CN100499514C - Method for ensuring consistency between controlled users of snooping network side and snooping triggering side - Google Patents

Method for ensuring consistency between controlled users of snooping network side and snooping triggering side Download PDF

Info

Publication number
CN100499514C
CN100499514C CNB031495524A CN03149552A CN100499514C CN 100499514 C CN100499514 C CN 100499514C CN B031495524 A CNB031495524 A CN B031495524A CN 03149552 A CN03149552 A CN 03149552A CN 100499514 C CN100499514 C CN 100499514C
Authority
CN
China
Prior art keywords
user data
controlled user
synchronisation source
controlled
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031495524A
Other languages
Chinese (zh)
Other versions
CN1571369A (en
Inventor
程作品
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB031495524A priority Critical patent/CN100499514C/en
Publication of CN1571369A publication Critical patent/CN1571369A/en
Application granted granted Critical
Publication of CN100499514C publication Critical patent/CN100499514C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method of assuring the consistency of controlled user data between monitoring network side and monitoring triggering side, including: A. setting one of the monitoring network side and monitoring triggering side as a synchronous source and the other as a synchronous object; B. the synchronous source sends its own controlled user data to the synchronous object; C. the synchronous object compares its own controlled user data with that of the synchronous source: if the synchronous object has no corresponding controlled user data to be the same as that of the synchronous source, correspondingly adding or deleting the controlled user data in the synchronous object according to the controlled user data of the synchronous source. The method assures the consistency of the controlled user data between the monitoring network side and the monitoring triggering side.

Description

Guarantee to monitor the method for network side and the controlled users consistency of monitoring triggering side
Technical field
The present invention relates to monitoring technique, particularly a kind of method that guarantees to monitor network side and the controlled users consistency of monitoring triggering side.
Background technology
Lawful Interception is the requirement of answering state's laws, and operator provides monitoring triggering interface, equipment manufacturers to provide and monitors network side voice and incident transmission solution.According to legal mandate, state security organization can require Virtual network operator or service provider that the snoop results of specific objective is provided to specific monitoring authorities or actuator (LEA).
At present, Lawful Interception is normally realized according to the scheme that circuit domain of stipulating in ETSI (ETSI) agreement and packet domain are separated from each other, is existed the audiomonitor of variety of way and the networking mode of equipment room.As shown in Figure 1, Fig. 1 is for monitoring the structure chart of network, this is monitored network and is made up of listening center (LEMF), legal access function equipment (LIAF) and mobile switching centre (MSC) or other preservation controlled user data equipment, interface between LEMF and the LIAF is HI1, HI2 and HI3, wherein, HI1 is the interface that is used for transfer management information, and HI2 is the interface that is used to transmit Intercept related information, and HI3 is the interface that is used to transmit Content of communciation; LIAF and MSC or other interfaces of preserving between the controlled user data equipment are X1-1, X2, X3, and wherein, X1-1 is the interface that is used for transfer management information, and X2 is the interface that is used to transmit Intercept related information, and X3 is the interface that is used to transmit Content of communciation.
Controlled user's registration or cancel process and the relevant interface transport process as shown in Figure 2, this monitoring system is made up of MSC or other preservation controlled user data equipment of LEMF that monitors network side and monitoring triggering side, LEMF and MSC or other are preserved between the controlled user data equipment and are connected (not providing among the figure) by LIAF, and its specific descriptions are:
Step 1, when controlled user registers, LEMF preserves controlled user data equipment by HI1, X1-1 interface to MSC or other and sends and set controlled user instruction, this is set controlled user instruction and comprises controlled user profile, interception type and time etc.;
Step 2, MSC or other preservation controlled user data equipment are handled the controlled user instruction of the described setting of step 1, handling the back returns the setting success or sets unsuccessful result to LEMF by X1-1, if what return is MSC or the controlled user's successful result of other preservation controlled user data apparatus settings, then preserve this controlled user of mark on the controlled user data equipment at MSC or other, otherwise, preserve on the controlled user data equipment not this controlled user of mark at MSC or other;
What return is to set successful result if step 3 step 2 is described, this controlled user data of record on LEMF equipment then, otherwise, on LEMF equipment, do not write down this controlled user data;
Step 4, when controlled user cancels, LEMF preserves controlled user data equipment by HI1, X1-1 interface to MSC or other and sends and cancel controlled user instruction, this is cancelled controlled user instruction and comprises controlled user profile;
Step 5, MSC or other are preserved controlled user data equipment and are cancelled controlled user instruction and handle step 4 is described, if MSC or other are preserved the controlled user's success of controlled user data device revocation, then preserve this controlled user of deletion on the controlled user data equipment at MSC or other, and return the successful result of deletion to LEMF by X1-1, otherwise, on MSC or other preservation controlled user data equipment, do not delete this controlled user, and return the unsuccessful result of deletion to LEMF by X1-1;
That return is the successful result of deletion if step 6 step 5 is described, then deletes this controlled user data on LEMF equipment, otherwise, on LEMF equipment, do not delete this controlled user data.
There are following situation in the setting recited above or the process of cancelling:
Situation one, because network is former thereby cause the controlled user data monitored between network side and the monitoring triggering side inconsistent: preserve controlled user data equipment to may being wide area network or local area network (LAN) the LEMF from MSC or other, no matter all might there be the situation of data transmission exception in the sort of network, as: lost data packets etc.For example: preserve the controlled user's success of setting on the controlled user data equipment at MSC or other, it is to having lost that but the successful setting result who returns is transmitted on Network Transmission, at this moment controlled user will occur has sign at MSC, does not have the situation of expression at listening center.
Situation two, owing to unit exception causes the controlled user data monitored between network side and the monitoring triggering side inconsistent: preserve at MSC or other and to set controlled user's success on controlled user data equipment, the successful setting result who returns gives LEMF, but the equipment of LEMF has been paralysed, at this moment controlled user also can occur has sign at MSC, does not have the situation of expression at listening center.
Monitoring network side and the controlled user data between the monitoring triggering side that both of these case causes are inconsistent, will cause in the course of time owing to junk data is redundant to make whole monitoring system scarcity of resources, finally cause the monitoring system can't operate as normal.
Summary of the invention
In view of this, the invention provides a kind of method that guarantees to monitor network side and the controlled users consistency of monitoring triggering side, this method has guaranteed to monitor the controlled user data unanimity between network side and the monitoring triggering side, thereby guarantees the operate as normal of monitoring system.
According to above-mentioned purpose, technical scheme of the present invention is achieved in that
A kind of method that guarantees to monitor network side and the controlled users consistency of monitoring triggering side, this method comprises:
A, be provided with and monitor one of network side and monitoring triggering side and be synchronisation source, opposite side is synchronous target;
B, synchronisation source send to synchronous target to the controlled user data of self;
C, synchronous target are compared the controlled user data of self with the controlled user data from synchronisation source, if there is not synchronously corresponding controlled user data identical in the target, then adds or delete controlled user data according to the controlled user data of synchronisation source is corresponding in target synchronously with controlled user data from synchronisation source; If there is synchronously corresponding controlled user data identical in the target with controlled user data from synchronisation source, a mark is set then for this identical controlled user data, take turns the resource inspection end to this after, synchronously target initiates to contain the interpolation instruction or the delete instruction of the controlled user data that was not labeled to synchronisation source, and synchronisation source receives that this instruction back is according to the controlled user data interpolation that was not labeled or the controlled user data of deleting self.
Described step B is provided with the verification end mark that this is taken turns after further being included in and sending controlled user data;
Described step C determines that this process of taking turns the resource inspection end is: judge and verify end mark, if set then should be taken turns the resource inspection end; Otherwise, continue this and take turns resource inspection.
This method further comprises: a timer is set on synchronisation source, and when timer expiry, execution in step B.
Described step B further comprises: before synchronous target sent to synchronous target to the controlled user data of self, target sent the resource inspection instruction to synchronisation source synchronously at synchronisation source.
Described step B also comprises: target sends to synchronisation source to the controlled user data of self to synchronisation source synchronously; Described step C also comprises: synchronisation source is compared the controlled user data of self with the controlled user data of coming the motor synchronizing target, if there is not corresponding controlled user data identical in the synchronisation source, then in synchronisation source, add accordingly or the deletion controlled user data according to the controlled user data of synchronous target with the controlled user data of coming the motor synchronizing target.
This method further comprises: on synchronisation source, a timer is set simultaneously with synchronous target, and when timer expiry, execution in step B.
The described timer time regularly is minute being unit.
Described step B further comprises: adopt the mode of poll to send controlled user data.
The mode of described employing poll sends controlled user data and further comprises:
A, the position that label is set are 0, and the controlled user data that each transmission is set is a definite value;
B, send this definite value the controlled user data number to synchronous target, the position of this label is added this definite value; C, judge whether the position of this label is last controlled user data, if, finish this label position poll, otherwise, step b returned.
Described monitoring network side comprises listening center, and described monitoring triggering side comprises mobile switching centre or preserves the equipment of controlled user data.
By technique scheme as can be seen, in order to guarantee the operate as normal of monitoring system, the present invention is provided with the controlled user data unanimity of monitoring between network side and the monitoring triggering side.For the controlled user data unanimity of monitoring between network side and the monitoring triggering side is set, the present invention has adopted the regularly method of resource inspection.Method provided by the invention has guaranteed to monitor the controlled user data unanimity between network side and the monitoring triggering side, has reduced the appearance of junk data, thereby reduces the shared monitoring system resource of junk data, guarantees the operate as normal of monitoring system.
Description of drawings
Fig. 1 is for monitoring the structure chart of network.
Fig. 2 is controlled user's registration or cancels process and relevant interface transport process figure.
Fig. 3 is the controlled user's of the present invention registration or an enforcement illustration of cancelling process.
Fig. 4 is the controlled user's of the present invention registration or another enforcement illustration of cancelling process.
Embodiment
In order to make the purpose, technical solutions and advantages of the present invention clearer, by the following examples and with reference to accompanying drawing, the present invention is described in more detail.
The present invention adopts to increase and decrease between the equipment of the MSC of LEMF that monitors network side and monitoring triggering side or other preservation controlled user data and confirms instruction or increase the timing verification mechanism, makes the controlled user data unanimity between monitoring network side and the monitoring triggering side.
As shown in Figure 3, Fig. 3 is the controlled user's of the present invention registration or an enforcement illustration of cancelling process, and it increases on the X1-1 interface between LEMF and the MSC confirms instruction, and the concrete steps of this process are:
When controlled user registers:
Steps A 1, LEMF preserve the controlled user instruction of controlled user data equipment transmission setting by HI1, X1-1 interface to MSC or other, and this is set controlled user instruction and comprises controlled user profile, interception type and time etc.;
Step B1, MSC or other are preserved controlled user data equipment the controlled user instruction of steps A 1 described setting are handled, if MSC or other are preserved the controlled user's success of controlled user data apparatus settings, then return and set controlled user's successful result, and preserve timer T1 of startup on the controlled user data equipment at MSC or other, otherwise, process ends;
What return is to set successful result if step C1 step B1 is described, then on LEMF equipment, write down this controlled user data, preserve controlled user data equipment for simultaneously MSC or other and return the affirmation instruction, otherwise, this controlled user data on LEMF equipment, do not write down;
Step D1, MSC or other were preserved controlled user data equipment and receive the affirmation instruction in the times of timer T1 defined, then on MSC or other preservation controlled user data equipment, do not do operation, otherwise, then preserve this controlled user data of deletion on the controlled user data equipment at MSC or other.
When controlled user cancels:
Steps A 2, LEMF cancel controlled user instruction by HI1, X1-1 interface to MSC or other preservation controlled user data equipment transmissions, and this is cancelled controlled user instruction and comprises controlled user profile;
Step B2, MSC or other are preserved controlled user data equipment and are cancelled controlled user instruction and handle steps A 2 is described, if MSC or other are preserved the controlled user's success of controlled user data unit deletion, that then return is the result who cancels controlled user's success, and preserve timer T1 of startup on the controlled user data equipment at MSC or other, otherwise, process ends;
That return is the successful result of deletion if step C2 step B2 is described, then on LEMF equipment, delete this controlled user data, preserve controlled user data equipment for simultaneously MSC or other and return the affirmation instruction, otherwise, this controlled user data on LEMF equipment, do not deleted;
Step D2, MSC or other are preserved controlled user data equipment and receive the affirmation instruction in timer T1 official hours, then on MSC or other preservation controlled user data equipment, do not operate, otherwise, then on MSC or other preservation controlled user data equipment, delete controlled user data.
The present invention can also verification mechanism guarantees to monitor network side and the consistent problem of monitoring triggering side controlled user data by increasing regularly, its detailed process as shown in Figure 4, Fig. 4 is the controlled user's of the present invention registration or another enforcement illustration of cancelling process, specifies as follows:
Steps A 3, preserving controlled user data equipment when LEMF and MSC or other can both proper communication, and the communication between the two just often, opens a timer T2 on LEMF, and the time span of this timer T2 can be a minute level;
Step B3, when the overtime triggering of timer T2, preserve controlled user data equipment to all MSC that link to each other with LEMF or other and initiate resource inspection and instruct by the X1-1 interface;
Step C3, after MSC or other are preserved controlled user data equipment and are received this resource inspection instruction, set a label, according to label position poll ground controlled user data is fed back to LEMF by X1-1, set label process can for: the position that the beginning label is set is 0, the number of users that at every turn feeds back to LEMF is 10, MSC or other preservation controlled user data equipment return and are numbered 0~9 controlled user data when asking for the first time, the position that label is set simultaneously is 10, as so continuous correction label position, if label position is run into the end, then rounds of inquiries finish;
Step D3, according to the controlled user profile in the resource inspection return messages, LEMF compares the controlled user profile of returning with the controlled user profile of LEMF, if there is not corresponding controlled user to be complementary, then cancels this controlled user or this user is added among the LEMF.
The resource inspection process also can be exchanging between LEMF and MSC or other preservation controlled user data equipment, promptly based on LEMF, regularly sending out resource inspection has instructed, specifically describe as follows: steps A 4, preserving controlled user data equipment when LEMF and MSC or other can both proper communication, and the communication between the two just often, preserves timer T2 of unlatching on the controlled user data equipment at MSC or other;
Step B4, preserve LEMF that controlled user data equipment links to each other by the X1-1 interface to all and MSC or other and initiate resource inspection and instruct when timer T2 is overtime when triggering;
Step C4, LEMF set a label after receiving this resource inspection instruction, according to label position poll ground controlled user data are fed back to MSC or other preservation controlled user data equipment by X1-1;
Step D4, according to the controlled user profile in the resource inspection return messages, MSC or other are preserved controlled user data equipment the controlled user profile of returning are compared with MSC or other controlled user profile of preserving in the controlled user data equipment, if there is not corresponding controlled user to be complementary, then initiation is cancelled this controlled user instruction or this user is added in MSC or other preservation controlled user data equipment.
In order further to guarantee the tightness of resource inspection process, the present invention has also increased the verification end mark, below preserves controlled user data equipment based on MSC or other, sends resource to LEMF and regularly verifies instruction this method, and its detailed process is:
Steps A 5, preserving controlled user data equipment when LEMF and MSC or other can both proper communication, and the communication between the two just often, preserves at MSC or other and opens a timer T2 on controlled user data equipment;
Step B5, preserve LEMF that controlled user data equipment links to each other by the X1-1 interface to all and MSC or other and initiate resource inspection and instruct when timer T2 is overtime when triggering;
After step C5, LEMF receive this resource inspection instruction, set a label, according to label position poll ground controlled user data is fed back to MSC or other by X1-1 and preserves controlled user data equipment, fed back controlled user data after, the verification end mark that this is taken turns is set;
Step D5, according to the controlled user profile in the resource inspection return messages, MSC or other are preserved controlled user data equipment the controlled user profile of returning are compared with MSC or other controlled user profile of preserving in the controlled user data equipment, if there is not corresponding controlled user to be complementary, then initiation is cancelled this controlled user instruction or this user is added in MSC or other preservation controlled user data equipment, if have corresponding controlled user to be complementary, then the controlled user's of set mark;
Step e 5, judge that this is taken turns and whether finish according to verifying end mark, if finish, then MSC or other are preserved controlled user data equipment the user data that does not have mark and cross are initiated to add instruction or MSC or other are preserved controlled user data unit deletion operation to LEMF, this user who does not have mark to cross is meant in the resource inspection return messages not this user, and MSC or other preservation controlled user data equipment contain this user, otherwise, continue to verify.
The resource inspection process also can be two-way, LEMF and MSC or other are preserved controlled user data equipment all as main body, simultaneously send out the resource inspection request, and simultaneously the controlled user data of self is done corresponding deletion or interpolation according to the resource inspection return messages to the other side.
Resource inspection also can adopt the PUSH formula, that is: a side of reception resource inspection request is a passive type, as long as LEMF and MSC or other are preserved controlled user data equipment operate as normal, and mutual communication is normal, a side who then sends the resource inspection request needn't send the resource inspection request to a side who receives the resource inspection request, but regularly controlled user data is issued a side who receives the resource inspection request, allow a side who receives the resource inspection request directly verify the controlled user data of sending, and according to the result who verifies, deletion or the controlled user data of adding a side who receives the resource inspection request.
Controlled user data between network side and the monitoring triggering side is set, the process of cancelling has increased the affirmation interface monitoring in the present invention, greatly reduces owing to transmission abnormality or unit exception make the inconsistent situation of both sides' controlled user data; The present invention has increased the regularly mechanism of resource inspection, can guarantee to monitor the consistency of the controlled user data between network side and the monitoring triggering side, thereby can not cause owing to rubbish is redundant to make the monitoring system scarcity of resources, finally cause the situation that monitoring system can't operate as normal.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being made within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1, a kind of method that guarantees to monitor network side and the controlled users consistency of monitoring triggering side is characterized in that this method comprises:
A, be provided with and monitor one of network side and monitoring triggering side and be synchronisation source, opposite side is synchronous target;
B, synchronisation source send to synchronous target to the controlled user data of self;
C, synchronous target are compared the controlled user data of self with the controlled user data from synchronisation source, if there is not synchronously corresponding controlled user data identical in the target, then adds or delete controlled user data according to the controlled user data of synchronisation source is corresponding in target synchronously with controlled user data from synchronisation source; If there is synchronously corresponding controlled user data identical in the target with controlled user data from synchronisation source, a mark is set then for this identical controlled user data, take turns the resource inspection end to this after, synchronously target initiates to contain the interpolation instruction or the delete instruction of the controlled user data that was not labeled to synchronisation source, and synchronisation source receives that this instruction back is according to the controlled user data interpolation that was not labeled or the controlled user data of deleting self.
2, the method for claim 1 is characterized in that,
Described step B is provided with the verification end mark that this is taken turns after further being included in and sending controlled user data;
Described step C determines that this process of taking turns the resource inspection end is:
Judge and verify end mark, if set then should finish by the wheel resource inspection; Otherwise, continue this and take turns resource inspection.
3, the method for claim 1 is characterized in that, this method further comprises: a timer is set on synchronisation source, and when timer expiry, execution in step B.
4, the method for claim 1 is characterized in that, described step B further comprises: before synchronous target sent to synchronous target to the controlled user data of self, target sent the resource inspection instruction to synchronisation source synchronously at synchronisation source.
5, the method for claim 1 is characterized in that,
Described step B also comprises: target sends to synchronisation source to the controlled user data of self to synchronisation source synchronously;
Described step C also comprises: synchronisation source is compared the controlled user data of self with the controlled user data of coming the motor synchronizing target, if there is not corresponding controlled user data identical in the synchronisation source, then in synchronisation source, add accordingly or the deletion controlled user data according to the controlled user data of synchronous target with the controlled user data of coming the motor synchronizing target.
6, method as claimed in claim 4 is characterized in that, this method further comprises: on synchronisation source, a timer is set simultaneously with synchronous target, and when timer expiry, execution in step B.
As claim 3 or 6 described methods, it is characterized in that 7, the described timer time regularly is minute being unit.
8, the method for claim 1 is characterized in that, described step B further comprises: adopt the mode of poll to send controlled user data.
9, method as claimed in claim 8 is characterized in that, the mode of described employing poll sends controlled user data and further comprises:
A, the position that label is set are 0, and the controlled user data that each transmission is set is a definite value;
B, send this definite value the controlled user data number to synchronous target, the position of this label is added this definite value; C, judge whether the position of this label is last controlled user data, if, finish this label position poll, otherwise, step b returned.
10, the method for claim 1 is characterized in that, described monitoring network side comprises listening center, and described monitoring triggering side comprises mobile switching centre or preserves the equipment of controlled user data.
CNB031495524A 2003-07-16 2003-07-16 Method for ensuring consistency between controlled users of snooping network side and snooping triggering side Expired - Fee Related CN100499514C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031495524A CN100499514C (en) 2003-07-16 2003-07-16 Method for ensuring consistency between controlled users of snooping network side and snooping triggering side

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031495524A CN100499514C (en) 2003-07-16 2003-07-16 Method for ensuring consistency between controlled users of snooping network side and snooping triggering side

Publications (2)

Publication Number Publication Date
CN1571369A CN1571369A (en) 2005-01-26
CN100499514C true CN100499514C (en) 2009-06-10

Family

ID=34472584

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031495524A Expired - Fee Related CN100499514C (en) 2003-07-16 2003-07-16 Method for ensuring consistency between controlled users of snooping network side and snooping triggering side

Country Status (1)

Country Link
CN (1) CN100499514C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100413261C (en) * 2006-01-04 2008-08-20 华为技术有限公司 Method and system of data recovering
CN102857949B (en) * 2012-09-14 2018-11-20 中兴通讯股份有限公司 A kind of method and apparatus that layout data consistency guarantees

Also Published As

Publication number Publication date
CN1571369A (en) 2005-01-26

Similar Documents

Publication Publication Date Title
CN101754221B (en) Data transmission method between heterogeneous systems and data transmission system
CN101795222B (en) Multi-stage forward service system and method
EP0464014A2 (en) Communications systems using a fault tolerant protocol
CN100527738C (en) Method for handling discarding of a sequence of service data units and communication apparatus
EP2779713B1 (en) Method and system for data record packet processing
ZA200506363B (en) Method for processing security message in a mobile communication system
CN103975568B (en) There is safety management system and the method for managing security of multiple Relay Servers
CN102187337A (en) Enhanced data access for information systems
CN101267440B (en) No damage relocation method and system
CN110351379B (en) Communication control method and device, electronic equipment and storage medium
CN107104902A (en) A kind of method, relevant apparatus and the system of RDMA data transfers
CN101977358A (en) Method, device and equipment for transmitting data short messages
US6826166B2 (en) Wireless access system
CN101778134A (en) Data synchronization method and mobile communication terminal
CN106789279B (en) Gateway control method, remote control end control method and device
CN105940658A (en) A user data transmission method, apparatus and terminal
US7218714B2 (en) Method of calling service among devices in home network
CN100499514C (en) Method for ensuring consistency between controlled users of snooping network side and snooping triggering side
CN112055088B (en) Optical shutter-based file reliable transmission system and method thereof
EP1993245A1 (en) A system and method for realizing message service
CN106027419A (en) Data structure management method and device
CN110557369A (en) high-speed data processing platform based on domestic operating system kernel mode
CN110995612B (en) Message processing method, system and communication equipment
CN103716192B (en) Non-inductive series connection device based on virtual IP
CN101009690A (en) A method and device for the state confirmation of the physical terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090610

Termination date: 20200716