CN101212337B - Method for constructing online personal identity database automatically - Google Patents

Method for constructing online personal identity database automatically Download PDF

Info

Publication number
CN101212337B
CN101212337B CN2006101487250A CN200610148725A CN101212337B CN 101212337 B CN101212337 B CN 101212337B CN 2006101487250 A CN2006101487250 A CN 2006101487250A CN 200610148725 A CN200610148725 A CN 200610148725A CN 101212337 B CN101212337 B CN 101212337B
Authority
CN
China
Prior art keywords
network
network application
sign
application service
uid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2006101487250A
Other languages
Chinese (zh)
Other versions
CN101212337A (en
Inventor
张世永
张远
吴承荣
郭巍
谢剑峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUDAN GUANGHUA INFORMATION SCIENCE AND TECHNOLOGY Co Ltd SHANGHAI
Original Assignee
FUDAN GUANGHUA INFORMATION SCIENCE AND TECHNOLOGY Co Ltd SHANGHAI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUDAN GUANGHUA INFORMATION SCIENCE AND TECHNOLOGY Co Ltd SHANGHAI filed Critical FUDAN GUANGHUA INFORMATION SCIENCE AND TECHNOLOGY Co Ltd SHANGHAI
Priority to CN2006101487250A priority Critical patent/CN101212337B/en
Publication of CN101212337A publication Critical patent/CN101212337A/en
Application granted granted Critical
Publication of CN101212337B publication Critical patent/CN101212337B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method for automatically building a network personal identity database, which provides a technical support for an overall and timely network supervision and administration. According to the technical proposal, the method comprises the following steps: information to be processed is prepared; network access information and network application information are screened; the network access information and the network application information are associated processed about address and time to obtain a plurality of collection of network identity; the obtained collection of network identity is inserted into the network personal identity database. The invention is applied to the field of supervising and administrating network safety.

Description

The method of automatic building network personal identity database
Technical field
The present invention relates to a kind of network security technology, relate in particular to a kind of method of automatic building network personal identity database.
Background technology
Along with Internet development, based on network application and user present explosive growth, and the same network user may use a plurality of different identify labels in heterogeneous networks is used, and this has proposed the challenge sternly completed for network supervision.To this, existing technical scheme is normally Real-name Registration and online personal identity database etc.But because a variety of causes temporarily can't popularize Real-name Registration in an all-round way, the netizen can carry out the behavior of various anonymities on the net, this make trace very difficult.
And online personal identity database has application promise in clinical practice aspect network supervision, but present building network personal identity database still is based on the mode of artificial registration typing.Obviously, a kind of like this mode not only can't be supported on a large scale, the typing and the arrangement of multi-layer network user's mass data, also can't realize the real-time update and the maintenance of online personal identity database, thus also can't satisfy comprehensively, network supervision requirement timely.
Summary of the invention
The objective of the invention is to address the above problem, a kind of method of automatic building network personal identity database be provided, for comprehensively timely network supervision technical support is provided.
Technical scheme of the present invention is: the invention provides a kind of method of automatic building network personal identity database, comprising:
A. the preparation of pending information, information is used in screening network access information and network application;
B. network access information and network application use information are carried out address and temporal association process, obtain the plurality of network identify label and collect;
C. resulting network identity sign is collected and be inserted in the online personal identity database.
The method of above-mentioned automatic building network personal identity database, wherein, step b further comprises:
(1) network access information and network application use information are carried out the address correlation processing, obtain plurality of network application service recorder subclass and plurality of network identify label and collect;
(2) according to network access information the network application service recorder in those network application service recorder subclass being carried out association in time handles;
(3) obtaining the plurality of network identify label from the network application service recorder that is associated collects.
The method of above-mentioned automatic building network personal identity database, wherein, the preliminary treatment of step a is by checking that screening makes every the network insertion record that constitutes those network access informations comprise that at least network access equipment sign, user distribute address and online period of user; Constituting those network applications uses every network application service recorder of information to comprise network application sign, accesses identity sign, reference address and access time at least.
The method of above-mentioned automatic building network personal identity database, wherein, the step among the step b (1) further comprises:
According to reference address all those network application service recorders are divided into groups; For the identical network application service recorder in arbitrary group access address, if exist a user to distribute the address network insertion record identical with this reference address, then this group network is used network application service recorder subclass of service recorder formation; Otherwise the network application sign that each the bar network application service recorder in this group comprises and accesses identity sign constitutes a network identity sign and collects { (AID, UID) }, and wherein AID represents the network application sign, and UID represents the accesses identity sign.
The method of above-mentioned automatic building network personal identity database, wherein, the step among the step b (2) further comprises:
For those network application service recorder subclass, whether the access time of judging per two the network application service recorders in each network application service recorder subclass drops on same the user in the network insertion record between the online period, if then these two network application service recorders are associated, otherwise these two network application service recorders are unconnected.
The method of above-mentioned automatic building network personal identity database, wherein, the step among the step b (3) further comprises:
For every group of network application service recorder that is associated, with the network application sign AID of every network application service recorder nWith accesses identity sign UID nConstitute two tuple (AID n, UID n), and obtain the network identity sign and collect { (AID through redundant processing of past n, UID n) | n 〉=1}.
The method of above-mentioned automatic building network personal identity database, wherein, step c further comprises:
Collect { (AID for each network identity sign n, UID n) | n 〉=1}, do following operation and be inserted into online personal identity database:
For first identify label (AID 1, UID 1), if there has been this identify label in the online personal identity database, this network identity sign is collected { (AID n, UID n) | the network identity sign that n 〉=1} merges under this identify label in the online personal identity database collects; Otherwise, in online personal identity database, create this network identity sign and collect { (AID n, UID n) | n 〉=1};
Check other identify label (AID successively n, UID n) (n 〉=2), if identify label (AID n, UID n) (n 〉=2) network identity sign of also being present in the online personal identity database other collects, and these two network identities signs under this identify label are collected merging.
The present invention contrasts prior art following beneficial effect: the present invention does association analysis to the network access information and the network application use information that provide through pretreated network monitoring equipment, the identify label that once up and down the pairing all-network in same address is used in the line process is classified as the employed sign of the same network user, realization collects corresponding to the same network user's heterogeneous networks identify label, thereby finishes the automatic structure of online personal identity database.Compared with prior art, not only can support on a large scale, the typing and the arrangement of multi-layer network user's mass data, also realize the real-time update and the maintenance of online personal identity database, for comprehensively, network supervision provides solid technical support timely.
Description of drawings
Fig. 1 is the flow chart of a preferred embodiment of the method for automatic building network personal identity database of the present invention.
Embodiment
The invention will be further described below in conjunction with drawings and Examples.
Fig. 1 shows the flow process of a preferred embodiment of the method for automatic building network personal identity database of the present invention.See also Fig. 1, each step in this method flow is described in detail below in conjunction with an instantiation.
The data source explanation: information and network access information are used in the used network application of the present invention, all can get by existing equipment collection and the preliminary treatment of process prior art.
Suppose that in the present embodiment employed network application uses information to use shown in the information table 1 as network application:
UID AID Add Time
chenjie518 hotmail.com 210.221.85.121 2006-05-22 09:31:18
shihaina11 msn.com 210.56.188.18 2006-05-22 09:32:44
xiaycn hotmail.com 222.217.33.178 2006-05-22 09:32:58
cuiyu 208.26.185.5
93430153 qq.com 208.26.185.56 2006-05-22 09:33:11
48973396 qq.com 180.55.86.231 2006-05-22 09:33:16
11140676 qq.com 231.34.71.221 2006-05-22 09:33:38
yutang yahoo.com 202.112.222.22
7208100 qq.com 210.221.85.121 2006-05-22 09:34:08
196621189 qq.com 210.56.188.18 2006-05-22 09:34:16
8169293 qq.com 222.217.33.178 2006-05-22 09:34:38
msn.com 222.56.32.12 2006-05-22 09:34:58
rouzheng hotmail.com 210.56.181.155 2006-05-22 09:35:25
40917195 qq.com 210.221.85.121 2006-05-22 09:35:53
Suppose that in the present embodiment employed network access information is shown in network access information table 2:
AEID ADD DUR
02368327840 210.221.85.121 2006-05-2209:28:28
2006-05-2210:08:18
02368327840 210.221.85.123 2006-05-2209:28:28
02347524189 222.217.33.178 2006-05-2209:15:18 2006-05-2209:33:25
4f:05:96:0a:00:00 203.66.231.82 2006-05-2209:31:18 2006-05-2209:31:18
4f:05:96:0a:00:00 203.66.231.82 2006-05-2209:31:18
6c:02:96:0a:00:00 210.56.188.18 2006-05-2209:01:18 2006-05-2211:07:32
8613896275678 220.221.185.12 2006-05-2209:31:18 2006-05-2209:32:18
Step S1: check network application use information table 1, the network application service recorder that the deletion record field is incomplete, guarantee that every network application service recorder comprises network application sign AID, accesses identity sign UID, reference address Add and access time Time at least, obtains network application and uses information table 3.Check network access information table 2 simultaneously, the network insertion record that the deletion record field is incomplete guarantees that every network insertion record comprises that at least network access equipment sign AEID, user distribute address ADD and the online period DUR of user, obtain network access information table 4.
According to above-mentioned mode, obtain network application and use information table 3:
UID AID Add Time
chenjie518 hotmail.com 210.221.85.121 2006-05-22 09:31:18
shihaina11 msn.com 210.56.188.18 2006-05-22 09:32:44
xiaycn hotmail.com 222.217.33.178 2006-05-22 09:32:58
93430153 qq.com 208.26.185.56 2006-05-22 09:33:11
48973396 qq.com 180.55.86.231 2006-05-22
09:33:16
11140676 qq.com 231.34.71.221 2006-05-22 09:33:38
7208100 qq.com 210.221.85.121 2006-05-22 09:34:08
196621189 qq.com 210.56.188.18 2006-05-22 09:34:16
8169293 qq.com 222.217.33.178 2006-05-22 09:34:38
rouzheng hotmail.com 210.56.181.155 2006-05-22 09:35:25
40917195 qq.com 210.221.85.121 2006-05-22 09:35:53
Obtain network access information table 4 simultaneously:
AEID ADD DUR
02368327840 210.221.85.121 2006-05-2209:28:28 2006-05-2210:08:18
02347524189 222.217.33.178 2006-05-2209:15:18 2006-05-2209:33:25
4f:05:96:0a:00:00 203.66.231.82 2006-05-2209:31:18 2006-05-2209:31:18
6c:02:96:0a:00:00 210.56.188.18 2006-05-2209:01:18 2006-05-2211:07:32
8613896275678 220.221.185.12 2006-05-2209:31:18 2006-05-2209:32:18
Step S2: network access information and network application use information are carried out the address correlation processing.
Specifically, use the all-network application service recorder in the information table 3 to divide into groups according to reference address to network application; For the identical network application service recorder of arbitrary group access address Add, if exist a user to distribute the address ADD network insertion record identical with this reference address Add, then this group network is used network application service recorder subclass of service recorder formation; Otherwise the network application sign that each the bar network application service recorder in this group comprises and accesses identity sign constitutes a network identity sign and collects { (AID, UID) }.
Obtain plurality of network thus and use the service recorder subclass:
Network application service recorder subclass 1:
UID AID Add Time
chenjie518 hotmail.com 210.221.85.121 2006-05-22 09:31:18
7208100 qq.com 210.221.85.121 2006-05-22 09:34:08
40917195 qq.com 210.221.85.121 2006-05-22 09:35:53
Network application service recorder subclass 2:
UID AID Add Time
xiaycn hotmail.com 222.217.33.178 2006-05-22 09:32:58
8169293 qq.com 222.217.33.178 2006-05-22 09:34:38
Network application service recorder subclass 3:
UID AID Add Time
shihaina11 msn.com 210.56.188.18 2006-05-22 09:32:44
196621189 qq.com 210.56.188.18 2006-05-22 09:34:16
And obtain following network identity sign and collect: { (qq.com, 93430153) }, { (qq.com, 48973396) }, { (qq.com, 11140676) } and { (hotmail.com, rouzheng) }.
Step S3: according to network access information the network application service recorder in the network application service recorder subclass is carried out association in time and handle.
Specifically, for network application service recorder subclass 1,2 and 3, whether the access time Time1 and the Time2 that judge per two the network application service recorders in each network application service recorder subclass drop between same the online period DUR of user in the network insertion record, if then these two network application service recorders are associated, otherwise these two network application service recorders are unconnected.
Obtain several associated group of network application service recorder thus:
Associated group 1:
UID AID Add Time
chenjie518 hotmail.com 210.221.85.121 2006-05-22 09:31:18
7208100 qq.com 210.221.85.121 2006-05-22 09:34:08
40917195 qq.com 210.221.85.121 2006-05-22 09:35:53
Associated group 2:
UID AID Add Time
xiaycn hotmail.com 222.217.33.178 2006-05-22 09:32:58
Associated group 3:
UID AID Add Time
8169293 qq.com 222.217.33.178 2006-05-22 09:34:38
Associated group 4:
UID AID Add Time
shihaina11 msn.com 210.56.188.18 2006-05-22 09:32:44
196621189 qq.com 210.56.188.18 2006-05-22 09:34:16
Step S4: obtain the network identity sign from the network application service recorder that is associated and collect.
Specifically, for every group of network application service recorder that is associated, with the network application sign AID of every network application service recorder nWith accesses identity sign UID nConstitute two tuple (AID n, UID n), and through redundant processing of past, obtain the network identity sign and collect { (AID n, UID n) | n 〉=1}.
Obtaining following network identity sign thus collects:
{ (hotmail.com, chenj ie518), (qq.com, 7208100), (qq.com, 40917195) }, { (hotmail.com, xiaycn) }, { (qq.com, 8169293) } and { (msn.com, shihaina11), (qq.com, 196621189) }.
Step S5: resulting network identity sign collected be inserted in the online personal identity database.
Concrete insertion method is: (1) is for first identify label (AID 1, UID 1), if there has been this identify label in the online personal identity database, this network identity sign is collected { (AID n, UID n) | the network identity sign that n 〉=1} merges under this identify label in the online personal identity database collects; Otherwise, in online personal identity database, create this network identity sign and collect { (AID n, UID n) | n 〉=1}.
(2) check other identify label (AID successively n, UID n) (n 〉=2), if identify label (AID n, UID n) (n 〉=2) network identity sign of also being present in the online personal identity database other collects, and these two network identities signs under this identify label are collected merging.
In this example, processing through above-mentioned steps S1~S4, obtaining following network identity sign collects: { (hotmail.com, chenj ie518), (qq.com, 7208100), (qq.com, 40917195) }, { (hotmail.com, xiaycn) }, { (qq.com, 8169293) }, (msn.com, shihainall), (qq.com, 19662ll89) }, { (qq.com, 93430153) }, { (qq.com, 48973396) }, { (qq.com, 11140676) } and { (hotmail.com, rouzheng) }.
Suppose existing online personal identity database, now intercept in this online personal identity database and identify relevant record with above-mentioned network identity, as shown in table 6:
Figure G061E8725020070123D000091
In table 6, all (AID that record is included n, UID n) constitute a network identity sign and collect, its corresponding SeqID collects unique number in online personal identity database as this, omits here.In order to save the space, uncorrelated record in the middle of in table 6, having deleted, and make that all records are adjacent.
Collecting { (hotmail.com, chenjie518), (qq.com, 7208100), (qq.com, 40917195) } with network identity sign below is example, introduces this insertion process:
(1) for identify label (hotmail.com, chenjie518), find Already in the online personal identity database, event collects this network identity sign and merges to (hotmail.com in the online personal identity database, chenjie518) the network identity sign under collect (hotmail.com, chenjie518), (yahoo.com.cn, cj8868) }, the record that therefore in online personal identity database, has corresponding newly-generated network identity sign to collect:
SeqID (AID 1,UID 1) (AID 2,UID 2) (AID 3, UID 3) (AID 4, UID 4) (AID 5, UID 5)
?xxxxxxxxxxx (hotmail.com, chenjie518) (yahoo.com.cn, cj8868) (qq.com, 7208100) (qq.com, 40917195) nul1
(2) check identify label successively, during other network identity of finding all not appear at this online personal identity database collects, so this insertion process that collects end.
Collect for above-mentioned other network identity sign and to finish the similarly insertion process in online personal identity database, obtain new online personal identity database, it is as shown in table 7 to revise part:
Figure G061E8725020070123D000101
From the above embodiments as can be known, from initial pending information check, association process to record, and last network identity identifies the insertion that collects, all can finish automatically, and need not artificial the intervention or operation, this on a large scale, the typing of multi-layer network user's mass data is very effective with arrangement.And, the employed network identity sign of the same network user who causes owing to the not congruent reason of information in the insertion process that network identity sign collects is not included into the same problem such as online personal identity database that collects or do not include in fully, the real-time update of follow-up online personal identity database with safeguard in progressively solved.Therefore, compare with the construction method of manual registration typing online personal identity database, the present invention has substantive distinguishing features and marked improvement.
The foregoing description provides to those of ordinary skills and realizes or use of the present invention; those of ordinary skills can be under the situation that does not break away from invention thought of the present invention; the foregoing description is made various modifications or variation; thereby protection scope of the present invention do not limit by the foregoing description, and should be the maximum magnitude that meets the inventive features that claims mention.

Claims (6)

1. the method for an automatic building network personal identity database comprises:
A. the preparation of pending information, information is used in screening network access information and network application;
B. network access information and network application use information are carried out address and temporal association process, obtaining the plurality of network identify label collects, wherein step b further comprises: (1) carries out the address correlation processing with network access information and network application use information, obtains plurality of network application service recorder subclass and plurality of network identify label and collects; (2) according to network access information the network application service recorder in those network application service recorder subclass being carried out association in time handles; (3) obtaining the plurality of network identify label from the network application service recorder that is associated collects;
C. resulting network identity sign is collected and be inserted in the online personal identity database.
2. the method for automatic building network personal identity database according to claim 1, it is characterized in that the preliminary treatment of step a is by checking that screening makes every the network insertion record that constitutes those network access informations comprise that at least network access equipment sign, user distribute address and online period of user; Constituting those network applications uses every network application service recorder of information to comprise network application sign, accesses identity sign, reference address and access time at least.
3. the method for automatic building network personal identity database according to claim 2 is characterized in that, the step among the step b (1) further comprises:
According to reference address all those network application service recorders are divided into groups; For the identical network application service recorder in arbitrary group access address, if exist a user to distribute the address network insertion record identical with this reference address, then this group network is used network application service recorder subclass of service recorder formation; Otherwise the network application sign that each the bar network application service recorder in this group comprises and accesses identity sign constitutes a network identity sign and collects { (AID, UID) }, and wherein AID represents the network application sign, and UID represents the accesses identity sign.
4. the method for automatic building network personal identity database according to claim 3 is characterized in that, the step among the step b (2) further comprises:
For those network application service recorder subclass, whether the access time of judging per two the network application service recorders in each network application service recorder subclass drops on same the user in the network insertion record between the online period, if then these two network application service recorders are associated, otherwise these two network application service recorders are unconnected.
5. the method for automatic building network personal identity database according to claim 4 is characterized in that, the step among the step b (3) further comprises:
For every group of network application service recorder that is associated, with the network application sign AID of every network application service recorder nWith accesses identity sign UID nConstitute two tuple (AID n, UID n), and obtain the network identity sign and collect { (AID through redundant processing of past n, UID n) | n 〉=1}.
6. the method for automatic building network personal identity database according to claim 5 is characterized in that, step c further comprises:
Collect { (AID for each network identity sign n, UID n) | n 〉=1}, do following operation and be inserted into online personal identity database:
For first identify label (AID 1, UID 1), if there has been this identify label in the online personal identity database, this network identity sign is collected { (AID n, UID n) | the network identity sign that n 〉=1} merges under this identify label in the online personal identity database collects; Otherwise, in online personal identity database, create this network identity sign and collect { (AID n, UID n) | n 〉=1};
Check other identify label (AID successively n, UID n) (n 〉=2), if identify label (AID n, UID n) (n 〉=2) network identity sign of also being present in the online personal identity database other collects, and these two network identities signs under this identify label are collected merging.
CN2006101487250A 2006-12-30 2006-12-30 Method for constructing online personal identity database automatically Expired - Fee Related CN101212337B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006101487250A CN101212337B (en) 2006-12-30 2006-12-30 Method for constructing online personal identity database automatically

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006101487250A CN101212337B (en) 2006-12-30 2006-12-30 Method for constructing online personal identity database automatically

Publications (2)

Publication Number Publication Date
CN101212337A CN101212337A (en) 2008-07-02
CN101212337B true CN101212337B (en) 2011-12-28

Family

ID=39612038

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006101487250A Expired - Fee Related CN101212337B (en) 2006-12-30 2006-12-30 Method for constructing online personal identity database automatically

Country Status (1)

Country Link
CN (1) CN101212337B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102186173B (en) * 2011-04-26 2013-08-07 广州市动景计算机科技有限公司 Identity authentication method and system
CN106982443B (en) * 2016-01-18 2020-10-30 中国移动通信集团河北有限公司 Service distribution method and device
CN110968584B (en) * 2019-12-03 2023-03-14 北京明略软件系统有限公司 Portrait generation system, method, electronic device and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5878420A (en) * 1995-08-31 1999-03-02 Compuware Corporation Network monitoring and management system
CN1437359A (en) * 2002-02-07 2003-08-20 华为技术有限公司 Control method of network access of user to log on

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5878420A (en) * 1995-08-31 1999-03-02 Compuware Corporation Network monitoring and management system
CN1437359A (en) * 2002-02-07 2003-08-20 华为技术有限公司 Control method of network access of user to log on

Also Published As

Publication number Publication date
CN101212337A (en) 2008-07-02

Similar Documents

Publication Publication Date Title
CN110462604A (en) The data processing system and method for association internet device are used based on equipment
US10162880B1 (en) Cohort selection with privacy protection
US8661048B2 (en) Crime investigation tool and method utilizing DNA evidence
CN101178798A (en) Method for monitoring process flow across business system
Al-Janabi A proposed framework for analyzing crime data set using decision tree and simple k-means mining algorithms
CN101212337B (en) Method for constructing online personal identity database automatically
CN113535518A (en) Distributed real-time dynamic monitoring method and system for user behaviors
JP3915011B2 (en) Skill analysis method, skill analysis program, and skill analysis apparatus
Voorhees Coopetition in IR research
CN1347053A (en) System and method for training and managing basic ability
CN113392420A (en) Intelligent project data management method and system
US20080281826A1 (en) Managing potential clinical trial participants
Duskin et al. Echo Chambers in the Age of Algorithms: An Audit of Twitter’s Friend Recommender System
Kalton Probability vs. nonprobability sampling: from the birth of survey sampling to the present day
CN104809547A (en) Service rating system based on facts and service results, and rating method thereof
CN114757805A (en) Block chain-based convenient government affair service system
CN110457309A (en) A kind of database for metal material characterization parameter
Liu et al. Research on application of data mining in hospital management
Azadfallah A hybrid MCDM approach for ranking suppliers by considering ethical factors
Chin et al. Identifying active subgroups in online communities
CN111221906A (en) Alliance block chain-based plant seed management system and method
CN116957521B (en) Flow approval system capable of being flexibly customized
Wang [Retracted] Internet Entrepreneurship Information Resource Sharing System Based on Improved Deep Learning Algorithm
Salahbrahim et al. Some insight on dynamics of posts and citations in different blog communities
Prasetio et al. The Impact of Traffic Source on Page Views

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20111228

Termination date: 20181230