The user data for entering the synchronous identifying code of pseudorandom is verified.
Further, it further includes having timer that the network data, which veritifies device, is used for synchronous to current pseudorandom Continuous and effective time of identifying code carries out timing, when in the life span t, the verifying code generator determine current puppet with The synchronous identifying code of machine is still effective, and when being more than in the life span t, the verifying code generator determines that current pseudorandom is same Step identifying code is invalid, using the synchronous identifying code of next pseudorandom in the synchronous identifying code sequence of the pseudorandom as current pseudorandom Synchronous identifying code, while the timer carries out timing to the continuous and effective time of the synchronous identifying code of current pseudorandom again.
According to an aspect of the present invention, the present invention provides a kind of network data transmission method comprising: network data is compiled Code method and network data method of calibration.It is that user prepares to need to carry out that the network data coding method, which includes: in client, The user data of safe coding and transmission, the user have unique user identifier;It is based in client according to by server The user identifier of the user is that the identifying code seed of user distribution generates the synchronous identifying code sequence of pseudorandom, wherein described The synchronous identifying code sequence of pseudorandom is made of a series of synchronous identifying code of pseudorandoms, by the synchronous identifying code sequence of the pseudorandom In the synchronous identifying code of each pseudorandom successively as the synchronous identifying code of current pseudorandom;In client by the same step of current pseudorandom Code is demonstrate,proved to be embedded in the user data;The user of the user data for being embedded in the synchronous identifying code of pseudorandom and user is marked in client Knowledge is encapsulated as data packet and is sent to server.The network data method of calibration includes: the data for receiving and sending from client Packet, and the user data of the user identifier identifying code synchronous with insertion pseudorandom in the data packet is separated;In server The user identifier that middle basis is isolated is retrieved in the subscriber identity data library of server;In the server, according to the use Family identifies corresponding identifying code seed and generates the synchronous identifying code sequence of pseudorandom in the server, wherein the pseudorandom is synchronous Identifying code sequence is made of a series of synchronous identifying code of pseudorandoms, by the synchronous identifying code sequence of the pseudorandom it is each it is pseudo- with The synchronous identifying code of machine successively as the synchronous identifying code of current pseudorandom, wherein the corresponding identifying code seed of the user identifier be by Server is in advance according to the distribution of the user identifier of the user;Pass through the synchronous identifying code of the current pseudorandom generated in server The user data of the synchronous identifying code of the insertion pseudorandom isolated from data packet is verified, if after verification passes through, from The insertion pseudorandom, which synchronizes, to be restored to obtain the user data in the user data of identifying code.
Further, there is treaty rule in the identifying code seed in the server and the client, it is described Treaty rule include length l, the life span t of the synchronous identifying code of each pseudorandom and the initial position p for being embedded in user data, Range w and mode q, the server and the client are according to the synchronous identifying code of each pseudorandom in the treaty rule Length l generates the synchronous identifying code sequence of pseudorandom;The server and the client synchronization according in the treaty rule The life span t of the synchronous identifying code of each pseudorandom whether still effectively determine the synchronous identifying code of current pseudorandom, if nothing Effect, then using the synchronous identifying code of next pseudorandom in the synchronous identifying code sequence of the pseudorandom as the synchronous verifying of current pseudorandom Code;The client according to the initial position p of the insertion user data of the synchronous identifying code of pseudorandom each in the treaty rule, Range w is with mode q by the current pseudorandom synchronous identifying code insertion user data, and the server is according to the agreement Each pseudorandom synchronizes initial position p, range w and the mode q of the insertion user data of identifying code and in server in rule Number of users of the synchronous identifying code of the current pseudorandom of middle generation to the synchronous identifying code of the insertion pseudorandom isolated from data packet According to being verified.
Further, the timer in server and the timer synchronization of client are to the synchronous identifying code of current pseudorandom The continuous and effective time carry out timing, when in the life span t, determine that the synchronous identifying code of current pseudorandom is still effective, When being more than in the life span t, determine that the synchronous identifying code of current pseudorandom is invalid, by the synchronous identifying code sequence of the pseudorandom In the synchronous identifying code of next pseudorandom as the synchronous identifying code of current pseudorandom, and again synchronous to current pseudorandom verify The continuous and effective time of code carries out timing.
Compared with prior art, the network data transmission scheme in the present invention can be provided to data confidentiality, true, complete Safety, the transmission of the data of low overhead are realized in the protection of many aspects such as whole.
[Detailed description of the invention]
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill of field, without any creative labor, it can also be obtained according to these attached drawings other Attached drawing.Wherein:
Fig. 1 is the flow diagram of identifying code the seed generation and loading phase of the present invention in one embodiment;
Fig. 2 is that the present invention realizes the safe coding of data using identifying code in one embodiment and veritifies the process in stage Schematic diagram;
Fig. 3 is the structural schematic diagram of the network data transmission system of the present invention in one embodiment.
[specific embodiment]
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real Applying mode, the present invention is described in further detail.
" one embodiment " or " embodiment " referred to herein, which refers to, may be included at least one implementation of the invention A particular feature, structure, or characteristic." in one embodiment " that different places occur in the present specification not refers both to same A embodiment, nor the individual or selective embodiment mutually exclusive with other embodiments.Unless stated otherwise, herein In connection, be connected, connect expression be electrically connected word indicate directly or indirectly to be electrical connected.
Network data transmission method in the present invention includes two stages, and respectively identifying code seed generates and be packed into rank It is section and network data coding and veritification stage, as depicted in figs. 1 and 2 respectively.
It please refers to shown in Fig. 1, is generated for the identifying code seed of the present invention in one embodiment and loading phase is (square Method) flow diagram.Identifying code seed generation shown in FIG. 1 and loading phase are specifically introduced below in conjunction with Fig. 3 comprising such as Lower step.
Step 101, start.
Step 102, user identifier (Identifier, abbreviation ID) is generated for user in client.
Client by User ID generator 304 collect the unique information of user, including be not limited to user name, client computer it is hard Then the part ID either address client mac (Media Access Control) etc. generates user with the information and uniquely uses Family ID, and be committed in the User ID database 307 of server.
Step 103, server registration User ID.Server is received the use that client is sent by User ID database 307 After the ID of family, whether the ID that new registration user is retrieved in the ID number of all registered users of its storage be can be used.If can not With then notifying client to regenerate a User ID and registered;If it is available, then to the application point of identifying code kind subpool 310 The User ID is given with a new identifying code seed.
Step 104, server generates identifying code seed.Server receives User ID data by identifying code kind subpool 310 Library 307 is after a new registration user distributes the request of new identifying code seed, to select one at random from its identifying code kind subpool Seed returns to User ID database 307.The identifying code seed needs to be sent respectively to the verifying code generator of client simultaneously 302 and server verifying code generator 311.
Step 105, client is packed into identifying code seed.The verifying code generator 302 of client receives server authentication code The identifying code seed that kind subpool 310 is sent, and the treaty rule in identifying code seed is parsed, the treaty rule includes each testing It demonstrate,proves length l, the life span t of code and is embedded in initial position p, range w and the mode q of user data, to generate the user couple The synchronous identifying code sequence of the pseudorandom answered.
Step 106, server is packed into identifying code seed.The verifying code generator 312 of server receives identifying code kind subpool The 310 identifying code seeds sent also need the treaty rule in parsing identifying code seed, and the treaty rule includes each identifying code Length l, life span t and be embedded in user data initial position p, range w and mode q, with generate it is consistent with client The synchronous identifying code sequence of the pseudorandom corresponding to the user.
Step 107, above-mentioned steps are completed, then identifying code seed generates and loading procedure terminates.
Please refer to shown in Fig. 2, for the present invention in one embodiment using identifying code realize network data coding and The flow diagram in veritification stage.The coding of network data shown in Fig. 2 is specifically introduced below in conjunction with Fig. 3 and veritifies the stage, Include the following steps.
Step 201, start.
Step 202, the user data module 301 in client is that user prepares to need to carry out the use of safe coding and transmission User data.The user data includes being not limited to the files such as text, picture, audio, video, needs for these files to be first expressed as The data flow of binary stream, length are unlimited.
Step 203, client generates identifying code.By verifying code generator 302 according to the user's checking code having been loaded into Seed continuously generates the synchronous identifying code sequence of the corresponding pseudorandom of the user, wherein the synchronous identifying code sequence of the pseudorandom be by A series of pseudorandoms synchronous identifying code (identifying code can also be referred to as) composition.
As described above, the identifying code seed includes treaty rule, and the treaty rule includes each identifying code Length l, life span t and initial position p, range w and the mode q for being embedded in user data, to generate the corresponding puppet of the user Random synchronism identifying code sequence.Specifically, being generated according to the length l of the synchronous identifying code of each pseudorandom in the treaty rule Pseudorandom synchronizes identifying code sequence.It is determined according to the life span t of the synchronous identifying code of each pseudorandom in the treaty rule The synchronous identifying code of current pseudorandom whether still effectively, if in vain, will be next in the synchronous identifying code sequence of the pseudorandom The synchronous identifying code of a pseudorandom is as the synchronous identifying code of current pseudorandom.
Step 204, client is embedded in current verification code.By identifying code embedded device 303, generated in verifying code generator 302 The synchronous identifying code sequence of pseudorandom in, timing is carried out according to effective time of the timer 306 of client to identifying code, in institute When stating effective time in the life span t, determine that current verification code is before the deadline in the synchronous identifying code sequence of pseudorandom. If the effective time is more than the life span t, the identifying code is discarded, again from the synchronous identifying code sequence of pseudorandom It is middle to select next identifying code as the synchronous identifying code of current pseudorandom, and using the timer 306 of client to identifying code Effective time carries out reclocking.Current verification code before the deadline when, according to the insertion initial position of each identifying code, model It encloses and mode, in the user data that identifying code insertion user data module 301 is provided.
Step 205, client-side data cache is sent.It is responsible for that identifying code will be embedded in by Data Synthesis transmitter 305 The User ID of user data affix user, according to progress packet encapsulation, caching and transmission the case where transmission network.Specifically , it can be carried out data transmission by mobile data network, internet, local area network.
The client can be portable electronic device, such as mobile phone, tablet computer, laptop etc. or desk-top Computer etc..
From step 201 to step 205, this stage can also be referred to as network data coding method.
Step 206, server receives mask data.It is cached by the data receiver separator 308 of server and receives client The data packet sent is held, the user data of User ID and insertion identifying code is separated.
Step 207, server veritifies User ID.By data receiver separator 308 according to the User ID isolated in user It is retrieved in ID database 307, if there is the User ID, then gives the user data for being embedded in identifying code to identifying code and veritify Device 312 carries out veritification processing.Otherwise, then data are abandoned.
If there is the User ID, then the corresponding identifying code seed of the user identifier is found according to the user identifier, as above Described in text, the corresponding identifying code seed of the User ID is generated in advance according to the User ID of the user by server.
Step 208, server veritifies identifying code.It is similar with client, code generator 311 is verified according to the user identifier Corresponding identifying code seed generates the synchronous identifying code sequence of pseudorandom, wherein by each in the synchronous identifying code sequence of the pseudorandom The synchronous identifying code of pseudorandom is successively as the synchronous identifying code of current pseudorandom.There is treaty rule, institute in the identifying code seed State length l, the life span t and the initial position for being embedded in user data that treaty rule includes the synchronous identifying code of each pseudorandom P, range w and mode q.
Code generator 311 is verified according to the synchronous identifying code of each pseudorandom in the treaty rule in the identifying code seed Length l generate the synchronous identifying code sequence of pseudorandom.Identifying code verifier 312 is according to each pseudorandom in the treaty rule Whether still effectively the life span t of synchronous identifying code determines the synchronous identifying code of current pseudorandom, if in vain, by the puppet The synchronous identifying code of next pseudorandom in random synchronism identifying code sequence is as the synchronous identifying code of current pseudorandom.Specifically, also It needs to carry out timing to the effective time of identifying code according to the timer 309 of server, in the effective time in the existence When in time t, determine that current verification code is before the deadline in the synchronous identifying code sequence of pseudorandom.If the effective time is more than When the life span t, then the identifying code is discarded, selects next identifying code to make from the synchronous identifying code sequence of pseudorandom again Identifying code is synchronized for current pseudorandom, and carries out reclocking using effective time of the timer of server 309 to identifying code.
Identifying code verifier 312 synchronizes identifying code according to the current pseudorandom that verifying code generator 311 generates and its is embedding Initial position p, the range w of access customer data are with mode q to the synchronous identifying code of the insertion pseudorandom isolated from data packet User data is verified.
Step 209, server restoring user data.If identifying code verifier 312 is veritified successfully, by extracting verifying Code recovers original user data.If veritifying failure, the problems such as illustrating in transmission process, distort, forge or malfunction, Then abandon the user data.
Step 210, terminate.
It is network data checking method that step 206- step 209, which can be referred to as,.
It please refers to shown in Fig. 3, for the structure of the network data coding and Transmission system of the present invention in one embodiment Schematic diagram, system shown in Fig. 3 include that client (can also be referred to as network data code device) and server (can also be with Referred to as network data veritifies device) two component parts.
Wherein, client specifically includes user data module 301, verifying code generator 302, identifying code embedded device 303, uses Family ID generator 304, Data Synthesis transmitter 305 and timer 306.Server specifically includes User ID database 307, data It receives separator 308, timer 309, identifying code kind subpool 310, verifying code generator 311, identifying code verifier 312 and restores User data 313 out.
User data module 301 provides user and needs to carry out the data of safe coding and transmission, including is not limited to text, figure Piece, audio, video etc. can be expressed as the data of binary stream, and the value of length n is unlimited.
Code generator 302 is verified, according to the treaty rule in the corresponding identifying code seed of the user having been loaded into, continuously Generate the synchronous identifying code sequence of the corresponding pseudorandom of the user.Here identifying code treaty rule, the length including each identifying code Degree l, life span t and initial position p, range w and the mode q for being embedded in user data are arranged.Here identifying code Length l value is unlimited.Identifying code life span t refers to that the same identifying code can be reused, be embedded in multiple user data when Between, which is responsible for synchronous and timing with server timer 209 by client timer 306.In the life span of identifying code Once expired, then the identifying code fails, and regenerates a new identifying code by verifying code generator.The insertion start bit of identifying code P is set, can be any position of user data, is i.e. p can be the arbitrary value of 1~n.It is embedded in range w, refers to that needs are embedded in verifying The range of the user data of code, w can be the arbitrary value in 0~n.Embedded mode q refers to that identifying code and user data are transported The mode of calculation, including but not limited to plus (+), subtract the binary arithmetic operations such as (-), exclusive or ().
Identifying code embedded device 303, according to the insertion initial position of the current verification code of the verifying generation of code generator 302, model It encloses and mode, by the insertion user data 301 of current verification code.Meanwhile being fed back according to the timing of client timer 306, certainly Whether the fixed current verification code remains valid.If timing time (can also be referred to as effective time) is more than that life span t is arrived, The current verification code is then discarded, obtains a new current verification code from verifying code generator 302 again.
User ID generator 304 is responsible for generating the unique ID number of user according to the unique information of user in client, and Submit server, the duplicate checking in the User ID database 308 of server, it has been determined that whether the User ID can be used.Here user is only One information includes the hardware ID either client computer MAC Address etc. for being not limited to user name, client computer.
Data Synthesis transmitter 305 is responsible for that the ID of the user data and affix user of identifying code, root will be embedded in It needs to carry out packet encapsulation, caching and transmission according to transmission network.
Client timer 306 is responsible for carrying out time synchronization with server timer 309 in real time, and according to each current The life span of identifying code existence is arranged a timer and carries out countdown.The timer time arrives, then it is assumed that current verification code is It is expired, an identifying code is obtained as current verification code from new.
User ID database 307 provides ID for the ID number of registered users all in storage system, while to new user Duplicate checking function.
Data receiver separator 308 caches and receives the data packet that client is sent, and User ID and is embedded in identifying code User data is separated.And retrieved in User ID database 307 according to User ID, if there is the User ID, then The user data for being embedded in identifying code is given to identifying code verifier 312 to handle.
Server timer 309 is responsible for carrying out time synchronization with the timing of all clients in system, and according to each note The identifying code that volume user is being currently used is arranged individual timer and carries out countdown.If some timer time arrives, Notify identifying code verifier 312, the currently used identifying code of relative users out of date.
Identifying code kind subpool 310, a certain number of identifying code seeds of pre-generatmg, each identifying code seed have different pacts Then, the treaty rule includes length l, the life span t of each identifying code and the initial position for being embedded in user data to set pattern P, range w and mode q.
Code generator 311 is verified, it is similar with the effect of client validation code generator 302, according to each of having been loaded into Treaty rule in user's checking code seed continuously generates the synchronous identifying code sequence of corresponding with each user pseudorandom.
Identifying code verifier 312, according to verifying code generator 311 generate the corresponding each identifying code of each user and its It is embedded in initial position, range and mode, the user data for the insertion identifying code that data receiver separator 308 is separated is carried out Verification.If verification passes through, identifying code is extracted, original user data 313 is recovered.If in transmission process, distort, The problems such as forging or malfunctioning, then can validation failure.Meanwhile identifying code verifier is also needed according to server timer 309 Timing feedback, determines whether the current verification code continues to use.If timing time arrives, the identifying code is discarded, again from testing It demonstrate,proves code generator 311 and obtains a new identifying code corresponding to the user.
User data 313 is passed through by the veritification of identifying code verifier 311, extracts the user data recovered after identifying code, The user data 301 theoretically sent with client should be consistent.
It should be strongly noted that can be realized simultaneously the confidentiality, integrality and authenticity to data through the invention Multiple protective, can also be according to user's needs, neatly one or several aspects of selection protection data, favorable expandability.
It should be pointed out that any change that one skilled in the art does a specific embodiment of the invention All without departing from the range of claims of the present invention.Correspondingly, the scope of the claims of the invention is also not merely limited to In previous embodiment.

Claims (17)

1. a kind of network data coding method, characterized in that it comprises:
Need to carry out the user data of safe coding and transmission for user's preparation, the user has unique user identifier;
It is same that pseudorandom is generated according to the identifying code seed that the user identifier by server based on the user is user distribution Identifying code sequence is walked, wherein the synchronous identifying code sequence of the pseudorandom is made of a series of synchronous identifying code of pseudorandoms, by institute It states the synchronous identifying code of each pseudorandom in the synchronous identifying code sequence of pseudorandom and successively synchronizes identifying code as current pseudorandom;
The synchronous identifying code of current pseudorandom is embedded in the user data;
The user identifier of the user data for being embedded in the synchronous identifying code of pseudorandom and user is encapsulated as data packet and is sent to the clothes Business device.
2. network data coding method according to claim 1, which is characterized in that have agreement in the identifying code seed Rule, the treaty rule include length l, the life span t and insertion user data of the synchronous identifying code of each pseudorandom Initial position p, range w and mode q,
The synchronous identifying code sequence of pseudorandom is generated according to the length l of the synchronous identifying code of each pseudorandom in the treaty rule;
The synchronous verifying of current pseudorandom is determined according to the life span t of the synchronous identifying code of each pseudorandom in the treaty rule Whether code is still effective, if in vain, by the synchronous identifying code of next pseudorandom in the synchronous identifying code sequence of the pseudorandom As the synchronous identifying code of current pseudorandom;
According to initial position p, range w and the side of the insertion user data of the synchronous identifying code of pseudorandom each in the treaty rule The synchronous identifying code of current pseudorandom is embedded in the user data by formula q.
3. network data coding method according to claim 2, which is characterized in that continue to current pseudorandom identifying code Effective time carries out timing, when in the life span t, determines that current pseudorandom identifying code is still effective, is being more than described When in life span t, determine that current pseudorandom identifying code is invalid, by the synchronous identifying code sequence of the pseudorandom it is next it is pseudo- with The synchronous identifying code of machine counts the continuous and effective time of current pseudorandom identifying code as current pseudorandom identifying code, and again When.
4. network data coding method according to claim 2, which is characterized in that according to the side of the insertion user data The synchronous identifying code of current pseudorandom and the user data are carried out operation by formula q.
5. a kind of network data checking method, characterized in that it comprises:
The data packet sent from client is received, and the user identifier identifying code synchronous with insertion pseudorandom in the data packet User data separated;
It is retrieved in the subscriber identity data library of server according to the user identifier isolated;
It is same in server generation pseudorandom according to the corresponding identifying code seed of the user identifier if there is the user identifier Identifying code sequence is walked, wherein the synchronous identifying code sequence of the pseudorandom is made of a series of synchronous identifying code of pseudorandoms, by institute It is described successively as the synchronous identifying code of current pseudorandom to state the synchronous identifying code of each pseudorandom in the synchronous identifying code sequence of pseudorandom The corresponding identifying code seed of user identifier is distributed in advance according to the user identifier of the user by server;
It is synchronous to the insertion pseudorandom isolated from data packet based on the synchronous identifying code of current pseudorandom generated in server The user data of identifying code is verified, if after verification passes through, from the number of users of the synchronous identifying code of the insertion pseudorandom The user data is obtained according to middle recovery.
6. network data checking method according to claim 5, which is characterized in that have agreement in the identifying code seed Rule, the treaty rule include length l, the life span t and insertion user data of the synchronous identifying code of each pseudorandom Initial position p, range w and mode q,
Pseudorandom is generated in the server according to the length l of the synchronous identifying code of each pseudorandom in the treaty rule to synchronize Identifying code sequence;
Determine that current pseudorandom identifying code is according to the life span t of the synchronous identifying code of each pseudorandom in the treaty rule It is no still effectively, if in vain, using the synchronous identifying code of next pseudorandom in the synchronous identifying code sequence of the pseudorandom as Current pseudorandom synchronizes identifying code;
According to initial position p, range w and the side of the insertion user data of the synchronous identifying code of pseudorandom each in the treaty rule Formula q and the current pseudorandom generated in server synchronize identifying code to the same step of insertion pseudorandom isolated from data packet The user data of card code is verified.
7. network data checking method according to claim 5, which is characterized in that the synchronous identifying code of current pseudorandom The continuous and effective time carries out timing, when in the life span t, determines that the synchronous identifying code of current pseudorandom is still effective, When more than in the life span t, determine that the synchronous identifying code of current pseudorandom is invalid, it will be in the synchronous identifying code sequence of the pseudorandom The synchronous identifying code of next pseudorandom as the synchronous identifying code of current pseudorandom, and again to the synchronous identifying code of current pseudorandom The continuous and effective time carry out timing.
8. a kind of network data code device, characterized in that it comprises:
User data module, for needing to carry out the user data of safe coding and transmission for user's preparation, the user has Unique user identifier;
Code generator is verified, is the identifying code kind of user distribution according to the user identifier by server based on the user Son generates the synchronous identifying code sequence of pseudorandom, wherein the synchronous identifying code sequence of the pseudorandom is by a series of same step of pseudorandoms Code composition is demonstrate,proved, is successively used as current pseudorandom same the synchronous identifying code of each pseudorandom in the synchronous identifying code sequence of the pseudorandom Walk identifying code;
The synchronous identifying code of current pseudorandom is embedded in the user data by identifying code embedded device;
The user identifier of the user data for being embedded in the synchronous identifying code of pseudorandom and user is encapsulated as data by Data Synthesis transmitter Packet is sent to the server.
9. network data code device according to claim 8, which is characterized in that have agreement in the identifying code seed Rule, the treaty rule include length l, the life span t and insertion user data of the synchronous identifying code of each pseudorandom Initial position p, range w and mode q,
The verifying code generator generates pseudorandom according to the length l of the synchronous identifying code of each pseudorandom in the treaty rule Synchronous identifying code sequence;
The identifying code embedded device is worked as according to the life span t determination of the synchronous identifying code of each pseudorandom in the treaty rule The synchronous identifying code of preceding pseudorandom whether still effectively, if in vain, will be next in the synchronous identifying code sequence of the pseudorandom The synchronous identifying code of pseudorandom is as the synchronous identifying code of current pseudorandom;
Identifying code embedded device synchronizes the start bit of the insertion user data of identifying code according to pseudorandom each in the treaty rule Setting p, range w will be in the current pseudorandom synchronous identifying code insertion user data with mode q.
10. network data code device according to claim 9, which is characterized in that its further include:
Timer carries out timing to the continuous and effective time of the synchronous identifying code of current pseudorandom, when in the life span t, The verifying code generator determines that the synchronous identifying code of current pseudorandom is still effective, described when being more than in the life span t Verifying code generator determines that the synchronous identifying code of current pseudorandom is invalid, by next puppet in the synchronous identifying code sequence of the pseudorandom Random synchronism identifying code is as the synchronous identifying code of current pseudorandom, while the timer is again to the synchronous verifying of current pseudorandom The continuous and effective time of code carries out timing.
11. network data code device according to claim 9, which is characterized in that the identifying code embedded device is according to institute The synchronous identifying code of current pseudorandom and the user data are carried out operation by the mode q for stating insertion user data.
12. a kind of network data veritifies device, characterized in that it comprises:
Data receiver separator, for receiving the data packet sent from client, and in the data packet user identifier and The user data of the synchronous identifying code of insertion pseudorandom is separated;
Subscriber identity data library is retrieved in the subscriber identity data library of server according to the user identifier isolated;
Identifying code kind subpool device, is stored with multiple identifying code seeds, is user distribution according to the user identifier of the user One identifying code seed;
Code generator is verified, the synchronous identifying code sequence of pseudorandom is generated according to the corresponding identifying code seed of the user identifier, wherein The synchronous identifying code sequence of the pseudorandom is made of a series of synchronous identifying code of pseudorandoms, by the synchronous identifying code of the pseudorandom The synchronous identifying code of each pseudorandom is successively as the synchronous identifying code of current pseudorandom in sequence;
Identifying code checker, it is embedding to what is isolated from data packet based on the synchronous identifying code of current pseudorandom generated in server The user data for entering the synchronous identifying code of pseudorandom is verified, if after verification passes through, verified from the insertion pseudorandom is synchronous Restore to obtain the user data in the user data of code.
13. network data code device according to claim 12, which is characterized in that have about in the identifying code seed Then, the treaty rule includes length l, the life span t and insertion user data of the synchronous identifying code of each pseudorandom to set pattern Initial position p, range w and mode q,
Pseudorandom is generated in the server according to the length l of the synchronous identifying code of each pseudorandom in the treaty rule to synchronize Identifying code sequence;
The synchronous verifying of current pseudorandom is determined according to the life span t of the synchronous identifying code of each pseudorandom in the treaty rule Whether code is still effective, if in vain, by the synchronous identifying code of next pseudorandom in the synchronous identifying code sequence of the pseudorandom As the synchronous identifying code of current pseudorandom;
According to initial position p, range w and the side of the insertion user data of the synchronous identifying code of pseudorandom each in the treaty rule Formula q and the current pseudorandom generated in server synchronize identifying code to the same step of insertion pseudorandom isolated from data packet The user data of card code is verified.
14. network data according to claim 12 veritifies device, which is characterized in that it further includes having timer, is used Timing is carried out in the continuous and effective time to the synchronous identifying code of current pseudorandom,
When in the life span t, the verifying code generator determines that the synchronous identifying code of current pseudorandom is still effective, super When crossing in the life span t, the verifying code generator determines that the synchronous identifying code of current pseudorandom is invalid, by the pseudorandom The synchronous identifying code of next pseudorandom in synchronous identifying code sequence synchronizes identifying code, while the timer as current pseudorandom Again timing is carried out to the continuous and effective time of the synchronous identifying code of current pseudorandom.
15. a kind of network data transmission method, characterized in that it comprises: network data coding method and network data verification Method,
The network data coding method includes:
It is the user data that user's preparation needs to carry out safe coding and transmission in client, the user has unique user Mark;
It is generated in client according to the identifying code seed that the user identifier by server based on the user is user distribution Pseudorandom synchronizes identifying code sequence, wherein the synchronous identifying code sequence of the pseudorandom is by a series of synchronous verifying code character of pseudorandoms At by the synchronous identifying code of each pseudorandom in the synchronous identifying code sequence of the pseudorandom successively as the synchronous verifying of current pseudorandom Code;
The synchronous identifying code of current pseudorandom is embedded in the user data in client;
The user identifier of the user data for being embedded in the synchronous identifying code of pseudorandom and user data packet is encapsulated as in client to send To server;
The network data method of calibration includes:
The data packet sent from client is received, and the user identifier identifying code synchronous with insertion pseudorandom in the data packet User data separated;
It is retrieved in the subscriber identity data library of server according to the user identifier isolated in the server;
In the server, the synchronous identifying code of pseudorandom is generated in the server according to the corresponding identifying code seed of the user identifier Sequence, wherein the synchronous identifying code sequence of the pseudorandom is made of a series of synchronous identifying code of pseudorandoms, by the pseudorandom The synchronous identifying code of each pseudorandom is successively as the synchronous identifying code of current pseudorandom in synchronous identifying code sequence, wherein the user Identifying corresponding identifying code seed is distributed in advance according to the user identifier of the user by server;
It is synchronous to the insertion pseudorandom isolated from data packet by the synchronous identifying code of the current pseudorandom generated in server The user data of identifying code is verified, if after verification passes through, from the user data of the synchronous identifying code of the insertion pseudorandom Middle recovery obtains the user data.
16. network data transmission method according to claim 15, which is characterized in that
There is treaty rule, the treaty rule includes every in the identifying code seed in the server and the client Length l, the life span t of the synchronous identifying code of a pseudorandom and initial position p, range w and the mode q for being embedded in user data,
The server and the client are generated according to the length l of the synchronous identifying code of each pseudorandom in the treaty rule Pseudorandom synchronizes identifying code sequence;
The life according to the synchronous identifying code of each pseudorandom in the treaty rule of the server and the client synchronization Deposit whether still effectively time t determines the synchronous identifying code of current pseudorandom, if in vain, by the synchronous identifying code of the pseudorandom The synchronous identifying code of next pseudorandom in sequence is as the synchronous identifying code of current pseudorandom;
The client synchronizes the initial position of the insertion user data of identifying code according to pseudorandom each in the treaty rule P, the synchronous identifying code of current pseudorandom is embedded in the user data by range w and mode q,
The server synchronizes the initial position of the insertion user data of identifying code according to pseudorandom each in the treaty rule P, the synchronous identifying code of the current pseudorandom that range w is generated with mode q and in the server is embedding to what is isolated from data packet The user data for entering the synchronous identifying code of pseudorandom is verified.
17. network data transmission method according to claim 16, which is characterized in that
When the timer synchronization of timer and client in server synchronizes the continuous and effective of identifying code to current pseudorandom Between carry out timing, when in the life span t, determine that the synchronous identifying code of current pseudorandom is still effective, be more than the life When depositing in time t, determine that the synchronous identifying code of current pseudorandom is invalid, by next puppet in the synchronous identifying code sequence of the pseudorandom Random synchronism identifying code synchronizes the continuous and effective of identifying code as the synchronous identifying code of current pseudorandom to current pseudorandom again Time carries out timing.
CN201610466589.3A 2016-06-23 2016-06-23 Network data coding method, device, checking method, device and transmission method Active CN106209772B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610466589.3A CN106209772B (en) 2016-06-23 2016-06-23 Network data coding method, device, checking method, device and transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610466589.3A CN106209772B (en) 2016-06-23 2016-06-23 Network data coding method, device, checking method, device and transmission method

Publications (2)

Publication Number Publication Date
CN106209772A CN106209772A (en) 2016-12-07
CN106209772B true CN106209772B (en) 2019-03-22

Family

ID=57460944

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610466589.3A Active CN106209772B (en) 2016-06-23 2016-06-23 Network data coding method, device, checking method, device and transmission method

Country Status (1)

Country Link
CN (1) CN106209772B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108521645A (en) * 2018-03-26 2018-09-11 上海康斐信息技术有限公司 A kind of auth method, system and control system based on identifying code
CN110941805B (en) * 2019-11-21 2022-06-10 北京达佳互联信息技术有限公司 Identity authentication method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1346189A (en) * 2000-09-30 2002-04-24 华为技术有限公司 Doppler small wave base based self-adaptive coherent interference suppression method
CN1564506A (en) * 2004-04-09 2005-01-12 中兴通讯股份有限公司 Following route clock transmitter of high speed serial data
CN103150228A (en) * 2013-02-22 2013-06-12 中国人民解放军国防科学技术大学 Synthesizable pseudorandom verification method and device for high-speed buffer memory
CN105024790A (en) * 2014-04-28 2015-11-04 上海朗帛通信技术有限公司 Communication method on unauthorized frequency band and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1346189A (en) * 2000-09-30 2002-04-24 华为技术有限公司 Doppler small wave base based self-adaptive coherent interference suppression method
CN1564506A (en) * 2004-04-09 2005-01-12 中兴通讯股份有限公司 Following route clock transmitter of high speed serial data
CN103150228A (en) * 2013-02-22 2013-06-12 中国人民解放军国防科学技术大学 Synthesizable pseudorandom verification method and device for high-speed buffer memory
CN105024790A (en) * 2014-04-28 2015-11-04 上海朗帛通信技术有限公司 Communication method on unauthorized frequency band and device

Also Published As

Publication number Publication date
CN106209772A (en) 2016-12-07

Similar Documents

Publication Publication Date Title
US9430655B1 (en) Split tokenization
TW202011246A (en) Blockchain-based transaction consensus processing method and apparatus, and electronic device
CN106850603B (en) White-box password bidirectional identity authentication method, terminal, server and system
CN106357396A (en) Digital signature method, digital signature system and quantum key card
CN109257346B (en) Concealed transmission system based on block chain
CN105812366B (en) Server, anti-crawler system and anti-crawler verification method
EP3289723A1 (en) Encryption system, encryption key wallet and method
CN110969431B (en) Secure hosting method, device and system for private key of blockchain digital coin
CN110838912B (en) Block chain-based key management method, device, equipment and computer medium
CN106612320A (en) Encrypted data dereplication method for cloud storage
CN103457733A (en) Data sharing method and system under cloud computing environment
CN111339199B (en) Block chain key recovery method and device
CN107171796A (en) A kind of many KMC key recovery methods
CN104836656B (en) A kind of storage of video file and transmission method
CN106330465A (en) Processing method, server and system for distributed timestamp
CN111211905A (en) Identity management method for Fabric alliance chain members based on certificate-free authentication
CN106209772B (en) Network data coding method, device, checking method, device and transmission method
CN115134087A (en) Client security data deduplication method for decentralized cloud storage
GB2488753A (en) Encrypted communication
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
CN105162592B (en) A kind of method and system of certification wearable device
CN108418679A (en) The method, apparatus and electronic equipment of key are handled under a kind of multiple data centers
CN116743713B (en) Remote online paperless conference method and device based on Internet of things
CN117688604A (en) Privacy set intersection method, device and storage medium in smart city system
CN108494552B (en) Cloud storage data deduplication method supporting efficient convergence key management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant