CN201663659U - Front end of conditional access system and scriber management system - Google Patents
Front end of conditional access system and scriber management system Download PDFInfo
- Publication number
- CN201663659U CN201663659U CN200920277479.8U CN200920277479U CN201663659U CN 201663659 U CN201663659 U CN 201663659U CN 200920277479 U CN200920277479 U CN 200920277479U CN 201663659 U CN201663659 U CN 201663659U
- Authority
- CN
- China
- Prior art keywords
- management system
- subscriber management
- conditional access
- unit
- pki
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000004891 communication Methods 0.000 claims abstract description 30
- 230000005540 biological transmission Effects 0.000 claims abstract description 26
- 238000010200 validation analysis Methods 0.000 claims description 19
- 238000012546 transfer Methods 0.000 claims description 6
- 230000015572 biosynthetic process Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 238000000034 method Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000012797 qualification Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Images
Abstract
The utility model provides a front end of a conditional access system and a scriber management system. The front end of the conditional access system comprises a first channel building unit and a first data transmission unit; the first channel building unit is used for building a communication channel based on safety shell SSH protocol between the front end of the conditional access system and the scriber management system; the first data transmission unit is used for conducting data transmission through the communication channel built by the first channel building unit. In the embodiment of the utility model, the SSH safety channel can be built between the front end of the conditional access system and the scriber management system; all transmission data can be encrypted; in this way, attack from illegal person, and DNS and IP spoofing can be prevented.
Description
Technical field
The utility model relates to digital TV field, particularly a kind of conditional access system front-end and Subscriber Management System.
Background technology
Condition receiving system (CAS, Conditional Access System) is the system that is used for controlling users broadcasting service or program reception, be that the user can only watch broadcast service or the program through authorizing, its objective is in television system the user is carried out authorization control and empowerment management, thus the paid service of realization Radio Data System.
Subscriber Management System (SMS, Subscriber Management System) is the bridge between digital-TV operator and the user, can realize the user management and the service of operator by this system.
But the inventor finds that the defective of prior art is in realizing process of the present utility model: can not the guaranteed conditions receiving system and Subscriber Management System between safety of data transmission, thereby can not prevent illegal person's attack, can not prevent domain name system (DNS, Domain Name System) and IP spoofing.
The utility model content
The utility model embodiment provides a kind of conditional access system front-end and Subscriber Management System, by between conditional access system front-end and Subscriber Management System, setting up secured communication channel based on Secure Shell (SSH:Secure Shell) agreement by authentication mode, can encrypt the data of all transmission between conditional access system front-end and the Subscriber Management System, comprise various keys are encrypted.Can improve safety of data transmission between conditional access system front-end and the Subscriber Management System.
The utility model embodiment provides a kind of conditional access system front-end, and this conditional access system front-end comprises:
First passage is set up the unit, be used for and Subscriber Management System between set up communication port based on Secure Shell SSH agreement;
First data transmission unit is used to utilize this first passage to set up the communication port of setting up the unit and carries out transfer of data.
The utility model embodiment provides a kind of Subscriber Management System, and this Subscriber Management System comprises:
Second channel is set up the unit, be used for and conditional access system front-end between set up communication port based on Secure Shell SSH agreement;
Second data transmission unit is used to utilize this second channel to set up the communication port of setting up the unit and carries out transfer of data.
The beneficial effect of the utility model embodiment is, between conditional access system front-end and Subscriber Management System, set up the SSH escape way, can encrypt the data of all transmission, so not only can prevent illegal person's attack, and can prevent DNS and IP spoofing.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present utility model, constitutes the application's a part, does not constitute qualification of the present utility model.In the accompanying drawings:
Fig. 1 is the formation schematic diagram of the conditional access system front-end of the utility model embodiment 1;
Fig. 2 is the formation schematic diagram that the first passage of the utility model embodiment 1 is set up the unit;
Fig. 3 is the formation schematic diagram of the Subscriber Management System of the utility model embodiment 2;
Fig. 4 is the formation schematic diagram that the second channel of the utility model embodiment 2 is set up the unit;
Fig. 5 is the formation schematic diagram based on the digital television system front end of SSH agreement of the utility model embodiment 3;
Fig. 6 is the workflow diagram of the digital television system front end of the utility model embodiment 3.
Embodiment
For making the purpose of this utility model, technical scheme and advantage clearer, the utility model embodiment is described in further detail below in conjunction with accompanying drawing.At this, illustrative examples of the present utility model and explanation thereof are used to explain the utility model, but not as to qualification of the present utility model.
Embodiment 1
The utility model embodiment provides a kind of conditional access system front-end, and as shown in Figure 1, this conditional access system front-end comprises: first passage is set up the unit 101 and first data transmission unit 102;
Wherein, this first passage set up that unit 101 is used for and Subscriber Management System between set up communication port based on Secure Shell SSH agreement; The communication port that this first data transmission unit 102 is used to utilize this first passage to set up unit 101 foundation carries out transfer of data.
In the present embodiment, this first passage is set up can be by finger daemon of operation in the unit 101, and response is set up request from the passage of this Subscriber Management System, sets up SSH safety with this and connects.For example, this first passage is set up unit 101 can start a finger daemon, and this finger daemon operation automatically gets up and monitors and wait for always the passage foundation request that this Subscriber Management System sends in corresponding ports; In the time of this request comes, this finger daemon can produce a subprocess, carries out current connection by this subprocess and sets up processing.
In the present embodiment, when this first passage of this conditional access system front-end set up between unit 101 and the Subscriber Management System determine that the SSH escape way is set up after, this first data transmission unit 102 and Subscriber Management System can be by this SSH escape way transmission data.Like this; the secure communication mechanism of " encryption tunnel " is provided for the network service of conditional access system front-end and Subscriber Management System; not only can carry out very safe encipherment protection, also strengthen security mechanism simultaneously the Subscriber Management System authentication to Content of Communication.
In the present embodiment, as shown in Figure 2, this first passage is set up unit 101 and is comprised: request receiving element 201, authentication ' unit 202, first ciphering unit 203, first transmitting element 204, first information receiving element 205, first decrypting device 206 and first passage determining unit 207;
Wherein, request receiving element 201 is used to receive the passage foundation request that comprises the Subscriber Management System PKI that Subscriber Management System sends;
Authentication ' unit 202 is connected with this request receiving element 201, is used to determine whether this Subscriber Management System PKI that receives is consistent with the Subscriber Management System PKI that prestores; Wherein, conditional access system front-end can receive the Subscriber Management System PKI of Subscriber Management System transmission and store this Subscriber Management System PKI;
Wherein, this identity validation information also comprises being used for the data of consulting session key except comprising the condition receiving system PKI, and is similar with prior art, repeats no more herein.
First transmitting element 204 is connected with this first ciphering unit 203, is used for the identity validation information that this first ciphering unit 203 is encrypted is sent to this Subscriber Management System;
First information receiving element 205, be used to receive the information that Subscriber Management System returns according to the identity validation information of encrypting, the information of returning is the information of this Subscriber Management System utilization from the conditional access system front-end public key encryption of the identity validation information acquisition of encryption;
First passage determining unit 207 is connected with this first decrypting device 206, is used for determining to have set up between this conditional access system front-end and this Subscriber Management System communication port based on the SSH agreement when these first decrypting device, 206 successful decryptions.
As shown in Figure 1, this conditional access system front-end also comprises: the first key generation unit 103, key receiving element 104 and first memory cell 105;
Wherein, the first key generation unit 103 is used for formation condition receiving system front end PKI and condition receiving system private key; Key receiving element 104 is used to receive the Subscriber Management System PKI that this Subscriber Management System that this Subscriber Management System sends generates; First memory cell 105 is connected with key receiving element 104 with this first key generation unit 103, is used to store conditional access system front-end PKI and the condition receiving system private key that this first key generation unit 103 generates; And the Subscriber Management System PKI of these key receiving element 104 receptions.
By the foregoing description as can be known, by between conditional access system front-end and Subscriber Management System, setting up secured communication channel based on the SSH agreement by authentication mode, can encrypt the data of all transmission between conditional access system front-end and the Subscriber Management System, comprise various keys are encrypted.So not only rogue attacks can be prevented, and DNS and IP spoofing can be prevented.
Embodiment 2
The utility model embodiment provides a kind of Subscriber Management System, and as shown in Figure 3, this Subscriber Management System comprises: second channel is set up the unit 301 and second data transmission unit 302;
Wherein, second channel set up that unit 301 is used for and conditional access system front-end between set up communication port based on Secure Shell SSH agreement; The communication port that second data transmission unit 302 is used to utilize this second channel to set up unit 301 foundation carries out transfer of data.
In the present embodiment, when this second channel of this Subscriber Management System set up between unit 301 and the conditional access system front-end determine that the SSH escape way is set up after, this second data transmission unit 302 and conditional access system front-end can be by this SSH escape way transmission data.Like this; the secure communication mechanism of " encryption tunnel " is provided for the network service of conditional access system front-end and Subscriber Management System; not only can carry out very safe encipherment protection, also strengthen security mechanism simultaneously the Subscriber Management System authentication to Content of Communication.
In the present embodiment, as shown in Figure 4, this second channel is set up unit 301 and is comprised: request transmitting unit 401, second information receiving unit 402, second decrypting device 403, second ciphering unit 404 and second transmitting element 405;
Wherein, request transmitting unit 401 is used for sending the passage that comprises the Subscriber Management System PKI to the Subscriber Management System front end and sets up request;
Second information receiving unit 402, be used for the condition of acceptance receiving system front end information that the request of setting up is returned according to this passage, wherein, to be this conditional access system front-end utilization set up the information that the Subscriber Management System PKI that obtains the request obtains the identity validation information encryption that comprises the conditional access system front-end PKI from passage to the information that the request of setting up is returned according to this passage;
Second transmitting element 405 is connected with this second ciphering unit 404, is used for these second ciphering unit, 404 information encrypted are sent to conditional access system front-end.
As shown in Figure 3, this Subscriber Management System also comprises: the second key generation unit 303, second memory cell 304 and key transmitting element 305;
Wherein, the second key generation unit 303 is used to generate Subscriber Management System private key and Subscriber Management System PKI; Second memory cell 304 is used to store this Subscriber Management System private key and this Subscriber Management System PKI that this second key generation unit 303 generates;
In addition, this second memory cell 304 also can store the conditional access system front-end PKI that second decrypting device 403 obtains;
Key transmitting element 305 is used for the Subscriber Management System PKI that this second key generation unit 303 generates is sent to conditional access system front-end.
By the foregoing description as can be known, by between conditional access system front-end and Subscriber Management System, setting up secured communication channel based on the SSH agreement by authentication mode, can encrypt the data of all transmission between conditional access system front-end and the Subscriber Management System, comprise various keys are encrypted, so not only rogue attacks can be prevented, and DNS and IP spoofing can be prevented.
Embodiment 3
The utility model embodiment provides a kind of digital television system front end, and as shown in Figure 5, this digital television system front end comprises conditional access system front-end 501 and Subscriber Management System 502;
Wherein, this conditional access system front-end 501 can be the 1 described conditional access system front-end as embodiment, and this Subscriber Management System 502 can be the 2 described Subscriber Management Systems as embodiment, repeats no more herein.
Below in conjunction with Fig. 6, the communication port process of setting up based on the SSH agreement between conditional access system front-end in the digital television system 501 and the Subscriber Management System 502 is elaborated by example.
As shown in Figure 6, foundation comprises based on the step of the communication port of SSH agreement:
In the present embodiment, conditional access system front-end 501 can carry out the filtration of an IP address and port especially in order to improve the fail safe of telemanagement, is used as conditional access system front-end 501 IP trusty address and ports.In this way, then have only the IP address of the Subscriber Management System 502 of being trusted and port just can utilize this conditional access system front-end 501 of SSH safety connected reference; And unwarranted Subscriber Management System 502 haves no right to conduct interviews.
In the present embodiment, this Subscriber Management System 502 can generate pair of secret keys automatically when starting, comprise Subscriber Management System private key and Subscriber Management System PKI, can be with this key in the file that is kept at local appointment; Simultaneously, this Subscriber Management System 502 sends to this conditional access system front-end 501 with this Subscriber Management System PKI; This conditional access system front-end 501 is stored after receiving this Subscriber Management System PKI.
In the present embodiment, this conditional access system front-end 501 also can generate pair of secret keys automatically when starting, comprise conditional access system front-end private key and conditional access system front-end PKI, can be with this key in the file that is kept at local appointment.But be not limited thereto, this conditional access system front-end 501 also can generate this key when receiving passage foundation request right, can determine according to actual conditions.
In the present embodiment, conditional access system front-end 501 can be searched the Subscriber Management System PKI that prestores from local memory cell, whether Subscriber Management System PKI that then this is prestored and the Subscriber Management System PKI that receives are compared, consistent with the Subscriber Management System PKI that receives with the Subscriber Management System PKI of determining to prestore.
Wherein, this identity validation information also comprises being used for the data of consulting session key except comprising the condition receiving system PKI, and is similar with prior art, repeats no more herein.
After step 606, Subscriber Management System 502 were received identity validation information after the encryption that conditional access system front-end 501 sends, the identity validation information after utilizing the Subscriber Management System private key that prestores to this encryption was decrypted;
In the present embodiment, the identity validation information after this encryption is that this conditional access system front-end 501 utilizes from passage and sets up the information that the Subscriber Management System PKI that obtains the request obtains the identity validation information encryption that comprises the conditional access system front-end PKI.After the identity validation information of the Subscriber Management System private key that these Subscriber Management System 502 usefulness prestore after to this encryption is decrypted, can obtain to comprise the information of this conditional access system front-end PKI.
Wherein, this relevant information can comprise some data of relevant session key agreement, and is similar with prior art, repeats no more herein.
The safety that step 609, conditional access system front-end 501 and Subscriber Management System 502 utilize this communication port to carry out data transmits.
Step 610, passage are set up process and are finished.
By the foregoing description as can be known, by between conditional access system front-end and Subscriber Management System, setting up secured communication channel based on the SSH agreement by authentication mode, can encrypt the data of all transmission between conditional access system front-end and the Subscriber Management System, comprise various keys are encrypted.So not only rogue attacks can be prevented, and DNS and IP spoofing can be prevented; In addition, the data by the transmission of this communication port are through overcompression, speed that can speeding up data transmission.
The professional can also further recognize, the unit and the algorithm steps of each example of describing in conjunction with embodiment disclosed herein, can realize with electronic hardware, computer software or the combination of the two, for the interchangeability of hardware and software clearly is described, the composition and the step of each example described prevailingly according to function in the above description.These functions still are that software mode is carried out with hardware actually, depend on the application-specific and the design constraint of technical scheme.The professional and technical personnel can use distinct methods to realize described function to each specific should being used for, but this realization should not thought and exceeds scope of the present utility model.
The method of describing in conjunction with embodiment disclosed herein or the step of algorithm can use the software module of hardware, processor execution, and perhaps the combination of the two is implemented.Software module can place the storage medium of any other form known in random asccess memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or the technical field.
Above-described embodiment; the purpose of this utility model, technical scheme and beneficial effect are further described; institute is understood that; the above only is an embodiment of the present utility model; and be not used in and limit protection range of the present utility model; all within spirit of the present utility model and principle, any modification of being made, be equal to replacement, improvement etc., all should be included within the protection range of the present utility model.
Claims (8)
1. a conditional access system front-end is characterized in that, described conditional access system front-end comprises:
First passage is set up the unit, be used for and Subscriber Management System between set up communication port based on Secure Shell SSH agreement;
First data transmission unit is used to utilize described first passage to set up the communication port of setting up the unit and carries out transfer of data.
2. conditional access system front-end according to claim 1 is characterized in that, described first passage is set up the unit and comprised:
The request receiving element is used to receive the passage foundation request that comprises the Subscriber Management System PKI that described Subscriber Management System sends;
Authentication ' unit is connected with the described request receiving element, is used to determine whether the described Subscriber Management System PKI that receives is consistent with the Subscriber Management System PKI that prestores;
First ciphering unit, be connected with described authentication ' unit, be used for when described authentication ' unit determines that the Subscriber Management System PKI that receives is consistent with the Subscriber Management System PKI that prestores, utilizing described Subscriber Management System PKI that the identity validation information that comprises described conditional access system front-end PKI is encrypted;
First transmitting element is connected with described first ciphering unit, is used for the identity validation information that described first ciphering unit is encrypted is sent to described Subscriber Management System;
First information receiving element, be used to receive the information that described Subscriber Management System returns according to the identity validation information of encrypting, the information of returning is the information of described Subscriber Management System utilization from the conditional access system front-end public key encryption of the identity validation information acquisition of encryption;
First decrypting device is connected with described first information receiving element, is used to utilize described conditional access system front-end private key that the information that described first information receiving element receives is decrypted;
The first passage determining unit is connected with described first decrypting device, is used for when the described first decrypting device successful decryption, determines to set up between described conditional access system front-end and the described Subscriber Management System communication port based on the SSH agreement.
3. conditional access system front-end according to claim 2 is characterized in that, described conditional access system front-end also comprises:
The first key generation unit is used to generate described conditional access system front-end PKI and described condition receiving system private key;
The key receiving element is used to receive the Subscriber Management System PKI that described Subscriber Management System that described Subscriber Management System sends generates;
First memory cell is connected with the key receiving element with the described first key generation unit, is used to store described conditional access system front-end PKI and the described condition receiving system private key that the described first key generation unit generates; And the Subscriber Management System PKI of described key receiving element reception.
4. a Subscriber Management System is characterized in that, described Subscriber Management System comprises:
Second channel is set up the unit, be used for and conditional access system front-end between set up communication port based on Secure Shell SSH agreement;
Second data transmission unit is used to utilize described second channel to set up the communication port of setting up the unit and carries out transfer of data.
5. Subscriber Management System according to claim 4 is characterized in that, described second channel is set up the unit and comprised:
Request transmitting unit is used for sending the passage that comprises the Subscriber Management System PKI to conditional access system front-end and sets up request;
Second information receiving unit, be used to receive the described conditional access system front-end information that the request of setting up is returned according to described passage, wherein, to be described conditional access system front-end utilization set up the information that the Subscriber Management System PKI that obtains the request obtains the identity validation information encryption that comprises the conditional access system front-end PKI from passage to the information that the request of setting up is returned according to described passage;
Second decrypting device is connected with described second information receiving unit, is used to utilize the Subscriber Management System private key that prestores that the information that described second information receiving unit receives is decrypted, to obtain described conditional access system front-end PKI;
Second ciphering unit is connected with described second decrypting device, and the condition receiving system PKI that is used to utilize described second decrypting device to obtain is encrypted relevant information;
Second transmitting element is connected with described second ciphering unit, is used for the described second ciphering unit information encrypted is sent to described conditional access system front-end.
6. Subscriber Management System according to claim 5 is characterized in that, described Subscriber Management System also comprises:
The second key generation unit is used to generate described Subscriber Management System private key and described Subscriber Management System PKI;
Second memory cell is used to store described Subscriber Management System private key and the described Subscriber Management System PKI that the described second key generation unit generates, and stores the described conditional access system front-end PKI that described second decrypting device obtains;
The key transmitting element is used for the described Subscriber Management System PKI that the described second key generation unit generates is sent to described conditional access system front-end.
7. a digital television system front end is characterized in that, described digital television system front end comprises conditional access system front-end, and described conditional access system front-end comprises the described conditional access system front-end of each claim of claim 1 to 3.
8. digital television system front end according to claim 7 is characterized in that, described digital television system front end also comprises Subscriber Management System, and described Subscriber Management System comprises the described Subscriber Management System of each claim of claim 4 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200920277479.8U CN201663659U (en) | 2009-11-27 | 2009-11-27 | Front end of conditional access system and scriber management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200920277479.8U CN201663659U (en) | 2009-11-27 | 2009-11-27 | Front end of conditional access system and scriber management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN201663659U true CN201663659U (en) | 2010-12-01 |
Family
ID=43234076
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200920277479.8U Expired - Fee Related CN201663659U (en) | 2009-11-27 | 2009-11-27 | Front end of conditional access system and scriber management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN201663659U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106210775A (en) * | 2016-08-26 | 2016-12-07 | 浙江大华技术股份有限公司 | A kind of method of video-encryption, camera head and video processing platform |
WO2018095240A1 (en) * | 2016-11-24 | 2018-05-31 | 阿里巴巴集团控股有限公司 | Method and device for establishing secure channel in cluster |
-
2009
- 2009-11-27 CN CN200920277479.8U patent/CN201663659U/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106210775A (en) * | 2016-08-26 | 2016-12-07 | 浙江大华技术股份有限公司 | A kind of method of video-encryption, camera head and video processing platform |
WO2018095240A1 (en) * | 2016-11-24 | 2018-05-31 | 阿里巴巴集团控股有限公司 | Method and device for establishing secure channel in cluster |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100967323B1 (en) | Method and apparatus for security in a data processing system | |
US9055047B2 (en) | Method and device for negotiating encryption information | |
JP4545197B2 (en) | Wireless network system and communication method using the same | |
JP4804983B2 (en) | Wireless terminal, authentication device, and program | |
EP2037621B1 (en) | Method and device for deriving local interface key | |
CN101969638B (en) | Method for protecting international mobile subscriber identity (IMSI) in mobile communication | |
US9392453B2 (en) | Authentication | |
KR100852146B1 (en) | System and method for lawful interception using trusted third parties in voip secure communications | |
CN101772024B (en) | User identification method, device and system | |
EP1748615A1 (en) | Method and system for providing public key encryption security in insecure networks | |
EP3422630B1 (en) | Access control to a network device from a user device | |
GB2404126A (en) | Secure communications using a secret key valid for a certain period and verified using a time stamp | |
CA2690778A1 (en) | System and method of creating and sending broadcast and multicast data | |
WO2012024872A1 (en) | Method, system and related apparatus for encrypting communication in mobile internet | |
Aura et al. | Reducing reauthentication delay in wireless networks | |
CN101895882A (en) | Data transmission method, system and device in WiMAX system | |
CN113612797A (en) | Kerberos identity authentication protocol improvement method based on state cryptographic algorithm | |
WO2005088892A1 (en) | A method of virtual challenge response authentication | |
CN112672342B (en) | Data transmission method, device, equipment, system and storage medium | |
CN105429962A (en) | General intermediate network service establishing method and system facing encryption data | |
JP4938408B2 (en) | Address management system, address management method and program | |
CN115022868A (en) | Satellite terminal entity authentication method, system and storage medium | |
CN104168565A (en) | Method for controlling safe communication of intelligent terminal under undependable wireless network environment | |
CN110572825A (en) | Wearable equipment authentication device and authentication encryption method | |
CN201663659U (en) | Front end of conditional access system and scriber management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20101201 Termination date: 20171127 |