CN101236534A - Hard Disk Encryption Method Based on PCI Card in Windows Environment - Google Patents
Hard Disk Encryption Method Based on PCI Card in Windows Environment Download PDFInfo
- Publication number
- CN101236534A CN101236534A CNA2007101198151A CN200710119815A CN101236534A CN 101236534 A CN101236534 A CN 101236534A CN A2007101198151 A CNA2007101198151 A CN A2007101198151A CN 200710119815 A CN200710119815 A CN 200710119815A CN 101236534 A CN101236534 A CN 101236534A
- Authority
- CN
- China
- Prior art keywords
- hard disk
- encryption
- pci card
- target hard
- operating system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 16
- 238000012544 monitoring process Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 claims description 2
- 238000001514 detection method Methods 0.000 claims 1
- 238000013461 design Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000005192 partition Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
本发明涉及计算机安全领域,具体的说是提供了一种防止硬盘数据泄露的方法。本发明包括一个PCI卡,一段存放在PCI卡扩展ROM映像中的加载程序,一段存放在PCI卡非扩展ROM中的硬盘加密解密程序。加载程序监控Windows操作系统通过INT13H中断读写目标硬盘,完成对目标硬盘数据的加密和解密;同时在计算机启动时把硬盘加密解密程序嵌入Windows操作系统。硬盘加密解密程序监控Windows操作系统通过驱动程序读写目标硬盘,完成对目标硬盘数据的加密和解密。本发明设计新颖,不需要在计算机主板和硬盘之间增加额外的硬件设备;使用成本低,仅需要一个PCI卡;使用方便,PCI卡的硬件序列号和目标硬盘的硬件序列号产生加密解密需要的密钥。该密钥将PCI卡和目标硬盘绑定为钥匙和锁的关系,插入匹配的PCI卡即可,不需要输入用户名和密码。
The invention relates to the field of computer security, and specifically provides a method for preventing hard disk data leakage. The invention comprises a PCI card, a section of loading program stored in the PCI card expansion ROM image, and a section of hard disk encryption and decryption program stored in the non-extension ROM of the PCI card. The loading program monitors the Windows operating system to read and write the target hard disk through the INT13H interrupt, and completes the encryption and decryption of the target hard disk data; at the same time, the hard disk encryption and decryption program is embedded in the Windows operating system when the computer is started. The hard disk encryption and decryption program monitors the Windows operating system to read and write the target hard disk through the driver program, and completes the encryption and decryption of the target hard disk data. The invention is novel in design and does not need to add additional hardware devices between the computer main board and the hard disk; the cost of use is low, and only one PCI card is needed; it is easy to use, and the hardware serial number of the PCI card and the hardware serial number of the target hard disk are required for encryption and decryption. key. The key binds the PCI card and the target hard disk as a key and a lock, just insert the matching PCI card, and there is no need to enter the user name and password.
Description
技术领域 technical field
本发明涉及计算机安全领域,具体的说是提供了一种防止硬盘数据泄露的方法。The invention relates to the field of computer security, and specifically provides a method for preventing hard disk data leakage.
背景技术 Background technique
随着信息化程度越来越高,信息安全显得格外重要。计算机的数据一般存储在本地硬盘上,未授权的数据拷贝甚至直接盗走硬盘会给计算机用户带来严重的损失。在众多防止硬盘数据泄露的方案中,对硬盘数据进行加密不失为一种有效方法。With the increasing degree of informatization, information security is particularly important. Computer data is generally stored on the local hard disk, and unauthorized data copying or even direct theft of the hard disk will bring serious losses to computer users. Among many solutions to prevent hard disk data leakage, encrypting hard disk data is an effective method.
目前存在的硬盘加密方案普遍需要结合复杂的硬件设备,如在计算机主板和硬盘之间增加额外的硬件设备,使用成本较高。另外,由于和硬件结合比较紧密,存在兼容性的问题。Currently existing hard disk encryption schemes generally need to be combined with complex hardware devices, such as adding additional hardware devices between the computer motherboard and the hard disk, and the cost of use is relatively high. In addition, due to the close integration with hardware, there are compatibility issues.
发明内容 Contents of the invention
本发明的目的在于提供一种低成本的基于PCI卡的硬盘加密方法。The purpose of the present invention is to provide a low-cost hard disk encryption method based on a PCI card.
本发明的技术方案是:Technical scheme of the present invention is:
包括一个PCI卡,一段存放在PCI卡扩展ROM映像中的加载程序,一段存放在PCI卡非扩展ROM中的硬盘加密解密程序;加载程序监控Windows操作系统通过INT13H中断读写目标硬盘,完成对目标硬盘数据的加密和解密;同时在计算机启动时把硬盘加密解密程序嵌入Windows操作系统;硬盘加密解密程序监控Windows操作系统通过驱动程序读写目标硬盘,完成对目标硬盘数据的加密和解密;加载程序和硬盘加密解密程序获取PCI卡的硬件序列号PID和目标硬盘的硬件序列号HID,通过函数f(PID,HID)计算出目标硬盘加密和解密需要的密钥。It includes a PCI card, a loading program stored in the PCI card expansion ROM image, and a hard disk encryption and decryption program stored in the non-extended ROM of the PCI card; the loading program monitors the Windows operating system to read and write the target hard disk through INT13H interrupt, and completes the target Encryption and decryption of hard disk data; at the same time, when the computer starts, the hard disk encryption and decryption program is embedded in the Windows operating system; the hard disk encryption and decryption program monitors the Windows operating system to read and write the target hard disk through the driver program, and completes the encryption and decryption of the target hard disk data; loads the program Obtain the hardware serial number PID of the PCI card and the hardware serial number HID of the target hard disk with the encryption and decryption program of the hard disk, and calculate the key needed for the encryption and decryption of the target hard disk by the function f(PID, HID).
加载程序存放在PCI卡扩展ROM的映像中;当计算机BIOS执行的自检操作检测到PCI卡具有扩展ROM时,将扩展ROM中的映像读入内存COOOOH~DFFFFH中的某一个区域,然后作一个远程调用,执行映像中的加载程序;加载程序监控Windows操作系统通过INT13H中断读写目标硬盘,解密从目标硬盘读取的数据,加密写入目标硬盘的数据;同时在内存中修改读取的注册表信息和文件系统信息,把硬盘加密解密程序作为磁盘过滤驱动程序嵌入Windows操作系统。The loading program is stored in the image of the PCI card expansion ROM; when the self-test operation performed by the computer BIOS detects that the PCI card has an expansion ROM, the image in the expansion ROM is read into a certain area in the memory COOOOH~DFFFFH, and then a Remote call, execute the loading program in the image; the loading program monitors the Windows operating system to read and write the target hard disk through INT13H interrupt, decrypt the data read from the target hard disk, encrypt the data written to the target hard disk; at the same time, modify the read registration in the memory Table information and file system information, the hard disk encryption and decryption program is embedded in the Windows operating system as a disk filter driver.
硬盘加密解密程序存放在PCI卡的非扩展ROM中;它是一个工作在Windows操作系统内核的磁盘过滤驱动程序;当Windows操作系统放弃使用INT13H中断改用驱动程序读写目标硬盘时,硬盘加密解密程序接管对目标硬盘数据的加密和解密。The hard disk encryption and decryption program is stored in the non-extended ROM of the PCI card; it is a disk filter driver working in the Windows operating system kernel; when the Windows operating system abandons the use of INT13H interrupts and uses the driver to read and write the target hard disk, the hard disk encryption and decryption The program takes over the encryption and decryption of data on the target hard disk.
当计算机BIOS执行的自检操作检测到PCI卡具有扩展ROM时,将扩展ROM中的映像读入内存COOOOH~DFFFFH中的某一个区域,然后作一个远程调用,执行映像中的加载程序。加载程序通过修改INT13H的中断服务程序来监控计算机对目标硬盘的读写。加载程序完成修改后,把硬盘0扇区的内容读入内存0000:7C00并执行,从硬盘上启动Windows操作系统。在随后的启动过程中,硬盘上的Windows引导程序(Osloader.exe)通过INT13H读取注册表信息和文件系统信息。加载程序监测到引导程序对注册表的读写,调用原始的INT13H中断服务程序读取硬盘上的注册表到内存,并在内存中修改读取的内容,让引导程序加载一个硬盘上并不存在的内核驱动程序。当引导程序通过INT13H来读取该内核驱动程序时,加载程序把读操作重定向到PCI卡,读取存放在PCI卡非扩展ROM的硬盘加密解密程序。至此,引导程序获得了硬盘加密解密程序的内容,并根据注册表的指示将它装入Windows操作系统。引导程序完成系统初始化工作后,Windows操作系统开始启动。此时刻开始,Windows操作系统将放弃使用INT13H中断改用驱动程序访问硬盘等存储设备。作为磁盘过滤驱动程序嵌入到Windows操作系统内核的硬盘加密解密程序接管对目标硬盘读写操作的监控,解密读操作获取的数据,加密写操作的数据。When the self-test operation performed by the computer BIOS detects that the PCI card has an expansion ROM, the image in the expansion ROM is read into a certain area in the memory COOOOH-DFFFFH, and then a remote call is made to execute the loading program in the image. The loader monitors the computer's reading and writing of the target hard disk by modifying the interrupt service routine of INT13H. After the loading program is modified, read the content of sector 0 of the hard disk into memory 0000:7C00 and execute it, and start the Windows operating system from the hard disk. In the subsequent startup process, the Windows boot program (Osloader.exe) on the hard disk reads registry information and file system information through INT13H. The loader monitors the read and write of the registry by the bootloader, calls the original INT13H interrupt service program to read the registry on the hard disk to the memory, and modifies the read content in the memory, so that the bootloader loads a file that does not exist on the hard disk. kernel driver. When the boot program reads the kernel driver program through INT13H, the loading program redirects the read operation to the PCI card to read the hard disk encryption and decryption program stored in the non-extended ROM of the PCI card. So far, the boot program has obtained the content of the hard disk encryption and decryption program, and loads it into the Windows operating system according to the instructions of the registry. After the boot program completes the system initialization work, the Windows operating system begins to start. From this moment, the Windows operating system will give up using the INT13H interrupt and use the driver to access storage devices such as hard disks. As a disk filter driver, the hard disk encryption and decryption program embedded in the kernel of the Windows operating system takes over the monitoring of the read and write operations of the target hard disk, decrypts the data obtained by the read operation, and encrypts the data obtained by the write operation.
本发明的有益效果是:The beneficial effects of the present invention are:
1)设计新颖。不需要在计算机主板和硬盘之间增加额外的硬件设备。1) The design is novel. There is no need to add additional hardware devices between the computer motherboard and the hard disk.
2)使用成本低。仅需要一个PCI卡。2) The use cost is low. Only one PCI card is required.
3)使用方便。PCI卡的硬件序列号和目标硬盘的硬件序列号产生加密解密需要的密钥。该密钥将PCI卡和目标硬盘绑定为钥匙和锁的关系,插入匹配的PCI卡即可,不需要输入用户名和密码。3) Easy to use. The hardware serial number of the PCI card and the hardware serial number of the target hard disk generate the key needed for encryption and decryption. The key binds the PCI card and the target hard disk as a key and a lock, just insert the matching PCI card, and there is no need to enter the user name and password.
附图说明 Description of drawings
图1-磁盘存储驱动程序层次示意图。Figure 1 - Schematic diagram of the disk storage driver hierarchy.
图2-PCI卡存储空间的使用示意图。Figure 2 - Schematic diagram of usage of PCI card storage space.
图3-从PCI卡启动的工作流程图。Figure 3 - Workflow diagram for booting from a PCI card.
具体实施方式 Detailed ways
下面结合附图和具体实施方式对本发明作进一步详细描述。本发明不仅限于以下实施例,凡是利用本发明的设计思路,做一些简单变化的设计都应进入本发明的保护范围之内。The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. The present invention is not limited to the following embodiments, and any designs that utilize the design ideas of the present invention and make some simple changes should fall within the scope of protection of the present invention.
PCI卡作为加载程序和硬盘加密解密程序的载体。加载程序存放在PCI卡扩展ROM的映像中,硬盘加密解密程序存放在PCI卡的非扩展ROM中,如图2。The PCI card is used as the carrier of the loading program and the hard disk encryption and decryption program. The loading program is stored in the image of the PCI card expansion ROM, and the hard disk encryption and decryption program is stored in the non-extension ROM of the PCI card, as shown in Figure 2.
硬盘加密解密程序(DiskSecure.sys)工作在Windows操作系统内核,位于磁盘驱动程序(Disk.sys)和分区驱动程序(PartMgr.sys)之间,如图1。Windows操作系统启动后,计算机对硬盘的读写操作通过输入输出请求包(IRP)来完成。当Windows操作系统需要访问硬盘时,构造相应的IRP并且层层下传。硬盘加密解密程序对分区驱动程序传下来的IRP进行分析:如果IRP为读操作,硬盘加密解密程序先将该IRP发送给磁盘驱动程序,磁盘驱动程序完成读操作后将该IRP返回给硬盘加密解密程序。硬盘加密解密程序使用密钥解密IRP中的数据;完成解密后将IRP返回给Windows操作系统。如果IRP为写操作,硬盘加密解密程序根据该IRP重新创建一个新的IRP,且使用密钥加密新创建的IRP中的数据;完成加密后,将新创建的IRP发送给磁盘驱动程序。The hard disk encryption and decryption program (DiskSecure.sys) works in the Windows operating system kernel and is located between the disk driver (Disk.sys) and the partition driver (PartMgr.sys), as shown in Figure 1. After the Windows operating system starts, the computer reads and writes to the hard disk through input and output request packets (IRP). When the Windows operating system needs to access the hard disk, it constructs the corresponding IRP and downloads it layer by layer. The hard disk encryption and decryption program analyzes the IRP sent by the partition driver: if the IRP is a read operation, the hard disk encryption and decryption program first sends the IRP to the disk driver, and the disk driver returns the IRP to the hard disk encryption and decryption after completing the read operation program. The hard disk encryption and decryption program uses the key to decrypt the data in the IRP; after the decryption is completed, the IRP is returned to the Windows operating system. If the IRP is a write operation, the hard disk encryption and decryption program recreates a new IRP according to the IRP, and uses a key to encrypt the data in the newly created IRP; after the encryption is completed, the newly created IRP is sent to the disk driver.
Windwos操作系统启动时需要很多初始化数据,这些数据保存在注册表中。系统启动时,引导程序读取注册表来完成初始化操作。加载程序监控引导程序对注册表和文件系统的读操作,在内存中修改引导程序读取的数据。When the Windows operating system starts, it needs a lot of initialization data, which are stored in the registry. When the system starts, the bootloader reads the registry to complete the initialization operation. The loader monitors the read operation of the boot program to the registry and the file system, and modifies the data read by the boot program in memory.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E967-E325-11CE-BFC1-08002BE10318}中UpperFilters键指示磁盘存储驱动程序的层次顺序:PartMgr.sys,Diskperf.sys。其中Diskperf.sys为Windows 2000独有。这里我们需要将内存中的UpperFilters键值进行修改,层次顺序变为:DiskSecure.sys,PartMgr.sys,Diskperf.sys。除此之外,我们还需要在内存中的HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services键下面增加DiskSecure键,且在HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DiskSecure键下增加Start,Group等键值并且赋予相应的值。其中Start=0表示DiskSecure.sys在计算机启动时装入。对内存中注册表数据的修改生效后,引导程序需要从文件系统获取DiskSecure.sys文件的信息。加载程序截获引导程序对SYSTEM32\DRIVERS目录信息的访问,在内存中增加DiskSecure.sys的信息,如文件大小、文件位置等等。当引导程序根据这些信息读取DiskSecure.sys(DiskSecure.sys在硬盘上并不存在)时,加载程序把读操作且重定向到PCI卡,读取放在PCI卡非扩展ROM的DiskSecure.sys。至此,引导程序获得了DiskSecure.sys的内容,并根据注册表的指示将DiskSecure.sys装入Windows操作系统,如图3所示。The UpperFilters key in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E967-E325-11CE-BFC1-08002BE10318} indicates the hierarchical order of disk storage drivers: PartMgr.sys, Diskperf.sys. Among them, Diskperf.sys is unique to Windows 2000. Here we need to modify the UpperFilters key value in the memory, and the hierarchical order becomes: DiskSecure.sys, PartMgr.sys, Diskperf.sys. In addition, we also need to add the DiskSecure key under the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services key in the memory, and add the Start, Group and other key values under the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DiskSecure key and assign corresponding values . Among them, Start=0 means that DiskSecure.sys is loaded when the computer starts. After the modification of the registry data in the memory takes effect, the boot program needs to obtain the information of the DiskSecure.sys file from the file system. The loader intercepts the boot program's access to the SYSTEM32\DRIVERS directory information, and adds DiskSecure.sys information in the memory, such as file size, file location, and so on. When the boot program reads DiskSecure.sys (DiskSecure.sys does not exist on the hard disk) according to these information, the loader redirects the read operation to the PCI card, and reads the DiskSecure.sys placed in the non-extended ROM of the PCI card. So far, the boot program has obtained the content of DiskSecure.sys, and loads DiskSecure.sys into the Windows operating system according to the instructions of the registry, as shown in Figure 3.
Claims (3)
- Under the Windows environment based on the hard disk encryption method of pci card, it is characterized in that: comprise a pci card, one section loading procedure that leaves in the pci card expansion ROM reflection, one section HD encryption decrypted program that leaves in the non-expansion ROM of pci card; Loading procedure monitoring Windows operating system is interrupted the read-write target hard disk by INT13H, finishes the encryption and decryption to the target hard disk data; When computer starting, the HD encryption decrypted program is embedded Windows operating system simultaneously; HD encryption decrypted program monitoring Windows operating system is read and write target hard disk by driver, finishes the encryption and decryption to the target hard disk data; Loading procedure and HD encryption decrypted program obtain the hardware sequence number PID of pci card and the hardware sequence number HID of target hard disk, and (PID HID) calculates the key that the target hard disk encryption and decryption need by function f.
- 2. based on the hard disk encryption method of pci card, it is characterized in that under the Windows environment as claimed in claim 1: described loading procedure leaves in the reflection of pci card expansion ROM; The self check operation detection of carrying out when computer BIOS is read in some zones among internal memory C0000H~DFFFFH with the reflection in the expansion ROM when pci card has expansion ROM, makes a far call then, carries out the loading procedure in videoing; Loading procedure monitoring Windows operating system is interrupted the read-write target hard disk by INT13H, and the data that deciphering is read from target hard disk are encrypted the data that write target hard disk; In internal memory, revise registry information and the filesystem information that reads simultaneously, the HD encryption decrypted program is embedded Windows operating system as the disk filter drive program.
- 3. based on the hard disk encryption method of pci card, it is characterized in that under the Windows environment as claimed in claim 1: described HD encryption decrypted program leaves in the non-expansion ROM of pci card; It is a disk filter drive program that is operated in the Windows operating system nucleus; When Windows operating system abandoned using INT13H to interrupt using instead driver read-write target hard disk, the HD encryption decrypted program was taken over the encryption and decryption to the target hard disk data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007101198151A CN101236534A (en) | 2007-07-31 | 2007-07-31 | Hard Disk Encryption Method Based on PCI Card in Windows Environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007101198151A CN101236534A (en) | 2007-07-31 | 2007-07-31 | Hard Disk Encryption Method Based on PCI Card in Windows Environment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101236534A true CN101236534A (en) | 2008-08-06 |
Family
ID=39920164
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007101198151A Pending CN101236534A (en) | 2007-07-31 | 2007-07-31 | Hard Disk Encryption Method Based on PCI Card in Windows Environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101236534A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103401928A (en) * | 2013-08-05 | 2013-11-20 | 苏州鼎富软件科技有限公司 | Remote computer monitoring method |
CN112632515A (en) * | 2020-12-18 | 2021-04-09 | 三未信安科技股份有限公司 | Access method and system of PCI (peripheral component interconnect) password card under PMON (Power management on) |
-
2007
- 2007-07-31 CN CNA2007101198151A patent/CN101236534A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103401928A (en) * | 2013-08-05 | 2013-11-20 | 苏州鼎富软件科技有限公司 | Remote computer monitoring method |
CN103401928B (en) * | 2013-08-05 | 2016-07-06 | 国家电网公司 | Remote computer monitors method |
CN112632515A (en) * | 2020-12-18 | 2021-04-09 | 三未信安科技股份有限公司 | Access method and system of PCI (peripheral component interconnect) password card under PMON (Power management on) |
CN112632515B (en) * | 2020-12-18 | 2022-12-13 | 三未信安科技股份有限公司 | Access method and system of PCI (peripheral component interconnect) password card under PMON (Power management on) |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8875266B2 (en) | System and methods for enforcing software license compliance with virtual machines | |
US7421588B2 (en) | Apparatus, system, and method for sealing a data repository to a trusted computing platform | |
US7330977B2 (en) | Apparatus, system, and method for secure mass storage backup | |
KR101081118B1 (en) | System and method for securely restoring a program context from a shared memory | |
WO2009107330A1 (en) | Information processor and method for controlling the same | |
US20110225431A1 (en) | System and Method for General Purpose Encryption of Data | |
US20080066075A1 (en) | System and Method for Securely Saving and Restoring a Context of a Secure Program Loader | |
TW201535145A (en) | System and method to store data securely for firmware using read-protected storage | |
US20090240953A1 (en) | On-disk software image encryption | |
US20110225428A1 (en) | System and Method for Encryption and Decryption of Data | |
US20130067210A1 (en) | System and method for recovering from an interrupted encryption and decryption operation performed on a volume | |
JP2010510574A (en) | Protection and method of flash memory block in secure device system | |
CN101236532B (en) | Hard Disk Encryption Method Based on USB Device in Windows Environment | |
US7818567B2 (en) | Method for protecting security accounts manager (SAM) files within windows operating systems | |
JP2004234053A (en) | Computer system, computer device, data protection method for storage device, and program | |
US20110225406A1 (en) | System and Method for Pre-Operating System Encryption and Decryption of Data | |
CN101021793B (en) | Method and system for realizing Pre-OS Application utilizing extended BIOS technique | |
CN103488919A (en) | Protection method and device for executable programs | |
TWI564743B (en) | Method and apparatus to using storage devices to implement digital rights management protection | |
JP2013175112A (en) | Authentication device and authentication method | |
CN100507850C (en) | A Method of Embedding Kernel Driver in Windows Operating System Using USB Device | |
WO2013030967A1 (en) | Backup method and backup program | |
WO2008068908A1 (en) | Information processing device and information management program | |
US20020169976A1 (en) | Enabling optional system features | |
CN101236498B (en) | Method for embedding inner core drive program in Window operation system by PCI card start-up |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20080806 |