CN102622561A - Enciphering and deciphering method for invoking data in software - Google Patents

Enciphering and deciphering method for invoking data in software Download PDF

Info

Publication number
CN102622561A
CN102622561A CN2011100296914A CN201110029691A CN102622561A CN 102622561 A CN102622561 A CN 102622561A CN 2011100296914 A CN2011100296914 A CN 2011100296914A CN 201110029691 A CN201110029691 A CN 201110029691A CN 102622561 A CN102622561 A CN 102622561A
Authority
CN
China
Prior art keywords
file
data
aes
function
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100296914A
Other languages
Chinese (zh)
Inventor
邹芬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SAIKUTE (BEIJING) INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SAIKUTE (BEIJING) INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SAIKUTE (BEIJING) INFORMATION TECHNOLOGY Co Ltd filed Critical SAIKUTE (BEIJING) INFORMATION TECHNOLOGY Co Ltd
Priority to CN2011100296914A priority Critical patent/CN102622561A/en
Publication of CN102622561A publication Critical patent/CN102622561A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses an enciphering and deciphering method protecting the data to be read on computer software, wherein data required to be protected is related to an enciphering lock inserted in the same computer, and the enciphering lock is required to be always available during the data reading process. AES and Hash checking MD5 are utilized to judge the enciphering and the file. The enciphering and deciphering method belongs to the field of data safety.

Description

Call the encryption and the decryption method of data in a kind of software
Technical field
The data encryption and decryption method that the present invention relates in a kind of software transfer belongs to field of information security technology.And be particularly to the data encryption and decryption method in a kind of software transfer.
Background technology
In the software protection field, the protection software copyright is for the encryption measures widespread use of the guard against piracy of software itself now.But often ignored the protection of the data that generate for software itself.And development of electronic technology makes public telecommunication can extrude many files now, and this also comprises a lot of classified papers, and this confidentiality to file constitutes a threat to.It is exactly that the confidentiality of protected file is not by unauthorized infringement that data are encrypted.Encryption converts plaintext to insignificant ciphertext, and deciphering just reverts to insignificant ciphertext expressly.In order to address the above problem, the present invention proposes the encrypting and decrypting method that calls data in a kind of software.
Aes algorithm is the abbreviation of .Advanced Encrypt Standard, and it is a kind of novel symmetric key encryption algorithm standard that the NIST of American National Standard Committee announces.Aes algorithm is owing to have applied range, and the stand-by period is short, hides the advantage that handling capacity is high easily.
The full name of MD5 is Message-Digest Algorithm 5 (md5-challenge); Ronald L.Rivest by MIT Laboratory for Computer Science and RSA Data Security Inc develops in the early 1990s, through MD2, MD3 and MD4 development.Its effect is to let high capacity information become a kind of secret form (be exactly the big integer that be transformed into the byte serial of a random length one fixed length) by " compression " with the signature of digital signature software before the private close spoon.
AES and MD5 algorithm are used in increasing security fields.
Summary of the invention
The present invention relates to call in a kind of software the encrypting and decrypting method of data.
Encryption when relating in particular to reading of data and decryption method.Require the data of protection relevant, in carrying out data read process, require this encryption device all to exist always with the encryption device that is inserted in on the computing machine.The technical matters that the present invention mainly solves is, the data of encrypting and decrypting software transfer.In the software protection field, the protection software copyright reaches safety practice widespread uses such as encryption for the piracy that prevents of software itself now.But often ignored the protection of the data that generate for software itself.
In order to address the above problem, the present invention proposes the encryption and the decryption method of the data that read on a kind of computer software.Method may further comprise the steps:
Suppose that source data file leaves the C dish in, data file is called A, and its workflow is following:
1, in the subscriber computer hard disk, create the arbitrary data file of (the establishment mode that windows is general) sky under the same subregion same root catalogue, called after A1 also divides the file header zone, and it is used for depositing the target data file after the encryption; Promptly A is encrypted, be stored in the A after encrypting among the A1.
2, reading of data content from source file A through the AES AES, is encrypted the data content among the A, and the data encrypted content is write among the A1, before the data encrypted content is write A1, need carry out twice judgement to the file header of A1:
3, the encrypt file head is the part of file A1: when (beginning to carry out decision operation) is empty when the encrypt file head of A1, it is write the encrypt file head; When the file encryption head of A1 for sky is not; Adopt MD5 () algorithm that the encrypt file head is carried out logic determines for the second time: when value that function MD5 () equals to arrange; Show that this file A1 is the file after encrypted, needs carry out read/write operation through self-defining myreadfile () function to file A1; When function MD5 () was not equal to about definite value, refusal carried out read/write operation to file A1;
4, the file A1 of source file A after encrypt, employing be that the AES AES adopts the AES AES, source data is carried out the mathematical logic computing, thereby changes the content of source data file; The rule of mathematical logic computing is: get current time numerical value, call srand () function, and will be worth the current time as value of a srand () function parameters generation; Call rand () function after the what is said or talked about again, the value that function srand () is generated obtains a value as rand () function parameters, and we are called Key (being the factor of mathematical logic computing).Data encrypted A1=source data A [the mathematical logic operation relation of agreement] Key.
Decrypting process is the inverse operation of ciphering process, and the Data2 value mathematical logic computing by appointment after encrypting is decrypted into source data file Data1.Data content decrypting process among the file A1 is following: the operational factor Key that is produced in the ciphering process is left in the A1 encrypt file in front in advance.Through myReadfile () data content among the file A1 is read, what read this moment is the data encrypted content, is not the source file data content; Obtain to judge the zone bit of encrypt file head before the operational factor Key; Operation function MD5 () when functional value equals about definite value, reads operational factor Key success this moment, gets into step 3; Operation function MD5 (), when functional value was not equal to about definite value, the data content that reads operational factor key failure source file A this moment equaled the inverse operation of the mathematical logic relation of file A1 data encrypted content and operational factor Key.
Description of drawings
Fig. 1 is through AES encrypting and decrypting process flow diagram.
Fig. 2 generates the flow process of data file encryption.
Embodiment
For making the object of the invention, technical scheme and advantage are more clear, the present invention are done further describing below in conjunction with accompanying drawing and specific embodiment.Suppose that source data file leaves the C dish in, data file is called A, and its workflow as shown in Figure 2 is following:
Under same directory, create the data file of a sky, A1 by name, it is used for depositing the data encrypted file; Read data files from source file A; Through the AES AES; Data among the A through AES, are write among the A1, before A1 is write; Need carry out twice judgement to the encrypt file head: the encrypt file head is the part of file A1: when (beginning to carry out decision operation) is empty when the encrypt file head of A1, it is write the encrypt file head; When the file encryption head of A1 for sky is not; Adopt MD5 () algorithm that the encrypt file head is carried out logic determines for the second time: when value that function MD5 () equals to arrange; Show that this file A1 is the file after encrypted, needs carry out read/write operation through self-defining myreadfile () function to file A1; When function MD5 () was not equal to about definite value, refusal carried out read/write operation to file A1; The file A1 of source file A after encrypt, employing be the AES AES.
The operation implementation procedure of the encrypting and decrypting that aes algorithm is concrete;
Realize principle: the data content among the source file A is taked a series of mathematical logic computing, thereby change the data among the source file A, the data content after the change is stored in A1.
Process is following:
1, through readfile () data content among the source file A is read;
2, call srand () function, the srand function is the initialization function of randomizer.And get active user's main frame time as this function parameters, and move this function, draw a corresponding functional value;
3, and then call rand () function, return a random number, this is worth the operational factor key in the step 4 just; Before calling rand () function generation random number, must fall earlier with srand () function and carry out initialization.
4, with functional value that step 3 a drew factor as the mathematical logic computing, we are referred to as operational factor Key;
5, the data encrypted content equals data content and the mathematical logic operation relation of operational factor Key among the source file A.
Aes algorithm is the abbreviation of .Advanced Encrypt Standard, and it is a kind of novel symmetric key encryption algorithm standard that the NIST of American National Standard Committee announces.Aes algorithm is owing to have applied range, and the stand-by period is short, hide easily, and the advantage that handling capacity is high, thereby aes algorithm is used in increasing security fields.
Aes algorithm is as a kind of alternate data encryption standard (Data Encryption Standard; DES) novel symmetric key encryption algorithm standard; Be an iteration block cipher, block length is 128bit, and key length can be appointed as 128bit, 192bit or 256bit.The key iteration of aes algorithm is made up of three reversible transformations that are referred to as layer, and these three layers are respectively that linear hybrid layer, non-linear layer and key add layer.Fig. 1 is existing aes algorithm process flow diagram, and is as shown in Figure 1, is example with 128 keys, and existing aes algorithm flow process is following:
The cryptographic operation flow process: data to be encrypted before carrying out encrypting iteration the first time, are at first carried out the key arithmetic operation by 128 inputs of dividing into groups, and start Nr time afterwards and encrypt the iterative operation flow process; Encrypt in the iterative process at Nr time, enciphered data at first through the shifting function of displacement of S box and byte, is mixed rank transformation afterwards, carries out the key arithmetic operation at last; Omit when encrypting iteration the last time and mix the rank transformation operation, later data are encrypted in output: the decryption oprerations flow process: treat that decrypted data is by 128 inputs of dividing into groups, before carrying out deciphering iteration the first time; At first carry out the key arithmetic operation, start deciphering iterative operation flow process afterwards Nr time: decipher in the iterative process at Nr time, different with encryption flow is; What deciphering was at first carried out is the shifting function of byte; Carry out the inverse permutation of S box again, carry out the key arithmetic operation afterwards, mix the row inverse transformation at last; Omit when deciphering iteration the last time and mix the row inverse transformation step, the data that the output deciphering is later.What manipulate is identical sub-key value for the cryptographic operation of AES and deciphering, the sub-key that only is to use.
To the concise and to the point narration of MD5 algorithm can for: MD5 handles the information of input with 512 groupings; And each divides into groups to be divided into again 16 32 seats and divides into groups; After having passed through a series of processing; The output of algorithm is formed by four 32, with generating 128 hashed values after these four 32 packet concatenation.
In the MD5 algorithm, at first need fill information, make its long result equal 448 to 512 complementations.Therefore, the position long (a Bits Length) of information will be expanded to N*512+448, i.e. N*64+56 byte (Bytes), and N is a positive integer.The method of filling is following, fills one 1 in the back of information with numerous 0, just stops the filling with 0 pair of information during condition above satisfying.Then, this result additional at the back one with the filling of 64 binary representations before message length.Through the processing in these two steps, position long=N*512+448+64=(N+1) * 512 of present information, promptly length is 512 integral multiple just.The reason of doing like this is for satisfying in the later process requirement to message length.
Four 32 numeric parameters that are known as link variable (Chaining Variable) are arranged among the MD5, and they are respectively: A=0x67452301, B=0xefcdab89, C=0x98badcfe, D=0x10325476.
After setting these four link variables, just begin to get into the four-wheel loop computation of algorithm.The round-robin number of times is the number of 512 information block in the information.
Top four link variables are copied in other four variablees: A is to a, and B is to b, and C is to c, and D is to d.
Major cycle has four-wheel (MD4 has only three-wheel), and every to take turns circulation all very similar.The first round is carried out 16 operations.Each operation adds the 4th variable with the gained result, a sub-packet of text and a constant then to the nonlinear function computing of wherein three dos among a, b, c and the d.Again the gained result is encircled left and move an indefinite number, and one of add among a, b, c or the d.One of replace among a, b, c or the d with this result at last.
To be four nonlinear functions using in each operation (every take turns one) once.
F(X,Y,Z)=(X&Y)|(( -X)&Z)
G(X,Y,Z)=(X&Z)|(Y&( -Z))
H(X,Y,Z)=X^Y^Z
I(X,Y,Z)=Y^(X|( -Z))
(& be with, | be or, -Right and wrong, ^ is an XOR)
The explanation of these four functions: if the corresponding position of X, Y and Z is independent and uniformly, each of result also should be independent of uniformly so.
F is the function of a bitwise operation.That is, if X, Y so, otherwise Z.Function H is an odd even operational character by turn.
Suppose that Mj representes the j sub-packet (from 0 to 15) of message, constant ti is the integral part of 4294967296*abs (sin (i)), i value from 1 to 64, and unit is a radian.(4294967296 equal 2 32 powers)
FF (a, b, c, d, Mj, s, ti) expression a=b+ ((a+F (and b, c, d)+Mj+ti)<<s)
GG (a, b, c, d, Mj, s, ti) expression a=b+ ((a+G (and b, c, d)+Mj+ti)<<s)
HH (a, b, c, d, Mj, s, ti) expression a=b+ ((a+H (and b, c, d)+Mj+ti)<<s)
II (a, b, c, d, Mj, s, ti) expression a=b+ ((a+I (and b, c, d)+Mj+ti)<<s)
This four-wheel (64 step) is:
The first round
FF(a,b,c,d,M0,7,0xd76aa478)
FF(d,a,b,c,M1,12,0xe8c7b756)
FF(c,d,a,b,M2,17,0x242070db)
FF(b,c,d,a,M3,22,0xc1bdceee)
FF(a,b,c,d,M4,7,0xf57c0faf)
FF(d,a,b,c,M5,12,0x4787c62a)
FF(c,d,a,b,M6,17,0xa8304613)
FF(b,c,d,a,M7,22,0xfd469501)
FF(a,b,c,d,M8,7,0x698098d8)
FF(d,a,b,c,M9,12,0x8b44f7af)
FF(c,d,a,b,M10,17,0xffff5bb1)
FF(b,c,d,a,M11,22,0x895cd7be)
FF(a,b,c,d,M12,7,0x6b901122)
FF(d,a,b,c,M13,12,0xfd987193)
FF(c,d,a,b,M14,17,0xa679438e)
FF(b,c,d,a,M15,22,0x49b40821)
Second takes turns
GG(a,b,c,d,M1,5,0xf61e2562)
GG(d,a,b,c,M6,9,0xc040b340)
GG(c,d,a,b,M11,14,0x265e5a51)
GG(b,c,d,a,M0,20,0xe9b6c7aa)
GG(a,b,c,d,M5,5,0xd62f105d)
GG(d,a,b,c,M10,9,0x02441453)
GG(c,d,a,b,M15,14,0xdga1e681)
GG(b,c,d,a,M4,20,0xe7d3fbc8)
GG(a,b,c,d,M9,5,0x21e1cde6)
GG(d,a,b,c,M14,9,0xc33707d6)
GG(c,d,a,b,M3,14,0xf4d50d87)
GG(b,c,d,a,M8,20,0x455a14ed)
GG(a,b,c,d,M13,5,0xa9e3e905)
GG(d,a,b,c,M2,9,0xfcefa?3f8)
GG(c,d,a,b,M7,14,0x676f02d9)
GG(b,c,d,a,M12,20,0x8d2a4c8a)
Third round
HH(a,b,c,d,M5,4,0xfffa?3942)
HH(d,a,b,c,M8,11,0x8771f681)
HH(c,d,a,b,M11,16,0x6d9d6122)
HH(b,c,d,a,M14,23,0xfde5380c)
HH(a,b,c,d,M1,4,0xa4beea44)
HH(d,a,b,c,M4,11,0x4bdecfa9)
HH(c,d,a,b,M7,16,0xf6bb4b60)
HH(b,c,d,a,M10,23,0xbebfbc70)
HH(a,b,c,d,M13,4,0x289b7ec6)
HH(d,a,b,c,M0,11,0xeaa127fa)
HH(c,d,a,b,M3,16,0xd4ef3085)
HH(b,c,d,a,M6,23,0x04881d05)
HH(a,b,c,d,M9,4,0xd9d4d039)
HH(d,a,b,c,M12,11,0xe6db99e5)
HH(c,d,a,b,M15,16,0x1fa27cf8)
HH(b,c,d,a,M2,23,0xc4ac5665)
Four-wheel
II(a,b,c,d,M0,6,0xf4292244)
II(d,a,b,c,M7,10,0x432aff97)
II(c,d,a,b,M14,15,0xab9423a7)
II(b,c,d,a,M5,21,0xfc93a039)
II(a,b,c,d,M12,6,0x655b59c?3)
II(d,a,b,c,M3,10,0x8f?0ccc92)
II(c,d,a,b,M10,15,0xffeff47d)
II(b,c,d,a,M1,21,0x85845dd1)
II(a,b,c,d,M8,6,0x6fa87e4f)
II(d,a,b,c,M15,10,0xfe2ce6e0)
II(c,d,a,b,M6,15,0xa3014314)
II(b,c,d,a,M13,21,0x4e?0811a1)
II(a,b,c,d,M4,6,0xf7537e82)
II(d,a,b,c,M11,10,0xbd3af235)
II(c,d,a,b,M2,15,0x2ad7d2bb)
II(b,c,d,a,M9,21,0xeb86d391)
All these add a, b, c, d respectively with A, B, C, D after accomplishing.Continue the operation algorithm with next integrated data then, last output is the cascade of A, B, C and D.
After you were according to said method realization MD5 algorithm above me, you can do a simple test with the program that following several information are worked it out you, and the program of looking at has and do not have mistake.
MD5(″″)=d41d8cd98f00b204e9800998ecf8427e
MD5(″a″)=0cc175b9c0f1b6a831c399e269772661
MD5(″abc″)=900150983cd24fb0d6963f7d28e17f72
MD5(″mes?sage?digest″)=f96b697d7cb7938d525a2f31aaf161d0
MD5(″abcdefghijklmnopqrstuvwxyz″)=c3fcd3d76192e4007dfb496cca67e13b
MD5(″ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrs?tuvwxyz″)=
f29939a25efabaef3b87e2cbfe641315?。

Claims (4)

1. call the encrypting and decrypting method of data in the software, it is characterized in that, comprise the steps:
A creates the data file of a sky, is used for depositing the data encrypted file and generates the encrypt file head;
B is through the AES AES, and the data process AES with source file writes empty data file;
C adopts the MD5 algorithm that the encrypt file head is carried out logic determines; When the value of function agreement, can carry out read/write operation to file, when function is not equal to about definite value, refuse file is carried out read-write operation.
2. according to method described in the claim 1, its characteristic is that also said encrypting and decrypting algorithm is the AES encrypting and decrypting method.
3. according to method described in the claim 1, its characteristic is that also said logic determines adopts the MD5 algorithm.
4. according to method described in the claim 1, its characteristic also is, what refusal carried out file adopting in the action of the file after encrypt of source file in the read/write operation when function is not equal to about definite value is the AES AES.
CN2011100296914A 2011-01-27 2011-01-27 Enciphering and deciphering method for invoking data in software Pending CN102622561A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100296914A CN102622561A (en) 2011-01-27 2011-01-27 Enciphering and deciphering method for invoking data in software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100296914A CN102622561A (en) 2011-01-27 2011-01-27 Enciphering and deciphering method for invoking data in software

Publications (1)

Publication Number Publication Date
CN102622561A true CN102622561A (en) 2012-08-01

Family

ID=46562475

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100296914A Pending CN102622561A (en) 2011-01-27 2011-01-27 Enciphering and deciphering method for invoking data in software

Country Status (1)

Country Link
CN (1) CN102622561A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102867153A (en) * 2012-08-30 2013-01-09 腾讯科技(深圳)有限公司 Methods and devices for encrypting and decrypting video file and mobile terminal
CN105160262A (en) * 2015-08-25 2015-12-16 浙江工业大学 Server uploaded file naming method based on Struts2 framework and MD5 encryption technology
CN105760750A (en) * 2016-02-01 2016-07-13 北京华胜天成科技股份有限公司 Software falsification recognition method and system
CN107204852A (en) * 2017-06-23 2017-09-26 郑州云海信息技术有限公司 A kind of optimized algorithm based on consistency verification of data algorithm

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101231622A (en) * 2007-12-27 2008-07-30 深圳华为通信技术有限公司 Data storage method and equipment base on flash memory, as well as data fetch method and apparatu
CN101488860A (en) * 2009-02-20 2009-07-22 四川长虹电器股份有限公司 File ciphering, deciphering method
CN101526892A (en) * 2008-03-04 2009-09-09 深圳市爱国者嵌入式系统科技有限公司 Method for expanding application program based on embedded system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101231622A (en) * 2007-12-27 2008-07-30 深圳华为通信技术有限公司 Data storage method and equipment base on flash memory, as well as data fetch method and apparatu
CN101526892A (en) * 2008-03-04 2009-09-09 深圳市爱国者嵌入式系统科技有限公司 Method for expanding application program based on embedded system
CN101488860A (en) * 2009-02-20 2009-07-22 四川长虹电器股份有限公司 File ciphering, deciphering method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102867153A (en) * 2012-08-30 2013-01-09 腾讯科技(深圳)有限公司 Methods and devices for encrypting and decrypting video file and mobile terminal
CN102867153B (en) * 2012-08-30 2014-04-09 腾讯科技(深圳)有限公司 Methods and devices for encrypting and decrypting video file and mobile terminal
US9014372B2 (en) 2012-08-30 2015-04-21 Tencent Technology (Shenzhen) Company Limited Video file encryption and decryption method, device, and mobile terminal
CN105160262A (en) * 2015-08-25 2015-12-16 浙江工业大学 Server uploaded file naming method based on Struts2 framework and MD5 encryption technology
CN105760750A (en) * 2016-02-01 2016-07-13 北京华胜天成科技股份有限公司 Software falsification recognition method and system
CN107204852A (en) * 2017-06-23 2017-09-26 郑州云海信息技术有限公司 A kind of optimized algorithm based on consistency verification of data algorithm

Similar Documents

Publication Publication Date Title
US11818262B2 (en) Method and system for one-to-many symmetric cryptography and a network employing the same
US8767959B2 (en) Block encryption
CN102185694A (en) Electronic file encrypting method and system based on fingerprint information
CN103716157A (en) Grouped multiple-key encryption method and grouped multiple-key encryption device
CN105406969A (en) Apparatus And Method For Data Encryption
CN114095170B (en) Data processing method, device, system and computer readable storage medium
CN104396182A (en) Method of encrypting data
EP3382929B1 (en) Technique to generate symmetric encryption algorithms
Zhang et al. Hybrid encryption algorithms for medical data storage security in cloud database
CA3056814A1 (en) Symmetric cryptographic method and system and applications thereof
CN105095695A (en) Realizing authorization via incorrect functional behavior of a white-box implementation
Asaad et al. Advanced Encryption Standard Enhancement with Output Feedback Block Mode Operation
CN113098675B (en) Binary data encryption system and method based on polynomial complete homomorphism
CN109714154B (en) Implementation method of white-box cryptographic algorithm under white-box security model with difficult code volume
CN102622561A (en) Enciphering and deciphering method for invoking data in software
EP2960891B1 (en) Method for introducing dependence of white-box implementationon a set of strings
CN115766244A (en) Internet of vehicles information encryption method and device, computer equipment and storage medium
CN115499118A (en) Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium
WO2021044465A1 (en) Encrypting device, decrypting device, computer program, encryption method, decryption method, and data structure
CN102647428A (en) Encrypting and decrypting system and method adopting trusteeship control based on communication network
KR20110042419A (en) Mode of operation adapted to multimedia environments
EP2940919B1 (en) Realizing authorization via incorrect functional behavior of a white-box implementation
Tripathi et al. Survey on performance comparison of various symmetric encryption algorithms
Chang et al. Research and implementation of file encryption and decryption
Niture Cryptographic Algorithm Analysis and Implementation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120801