CN101771530B - Covert communication method for concealing weighted signal by using common signal sequence - Google Patents
Covert communication method for concealing weighted signal by using common signal sequence Download PDFInfo
- Publication number
- CN101771530B CN101771530B CN2010103007184A CN201010300718A CN101771530B CN 101771530 B CN101771530 B CN 101771530B CN 2010103007184 A CN2010103007184 A CN 2010103007184A CN 201010300718 A CN201010300718 A CN 201010300718A CN 101771530 B CN101771530 B CN 101771530B
- Authority
- CN
- China
- Prior art keywords
- signal
- information
- covert
- item weight
- weight score
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a covert communication method for concealing weighted signal by using common signal sequence, relating to the technical field of communication and solving the problems in the prior art that additional noise conceals covert communication during secret information loading in signal wave form domain when adopting four-item weighted score Fourier transform to perform covert communication, and that secret information is easy to discover by an unobjective host. The communication method in the invention comprises: taking a signal of a common sequence after modulation by a base band as a cover signal, modulating covert secrete information by the base band, encrypting by adopting four-item weighted score Fourier transform, implanting the encrypted cover signal into the cover signal to finish information covert communication, when the receiver and the transmitter are synchronous, demodulating the received signal and then subtracting the cover signal to obtain a covert information sequence, and performing four-item weighted score Fourier inversion to obtain corresponding covert information. The invention is extensively applicable in the technical field of covert communication.
Description
Technical field
The present invention relates in general burst, embed weighted signal, belong to communication technical field to reach the implementation method of covert communications.
Background technology
Information Hiding Techniques be the mid-90 in 20th century from external rise, it is the emerging technology that integrates multidisciplinary theory and technology, and has caused professional person's research interest rapidly.It is to utilize the mankind sensory insensitive; And the redundancy of multimedia digital signal existence itself; Secret information is hidden in the host signal, is not discovered or be not noted, and do not influence the sensory effect and the practical value of host signal by people's sensory perceptual system.The Information hiding most important character is that it has not only hidden the content of information, and has hidden the existence of information, thereby demonstrates more excellent characteristic at information security field.
Information hiding is a kind of means of information protection, and it is different from traditional cryptological technique.Cryptographic technique mainly is to study how confidential information to be carried out special coding, to form unrecognizable password form (ciphertext); And Information hiding mainly studies and how a certain confidential information secret is hidden in another disclosed information, and the transmission through public information comes the transfer machine confidential information then
The covert communications technology is an important branch of Information Hiding Techniques, and it is conceived to hide once the existence of communication, that is to say, is to make the uncertain secret that where exists of assailant, and what it was hidden is the form that information exists.As far as coded communication because ciphertext recognized easily, possibly more can evoke the desire that the interceptor decodes, make they intercept and capture ciphertext just all one's effort decode, or redispatch after ciphertext destroyed, thereby influence the safety of confidential information; But as far as the covert communications technology; Seem few owing to hidden the signal of secret information with general signal difference; The interceptor is difficult to judge in the face of numerous information which contains secret information, and which does not have secret information, thereby flees from interceptor's attack relatively easily; Thereby can guarantee the safety of confidential information, reach the purpose of covert communications.
(Fractional Fourier Transform is a kind of important time frequency analyzing tool FRFT) to fractional Fourier transform, has obtained comparatively extensive studies in the last few years, and is able to use in some field of engineering technology.FRFT is the popularization to traditional F ourier conversion, and its essential characteristics is appreciated that and is the fractionation to Fourier transform characteristics value.The continuity of parameter value, rotation additivity and be the fundamental property of FRFT to the uniformity of signal time-frequency form.Owing to, and, make FRFT have various definition form to the wide in range property that FRFT character retrains to the difference of characteristic value fractionation mode.According to these definition starting point and essential characteristic separately, can roughly it be divided into two types, that is: classical type FRFT and weighting class FRFT.
Classical type FRFT is a kind of FRFT form that proposes relatively early, and it directly from Fourier transform integrals nuclear and characteristic value, is promoted with complete.Because the orthogonal basis of classical FRFT with chirp form, thereby the classical type FRFT chirp class FRFT that is otherwise known as.Research and application about FRFT at present concentrates on classical type mostly, because morning, research appear extensively, thereby also it directly is called FRFT sometimes.Classical FRFT has application more widely in finding the solution scientific researches such as the differential equation, quantum mechanics, signal analysis and processing; The engineering aspect is to utilize classical FRFT the earliest like optical correlation fields such as optical communication system, light image processing, also is that application is the most successful at present.But be subject to the discrete logarithm problem of classical FRFT, its application in the communications field has received bigger restriction.
Weighting class fractional Fourier transform (Weighted FRFT is a kind of new mathematical tool that is different from classical fractional Fourier transformation WFRFT), propose first in nineteen ninety-five by C.C.Shih, classical type evening many.Propose beginning, it only defines in order to satisfy the FRFT fundamental property, and conversion itself is not endowed the actual physical meaning.Along with the progress of optical research, the mathematical property of WFRFT has obtained good embodiment in optical system, and can realize through simple optics, thereby in Information Optics, is able to use widely.
After C.C.Shih, to go deep into along with what FRFT was studied, the definition of WFRFT is constantly promoted, and unified with classical FRFT to a certain extent.The WFRFT definition form that C.C.Shih proposed goes for any periodic conversion that has.Utilize this character, can continuous WFRFT definition be generalized to the WFRFT of discrete series.
Four-item weight score Fourier conversion (4-WFRFT) that tradition is continuous is defined as:
F
α[f](t)=w
0(α)f(t)+w
1(α)F(t)+w
2(α)f(-t)+w
3(α)F(-t)
W wherein
0~w
3Be the weight coefficient by the control of dynamic encryption parameter alpha, the form of embodying is:
The value cycle of dynamic encryption parameter alpha is 4, and the span of setting α here is any real number between [0,4] or [2,2], for the real number outside the span, and weight coefficient α
l(l=0,1,2,3)
Will be along with α presents cyclic variation.The result of four-item weight score Fourier conversion is f (t) when α=0, and the result of four-item weight score Fourier conversion is F (t) when α=1.Wherein f (t) is by the function of conversion, and f (is the counter-rotating function at center with the initial point for f (t) t); F (t) becomes the right function of Fourier transform with f (t), and F (is the counter-rotating function at center with the initial point for F (t) t).Definition below Fourier transform adopts:
The definition of the four-item weight score Fourier conversion (4-WFRFT) of discrete series is as follows after promoting:
F
α,V[x(n)]=w
0(α,V)x(n)+w
1(α,V)X(n)+w
2(α,V)x(-n)+w
3(α,V)X(-n)
Wherein
Be by curtain V=[m
0, m
1, m
2, m
3] and NV=[n
0, n
1, n
2, n
3] wait the common weight coefficient form of controlling of 9 parameters, wherein MV and NV are real vector, make V=[MV, NV].X (n) and x (n) be DFT (DFT) to (through substitution of variable n=k), DFT adopts following formal definition:
Four-item weight score Fourier conversion after promoting has been inherited all character of former conversion, can come the rotation of the periodicity and the characteristic vector of control change in addition through the adjustment to real vector M V and NV.In a word, the four-item weight score Fourier conversion after promoting is complicated more, but more complete in theory, and is more flexible and changeable during practical application.
It all is the loading of carrying out secret information in the source encoding territory that conventional information is hidden transmission method, and other secret information embedding grammars of describing the territory almost do not relate at signal.The benefit of carrying out the secret information loading in the source encoding territory is can secret information sent and receive with identical load mode with blindage information, and secret information has with blindage information and has equal protection in channel.Problem is that secret information and blindage information are not easily separated, if blindage information is kept by information acquisition person for a long time, then has the found risk of secret information; In addition, owing to secret information and blindage information cutting apart physically not make the cost of detection secret information to exchange for through the time.
The secret information in signal waveform territory loads and extraction needs special-purpose transmission and receiving equipment, can realize the physical segmentation of secret information and blindage information.Do not having under the situation of equipment, secret information will be disposed with the form of noise by general receiver, can't be kept for a long time by information acquisition person.The deficiency that the waveform territory loads is to require higher sensitivity and interference free performance for the purpose receiver, because the common energy of secret information at this moment is less than blindage information, receives the influence of channel more easily.Present employed signal waveform domain information loading technique, a main deficiency need to be the outer noise of plus just can cover the planisphere of covert communications, under the situation of additional noise deficiency, also can improve the risk that covert communications exposes on the other hand.
Summary of the invention
The objective of the invention is for solving existing when adopting four-item weight score Fourier conversion to carry out covert communications; Carry out in the signal waveform territory existing the plus external noise to reach the purpose of covering covert communications when secret information loads; And the problem that exists secret information to be found by non-destination host easily provides a kind of concealed communication method that utilizes general burst to hide weighted signal.The concrete steps of this method are:
Transmitter terminal:
Step 1: with general burst through after the baseband modulation as the blindage signal;
Step 2: the secret information of hiding is hidden signal through acquisition after the baseband modulation;
Step 3: the hiding signal that step 2 is obtained adopts the four-item weight score Fourier transform to encrypt, and obtains weighted signal, and weighted signal is carried out the blindage signal plus that obtains with step 1 behind the amplitude fading, obtains the hiding signal of encrypting;
Step 4: the hiding signal of the encryption that step 3 is obtained through the digital carrier modulation after, after D/A conversion and up-conversion, send into channel again and transmit;
Receiver end:
Step 5: when receiver and transmitter fully synchronously the time, receive signal, and after the signal that receives sampled with A/D through down-conversion, again through the digital carrier demodulation; Obtain restituted signal;
Step 6: after in the restituted signal that step 5 obtains, deducting the blindage signal, adopt the four-item weight score Fourier inversion to decipher, obtain to hide signal, realize covert communications.
The present invention proposes to utilize the covert communications technology to come hiding necessary being of communicating by letter with the protection important information, in order to reduce the probability that important information is intercepted and captured; Utilize general sequence through the signal after the baseband modulation as blindage signal (being also referred to as host signal); Consider confidentiality through the signal after the four-item weight Fourier transform; The important information of desire protection is carried out the four-item weight score Fourier transform earlier, be embedded into then in the blindage signal.When Receiver And Transmitter fully synchronously the time, as long as deduct the blindage signal, just can obtain to pass through accordingly the information sequence after the weighting, process four-item weight score Fourier inversion just can obtain to hide Info accordingly again.Wherein, the key of telescopiny is the conversion exponent number, and the key of leaching process is corresponding inverse transformation exponent number, and the encryption measures that hides Info is the four-item weight score Fourier transform.
Beneficial effect of the present invention: when the inventive method is carried out the information loading of covert communications on the signal waveform territory, can realization information transmit when purpose receiver and transmitter are synchronous, do not need the outer noise signal of plus.Secret information to be passed is embedded in the blindage signal through after the weighted transformation, has strengthened the non-correlation between the signal, protected secret information effectively.Even the blindage signal is intercepted and captured by the enemy, do not carry out coded communication owing to do not understand which kind of mode of employing, therefore also be difficult to deciphering.Secret information through behind the weighted transformation again with the blindage signal plus, more reduced the probability that information comes to light and is decrypted.
Description of drawings
Fig. 1 utilizes general burst to hide the signal processing flow sketch map of the covert communications of weighted signal; Fig. 2 is the planisphere of blindage signal of the present invention; Fig. 3 is through the hiding signal constellation which after the 0.5 rank four-item weight score Fourier transform, and Fig. 4 is the planisphere of blindage signal behind the hiding secret information of employing the inventive method embedding.
Embodiment
Embodiment one: combine Fig. 1 that this execution mode is described, the described a kind of concealed communication method that utilizes general burst to hide weighted signal of this execution mode.
Its concrete steps are:
Transmitter terminal:
Step 1: with general burst through after the baseband modulation as the blindage signal;
Step 2: the secret information of hiding is hidden signal through acquisition after the baseband modulation;
Step 3: the hiding signal that step 2 is obtained adopts the four-item weight score Fourier transform to encrypt, and obtains weighted signal, and weighted signal is carried out the blindage signal plus that obtains with step 1 behind the amplitude fading, obtains the hiding signal of encrypting;
Step 4: the hiding signal of the encryption that step 3 is obtained through the digital carrier modulation after, after D/A conversion and up-conversion, send into channel again and transmit;
Receiver end:
Step 5: when receiver and transmitter fully synchronously the time, receive signal, and after the signal that receives sampled with A/D through down-conversion, again through the digital carrier demodulation; Obtain restituted signal;
Step 6: after in the restituted signal that step 5 obtains, deducting the blindage signal, adopt the four-item weight score Fourier inversion to decipher, obtain to hide signal, realize covert communications.
Referring to Fig. 2, Fig. 3 and Fig. 4; Adopt analogue system that the signal in the described communication means of this execution mode is carried out emulation; The blindage signal that said emulation is adopted is the signal that general burst obtains through QPSK base band mapping back; The hiding signal signal that to be secret information obtain through QPSK base band mapping back, hiding signal carry out the weighted signal that obtains behind the 0.5 rank four-item weight score Fourier conversion, and the amplitude fading of said weighted signal is 3dB; From Fig. 3 and Fig. 4, can find out; Weighted signal presents a kind Gauss distribution situation on complex plane; This blindage signal that make to embed behind secret information distributes at complex plane, and said blindage signal is similar to the general signal complex plane distribution situation after the Gaussian noise that superposeed very much, is difficult for causing interceptor's interest like this; The attack of non-destination host can be effectively hidden, good covert communications can be realized.
The described employing four-item weight score of this execution mode step 3 Fourier transform carry out the direct transform exponent number that encrypted secret key is four-item weight score Fourier the definition of said direct transform is following for α, V}:
S
0=F
α,V[X
0(n)]=w
0(α,V)X
0(n)+w
1(α,V)X
1(n)+w
2(α,V)X
2(n)+w
3(α,V)X
3(n)
The key that the described employing four-item weight score of this execution mode step 6 Fourier inversion is deciphered be four-item weight score Fourier the inverse transformation exponent number definition of said inverse transformation is following for α, V}:
X
0(n)=F
-α,V[S
0](n)=w
0(-α,V)S
0(n)+w
1(-α,V)S
1(n)+w
2(-α,V)S
2(n)+w
3(-α,V)S
3(n)。
The signal processing flow of this execution mode all can be realized by DSP, FPGA or FPGA and DSP combination.
The present invention utilizes the entrained information of general baseband modulation signal as blindage information, and secret information to be passed as hiding Info, is embedded in the blindage information.Transmitting and receiving under the situation that end is synchronous, embedding is suitable, can cover the fact of secret information transmission, reaching the purpose of covert communications.In order to strengthen the privacy degrees of secret information, secret information has been passed through the four-item weight score Fourier transform, reach planisphere counter-rotating and randomized purpose.Wherein, the key of telescopiny is the exponent number of weighted transformation, and the key of leaching process is corresponding inverse transformation exponent number.
When the present invention adopted four-item weight score Fourier conversion to carry out signal encryption at the unknown transmitter of non-purpose receiver, this method can well be hidden actual signal.And when non-purpose receiver known transmitter adopts four-item weight score Fourier conversion to carry out signal encryption,, having obtained the position of ideal constellation even through up to a hundred detections, it is to carry out wrong demodulation that very big probability is also arranged.Said one-parameter four-item weight score Fourier conversion signal all has the characteristic of multiple Gaussian distribution on time-frequency domain, this statistical property and noise are similar; Multi-parameter four-item weight score Fourier conversion signal has the advantages that constellation separates, and this signal with the process multipath channel has similitude.These two characteristics make the four-item weight score Fourier conversion signal have very strong camouflage property.
Claims (1)
1. concealed communication method that utilizes general burst to hide weighted signal is characterized in that concrete steps are:
Transmitter terminal:
Step 1: with general burst through after the baseband modulation as the blindage signal;
Step 2: the secret information of hiding is hidden signal through acquisition after the baseband modulation;
Step 3: the hiding signal that step 2 is obtained adopts the four-item weight score Fourier transform to encrypt, and obtains weighted signal, and weighted signal is carried out the blindage signal plus that obtains with step 1 behind the amplitude fading, obtains the hiding signal of encrypting;
Step 4: the hiding signal of the encryption that step 3 is obtained through the digital carrier modulation after, after D/A conversion and up-conversion, send into channel again and transmit;
Receiver end:
Step 5: when receiver and transmitter fully synchronously the time, receive signal, and after the signal that receives sampled with A/D through down-conversion, again through the digital carrier demodulation; Obtain restituted signal;
Step 6: after in the restituted signal that step 5 obtains, deducting the blindage signal, adopt the four-item weight score Fourier inversion to decipher, obtain to hide signal, realize covert communications;
The described employing four-item weight score of step 3 Fourier transform carry out the direct transform exponent number that encrypted secret key is four-item weight score Fourier α, V}, being defined as of said direct transform:
S
0=F
α,V[X
0(n)]=w
0(α,V)X
0(n)+w
1(α,V)X
1(n)+w
2(α,V)X
2(n)+w
3(α,V)X
3(n);
The key that the said employing four-item weight score of step 6 Fourier inversion is deciphered be four-item weight score Fourier the inverse transformation exponent number α, V}, being defined as of said inverse transformation:
X
0(n)=F
-α,V[S
0](n)=w
0(-α,V)S
0(n)+w
1(-α,V)S
1(n)+w
2(-α,V)S
2(n)+w
3(-α,V)S
3(n)。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010103007184A CN101771530B (en) | 2010-01-26 | 2010-01-26 | Covert communication method for concealing weighted signal by using common signal sequence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010103007184A CN101771530B (en) | 2010-01-26 | 2010-01-26 | Covert communication method for concealing weighted signal by using common signal sequence |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101771530A CN101771530A (en) | 2010-07-07 |
CN101771530B true CN101771530B (en) | 2012-08-15 |
Family
ID=42504152
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010103007184A Expired - Fee Related CN101771530B (en) | 2010-01-26 | 2010-01-26 | Covert communication method for concealing weighted signal by using common signal sequence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101771530B (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102142131B (en) * | 2011-05-12 | 2012-09-12 | 北京大学 | Encrypted kinoform based digital image watermarking embedding and extracting methods and systems |
CN102355359A (en) * | 2011-07-15 | 2012-02-15 | 华南理工大学 | Method for hiding secret information in modulation constellation |
CN103281164B (en) * | 2013-05-15 | 2016-01-13 | 江苏科技大学 | A kind of hidden channel synchronization method of composite type of high security |
CN103476026B (en) * | 2013-09-06 | 2017-01-18 | 中国科学院软件研究所 | Self-adaption covert communication method based on satellite channel coding |
CN106714148B (en) * | 2016-12-09 | 2019-07-05 | 浙江警察学院 | A kind of concealed communication method based on joint normal stochastic process |
CN108566260B (en) * | 2018-02-01 | 2020-07-10 | 西安电子科技大学 | Covert communication method based on interference division multiple access |
CN108920419B (en) * | 2018-06-20 | 2022-03-01 | 沈阳理工大学 | Fractional order Fourier inverse transformation hierarchical scanning method based on single parameter |
CN108989816B (en) * | 2018-09-03 | 2021-05-14 | 广州海格通信集团股份有限公司 | Coding channel information hiding method based on wavelet transformation |
CN109346092A (en) * | 2018-10-29 | 2019-02-15 | 王秉玉 | The system and method for voice encryption communication is carried out between a kind of communication terminal |
CN110188569B (en) * | 2019-05-29 | 2022-07-26 | 华南师范大学 | Information hiding method based on big data and Fourier transform and robot system |
CN110213009B (en) * | 2019-07-23 | 2021-08-31 | 电子科技大学 | Safe communication method based on power mixing |
CN110445777B (en) * | 2019-07-31 | 2020-07-10 | 华中科技大学 | Concealed voice signal transmission method, related equipment and storage medium |
CN112291034B (en) * | 2020-10-22 | 2022-05-17 | 南京邮电大学 | Satellite overlapping communication method for safety communication demand |
CN114124186B (en) * | 2022-01-27 | 2022-06-14 | 南京信息工程大学 | Multi-antenna wireless covert communication cooperative optimization method |
CN114745107B (en) * | 2022-03-22 | 2024-06-14 | 西安电子科技大学 | Coding layer secret communication method based on matrix coding |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1889428A (en) * | 2006-08-01 | 2007-01-03 | 西南交通大学 | Biological characteristic data safety hidden transmitting method under network environment |
CN101345618A (en) * | 2008-08-15 | 2009-01-14 | 哈尔滨工业大学 | Encryption and decryption method for four-item weight FRFT communication based on variable parameter |
CN101441618A (en) * | 2008-12-25 | 2009-05-27 | 哈尔滨工业大学 | Low sampling rate signal recovery method of weight fraction Fourier transformation field |
-
2010
- 2010-01-26 CN CN2010103007184A patent/CN101771530B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1889428A (en) * | 2006-08-01 | 2007-01-03 | 西南交通大学 | Biological characteristic data safety hidden transmitting method under network environment |
CN101345618A (en) * | 2008-08-15 | 2009-01-14 | 哈尔滨工业大学 | Encryption and decryption method for four-item weight FRFT communication based on variable parameter |
CN101441618A (en) * | 2008-12-25 | 2009-05-27 | 哈尔滨工业大学 | Low sampling rate signal recovery method of weight fraction Fourier transformation field |
Also Published As
Publication number | Publication date |
---|---|
CN101771530A (en) | 2010-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101771530B (en) | Covert communication method for concealing weighted signal by using common signal sequence | |
CN105631296A (en) | Design method of safety face verification system based on CNN (convolutional neural network) feature extractor | |
CN102012980B (en) | Method for securely detecting hidden text information based on homomorphic encryption system | |
CN111970693B (en) | Low-complexity LoRa Internet of things safety encryption method based on physical layer waveform | |
Gambhir et al. | Integrating RSA cryptography & audio steganography | |
CN107332664B (en) | Hidden underwater acoustic communication system with double-layer protection mechanism | |
CN105846946A (en) | Physical layer safety transmission method based on subcarrier index modulation | |
CN103078817B (en) | Based on the variable element frequency expansion sequence low detection probability signal launching and receiving method of weight score Fourier conversion | |
CN107135060A (en) | A kind of man made noise's signal building method and encryption in physical layer method | |
CN110635896B (en) | Blind parameter estimation method for continuous variable quantum key distribution | |
Habib et al. | Secure speech communication algorithm via DCT and TD-ERCS chaotic map | |
CN101345616B (en) | Communication encryption and decryption method of four-item weight score Fourier transform based on multi-parameter | |
Das et al. | Cryptanalysis of quantum secure direct communication protocol with mutual authentication based on single photons and bell states | |
Yang et al. | Waveform design for watermark framework based DFRC system with application on joint SAR imaging and communication | |
CN101345618B (en) | Encryption and decryption method for four-item weight FRFT communication based on variable parameter | |
MX2013000119A (en) | Data transmission security improvements. | |
Talbi et al. | Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT | |
CN105610569A (en) | Method of encrypting optical signal in phase space | |
Yang et al. | Smart home privacy protection based on the improved LSB information hiding | |
Tian et al. | High Anti-Interception Orbital Angular Momentum Spread Spectrum Communications Systems | |
Bremnavas et al. | Medical image security using LSB and chaotic logistic map | |
Jiao et al. | Iris biometric feature hidden based on chaotic encryption | |
Wu et al. | The Noise-like Disguised Scheme for Physical Layer Security Using Phase Rotation And Wavelet Transform | |
CN109685707A (en) | A kind of gray level image encryption and decryption method converted using real number field | |
Zhang et al. | Mixing Position Estimation of AIS Mixed Signal Based on Double-Sliding Window Method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120815 Termination date: 20130126 |