CN109743171A - It is a kind of to solve multiple party digital signatures, timestamp and the key series connection method of encryption - Google Patents
It is a kind of to solve multiple party digital signatures, timestamp and the key series connection method of encryption Download PDFInfo
- Publication number
- CN109743171A CN109743171A CN201811485865.6A CN201811485865A CN109743171A CN 109743171 A CN109743171 A CN 109743171A CN 201811485865 A CN201811485865 A CN 201811485865A CN 109743171 A CN109743171 A CN 109743171A
- Authority
- CN
- China
- Prior art keywords
- encryption
- file
- key
- paper sample
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention discloses a kind of solution multiple party digital signatures, timestamp and the key series connection method of encryption, the public key including private key and decrypted private key;Detailed process includes that a. calls function module to carry out operation to paper sample is executed, and generates an operation information;B. generation signature file is digitally signed to execution paper sample and its operation information using signature blocks;C. encryption is carried out to signature file with a private key and generates encryption file;D. transmission encryption file;E. receive encryption file, and use public key decryptions, call function module verifying operation information, the encryption file being proved to be successful is as new execution paper sample;F. above-mentioned a, b step are repeated to new execution paper sample, forms new signature file.The present invention solves the technical issues of cannot achieve multi-party common signature easily and effectively in the prior art.
Description
Technical field
The present invention relates to a kind of secrecy and secure communications, in particular to a kind of solution multiple party digital signatures, timestamp
And the key series connection method of encryption.
Background technique
Digital signature (also known as public key digital signature, Electronic Signature) is a kind of similar common physics label write on paper
Name, but the technology in public key encryption field has been used to realize, the method for identifying digital information.A set of digital signature is usually fixed
Adopted two kinds of complementary operations, one is used to sign, another is for verifying.Digital signature is exactly sender's ability of only information
Others the number of segment word string that can not forge that can be generated, this number of segment word string is also to send information truth to the sender of information simultaneously
One valid certificates of property.
Briefly, so-called digital signature is just attached to some data in data cell, or to data cell institute
The cryptographic transformation of work.This data or transformation allow source and data sheet of the recipient of data cell to confirm data cell
The integrality of member simultaneously protects data, prevents from being forged by people (such as recipient).It is signed to the message of electronic form
A kind of method of name, a signature information can be transmitted in a communication network.Based on public-key cryptosystem and private key cryptographic body
System can obtain digital signature, be mainly based upon the digital signature of public-key cryptosystem.It signs including ordinary numbers and special
Digital signature.Ordinary numbers signature algorithm have RSA, ElGamal, Fiat-Shamir, Guillou-Quisquarter,
Schnorr, Ong-Schnorr-Shamir Digital Signature Algorithm, Des/DSA, elliptic curve digital signature algorithm and finite automaton
Machine digital signature algorithm etc..Special number signature has Proxy Signature, allograph, group ranking, undeniable signature, Fair Blind label
Name, Threshold Signature, signature with Message Recovery etc., it is closely related with specific application environment.
Specifically, digital signature technology is the private key encryption by summary info with sender, sent to together with original text
Recipient.Recipient only uses the public key of sender that could decrypt encrypted summary info, then with HASH function to receiving
Original text generate a summary info, compared with the summary info of decryption.If identical, illustrate that the information received is complete
, it is not modified in transmission process, otherwise illustrates that information is modified, therefore digital signature is able to verify that the complete of information
Property.Digital signature is a process for encryption, and digital signature authentication is a process for decryption.
Digital signature has non-repudiation, is the core technology in electronic contract field, by using number in different links
Word signature realize electronic contract data encryption, with ensure its can not distort, it is legal credible.Effect that there are two digital signature, one
Can determine that message be strictly signed and issued by sender, second is that digital signature can determine that electronic message content whether by
It distorts, guarantees the integrality of message.Digital signature can guarantee information transmission integrality, sender authentication, prevent from handing over
Denial in easily occurs.
So-called group ranking (group signature) is exactly to meet the signature required in this way: in a group signature scheme,
Any one member in one group can represent entire group in a manner of anonymous and sign to message.With other numbers
Signature is the same, and group ranking can be disclosed and be verified, and can only be verified with single group's public key.It can also be used as group mark
To show the main application of group, type etc..Either single signature or group ranking at present, are substantially through a pair of secret keys,
Public key decryptions, private key signature.Multi-party common signature easily and effectively is not can solve.
Therefore, it is necessary to be improved to solve the above technical problems to the prior art.
Summary of the invention
In view of this, the purpose of the present invention is to provide a kind of solution multiple party digital signatures, timestamp and the keys of encryption
Series connection method solves the technical issues of cannot achieve multi-party common signature easily and effectively in the prior art.In particular by
Following technical solution is realized:
A kind of solution multiple party digital signatures, timestamp and the key series connection method of encryption of design, including private key and decryption
The public key of private key;Detailed process includes the following steps,
A. it calls function module to carry out operation to paper sample is executed, generates an operation information, function module can be used
Function of time module or other function modules etc. generate the operation information that can be verified for step e;
B. a user is digitally signed generation signature to execution paper sample and its operation information using signature blocks
File;
C. encryption is carried out to signature file with a private key and generates encryption file;
D. transmission encryption file can upload the ciphertext part that progressively increases in internet or other networks, and encryption file is passed to
Another needs the user being digitally signed, and encryption file directive sending can be needed the use of digital signature by user to another
Family can also be mass-sended to other multiple users for needing digital signature;
D. second user receives encryption file, and uses public key decryptions, and function module is called to verify operation information, verify at
The encryption file of function is as new execution paper sample;
F. above-mentioned a, b step are repeated to new execution paper sample, forms new signature file.
Further, solution multiple party digital signatures, timestamp and the key of the encryption series connection method further include further including
The step of repeating c, d, e, f, a, b to the new signature file in step f, the public key of the private key and decrypted private key include more
A, private key when encrypting every time to execution paper sample and its operation information is not identical, and multi-user uses the private key of oneself respectively
It is transmitted after being encrypted to execution paper sample and operation information, the user for each receiving encryption file can pass through public key
Decryption encryption file, and be capable of calling function module and operation information is verified, determine that file is the specific use for possessing private key
Family transmitting.
Further, the function module is function of time module, and the operation information is to transport to execution paper sample
The mode of the timestamp generated after calculation, the verifying operation information is whether verification time stamp generates in specific time interval
It is interior, when needing to be sequentially transmitted file to multi-party users, can be stabbed with the verification time whether generate in specific time section and
The time sequencing of generation time stamp meets specific sequence, and function of time module, which adopts to use, indicates timestamp in Python
Time module can indicate that tick unit (is till now by the offset that the second calculates since 00:00:00 on January 1st, 1970
The relative time of system is spaced floating number in seconds) it is most suitable for doing date operation.
Further, the step b further include execute paper sample carry out operation generate summary info and to summary info into
The process of row encryption, the step e further include the process that summary info verifying is carried out after decryption, can be using hash function to holding
Row paper sample carries out operation and generates summary info, and generating and verifying summary info may further ensure that file is not usurped
Change.
Further, the process for generating summary info and verifying abstract carries out operation with HASH function, due to non-
The arithmetic speed of symmetry algorithm is slower, so in digital signature protocol, it can be in file data quilt using one-way hash function
Under the premise of mapping generates summary info, guarantee the speed of operation.
Beneficial effects of the present invention: in group ranking, multi-party can be realized without meeting is signed respectively;Group ranking be with
The digital signature of timestamp, it is ensured that its is legal effectively, can not change;Other beneficial effects of the invention will be in conjunction with real in detail below
It applies in example and is further detailed.
Detailed description of the invention
The invention will be further described with reference to the accompanying drawings and examples:
Fig. 1 is procedure chart of the invention.
Specific embodiment
Embodiment: as shown in Figure 1, a kind of solution multiple party digital signatures, timestamp and the key series connection method of encryption, including
The public key of private key and decrypted private key;Detailed process includes the following steps,
A. it calls function module to carry out operation to paper sample is executed, generates an operation information, function module can be used
Function of time module or other function modules etc. generate the operation information that can be verified for step e;
B. a user is digitally signed generation signature to execution paper sample and its operation information using signature blocks
File;
C. encryption is carried out to signature file with a private key and generates encryption file;
D. transmission encryption file can upload the ciphertext part that progressively increases in internet or other networks, and encryption file is passed to
Another needs the user being digitally signed, and user can give encryption file directive sending to another user, can also mass-send
To other multiple users;
D. second user receives encryption file, and uses public key decryptions, and function module is called to verify operation information, verify at
The encryption file of function is as new execution paper sample;
F. above-mentioned a, b step are repeated to new execution paper sample, forms new signature file.
In the present embodiment, solution multiple party digital signatures, timestamp and the key series connection method of encryption further include
Include the steps that repeating c, d, e, f, a, b, the public key packet of the private key and decrypted private key to the new signature file in step f
Include multiple, not identical to the private key executed when paper sample and its operation information encrypt every time, multi-user uses oneself respectively
Private key transmits after encrypting to execution paper sample and operation information, and the user for each receiving encryption file can pass through
Public key decryptions encrypt file, and are capable of calling function module and verify to operation information, determine that file is possess private key specific
User transmitting.
In the present embodiment, the function module be function of time module, the operation information be to execute paper sample into
The mode of the timestamp generated after row operation, the verifying operation information is whether verification time stamp generates in specific time zone
In, when needing to be sequentially transmitted file to multi-party users, it can be stabbed and whether be generated in specific time section simultaneously with the verification time
And the time sequencing of generation time stamp meets specific sequence, function of time module, which adopts to use in Python, indicates timestamp
Time module, can indicate since 00:00:00 on January 1st, 1970 the offset calculated till now by the second, tick unit
(relative time of system is spaced floating number in seconds) is most suitable for doing date operation.
In the present embodiment, the step b further includes executing paper sample to carry out operation generation summary info and believe abstract
The process encrypted is ceased, the step e further includes the process of progress summary info verifying after decryption, can use hash function
To execute paper sample carry out operation generate summary info, generate and verify summary info may further ensure that file not by
It distorts.
In the present embodiment, the process for generating summary info and verifying abstract carries out operation with HASH function, by
It is slower in the arithmetic speed of asymmetric arithmetic, so in digital signature protocol, it can be in number of files using one-way hash function
Under the premise of being mapped generation summary info, guarantee the speed of operation.
Specific implementation process: the present invention is mainly made of four modules, respectively function of time module, for generating and adding
Upper timestamp;Signature blocks are used for digital signature;Deciphering module, for decrypting;Key laminating module is used for multiple party signatures;Example
Such as, a electronic document D needs A, B, and C tripartite completes in specific time interval [t1, t2];It initiates to sign by A, A passes through
Function of time module calculates the time, determines in time interval [t1, t2], generation time stamp, in addition the content of D, calls signature
Module generates D` with the private key encryption of A, issues B or C, for sake of convenience, be transmitted narration by the sequence with A, B, C;B exists
After receiving D`, deciphering module is called, with the public key decryptions of A, allocating time function module, the signature for verifying A is effective, then, leads to
It crosses time function module and calculates the time, determine in time interval [t1, t2], join raw timestamp, in addition the content of D`, calls label
Name module generates D`` with the private key encryption of B, issues C;It steps be repeated alternatively until that A, B, C complete to sign;It can also be straight by D`
Mass-sending is connect to B and C, then B and C call deciphering module respectively, with the public key decryptions of A, recall function of time module verification A's
Signature effectively, then, calculates the time by function of time module, determines in time interval [t1, t2], join raw timestamp, add
The content of upper D` calls signature blocks, generates D`` (B) with the private key encryption of B, generates D`` (C) with the private key of C, B is again by file
D`` (B) is transmitted to C, and file D`` (C) is transmitted to B by C, completes multiple party signatures;When electronic document D needs three or more user's signatures
When, it can repeatedly decrypt, sign by above-mentioned steps, signing timestamp, encryption, transmission or mass-sending multi-party users.
Finally, it is stated that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although referring to compared with
Good embodiment describes the invention in detail, those skilled in the art should understand that, it can be to skill of the invention
Art scheme is modified or replaced equivalently, and without departing from the objective and range of technical solution of the present invention, should all be covered at this
In the scope of the claims of invention.
Claims (5)
1. a kind of solve multiple party digital signatures, timestamp and the key series connection method of encryption, it is characterised in that: conciliate including private key
The public key of close private key;Detailed process includes the following steps,
A. it calls function module to carry out operation to paper sample is executed, generates an operation information;
B. generation signature file is digitally signed to execution paper sample and its operation information using signature blocks;
C. encryption is carried out to signature file with a private key and generates encryption file;
D. transmission encryption file;
E. receive encryption file, and use public key decryptions, call function module verify operation information, be proved to be successful encryption file work
For new execution paper sample;
F. above-mentioned a, b step are repeated to new execution paper sample, forms new signature file.
2. solving multiple party digital signatures, timestamp and the key series connection method of encryption, feature as described in claim 1 to exist
In: further include the steps that repeating the new signature file in step f c, d, e, f, a, b, the private key and decrypted private key
Public key include it is multiple, it is not identical to the private key executed when paper sample and its operation information encrypt every time.
3. solving multiple party digital signatures, timestamp and the key series connection method of encryption, feature as claimed in claim 2 to exist
In: the function module be function of time module, the operation information be to execute that paper sample generate after operation when
Between stab, it is described verifying operation information mode be the verification time stamp whether generate in specific time interval.
4. solving multiple party digital signatures, timestamp and the key series connection method of encryption, feature as described in claim 1 to exist
In: the step b further includes carrying out the mistake that operation generates summary info and encrypted to summary info to execution paper sample
Journey, the step e further include the process of progress summary info verifying after decryption.
5. solving multiple party digital signatures, timestamp and the key series connection method of encryption, feature as claimed in claim 4 to exist
In: the process for generating summary info and verifying abstract carries out operation with HASH function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811485865.6A CN109743171B (en) | 2018-12-06 | 2018-12-06 | Key series method for solving multi-party digital signature, timestamp and encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811485865.6A CN109743171B (en) | 2018-12-06 | 2018-12-06 | Key series method for solving multi-party digital signature, timestamp and encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109743171A true CN109743171A (en) | 2019-05-10 |
CN109743171B CN109743171B (en) | 2022-04-12 |
Family
ID=66358501
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811485865.6A Active CN109743171B (en) | 2018-12-06 | 2018-12-06 | Key series method for solving multi-party digital signature, timestamp and encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109743171B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110233736A (en) * | 2019-06-19 | 2019-09-13 | 核芯互联(北京)科技有限公司 | A kind of digital signature generation method, verification method, device, equipment, medium |
CN110620780A (en) * | 2019-09-26 | 2019-12-27 | 如般量子科技有限公司 | Anti-quantum computation two-dimensional code authentication method and system based on asymmetric key pool and timestamp |
CN110955918A (en) * | 2019-10-29 | 2020-04-03 | 浙江工业大学 | Contract text protection method based on RSA encrypted sha-256 digital signature |
CN112052435A (en) * | 2020-09-30 | 2020-12-08 | 杭州尚尚签网络科技有限公司 | Method for multi-user electronic signature of CAD (computer-aided design) drawing |
TWI716274B (en) * | 2019-06-26 | 2021-01-11 | 開曼群島商創新先進技術有限公司 | Method and device for realizing confidential blockchain transaction using ring signature |
CN112507328A (en) * | 2021-01-29 | 2021-03-16 | 统信软件技术有限公司 | File signature method, computing device and storage medium |
CN112580110A (en) * | 2020-12-23 | 2021-03-30 | 国家电网有限公司大数据中心 | Data resource sharing safety method based on watermark technology |
US11025434B2 (en) | 2019-06-26 | 2021-06-01 | Advanced New Technologies Co., Ltd. | Ring signature-based anonymous transaction |
CN112926974A (en) * | 2019-12-06 | 2021-06-08 | 环球雅途集团有限公司 | Offline ticket anti-counterfeiting method based on distributed account book principle |
TWI731569B (en) * | 2019-06-26 | 2021-06-21 | 開曼群島商創新先進技術有限公司 | Anonymous transaction method and device based on ring signature |
US11238447B2 (en) | 2019-06-26 | 2022-02-01 | Advanced New Technologies Co., Ltd. | Blockchain transactions with ring signatures |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1672358A (en) * | 2002-07-29 | 2005-09-21 | 国际商业机器公司 | Groups signature scheme |
US20140040611A1 (en) * | 2012-07-31 | 2014-02-06 | Isak Tenenboym | Distributed Validation of Digitally Signed Electronic Documents |
CN106533698A (en) * | 2016-12-15 | 2017-03-22 | 北京三未信安科技发展有限公司 | RSA-based distributed threshold signature method and system |
US20170220999A1 (en) * | 2016-02-02 | 2017-08-03 | Adobe Systems Incorporated | Techniques for document management workflows |
CN107017993A (en) * | 2017-04-01 | 2017-08-04 | 北京江南天安科技有限公司 | A kind of multi-party joint key is produced and digital signature method and system |
CN108199835A (en) * | 2018-01-19 | 2018-06-22 | 北京江南天安科技有限公司 | A kind of multi-party joint private key decryption method and system |
CN108833115A (en) * | 2018-06-15 | 2018-11-16 | 中山大学 | A kind of multi-party Fair PDF contract signature method based on block chain |
-
2018
- 2018-12-06 CN CN201811485865.6A patent/CN109743171B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1672358A (en) * | 2002-07-29 | 2005-09-21 | 国际商业机器公司 | Groups signature scheme |
US20140040611A1 (en) * | 2012-07-31 | 2014-02-06 | Isak Tenenboym | Distributed Validation of Digitally Signed Electronic Documents |
US20170220999A1 (en) * | 2016-02-02 | 2017-08-03 | Adobe Systems Incorporated | Techniques for document management workflows |
CN106533698A (en) * | 2016-12-15 | 2017-03-22 | 北京三未信安科技发展有限公司 | RSA-based distributed threshold signature method and system |
CN107017993A (en) * | 2017-04-01 | 2017-08-04 | 北京江南天安科技有限公司 | A kind of multi-party joint key is produced and digital signature method and system |
CN108199835A (en) * | 2018-01-19 | 2018-06-22 | 北京江南天安科技有限公司 | A kind of multi-party joint private key decryption method and system |
CN108833115A (en) * | 2018-06-15 | 2018-11-16 | 中山大学 | A kind of multi-party Fair PDF contract signature method based on block chain |
Non-Patent Citations (1)
Title |
---|
张永强: "《满足便携文档格式的公平多方合同签署协议》", 《西安电子科技大学学报》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110233736A (en) * | 2019-06-19 | 2019-09-13 | 核芯互联(北京)科技有限公司 | A kind of digital signature generation method, verification method, device, equipment, medium |
US11238447B2 (en) | 2019-06-26 | 2022-02-01 | Advanced New Technologies Co., Ltd. | Blockchain transactions with ring signatures |
TWI716274B (en) * | 2019-06-26 | 2021-01-11 | 開曼群島商創新先進技術有限公司 | Method and device for realizing confidential blockchain transaction using ring signature |
US11258614B2 (en) | 2019-06-26 | 2022-02-22 | Advanced New Technologies Co., Ltd. | Ring signature-based anonymous transaction |
US11025434B2 (en) | 2019-06-26 | 2021-06-01 | Advanced New Technologies Co., Ltd. | Ring signature-based anonymous transaction |
TWI731569B (en) * | 2019-06-26 | 2021-06-21 | 開曼群島商創新先進技術有限公司 | Anonymous transaction method and device based on ring signature |
CN110620780A (en) * | 2019-09-26 | 2019-12-27 | 如般量子科技有限公司 | Anti-quantum computation two-dimensional code authentication method and system based on asymmetric key pool and timestamp |
CN110620780B (en) * | 2019-09-26 | 2021-10-22 | 如般量子科技有限公司 | Anti-quantum computation two-dimensional code authentication method and system based on asymmetric key pool and timestamp |
CN110955918A (en) * | 2019-10-29 | 2020-04-03 | 浙江工业大学 | Contract text protection method based on RSA encrypted sha-256 digital signature |
CN112926974B (en) * | 2019-12-06 | 2024-02-13 | 环球数科集团有限公司 | Off-line ticket anti-counterfeiting method based on distributed account book principle |
CN112926974A (en) * | 2019-12-06 | 2021-06-08 | 环球雅途集团有限公司 | Offline ticket anti-counterfeiting method based on distributed account book principle |
CN112052435A (en) * | 2020-09-30 | 2020-12-08 | 杭州尚尚签网络科技有限公司 | Method for multi-user electronic signature of CAD (computer-aided design) drawing |
CN112052435B (en) * | 2020-09-30 | 2023-11-28 | 杭州尚尚签网络科技有限公司 | CAD drawing multiuser electronic signature method |
CN112580110A (en) * | 2020-12-23 | 2021-03-30 | 国家电网有限公司大数据中心 | Data resource sharing safety method based on watermark technology |
CN112507328A (en) * | 2021-01-29 | 2021-03-16 | 统信软件技术有限公司 | File signature method, computing device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109743171B (en) | 2022-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109743171A (en) | It is a kind of to solve multiple party digital signatures, timestamp and the key series connection method of encryption | |
Krawczyk et al. | The OPTLS protocol and TLS 1.3 | |
US8892890B2 (en) | Key agreement and transport protocol | |
US9008312B2 (en) | System and method of creating and sending broadcast and multicast data | |
CN105162599B (en) | A kind of data transmission system and its transmission method | |
EP1642437B1 (en) | Key agreement and transport protocol | |
CN108667626A (en) | The two sides cooperation SM2 endorsement methods of safety | |
US20190207757A1 (en) | Method for exchanging keys authenticated by blockchain | |
EP1063813A2 (en) | Public key encryption with digital signature scheme | |
CN108650227A (en) | Handshake method based on datagram secure transfer protocol and system | |
CN110113150B (en) | Encryption method and system based on non-certificate environment and capable of repudiation authentication | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN107682151A (en) | A kind of GOST digital signature generation method and system | |
CN103297230B (en) | Information encipher-decipher method, Apparatus and system | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
US20240097894A1 (en) | Threshold key exchange | |
CN106533656A (en) | Key multilayer mixed encryption/decryption method based on WSN | |
Shim | Cryptanalysis of mutual authentication and key exchange for low power wireless communications | |
CN106453253B (en) | A kind of hideing for efficient identity-based signs decryption method | |
JP2001211154A (en) | Secret key generating method, ciphering method, and cipher communication method | |
CN107682158A (en) | It is a kind of can trustship authentication encryption method | |
CN111526131B (en) | Anti-quantum-computation electronic official document transmission method and system based on secret sharing and quantum communication service station | |
CN112019553B (en) | Data sharing method based on IBE/IBBE | |
CN113347153A (en) | File encryption transmission method combining identity authentication and dynamic key | |
JP3864656B2 (en) | Data transmission method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Yin Jianwen Inventor after: Ni Xiangdong Inventor after: Xu Xufeng Inventor after: Hu Jianmin Inventor before: Yin Jianwen Inventor before: Ni Xiangdong |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |