CN117155718A - Gateway dynamic access control method, device and storage medium - Google Patents

Gateway dynamic access control method, device and storage medium Download PDF

Info

Publication number
CN117155718A
CN117155718A CN202311436276.XA CN202311436276A CN117155718A CN 117155718 A CN117155718 A CN 117155718A CN 202311436276 A CN202311436276 A CN 202311436276A CN 117155718 A CN117155718 A CN 117155718A
Authority
CN
China
Prior art keywords
user
gateway
terminal
code
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311436276.XA
Other languages
Chinese (zh)
Other versions
CN117155718B (en
Inventor
陈洪国
孙维伯
张奕冕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhian Technology Co ltd
Original Assignee
Beijing Zhian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhian Technology Co ltd filed Critical Beijing Zhian Technology Co ltd
Priority to CN202311436276.XA priority Critical patent/CN117155718B/en
Publication of CN117155718A publication Critical patent/CN117155718A/en
Application granted granted Critical
Publication of CN117155718B publication Critical patent/CN117155718B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the application provides a gateway dynamic access control method and a gateway dynamic access control device, which need to authenticate a user accessed each time and terminal equipment used by the user access application at the same time, so that a system determines whether the user can access the application according to an authentication result, and the system can determine the behavior of the user for accessing the application in real time according to the long-term access behavior of the user and the change of the terminal environment, thereby realizing the dynamic control of the user access application.

Description

Gateway dynamic access control method, device and storage medium
Technical Field
The embodiments of the present application belong to the technical field of network security, and in particular, relate to a gateway dynamic access control method, device and storage medium.
Background
Conventional network access control methods often lack sensitivity identification at the application level for different devices, especially at the application level of a seven-layer protocol, which causes an important problem: even users with legal identity authentication may be at different risks posed by access to different devices. Therefore, a method for real-time dynamic access control in combination with user identity and device information becomes particularly important.
Disclosure of Invention
In order to solve or alleviate the problems in the prior art, the embodiment of the application provides a method and a device for synchronizing and aggregating data of multiple programmable data sources.
In a first aspect, an embodiment of the present application provides a gateway dynamic access control method, which is applied to a terminal device, where a terminal application is installed on the terminal device, including:
the method comprises the steps of confirming whether a user is an authentication user or not through a gateway by receiving a request for accessing an application sent by the user;
if the user is a non-authenticated user, acquiring an authentication request sent by the gateway to authenticate the user;
sending a request to a terminal application to acquire an encrypted random code stored on the terminal application, wherein the encrypted random code is generated after the gateway authenticates the equipment, and the encrypted random code is arranged in one-to-one correspondence with the equipment code of the equipment;
and sending the user identity authentication request and the encrypted random code to a gateway, decrypting the encrypted random code through the gateway after the user authentication is passed by the gateway, and associating the device code corresponding to the decrypted random code with the user identity information so as to facilitate the user to access the specific application.
As a preferred embodiment of the present application, before the receiving the request sent by the user to access the application, the method includes:
and installing a terminal application on the terminal equipment, and starting a local monitoring port to monitor communication between the terminal equipment and the gateway after the terminal application is installed on the terminal equipment, and generating a device code of the terminal equipment according to the information of the terminal equipment by the terminal application and storing the device code in the terminal application.
As a preferred embodiment of the present application, if the user is confirmed to be a non-authenticated user by the gateway, the method further comprises:
and acquiring a device code from the terminal application to authenticate the terminal device.
As a preferred embodiment of the present application, the authenticating the terminal setting includes:
and acquiring a device code from the terminal application, and sending the device code to a gateway to authenticate the device.
As a preferred embodiment of the present application, the method further comprises:
if the authentication of the terminal equipment is passed, generating a random code through the gateway, encrypting the random code and setting the effective time of the encrypted random code;
and acquiring the encrypted random code and sending the encrypted random code to a terminal application for storage.
As a preferred embodiment of the present application, after the gateway passes the authentication of the user, and before associating the device code corresponding to the decrypted random code with the identity information of the user so that the user accesses a specific application, the method includes:
determining whether the encrypted random code is within a valid time;
and if the encrypted random code is in the effective time, decrypting the encrypted random code.
As a preferred embodiment of the present application, after associating the device code corresponding to the decrypted random code with the identity information of the user, the method includes:
and acquiring and storing the association information between the equipment code and the identity information of the user.
Compared with the prior art, the gateway dynamic access control method provided by the embodiment of the application needs to authenticate the user accessed each time and the terminal equipment used by the user access application at the same time, so that the system determines whether the user can access the application according to the authentication result, and the system can determine the behavior access of the user to the application in real time according to the long-term access behavior of the user and the change of the terminal environment, thereby realizing the dynamic control of the user access application.
In a second aspect, an embodiment of the present application further provides a gateway dynamic access control device, which is applied to a terminal device, where a terminal application is installed on the terminal device, including:
the confirmation module is used for confirming whether the user is an authentication user or not through the gateway by receiving a request for accessing the application sent by the user;
the acquisition module is used for acquiring an authentication request sent by the gateway to authenticate the user if the user is a non-authentication user;
the first sending module is used for sending a request to the terminal application to acquire an encrypted random code stored on the terminal application, wherein the encrypted random code is generated after the gateway authenticates the equipment, and the encrypted random code is arranged in one-to-one correspondence with the equipment code of the equipment;
and the second sending module is used for sending the identity authentication request of the user and the encrypted random code to a gateway together, decrypting the encrypted random code through the gateway after the user authentication is passed by the gateway, and associating the equipment code corresponding to the decrypted random code with the identity information of the user so as to facilitate the user to access the specific application.
As a preferred embodiment of the present application, the terminal device is provided with a terminal application, and after the terminal application is installed on the terminal device, a local monitoring port is started to monitor the communication between the terminal device and the gateway, and meanwhile, the terminal application generates a device code of the terminal device according to the information of the terminal device and stores the device code in the terminal application.
In a third aspect, an embodiment of the present application further provides a storage medium, configured to store a code program for executing a gateway dynamic access control method according to any one of the first aspect.
Compared with the prior art, the technical solutions provided by the second aspect and the third aspect have the same beneficial effects as those provided by the first aspect, and are not described herein.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. Some specific embodiments of the application will be described in detail hereinafter by way of example and not by way of limitation with reference to the accompanying drawings. The same reference numbers in the drawings denote the same or similar parts or portions, and it will be understood by those skilled in the art that the drawings are not necessarily drawn to scale, in which:
fig. 1 is a schematic flow chart of a gateway dynamic access control method according to an embodiment of the present application;
fig. 2 is a schematic diagram of an interaction process of a gateway dynamic access control method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a gateway dynamic access control device according to an embodiment of the present application.
Detailed Description
In order to enable those skilled in the art to better understand the present application, the following description will make clear and complete descriptions of the technical solutions according to the embodiments of the present application with reference to the accompanying drawings. It will be apparent that the described embodiments are merely some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
In a first aspect, as shown in fig. 1 and fig. 2, an embodiment of the present application provides a gateway dynamic access control method, which is applied to a terminal device, where a terminal application is installed on the terminal device, including:
step S01, a gateway confirms whether a user is an authenticated user or not by receiving a request for accessing an application sent by the user;
when a user accesses a specific application, it is necessary to first determine whether the user is an authenticated user for the security of the accessed application, specifically, the user logs in by using a unique user name and a unique password, and the system verifies the validity of the identity. In addition, the system can also support multi-factor authentication, such as mobile phone authentication codes, biological recognition and the like, so that the authentication security is improved.
If the user is a legal user and the terminal equipment used by the user for accessing the application has an association relationship with the user, the system allows the user to continue to access the application.
Prior to step S01, it comprises:
and installing a terminal application on the terminal equipment, and starting a local monitoring port to monitor communication between the terminal equipment and the gateway after the terminal application is installed on the terminal equipment, and generating a device code of the terminal equipment according to the information of the terminal equipment by the terminal application and storing the device code in the terminal application.
In the embodiment of the application, the terminal device is provided with the terminal application, the terminal application generates the device code of the terminal device according to the information of the terminal device, and is also used for monitoring the communication between the terminal device and the gateway, namely, the communication during authentication with the browser user, when the user initiates an authentication request in the browser, the terminal device and the gateway communicate, and the device code of the terminal device is sent to the back end for authentication.
Step S02, if the user is a non-authentication user, acquiring an authentication request sent by the gateway to authenticate the user;
it should be noted that, if the user is a non-authenticated user, the user cannot continue to access the application, so the gateway sends an authentication request to the terminal setting.
Step S03, a request is sent to a terminal application to acquire an encrypted random code stored on the terminal application, wherein the encrypted random code is generated after the gateway authenticates the equipment, and the encrypted random code is arranged in one-to-one correspondence with the equipment code of the equipment;
after receiving the authentication request sent by the gateway, the terminal device in step S02 sends a request to the terminal application to obtain the encrypted random code stored in the terminal application, and if the encrypted random code is stored in the terminal application, the terminal device is authenticated, and if the encrypted random code is not stored, the terminal device is not authenticated.
Specifically, the encrypted random code is generated by:
first, a device code needs to be acquired from the terminal application to authenticate the terminal device.
The specific terminal equipment authentication is authenticated by the following modes:
acquiring a device code from the terminal application, and sending the device code to a gateway to authenticate the device;
if the authentication of the terminal equipment is passed, generating a random code through the gateway, encrypting the random code to obtain an encrypted random code, and setting the effective time of the encrypted random code;
and acquiring the encrypted random code and sending the encrypted random code to a terminal application for storage.
Step S04, the user identity authentication request and the encrypted random code are sent to a gateway, and after the user authentication is passed by the gateway, the encrypted random code is decrypted by the gateway, and the device code corresponding to the decrypted random code is associated with the user identity information so that the user can access the specific application.
Specifically, an encrypted random code is generated and returned to the terminal equipment, when the user performs identity authentication by the browser, the identity authentication page sends a request to a local port of the terminal application to obtain the encrypted random code, the encrypted random code is sent to the rear end together with the user identity authentication, the legality of the user is verified, and after the identity authentication is passed, the equipment code corresponding to the decrypted random code is associated with the identity information of the user so that the user can access the specific application.
Prior to step S04, it includes:
determining whether the encrypted random code is within a valid time;
and if the encrypted random code is in the effective time, decrypting the encrypted random code.
By the step, the terminal equipment can be ensured to be authenticated in real time, so that the safety of the user for accessing the application can be confirmed.
For example, if the gateway sets the validity time for encrypting the random code to 3 minutes, the gateway needs to regenerate the random code and encrypt it if more than 3 minutes.
As a preferred embodiment of the present application, after step S04, it includes:
and acquiring and storing the association information between the equipment code and the identity information of the user.
Specifically, the association information between the device code and the identity information of the user is stored in a cookie of the terminal device. When a user accesses the application, whether the user has access right or not needs to be determined according to the stored association information between the equipment code and the identity information of the user, and if the user does not have the access right, the access is prevented.
When the access flow passes through the gateway, the system performs deep analysis on the access behavior in the browser and the real-time change of the environment of the terminal equipment, and specific treatment is performed according to the analysis result.
In a second aspect, as shown in fig. 3, an embodiment of the present application further provides a gateway dynamic access control apparatus, which is applied to a terminal device, where a terminal application is installed on the terminal device, including:
a confirmation module 21, configured to confirm whether the user is an authenticated user through the gateway by receiving a request for accessing an application sent by the user;
an obtaining module 22, configured to obtain an authentication request sent by the gateway to authenticate the user if the user is a non-authenticated user;
a first sending module 23, configured to send a request to a terminal application to obtain an encrypted random code stored on the terminal application, where the encrypted random code is generated after the gateway authenticates the device, and the encrypted random code is set in one-to-one correspondence with a device code of the device;
and the second sending module 24 is configured to send the user's identity authentication request and the encrypted random code to a gateway, decrypt the encrypted random code through the gateway after the gateway passes the user authentication, and associate a device code corresponding to the decrypted random code with the user's identity information so that the user accesses a specific application.
As a preferred embodiment of the present application, the terminal device is provided with a terminal application, and after the terminal application is installed on the terminal device, a local monitoring port is started to monitor the communication between the terminal device and the gateway, and meanwhile, the terminal application generates a device code of the terminal device according to the information of the terminal device and stores the device code in the terminal application.
In a third aspect, an embodiment of the present application further provides a storage medium, configured to store a code program for executing a gateway dynamic access control method according to any one of the first aspect.
Compared with the prior art, the technical solutions provided by the second aspect and the third aspect have the same beneficial effects as those provided by the first aspect, and are not described herein.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application.

Claims (10)

1. The gateway dynamic access control method is characterized by being applied to terminal equipment, wherein the terminal equipment is provided with a terminal application, and the method comprises the following steps:
the method comprises the steps of confirming whether a user is an authentication user or not through a gateway by receiving a request for accessing an application sent by the user;
if the user is a non-authenticated user, acquiring an authentication request sent by the gateway to authenticate the user;
sending a request to a terminal application to acquire an encrypted random code stored on the terminal application, wherein the encrypted random code is generated after the gateway authenticates the equipment, and the encrypted random code is arranged in one-to-one correspondence with the equipment code of the equipment;
and sending the user identity authentication request and the encrypted random code to a gateway, decrypting the encrypted random code through the gateway after the user authentication is passed by the gateway, and associating the device code corresponding to the decrypted random code with the user identity information so as to facilitate the user to access the specific application.
2. The method for dynamically controlling access to a gateway according to claim 1, wherein before receiving the request for accessing the application sent by the user, the method comprises:
and installing a terminal application on the terminal equipment, and starting a local monitoring port to monitor communication between the terminal equipment and the gateway after the terminal application is installed on the terminal equipment, and generating a device code of the terminal equipment according to the information of the terminal equipment by the terminal application and storing the device code in the terminal application.
3. The gateway dynamic access control method of claim 1, wherein if the user is confirmed to be a non-authenticated user by the gateway, the method further comprises:
and acquiring a device code from the terminal application to authenticate the terminal device.
4. A gateway dynamic access control method according to claim 3, wherein said authenticating said terminal setting comprises:
and acquiring a device code from the terminal application, and sending the device code to a gateway to authenticate the device.
5. The gateway dynamic access control method of claim 4, wherein the method further comprises:
if the authentication of the terminal equipment is passed, generating a random code through the gateway, encrypting the random code and setting the effective time of the encrypted random code;
and acquiring the encrypted random code and sending the encrypted random code to a terminal application for storage.
6. The method for dynamically controlling access to a gateway according to claim 5, wherein after the gateway passes the authentication of the user, and before associating the device code corresponding to the decrypted random code with the identity information of the user so that the user accesses a specific application, the method comprises:
determining whether the encrypted random code is within a valid time;
and if the encrypted random code is in the effective time, decrypting the encrypted random code.
7. The method for dynamically controlling access to a gateway according to claim 1, wherein after associating the device code corresponding to the decrypted random code with the identity information of the user, the method comprises:
and acquiring and storing the association information between the equipment code and the identity information of the user.
8. A gateway dynamic access control device, which is applied to a terminal device, wherein a terminal application is installed on the terminal device, and the gateway dynamic access control device comprises:
the confirmation module is used for confirming whether the user is an authentication user or not through the gateway by receiving a request for accessing the application sent by the user;
the acquisition module is used for acquiring an authentication request sent by the gateway to authenticate the user if the user is a non-authentication user;
the first sending module is used for sending a request to the terminal application to acquire an encrypted random code stored on the terminal application, wherein the encrypted random code is generated after the gateway authenticates the equipment, and the encrypted random code is arranged in one-to-one correspondence with the equipment code of the equipment;
and the second sending module is used for sending the identity authentication request of the user and the encrypted random code to a gateway together, decrypting the encrypted random code through the gateway after the user authentication is passed by the gateway, and associating the equipment code corresponding to the decrypted random code with the identity information of the user so as to facilitate the user to access the specific application.
9. The gateway dynamic access control apparatus according to claim 8, wherein a terminal application is installed on the terminal device, and a local listening port is started to listen to communication between the terminal device and the gateway after the terminal application is installed on the terminal device, and the terminal application generates a device code of the terminal device according to the information of the terminal device and stores the device code on the terminal application.
10. A storage medium storing a code program for performing a gateway dynamic access control method according to any one of claims 1 to 7.
CN202311436276.XA 2023-11-01 2023-11-01 Gateway dynamic access control method, device and storage medium Active CN117155718B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311436276.XA CN117155718B (en) 2023-11-01 2023-11-01 Gateway dynamic access control method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311436276.XA CN117155718B (en) 2023-11-01 2023-11-01 Gateway dynamic access control method, device and storage medium

Publications (2)

Publication Number Publication Date
CN117155718A true CN117155718A (en) 2023-12-01
CN117155718B CN117155718B (en) 2024-02-20

Family

ID=88901243

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311436276.XA Active CN117155718B (en) 2023-11-01 2023-11-01 Gateway dynamic access control method, device and storage medium

Country Status (1)

Country Link
CN (1) CN117155718B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650212A (en) * 2018-03-14 2018-10-12 北京云信万致科技有限公司 A kind of Internet of Things certification and access control method and Internet of Things security gateway system
US10108791B1 (en) * 2015-03-19 2018-10-23 Amazon Technologies, Inc. Authentication and fraud detection based on user behavior
CN113472716A (en) * 2020-03-30 2021-10-01 中移互联网有限公司 System access method, gateway device, server, electronic device, and storage medium
CN116032546A (en) * 2022-12-07 2023-04-28 北京天融信网络安全技术有限公司 Resource access method and device and electronic equipment
CN116248405A (en) * 2023-03-15 2023-06-09 广西北投信创科技投资集团有限公司 Network security access control method based on zero trust and gateway system and storage medium adopting same
CN116886343A (en) * 2023-06-27 2023-10-13 济南超级计算技术研究院 User access control method and system based on continuous authentication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10108791B1 (en) * 2015-03-19 2018-10-23 Amazon Technologies, Inc. Authentication and fraud detection based on user behavior
CN108650212A (en) * 2018-03-14 2018-10-12 北京云信万致科技有限公司 A kind of Internet of Things certification and access control method and Internet of Things security gateway system
CN113472716A (en) * 2020-03-30 2021-10-01 中移互联网有限公司 System access method, gateway device, server, electronic device, and storage medium
CN116032546A (en) * 2022-12-07 2023-04-28 北京天融信网络安全技术有限公司 Resource access method and device and electronic equipment
CN116248405A (en) * 2023-03-15 2023-06-09 广西北投信创科技投资集团有限公司 Network security access control method based on zero trust and gateway system and storage medium adopting same
CN116886343A (en) * 2023-06-27 2023-10-13 济南超级计算技术研究院 User access control method and system based on continuous authentication

Also Published As

Publication number Publication date
CN117155718B (en) 2024-02-20

Similar Documents

Publication Publication Date Title
CN109005155B (en) Identity authentication method and device
EP3723399A1 (en) Identity verification method and apparatus
US8646063B2 (en) Methods, apparatus, and computer program products for subscriber authentication and temporary code generation
US7640430B2 (en) System and method for achieving machine authentication without maintaining additional credentials
CN108471610B (en) Bluetooth connection control system
WO2014183526A1 (en) Identity recognition method, device and system
EP2879421B1 (en) Terminal identity verification and service authentication method, system, and terminal
JP5571854B2 (en) User account recovery
EP3195523B1 (en) Methods, devices and management terminals for establishing a secure session with a service
CN110611569B (en) Authentication method and related equipment
DK2414983T3 (en) Secure computer system
US11811739B2 (en) Web encryption for web messages and application programming interfaces
US20210203657A1 (en) Method, chip, device and system for authenticating a set of at least two users
CN109451504B (en) Internet of things module authentication method and system
CN108667800B (en) Access authority authentication method and device
CN110807210B (en) Information processing method, platform, system and computer storage medium
US20180314813A1 (en) Communication device, communication method and computer program
CN109460647B (en) Multi-device secure login method
RU2698424C1 (en) Authorization control method
CN117155718B (en) Gateway dynamic access control method, device and storage medium
CN105871788B (en) Password generation method and device for login server
CN113079506A (en) Network security authentication method, device and equipment
US11849326B2 (en) Authentication of a user of a software application
CN114301639B (en) Connection establishment method and device
CN110225011B (en) Authentication method and device for user node and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant