CN106921488A - A kind of label data encryption method and label data decryption method - Google Patents

A kind of label data encryption method and label data decryption method Download PDF

Info

Publication number
CN106921488A
CN106921488A CN201510994479.XA CN201510994479A CN106921488A CN 106921488 A CN106921488 A CN 106921488A CN 201510994479 A CN201510994479 A CN 201510994479A CN 106921488 A CN106921488 A CN 106921488A
Authority
CN
China
Prior art keywords
data
mapping
mapping table
label
data field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510994479.XA
Other languages
Chinese (zh)
Other versions
CN106921488B (en
Inventor
杨硕
邵波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201510994479.XA priority Critical patent/CN106921488B/en
Publication of CN106921488A publication Critical patent/CN106921488A/en
Application granted granted Critical
Publication of CN106921488B publication Critical patent/CN106921488B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to data security arts, a kind of label data encryption method and label data decryption method are disclosed, the label data encryption method includes:Data are divided at least one data field according to predetermined length;The data of the data field are encrypted by protecting key K1;And the data of encrypted data field are mapped according to mapping table to form data ciphertext, the complexity and cost for so reducing label in turn ensure that the security of label.

Description

A kind of label data encryption method and label data decryption method
Technical field
The present invention relates to data security arts, in particular it relates to a kind of label data encryption method and label Data decryption method.
Background technology
Radio frequency identification (RFID) technology is a kind of wireless communication technology, can be recognized by radio signals special Set the goal and read and write related data, and without set up between identifying system and specific objective Mechanical Contact or Optical contact.The most important advantage of RFID technique is contactless identification, it can penetrate snow, mist, ice, The adverse circumstances label reading that coating, dust and dirt and bar code cannot be used, and reading rate is exceedingly fast, greatly In most cases less than 100 milliseconds.In addition, it also has that data capacity is big, long service life, mark The advantages of label data can be changed dynamically.Therefore electronic tag be widely used in gate inhibition identification, electronics trace to the source, The fields such as foodstuff traceability, product false proof.
While being widely used, the potential safety hazard related to label is also produced therewith.At present, safety Problem has turned into one of principal element of restriction RFID technique popularization and application, wherein, private data guard It is the significant challenge faced in RFID evolutions to topic.
Increasing businessman and user worry the safety problem and Privacy Protection of rfid system, i.e., Its security and privacy how are ensured during using rfid system, and is unlikely to cause personal letter The loss of breath, business information and property etc. is usurped by other people.It is contemplated that if label is under attack, Cause private leaking data, it is more likely that produce immeasurable loss.But during label is rfid system In being easily exposed to by attack context, so being one of RFID security to the protection of label data Important directions.
RFID label tag framework is generally divided into two kinds.A kind of RFID label tag framework uses special label core Piece, it has been internally integrated special labeling algorithm, and storage region is divided into some, including Key zone, control of authority area and general memory area, sensitizing range therein use hardware protection, thus cannot Key data is directly read, key only carries out computing and calls inside processor, it is ensured that data safety. This RFID label tag framework is commonly used in the field higher to information security requirement.Another RFID Tag architecture is not having only with a general processor and a storage chip (abbreviation CPU+Flash) There is the data protection measure of hardware, only tag ID is write in the way of One Time Programmable (OTP) Can not change, be commonly used in the less sensitive field of data message.
Although the framework security of the first RFID label tag is higher, however it is necessary that special label chip and Hardware security module, thus increased the complexity and cost of label;Although second RFID label tag knot Structure is simple, but security is relatively low.
The content of the invention
It is an object of the invention to provide a kind of label data encryption method and label data decryption method, the mark It is that the complexity and cost for reducing label ensure again to sign data ciphering method and label data decryption method The security of label.
To achieve these goals, the present invention provides a kind of label data encryption method, the label data Encryption method includes:Data are divided at least one data field according to predetermined length;By protecting key K1 is encrypted to the data of the data field;And according to mapping table to the number of encrypted data field Data ciphertext is formed according to being mapped.
Preferably, it is described the data of encrypted data field to be mapped according to mapping table form data Ciphertext includes:The data of encrypted data field are mapped according to mapping table M2;And according to reflecting The data of data fields of the firing table M1 to being mapped by the mapping table M2 map.
Preferably, it is described mapping is carried out to the data of encrypted data field according to mapping table M2 to include: The data of the encrypted data field are mapped according to predetermined bit mapping;And/or the basis is reflected The data of data fields of the firing table M1 to being mapped by the mapping table M2 carry out mapping to be included:According to pre- Determine area's mapping to map the data of the data field mapped by the mapping table M2.
Preferably, the label data encryption method also include it is following at least one:According to first it is random because Sub- R1 generates the mapping table M1;And the mapping table M2 is generated according to the second random factor R2.
Preferably, the factor generates the first random factor R1 and described based on the ID of the label Second random factor R2.
Preferably, the predetermined length is 16 bytes.
Correspondingly, a kind of label data decryption method, the label data decryption method includes:According to pre- Data are divided at least one data field by measured length;According to the mapping table for encrypting to the data field Data carry out inverse mapping;And by protecting key K1 to the number of the data field by inverse mapping According to being decrypted.
Preferably, the mapping table that the basis is used to encrypt carries out inverse mapping bag to the data of the data field Include:Inverse mapping is carried out to the data of the data field according to the mapping table M1 for encrypting;And according to Mapping table M2 for encrypting enters to the data of the data field according to the mapping table M1 inverse mappings Row inverse mapping.
Preferably, the mapping table M1 that the basis is used to encrypt carries out inverse reflecting to the data of the data field Penetrate including:Inverse mapping is carried out to the data of the data field according to the fate mapping for encrypting.
Preferably, the basis is used for the mapping table M2 for encrypting to according to the mapping table M1 inverse mappings The data of the data field carry out inverse mapping and include:Mapped to basis according to the predetermined bit for encrypting The data of the data field of the mapping table M1 inverse mappings carry out inverse mapping.
By above-mentioned technical proposal, it is encrypted by protecting the data of data fields of the key K1 to dividing, Then the data of encrypted data field are mapped according to mapping table to form data ciphertext, so i.e. The complexity and cost for reducing label in turn ensure that the security of label.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Brief description of the drawings
Accompanying drawing is, for providing a further understanding of the present invention, and to constitute the part of specification, with Following specific embodiment is used to explain the present invention together, but is not construed as limiting the invention. In accompanying drawing:
Fig. 1 is the flow chart of the label data encryption method provided according to the present invention;
Fig. 2 gives the signal mapped according to predetermined bit provided according to one embodiment of the present invention Figure;
Fig. 3 gives the schematic diagram mapped according to fate provided according to one embodiment of the present invention;
Fig. 4 is the flow chart of the label data encryption method provided according to one embodiment of the present invention;
Fig. 5 is the flow chart of the label data decryption method provided according to the present invention;And
Fig. 6 is the flow chart of the label data decryption method provided according to one embodiment of the present invention.
Specific embodiment
Specific embodiment of the invention is described in detail below in conjunction with accompanying drawing.It should be appreciated that Specific embodiment described herein is merely to illustrate and explain the present invention, and is not limited to this hair It is bright.
Fig. 1 is the flow chart of the label data encryption method provided according to the present invention.As shown in figure 1, Data are divided at least one data field by step 10 place according to predetermined length (for example, 16 bytes); At step 11, the data of the data field are encrypted by protecting key K1;And in step At 12, the data of encrypted data field are mapped according to mapping table form data ciphertext.So The complexity and cost for reducing label in turn ensure that the security of label.
Wherein, it is described that according to mapping table the data of encrypted data field are mapped with close to form data Text includes:The data of encrypted data field are mapped according to mapping table M2;And according to mapping The data of data fields of the table M1 to being mapped by the mapping table M2 map.By mapping table M1 and the dual of mapping table M2 are obscured, and significantly reduce the successful possibility of Brute Force.
It is described mapping is carried out to the data of encrypted data field according to mapping table M2 to include:According to predetermined Bit map is mapped the data of the encrypted data field, for example, reflect the data of the first bit The 8th bit is incident upon, the data of the second bit map to the 3rd bit ..., and certain present invention is not intended to limit In this, those skilled in the art can arbitrarily set mapping relations.Fig. 2 is given according to of the invention a kind of The schematic diagram mapped according to predetermined bit that implementation method is provided, as shown in Fig. 2 being reflected according to predetermined bit The data for penetrating bit before mapping are mapped to after corresponding mapping in bit, it should be understood that this area Technical staff can complete the present invention according to the bit map of any setting.And/or it is described according to mapping table The data of data fields of the M1 to being mapped by the mapping table M2 carry out mapping to be included:According to fate Map and the data of the data field mapped by the mapping table M2 are mapped, such as by address Data in 1 map to address 4, and the data in address 2 are mapped in address 11 ..., certainly originally Invention is not restricted to this, and those skilled in the art can arbitrarily set mapping relations.Fig. 3 gives root The schematic diagram mapped according to fate provided according to one embodiment of the present invention, as shown in figure 3, according to Fate mapping maps to the data for mapping preceding data field in the data in corresponding mapped data area, should It should be appreciated that, those skilled in the art can complete the present invention according to the bit map of any setting.
Wherein, the label data encryption method also include it is following at least one:According to the first random factor R1 generates the mapping table M1;And the mapping table M2 is generated according to the second random factor R2. The factor the first random factor R1 and described second random can be generated based on the ID of the label Factor R 2.
The tag encryption method that the present invention is provided can be used with processor (CPU) and memory (Flash) in label, it is thus possible to keeping that versatility is good, range of choice big, using flexibly, deposit On the basis of reserves are big, it is ensured that the security of label data.In the framework of this RFID label tag, CPU is responsible for implementing and enciphering and deciphering algorithm for label function, and stores all of number in Flash parts According to the data such as including sensitive key.In logic level, storage region can be divided into key zone, power Limit control zone, general memory area, wherein what key zone was stored is key and the communication of regional encryption and decryption The key wanted needed for flow, and control of authority area is the encryption storage that could enter with corresponding authority Area.The position in key zone and control of authority area is relatively fixed, if not using physical protection, it is likely that quilt Violence reads all initial data, is eventually cracked and obtains sensitive information.However, being carried using the present invention The encryption method and decryption method of confession can then be greatly enhanced the difficulty of Brute Force completely.
Below through describing the present invention in detail by specific embodiment, it is noted that this hair It is bright to be not restricted to this.
When label dispatches from the factory can not built-in key, when initial distribution, data are generated at random Protection key K1;And based on tag ID the factor (tag ID is not repeated uniquely), generation first with The random factor R2 of machine factor R 1 and second, and data mapping tables are generated according to the first random factor R1 M1, data mapping tables M2 is generated according to the second random factor R2.Mapping table M1 is by mixed preceding data Area A (n) (the preceding data field of mapping) and mixed rear data field A ' (n) (mapped data area) composition, with every Individual address storage 1K data are defined, the length representative of n ciphertext limiting value.
Mapping table M1 is known as one-level mapping table, and mapping table M2 is known as two grades of mapping tables. Whole memory block carries out subregion according to memory characteristics, and in general every 16 byte is divided into an area (sector), n sector constitutes whole memory block.Mapping table M1 is virtual area reflecting to physical areas Penetrate.M2 tables are the mappings of virtual bit to physics bit in 1 sector.Mapping table is given birth to based on random number Into.Of course, it is possible to above-mentioned divided area is set as into corresponding address, Ji Yige areas one ground of correspondence Location.
Label data encryption flow of the invention is described in detail below with reference to Fig. 4.
As shown in figure 4, at step 41, random generation protection key K1, based on tag ID The factor generates the first random factor R1 and the second random factor R2, then generates mapping table according to R1 M1 simultaneously generates mapping table M2 according to R2;
At step 42, label data is divided into multiple data field d1, d1 to dn according to 16 bytes;
At step 43, the data of each data field d1, d1 to dn are added using key is protected It is close, obtain e1=K1 (d1), e2=K1 (d2), en=K1 (dn), and the total data after being encrypted E=e1+e2+ ...+en;
At step 44, judge whether the data encryption success of all data fields, gone to if success Step 45;
At step 45, e1 to en is mapped according to mapping table M2, in this embodiment, Each data field is 16 bytes, 128, is obscured this 128 data according to mapping table M2, Data e1', e2' ... en' after being mapped, if mapped successfully, goes to step 46 place;
At step 46, according to mapping table M1 to e1', e2' ..., en' maps, by each data field Obscured;
At step 47, the final data for obtaining are write into physical layer, complete label data encryption.
In this way, then label data is mapped twice by encryption by privately owned mapping table, thus cruelly It is very low that power cracks that successful possibility can drop.If in addition, it is to be noted that label data Length is not the integral multiple of predetermined length, in ciphering process, by its polishing, and can be arranged to be supplemented Data be invalid data, so that the data that will can be supplemented after decrypting are abandoned.
Correspondingly, corresponding with above-mentioned label data encryption method, the present invention also provides a kind of label data Decryption method, Fig. 5 is the flow chart of the label data decryption method provided according to the present invention.Such as Fig. 5 institutes Show, at step 50, data are divided at least one data field according to predetermined length;In step 51 The data of the data field are carried out inverse mapping by place according to the mapping table for encrypting;And in step 52 The data of the data field by inverse mapping are decrypted by place by protecting key K1.
The present invention is described in detail by specific embodiment below with reference to Fig. 6, it should be noted that It is that the present invention is not restricted to this.
Fig. 6 is the flow chart of the label data decryption method provided according to one embodiment of the present invention.
As shown in fig. 6, at step 61, the label data of reading is divided into multiple according to 16 bytes Data field;
At step 62, mapping table M1, mapping table M2, protection key K1 are obtained;
At step 63, the data of the data field are carried out according to the mapping table M1 for encrypting inverse Mapping, for example, carry out inverse mapping according to the fate mapping for encrypting to the data of the data field;
At step 64, according to the mapping table M2 for encrypting to reflecting according to the mapping table M1 is inverse The data of the data field penetrated carry out inverse mapping, for example, right according to the predetermined bit mapping for encrypting The data of the data field according to the mapping table M1 inverse mappings carry out inverse mapping, if all data The data inverse in area maps successfully, then go to step 65 place;
At step 65, the data of the data field by inverse mapping are carried out by protecting key K1 Decryption, after the data deciphering success of all data fields, completes the reduction of data.
In order to ensure the security of data to a greater extent, the term of validity of protection key K1 can be set, faced New protection key K2 can be generated when closely expiring, while pointing out to change protection key, at this moment will can be made The data encrypted with protection key K1 are backed up and change protection key again.Change the cycle of protection key Can be modified according to the sensitiveness of data.
The label data encipher-decipher method that the present invention is provided can be taken using ordinary processor and memory In the case of the label built, data are carried out with encryption and decryption using privately owned algorithm, and using many in terms of storage The method for remapping, is broken up and has been obscured to ciphertext using privately owned mapping table table, is effectively reduced The success rate of brute force attack.When label is initially issued, using random factor, can effectively prevent Attack so that label has the advantage that coupling is low, ease for use is good, safe.
The preferred embodiment of the present invention is described in detail above in association with accompanying drawing, but, the present invention is not limited Detail in above-mentioned implementation method, in range of the technology design of the invention, can be to the present invention Technical scheme carry out various simple variants, these simple variants belong to protection scope of the present invention.
It is further to note that each particular technique described in above-mentioned specific embodiment is special Levy, in the case of reconcilable, can be combined by any suitable means, in order to avoid need not The repetition wanted, the present invention is no longer separately illustrated to various possible combinations.
Additionally, can also be combined between a variety of implementation methods of the invention, as long as its Without prejudice to thought of the invention, it should equally be considered as content disclosed in this invention.

Claims (10)

1. a kind of label data encryption method, it is characterised in that the label data encryption method includes:
Data are divided at least one data field according to predetermined length;
The data of the data field are encrypted by protecting key K1;And
The data of encrypted data field are mapped according to mapping table form data ciphertext.
2. label data encryption method according to claim 1, it is characterised in that the basis Mapping table is mapped the data of encrypted data field to be included with forming data ciphertext:
The data of encrypted data field are mapped according to mapping table M2;And
The data of the data field according to mapping table M1 to being mapped by the mapping table M2 map.
3. label data encryption method according to claim 2, it is characterised in that
It is described mapping is carried out to the data of encrypted data field according to mapping table M2 to include:According to predetermined Bit map is mapped the data of the encrypted data field;And/or
The data of the data field according to mapping table M1 to being mapped by the mapping table M2 are reflected Penetrate including:The data of the data field mapped by the mapping table M2 are entered according to fate mapping Row mapping.
4. label data encryption method according to claim 2, it is characterised in that the label Data ciphering method also include it is following at least one:
The mapping table M1 is generated according to the first random factor R1;And
The mapping table M2 is generated according to the second random factor R2.
5. label data encryption method according to claim 4, it is characterised in that with the mark The factor generates the first random factor R1 and the second random factor R2 based on the ID of label.
6. label data encryption method according to any one of claim 1 to 5, its feature exists In the predetermined length is 16 bytes.
7. a kind of label data decryption method, it is characterised in that the label data decryption method includes:
Data are divided at least one data field according to predetermined length;
Inverse mapping is carried out to the data of the data field according to the mapping table for encrypting;And
The data of the data field by inverse mapping are decrypted by protecting key K1.
8. label data decryption method according to claim 7, it is characterised in that the basis Mapping table for encrypting carries out inverse mapping to the data of the data field to be included:
Inverse mapping is carried out to the data of the data field according to the mapping table M1 for encrypting;And
According to the mapping table M2 for encrypting to the data field according to the mapping table M1 inverse mappings Data carry out inverse mapping.
9. label data decryption method according to claim 8, it is characterised in that the basis Mapping table M1 for encrypting carries out inverse mapping to the data of the data field to be included:According to for encrypting Fate mapping inverse mapping is carried out to the data of the data field.
10. label data decryption method according to claim 8 or claim 9, it is characterised in that described According to the mapping table M2 for encrypting to the number of the data field according to the mapping table M1 inverse mappings Include according to inverse mapping is carried out:Mapped to inverse according to the mapping table M1 according to the predetermined bit for encrypting The data of the data field of mapping carry out inverse mapping.
CN201510994479.XA 2015-12-25 2015-12-25 Label data encryption method and label data decryption method Active CN106921488B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510994479.XA CN106921488B (en) 2015-12-25 2015-12-25 Label data encryption method and label data decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510994479.XA CN106921488B (en) 2015-12-25 2015-12-25 Label data encryption method and label data decryption method

Publications (2)

Publication Number Publication Date
CN106921488A true CN106921488A (en) 2017-07-04
CN106921488B CN106921488B (en) 2020-07-28

Family

ID=59455204

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510994479.XA Active CN106921488B (en) 2015-12-25 2015-12-25 Label data encryption method and label data decryption method

Country Status (1)

Country Link
CN (1) CN106921488B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995433A (en) * 2019-10-28 2020-04-10 北京三快在线科技有限公司 Data encryption method and device, electronic equipment and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080285747A1 (en) * 2007-05-14 2008-11-20 Samsung Electronics Co., Ltd. Encryption-based security protection method for processor and apparatus thereof
CN102904712A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Information encrypting method
CN103199995A (en) * 2013-04-26 2013-07-10 福建伊时代信息科技股份有限公司 File encryption method and device
CN104462994A (en) * 2014-11-25 2015-03-25 厦门市美亚柏科信息股份有限公司 Data encryption and decryption operation method
CN104680474A (en) * 2015-02-04 2015-06-03 四川长虹电器股份有限公司 Digital image encryption and decryption method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080285747A1 (en) * 2007-05-14 2008-11-20 Samsung Electronics Co., Ltd. Encryption-based security protection method for processor and apparatus thereof
CN102904712A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Information encrypting method
CN103199995A (en) * 2013-04-26 2013-07-10 福建伊时代信息科技股份有限公司 File encryption method and device
CN104462994A (en) * 2014-11-25 2015-03-25 厦门市美亚柏科信息股份有限公司 Data encryption and decryption operation method
CN104680474A (en) * 2015-02-04 2015-06-03 四川长虹电器股份有限公司 Digital image encryption and decryption method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995433A (en) * 2019-10-28 2020-04-10 北京三快在线科技有限公司 Data encryption method and device, electronic equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN106921488B (en) 2020-07-28

Similar Documents

Publication Publication Date Title
EP3917075B1 (en) Method and apparatus for encrypting and decrypting product information
JP5924851B2 (en) Multi-issuer secure element partition architecture for NFC-enabled devices
US9811478B2 (en) Self-encrypting flash drive
CN104217327B (en) A kind of financial IC card internet terminal and its method of commerce
CN1740991B (en) System and method for using address bits to signal security attributes of data in the address space
KR100961737B1 (en) Method for accessing information on object having tag, local server, ons proxy, program, tag creation method, device having tag writer, tag, and program for controlling device having tag writer
US11269786B2 (en) Memory data protection based on authenticated encryption
US20080297326A1 (en) Low Cost RFID Tag Security And Privacy System And Method
EP1894148B1 (en) Transponder system for transmitting key-encrypted information and associated keys
CN103326864B (en) A kind of electronic tag anti-fake authentication method
CN103281299B (en) A kind of ciphering and deciphering device and information processing method and system
CN103338110B (en) RFID safety authentication based on dynamic I D band search key
RU2010105691A (en) METHOD FOR ENCRYPTING A MEMORY CARD AND ASSEMBLY FOR ITS IMPLEMENTATION
CN102662874B (en) Double-interface encryption memory card and management method and system of data in double-interface encryption memory card
CN105205416A (en) Mobile hard disk password module
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system
CN103455768B (en) A kind of USB method for secure storing and system
CN106921488A (en) A kind of label data encryption method and label data decryption method
US8320570B2 (en) Apparatus and method for generating secret key
CN101795194B (en) Method for protecting multi-digital certificate of intelligent card
CN207475576U (en) A kind of safety mobile terminal system based on safety chip
CN106778939A (en) Electronic tag sensor-based system
CN102456119A (en) One-time key scheme used for RFID digital certificate
KR20170053056A (en) Security server using case based reasoning engine and storage medium for installing security function
KR20040092669A (en) A rfid terminal and a tag with security function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant