CN111800386A - Intelligent household terminal user communication safety authentication system - Google Patents
Intelligent household terminal user communication safety authentication system Download PDFInfo
- Publication number
- CN111800386A CN111800386A CN202010510822.XA CN202010510822A CN111800386A CN 111800386 A CN111800386 A CN 111800386A CN 202010510822 A CN202010510822 A CN 202010510822A CN 111800386 A CN111800386 A CN 111800386A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- authentication system
- security authentication
- server
- local
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Abstract
The invention relates to the technical field of intelligent home communication safety, and discloses an intelligent home terminal user communication safety authentication system, which comprises: local authentication server LAS running with security authentication system software and deployed in smart home control systemVA local server LS running with intelligent home control system software, a mobile terminal MT running with security authentication system software and running with intelligent home control system softwareui(ii) a Mobile terminal MTuiThe local server LS is connected to a local authentication server LAS by communication with the local server LSVFor communication connection, a local authentication server LASVWith mobile terminal MTuiCarrying out communication connection; security authentication system for MTuiOnly the mobile terminal MT performs security authenticationuiThe identity of (2) is authenticated by the security authentication system to allow the mobile terminal MTuiThe local server LS is accessed. The invention solves the technical problems of illegal user invasion and identity embezzlement in the data communication process of the intelligent home system.
Description
Technical Field
The invention relates to the technical field of intelligent home communication safety, in particular to an intelligent home terminal user communication safety authentication system.
Background
The intelligent household control system is a comprehensive control system with cross integration of an electronic technology, a communication technology, an internet technology and the like, comprehensively manages and controls household equipment by utilizing various advanced technologies and facilities, and simultaneously realizes functions of household security monitoring and the like. Along with the improvement of the living standard of people, the intelligent home technology is further popularized and applied. The control host and the controller are separated by adopting a WiFi technology and are connected through a WiFi network, one-to-many control can be realized, and the mobile terminal can also realize remote control on household equipment through the Internet.
The intelligent home brings convenience to life of people, and meanwhile, the safety problem of data in the transmission process also becomes an important problem to be solved, especially the network safety problems of illegal user invasion, identity embezzlement and the like in the data communication process of the intelligent home system.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides an intelligent home terminal user communication security authentication system to solve the technical problems of illegal user invasion and identity embezzlement in the data communication process of an intelligent home system.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme:
a smart home terminal user communication security authentication system includes: local authentication server LAS running with security authentication system software and deployed in smart home control systemVA local server LS running with intelligent home control system software, a mobile terminal MT running with security authentication system software and running with intelligent home control system softwareui;
Mobile terminal MTuiThe local server LS is connected to a local authentication server LAS by communication with the local server LSVFor communication connection, a local authentication server LASVWith mobile terminal MTuiCarrying out communication connection;
running on a local authentication server LASVTo mobile terminal MT by the security authentication systemuiThe user identity of the user is subjected to security authentication, and the authentication method comprises the following steps:
the method comprises the following steps: mobile terminal MTuiAuthenticating a server LAS locallyVThe user registration is performed on the security authentication system, which specifically comprises:
secure authentication system generates and sends to mobile terminal MTuiThe following system parameters are disclosed:
p: the size of the finite field is odd prime number and is 160 bits;
b: the base point of the elliptic curve E;
g: a generator on the elliptic curve with an order of n;
SHA: a one-way hash function;
random selection of SsaCalculate Psa=Ssa·B;
② mobile terminal MTuiSelect own IDuiAnd a random integer x ∈ [2, n-2 ]]Calculating Vui=SHA(x,IDui) Sending Vui、IDuiTo a security authentication system;
thirdly, the security authentication system selects a random integer k epsilon [2, n-2]Recalculating and disclosing the mobile terminal MTuiIs SSKuiAnd a public key SSKuiEvidence W of (A)uiThe method specifically comprises the following steps:
SSKui=Vui+(k-SHA(IDui))·B=(Puix,Puiy);
Wui=k+Ssa·(Puix+SHA(IDui))modn;
mobile terminal MTuiCalculating private Key PSKuiThe method specifically comprises the following steps:
PSKui=Wui+SHA(x,IDui)modn;
step two: security authentication system for MTuiAnd carrying out safety certification, wherein the specific certification process is as follows:
[ mobile terminal MTuiSending a public key SSK to a secure authentication systemuiID, IDuiAnd one-way hash function SHA (SSK)ui,IDui);
② the safety certification system selects a random number B, firstly calculates c ═ B · B and sends it to the mobile terminal MTuiThen, calculating: rui=SSKui+SHA(IDui)·B+((SSKuix+SHA(IDui)modn))·Psa,r′=b·Rui;
③ Mobile terminal MTuiCalculating r-PSKuiC, sending to the security authentication system;
the security authentication system verifies whether the equation r 'is satisfied, and if the equation r' is satisfied, the security authentication system passes through the mobile terminal MTuiThe identity authentication of (1).
Preferably, the local authentication server LASVTo mobile terminal MTuiOnly the mobile terminal MT performs security authenticationuiThe identity of (2) is authenticated by the security authentication system to allow the mobile terminal MTuiThe local server LS is accessed.
Preferably, the mobile terminal MTuiIs SSKuiIs issued by a mobile terminal MTuiAnd the security authentication system.
(III) advantageous technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
aiming at the network security problems of illegal user invasion, identity embezzlement and the like in the data communication process of the intelligent home system, the invention works as the MTuiOperating on a local authentication server LAS when sending an access request to a local server LSVThe above security authentication system starts to the mobile terminal MTuiIs securely authenticated and only the mobile terminal MTuiThe identity of (2) is authenticated by the security authentication system to allow the mobile terminal MTuiAccessing a local server LS;
therefore, the technical problems of illegal user invasion and identity embezzlement in the data communication process of the intelligent home system are solved.
2. In the invention, an attacker can not impersonate a security authentication system as a mobile terminal MTuiIssuing a public Key SSKuiUnable to acquire the mobile terminal MTuiPrivate key PSKuiThe attacker can intercept the MTuiIs SSKuiAnd a public key SSKuiEvidence W of (A)uiBut to recover the mobile terminal MTuiPrivate key PSKuiWill face the difficulty of solving discrete logarithm over finite field of elliptic curve, which significantly improves the mobile terminal MTuiPrivate key PSKuiThe safety performance of (2).
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A smart home terminal user communication security authentication system includes: local authentication server LAS running with security authentication system software and deployed in smart home control systemVA local server LS running with intelligent home control system software, a mobile terminal MT running with security authentication system software and running with intelligent home control system softwareui;
Mobile terminal MTuiThe intelligent home control system is in communication connection with a local server LS through mobile internet equipment, and the local server LS is in communication connection with a local authentication server LAS through network communication equipmentVFor communication connection, a local authentication server LASVMobile terminal MT on security authentication system through mobile internet equipmentuiCarrying out communication connection;
aiming at the network security problems of illegal user invasion, identity embezzlement and the like in the data communication process of the intelligent home system, when the MT is a mobile terminaluiOperating on a local authentication server LAS when sending an access request to a local server LSVThe above security authentication system starts to the mobile terminal MTuiIs securely authenticated and only the mobile terminal MTuiPasses the identity of the local authentication server LASVOf the security authentication systemAuthentication to allow the mobile terminal MTuiAccessing a local server LS;
running on a local authentication server LASVTo mobile terminal MT by the security authentication systemuiThe user identity of the user is subjected to security authentication, and the authentication method comprises the following steps:
the method comprises the following steps: mobile terminal MTuiAuthenticating a server LAS locallyVThe user registration is performed on the security authentication system, which specifically comprises:
secure authentication system generates and sends to mobile terminal MTuiThe following system parameters are disclosed:
p: the size of the finite field is odd prime number and is 160 bits;
b: the base point of the elliptic curve E;
g: a generator on the elliptic curve with an order of n;
SHA: a one-way hash function;
random selection of SsaCalculate Psa=Ssa·B;
Mobile terminal MT for registering with security authentication systemuiObtaining a public key SSKuiWithout letting the security authentication system know its private key PSKui, mobile terminal MTuiIs SSKuiCannot be generated simply by the security authentication system, should be generated by the mobile terminal MTuiThe method is characterized in that the method is interacted with a security authentication system, the interaction process is called as a user registration protocol, and the protocol is executed as follows:
② mobile terminal MTuiSelect own IDuiAnd a random integer x ∈ [2, n-2 ]]Calculating Vui=SHA(x,IDui) Sending Vui、IDuiTo a security authentication system;
thirdly, the security authentication system selects a random integer k epsilon [2, n-2]Recalculating and disclosing the mobile terminal MTuiIs SSKuiAnd a public key SSKuiEvidence W of (A)uiThe method specifically comprises the following steps:
SSKui=Vui+(k-SHA(IDui))·B=(Puix,Puiy);
Wui=k+Ssa·(Puix+SHA(IDui))modn;
mobile terminal MTuiCalculating private Key PSKuiThe method specifically comprises the following steps:
PSKui=Wui+SHA(x,IDui)modn;
step two: running on a local authentication server LASVTo mobile terminal MT by the security authentication systemuiAnd carrying out safety certification, wherein the specific certification process is as follows:
[ mobile terminal MTuiSending a public key SSK to a secure authentication systemuiID, IDuiAnd one-way hash function SHA (SSK)ui,IDui);
② the safety certification system selects a random number B, firstly calculates c ═ B · B and sends it to the mobile terminal MTuiThen, calculating: rui=SSKui+SHA(IDui)·B+((SSKuix+SHA(IDui)modn))·Psa,r′=b·Rui;
③ Mobile terminal MTuiCalculating r-PSKuiC, sending to the security authentication system;
the security authentication system verifies whether the equation r' is satisfied, and if so, the mobile terminal MT is proveduiKnowing private key PSKuiIf the security authentication system passes through the mobile terminal MTuiThe identity authentication of (2);
attacker can not impersonate security authentication system as mobile terminal MTuiIssuing a public Key SSKuiUnable to acquire the mobile terminal MTuiPrivate key PSKuiThe attacker can intercept the MTuiIs SSKuiAnd a public key SSKuiEvidence W of (A)uiBut to recover the mobile terminal MTuiPrivate key PSKuiWill face the difficulty of solving discrete logarithm over finite field of elliptic curve, which significantly improves the mobile terminal MTuiPrivate key PSKuiThe safety performance of (2).
In the above authentication protocol, the mobile terminal MTuiPrivate key PSK without revealing itselfuiKnowledge, mobile terminal MTuiBy PSK of own private keyuiHiding in transmitted random numbers to prevent knowledge disclosure, even if an attacker intercepts the transmission content, it is not possible to obtain any private key PSK from ituiAnd (4) information.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (3)
1. The utility model provides an intelligence house end user communication safety certification system which characterized in that includes: local authentication server LAS running with security authentication system software and deployed in smart home control systemVA local server LS running with intelligent home control system software, a mobile terminal MT running with security authentication system software and running with intelligent home control system softwareui;
Mobile terminal MTuiThe local server LS is connected to a local authentication server LAS by communication with the local server LSVFor communication connection, a local authentication server LASVWith mobile terminal MTuiCarrying out communication connection;
running on a local authentication server LASVTo mobile terminal MT by the security authentication systemuiThe user identity of the user is subjected to security authentication, and the authentication method comprises the following steps:
the method comprises the following steps: mobile terminal MTuiAuthenticating a server LAS locallyVThe user registration is performed on the security authentication system, which specifically comprises:
secure authentication system generates and sends to mobile terminal MTuiThe following system parameters are disclosed:
p: the size of the finite field is odd prime number and is 160 bits;
b: the base point of the elliptic curve E;
g: a generator on the elliptic curve with an order of n;
SHA: a one-way hash function;
random selection of SsaCalculate Psa=Ssa·B;
② mobile terminal MTuiSelect own IDuiAnd a random integer x ∈ [2, n-2 ]]Calculating Vui=SHA(x,IDui) Sending Vui、IDuiTo a security authentication system;
thirdly, the security authentication system selects a random integer k epsilon [2, n-2]Recalculating and disclosing the mobile terminal MTuiIs SSKuiAnd a public key SSKuiEvidence W of (A)uiThe method specifically comprises the following steps:
SSKui=Vui+(k-SHA(IDui))·B=(Puix,Puiy);
Wui=k+Ssa·(Puix+SHA(IDui))modn;
mobile terminal MTuiCalculating private Key PSKuiThe method specifically comprises the following steps:
PSKui=Wui+SHA(x,IDui)modn;
step two: security authentication system for MTuiAnd carrying out safety certification, wherein the specific certification process is as follows:
[ mobile terminal MTuiSending a public key SSK to a secure authentication systemuiID, IDuiAnd one-way hash function SHA (SSK)ui,IDui);
② the safety certification system selects a random number B, firstly calculates c ═ B · B and sends it to the mobile terminal MTuiThen, calculating: rui=SSKui+SHA(IDui)·B+((SSKuix+SHA(IDui)modn))·Psa,r′=b·Rui;
③ Mobile terminal MTuiCalculating r-PSKuiC, sending to the security authentication system;
safety certificationThe system verifies whether the equation r 'r is true, and if the equation r' r is true, the security authentication system passes through the mobile terminal MTuiThe identity authentication of (1).
2. The smart home end-user communication security authentication system of claim 1, wherein the local authentication server LASVTo mobile terminal MTuiOnly the mobile terminal MT performs security authenticationuiThe identity of (2) is authenticated by the security authentication system to allow the mobile terminal MTuiThe local server LS is accessed.
3. The smart home terminal user communication security authentication system according to claim 2, wherein the mobile terminal MT isuiIs SSKuiIs issued by a mobile terminal MTuiAnd the security authentication system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010510822.XA CN111800386A (en) | 2020-06-08 | 2020-06-08 | Intelligent household terminal user communication safety authentication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010510822.XA CN111800386A (en) | 2020-06-08 | 2020-06-08 | Intelligent household terminal user communication safety authentication system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111800386A true CN111800386A (en) | 2020-10-20 |
Family
ID=72802911
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010510822.XA Withdrawn CN111800386A (en) | 2020-06-08 | 2020-06-08 | Intelligent household terminal user communication safety authentication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111800386A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116170233A (en) * | 2023-04-23 | 2023-05-26 | 广州河东科技有限公司 | User terminal communication security authentication system of smart home |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101969377A (en) * | 2010-10-09 | 2011-02-09 | 成都市华为赛门铁克科技有限公司 | Zero-knowledge identity authentication method and system |
CN105577377A (en) * | 2014-10-13 | 2016-05-11 | 航天信息股份有限公司 | Identity-based authentication method and identity-based authentication system with secret key negotiation |
WO2019083082A1 (en) * | 2017-10-26 | 2019-05-02 | 순천향대학교 산학협력단 | Ksi-based authentication and communication method for safe smart home environment, and system therefor |
CN111243137A (en) * | 2020-01-13 | 2020-06-05 | 汪洵 | Intelligent door lock safety management system based on open architecture |
-
2020
- 2020-06-08 CN CN202010510822.XA patent/CN111800386A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101969377A (en) * | 2010-10-09 | 2011-02-09 | 成都市华为赛门铁克科技有限公司 | Zero-knowledge identity authentication method and system |
CN105577377A (en) * | 2014-10-13 | 2016-05-11 | 航天信息股份有限公司 | Identity-based authentication method and identity-based authentication system with secret key negotiation |
WO2019083082A1 (en) * | 2017-10-26 | 2019-05-02 | 순천향대학교 산학협력단 | Ksi-based authentication and communication method for safe smart home environment, and system therefor |
CN111243137A (en) * | 2020-01-13 | 2020-06-05 | 汪洵 | Intelligent door lock safety management system based on open architecture |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116170233A (en) * | 2023-04-23 | 2023-05-26 | 广州河东科技有限公司 | User terminal communication security authentication system of smart home |
CN116170233B (en) * | 2023-04-23 | 2023-07-18 | 广州河东科技有限公司 | User terminal communication security authentication system of smart home |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200213305A1 (en) | Managing internet of things devices using blockchain operations | |
CN109819444B (en) | Physical layer initial authentication method and system based on wireless channel characteristics | |
CN102026195B (en) | One-time password (OTP) based mobile terminal identity authentication method and system | |
CN106533861A (en) | Security control system and authentication method of smart home Internet of Things | |
CN107612949B (en) | Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint | |
CN101986598B (en) | Authentication method, server and system | |
CN103475666A (en) | Internet of things resource digital signature authentication method | |
WO2010083685A1 (en) | Method for realizing authentication center and authentication system | |
WO2019056971A1 (en) | Authentication method and device | |
CN111935067A (en) | Enterprise user identity authentication system based on cloud computing technology | |
CN106534050A (en) | Method and device for realizing key agreement of virtual private network (VPN) | |
CN109818943A (en) | A kind of authentication method suitable for low orbit satellite Internet of Things | |
CN111294796A (en) | Smart phone login management system based on zero-knowledge proof | |
CN111600713A (en) | Security protection system based on cloud computing server | |
CN114553430B (en) | SDP-based safety access system for power service terminal | |
CN116074019A (en) | Identity authentication method, system and medium between mobile client and server | |
CN111901118A (en) | Port enterprise security authentication system based on mobile internet | |
CN111212430A (en) | Wireless local area network protection system based on zero knowledge proof | |
CN115038084A (en) | Decentralized trusted access method for cellular base station | |
CN111800386A (en) | Intelligent household terminal user communication safety authentication system | |
CN110891067B (en) | Revocable multi-server privacy protection authentication method and revocable multi-server privacy protection authentication system | |
CN111818015A (en) | Security protection system suitable for remote node access | |
CN111865604A (en) | User identity authentication system based on remote control technology | |
CN1225941C (en) | Roaming access method of mobile node in radio IP system | |
CN111243137A (en) | Intelligent door lock safety management system based on open architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20201020 |