CN103177273B - Based on the mobile wireless radio frequency identification authentication method of low cost label - Google Patents
Based on the mobile wireless radio frequency identification authentication method of low cost label Download PDFInfo
- Publication number
- CN103177273B CN103177273B CN201310050622.0A CN201310050622A CN103177273B CN 103177273 B CN103177273 B CN 103177273B CN 201310050622 A CN201310050622 A CN 201310050622A CN 103177273 B CN103177273 B CN 103177273B
- Authority
- CN
- China
- Prior art keywords
- reading device
- label
- mobile reading
- server
- mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of mobile wireless radio frequency identification authentication method based on low cost label, for solving the inefficient technical matters of existing mobile wireless radio frequency identification authentication method.Technical scheme mobile wireless radio frequency identification authentication is divided into registration, normal certification and rapid authentication three phases, reduce information interaction times, simplify server, interaction flow between mobile reading device and label three, realize mobile reading device and label, and the certification mutually between two of mobile reading device and background server.Meet in actual demand the requirement needing to complete fast when repeatedly reading same label, not only increase authentication efficiency, also assures that the security of system.
Description
Technical field
The present invention relates to a kind of mobile wireless radio frequency identification authentication method, particularly relate to a kind of mobile wireless radio frequency identification authentication method based on low cost label.
Background technology
Mobile wireless radio-frequency (RF) identification (radio frequency identification, hereinafter referred to as RFID) label and mobile reading device in system, mobile reading device and server are all pass through wireless connections, reader is no longer an entity of being trusted, mobile reading device read-write scope is no longer restricted, mobile reading device infinitely can collect the information of label, and this more easily exposes the privacy of mobile reading device owner.This makes mobile RFID system face more complicated wireless communications environment compared to traditional rfid system, more easily suffers the security threats such as eavesdropping, personation, playback.Therefore, need to design the new safety certifying method being suitable for mobile RFID system, meet the new safety of system and privacy requirements.
At document " C L Chen, J K Jan, and C F Chien.Based on mobile RFID device to design asecure mutual authentication scheme for market application.2010International Conferenceon Broadband, Wireless Computing, Communication and Applications (BWCCA2010), LosAlamitos (USA): IEEE, 2010:423-428 " in, a kind of RFID authentication protocol of lightweight of author designed, achieve the reading identification of mobile reading device to label.The program meets EPC Class-1Generation-2 standard, is namely the simple operations such as cyclic redundancy check (CRC) code (CRC), XOR (XOR) operation at the arithmetic operation that tab end is main, meets the standard of the RFID authentication protocol of low cost label.The program has certain advantage in tab end calculated performance, but program message exchange number of times too much (mobile reading device respectively needs mutual 4 times with label and server respectively), information flowrate is not very high.Meanwhile, also there is safety issue in the program, when label response mobile reading device, and one of them value T
1(Y
2=R
2+ EPC
i) change only depend on server produce random number R
2, the same message that mobile reading device sends so if we reset, then T in the response of same label
1can be always constant, so assailant can carry out pursuit attack to label accordingly.
Summary of the invention
In order to overcome the inefficient deficiency of existing mobile wireless radio frequency identification authentication method, the invention provides a kind of mobile wireless radio frequency identification authentication method based on low cost label.Mobile wireless radio frequency identification authentication is divided into registration, normal certification and rapid authentication three phases by the method, reduce information interaction times, simplify server, interaction flow between mobile reading device and label three, realize mobile reading device and label, and the certification mutually between two of mobile reading device and background server, the requirement completed fast when same label is repeatedly read can be needed in practical requirement, improve authentication efficiency, the security of system can be ensured simultaneously.
The technical solution adopted for the present invention to solve the technical problems is: a kind of mobile wireless radio frequency identification authentication method based on low cost label, is characterized in comprising the following steps:
Step one, authentication protocol run before registration phase, executive system carries out initialization;
(1) information (Rid is stored
j, K
i, Sy
j, Pk, △ T
jwherein △ T
j=1) to mobile reading device.
(2) information (K is stored
i, Tid
i) to label.
(3) information (Rid is stored
j, K
i, Sy
j, △ T
j, Tid
i, T
info, Sk is △ T wherein
j=0) to server.
Step 2, normal authentication phase;
(1) mobile reading device sends authentication query request.Mobile reading device produces random number N r
j, then calculate
and M
2=h (Nr
j).Mobile reading device is by m
1and M
2send to label.
(2) the label shared key K that utilizes oneself to store
i, calculate and judge
whether set up.If
set up, prove that mobile reading device is legal, otherwise label does not respond.After label checking mobile reading device is legal, produce random number N t
i.Then calculate:
Label is by information (M
3, M
4, M
5) send to mobile reading device.
(3), after mobile reading device receives message, shared key K is utilized
icalculate Nt
i, then verify
whether set up.If
set up, prove that label is legal, continue next step process.If
be false, prove that label is illegal, abandon certification.After proving that label is legal, first mobile reading device searches whether there is Tid in self
i, and verify
whether set up.If
set up, then authentication success, otherwise mobile reading device counter increases by 1, i.e. △ T
j=△ T
j+ 1.Then mobile reading device utilizes server public key Pk enciphered message (Rid
j, △ T
j, Nr
j, M
5, Nt
i), obtain M
6=E
pk(Rid
j|| △ T
j|| Nr
j|| M
5|| Nt
i).Mobile reading device is by information M
6send to server.
(4) server receives message M
6after, be decrypted with the private key Sk of oneself, namely calculate D
sk(M
6), obtain information (Rid
j, △ T
j, Nr
j, M
5, Nt
i).First whether whois lookup exists a mobile reading device ID (identity number) and equals Rid
jif exist and prove that this mobile reading device is legal, continue authentication processing.If there is no prove that this mobile reading device is illegal, abandon certification.If mobile reading device is legal, to the mobile reading device Rid of server stores
jcorresponding △ T
jthe △ T obtained is deciphered with private key
j' compare.If private key deciphers the △ T obtained
j' be not more than the △ T of server stores
j, illustrate that this message is message playback, abandon certification.Otherwise, search label information in the server, calculate and judge
whether set up, if
establishment care label is legal, the △ T that server update stores
jfor private key deciphers the △ T obtained
j', utilize the symmetric key Sy of mobile reading device
jenciphered message (Tid
i, T
info, Nr
j), obtain M
7=E
syj(Tid
i|| T
info|| Nr
j).Server is by information N
7send to mobile reading device.
Step 3, rapid authentication stage;
(1) mobile reading device sends authentication query request.Mobile reading device produces random number N r
j, then calculate
and M
2=h (Nr
j).Mobile reading device is by M
1and M
2send to label.
(2) the label shared key K that utilizes oneself to store
i, calculate and judge
whether set up.If
set up, prove that mobile reading device is legal, otherwise label does not respond.If after label checking mobile reading device is legal, produce random number N t
i.Then calculate:
Label is by information (M
3, M
4, M
5) send to mobile reading device.
(3), after mobile reading device receives message, shared key K is utilized
icalculate Nt
i, then verify
whether set up, if
set up and prove that label is legal.First mobile reading device searches whether there is Tid in self
i, and verify
whether set up.If
set up, authentication success.
The invention has the beneficial effects as follows: because mobile wireless radio frequency identification authentication is divided into registration, normal certification and rapid authentication three phases by the method, reduce information interaction times, simplify server, interaction flow between mobile reading device and label three, realize mobile reading device and label, and the certification mutually between two of mobile reading device and background server, meet in actual demand the requirement needing to complete fast when repeatedly reading same label, not only increase authentication efficiency, also assures that the security of system.
Below in conjunction with drawings and Examples, the present invention is elaborated.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the mobile wireless radio frequency identification authentication method that the present invention is based on low cost label.
Fig. 2 is the process flow diagram of the mobile wireless radio frequency identification authentication method registration phase that the present invention is based on low cost label.
Fig. 3 is the process flow diagram of the normal authentication phase of mobile wireless radio frequency identification authentication method that the present invention is based on low cost label.
Fig. 4 is the process flow diagram in the mobile wireless radio frequency identification authentication method rapid authentication stage that the present invention is based on low cost label.
Embodiment
With reference to Fig. 1 ~ 4.This example is for actual mobile RFID system.The detailed process of the inventive method will be described in detail below.Detailed process is divided into three phases: registration phase, normal authentication phase and rapid authentication stage.Implement according to following steps:
The symbol description of variable and computing in embodiment.
(1) registration phase.
First label T and mobile reading device R must register in server S, and after succeeding in registration, mobile reading device R could realize the certification to label T.The inventive method can, by the mandate of server, make mobile reading device can only identify specific label.Such as, if set the shared key of the label of category-A product all as X in the methods of the invention, and the shared key of the label of category-B product is Y.Like this, if the shared key of server to mobile reading device R and label T is set to X during registration, then this mobile reading device can only identify category-A product, and can not identify category-B product.Thus realize the control of mobile reading device authority.Can certainly allow the shared key K of all labels
iall identical.Thus legal mobile reading device can to all product identification certifications.
Before authentication protocol runs, registration phase executive system (as production firm, application system etc.) carries out initialization altogether in three steps by escape way to mobile reading device, label and server.
Step 1: store information (Rid
j, K
i, Sy
j, Pk, △ T
jwherein △ T
j=1) to mobile reading device.
Step 2: store information (K
i, Tid
i) to label.
Step 3: store information (Rid
j, K
i, Sy
j, △ T
j, Tid
i, T
info, Sk is △ T wherein
j=0) to server.
(2) normal authentication phase.
Normal authentication phase is divided into four steps.
Step 1: mobile reading device sends authentication query request.Mobile reading device produces random number N r
j, then calculate
and M
2=h (Nr
j).Mobile reading device is by m
1and M
2send to label.
Step 2: the shared key K that label utilizes oneself to store
i, calculate and judge
whether set up.If
set up, prove that mobile reading device is legal, otherwise label does not respond.After label checking mobile reading device is legal, produce random number N t
i.Then calculate:
Label is by information (M
3, M
4, M
5) send to mobile reading device.
Step 3: after mobile reading device receives message, utilize shared key K
icalculate Nt
i, then verify
whether set up.If
set up, prove that label is legal, continue next step process.If
be false, prove that label is illegal, abandon certification.After proving that label is legal, first mobile reading device searches whether there is Tid in self
i, and verify
whether set up.If
set up, then authentication success, otherwise mobile reading device counter increases by 1, i.e. △ T
j=△ T
j+ 1.Then mobile reading device utilizes server public key Pk enciphered message (Rid
j, △ T
j, Nr
j, M
5, Nt
i), obtain M
6=E
pk(Rid
j|| △ T
j|| Nr
j|| M
5|| Nt
i).Mobile reading device is by information M
6send to server.
Step 4: server receives message M
6after, be decrypted with the private key Sk of oneself, namely calculate D
sk(M
6), obtain information (Rid
j, △ T
j, Nr
j, M
5, Nt
i).First whether whois lookup exists a mobile reading device ID (identity number) and equals Rid
jif exist and prove that this mobile reading device is legal, continue authentication processing.If there is no prove that this mobile reading device is illegal, abandon certification.If mobile reading device is legal, to the mobile reading device Rid of server stores
jcorresponding △ T
jthe △ T obtained is deciphered with private key
j' compare.If private key deciphers the △ T obtained
j' be not more than the △ T of server stores
j, illustrate that this message is message playback, abandon certification.Otherwise, search label information in the server, calculate and judge
whether set up, if
establishment care label is legal, the △ T that server update stores
jfor private key deciphers the △ T obtained
j', utilize the symmetric key Sy of mobile reading device
jenciphered message (Tid
i, T
info, Nr
j), obtain M
7=E
syj(Tid
i|| T
info|| Nr
j).Server is by information M
7send to mobile reading device.
(3) the rapid authentication stage.
The rapid authentication stage is divided into three steps.
Step 1: mobile reading device sends authentication query request.Mobile reading device produces random number N r
j, then calculate
and M
2=h (Nr
j).Mobile reading device is by M
1and M
2send to label.
Step 2: the shared key K that label utilizes oneself to store
i, calculate and judge
whether set up.If
set up, prove that mobile reading device is legal, otherwise label does not respond.If after label checking mobile reading device is legal, produce random number N t
i.Then calculate:
Label is by information (M
3, M
4, M
5) send to mobile reading device.
Step 3: after mobile reading device receives message, utilize shared key K
icalculate Nt
i, then verify
whether set up, if
set up and prove that label is legal.First mobile reading device searches whether there is Tid in self
i, and verify
whether set up.If
set up, authentication success, mobile reading device no longer needs to carry out alternately with server, thus realizes rapid authentication, decreases the stand-by period.
Claims (1)
1., based on a mobile wireless radio frequency identification authentication method for low cost label, it is characterized in that comprising the following steps:
Step one, authentication protocol run before registration phase, executive system carries out initialization;
(1) information Rid is stored
j, K
i, Sy
j, Pk, △ T
jto mobile reading device, wherein △ T
j=1;
(2) information K is stored
i, Tid
ito label;
(3) information Rid is stored
j, K
i, Sy
j, △ T
j, Tid
i, T
info, Sk to server, wherein △ T
j=0;
Wherein, Rid
jthe ID (identity number) of a jth mobile reading device, K
ithe shared key between mobile reading device and i-th label, Sy
jbe the symmetric cryptographic key of jth between mobile reading device and server, Pk is the PKI of server, △ T
jthe counter of a jth mobile reading device, Tid
ithe ID (identity number) of i-th label, T
infobe the details of the commodity of label representative, Sk is the private key of server;
Step 2, normal authentication phase;
(1) mobile reading device sends authentication query request; Mobile reading device produces random number N r
j, then calculate M
1=Nr
j⊕ K
iand M
2=h (Nr
j); Mobile reading device is by M
1and M
2send to label;
(2) the label shared key K that utilizes oneself to store
i, calculate and judge
whether set up; If
set up, prove that mobile reading device is legal, otherwise label does not respond; After label checking mobile reading device is legal, produce random number N t
i; Then calculate: M
3=Nt
i⊕ K
i, M
4=h (Nt
i⊕ Nr
j), M
5=h (Tid
i⊕ Nt
i); Label is by information M
3, M
4, M
5send to mobile reading device;
(3), after mobile reading device receives message, shared key K is utilized
icalculate Nt
i, then verify
whether set up; If
set up, prove that label is legal, continue next step process; If
be false, prove that label is illegal, abandon certification; After proving that label is legal, first mobile reading device searches whether there is Tid in self
i, and verify
whether set up; If
set up, then authentication success, otherwise mobile reading device counter increases by 1, i.e. △ T
j=△ T
j+ 1; Then mobile reading device utilizes server public key Pk enciphered message Rid
j, △ T
j, Nr
j, M
5, Nt
i, obtain M
6=E
pk(Rid
j|| △ T
j|| Nr
j|| M
5|| Nt
i); Mobile reading device is by information M
6send to server;
(4) server receives message M
6after, be decrypted with the private key Sk of oneself, namely calculate D
sk(M
6), obtain information Rid
j, △ T
j, Nr
j, M
5, Nt
i; First whether whois lookup exists a mobile reading device ID (identity number) and equals Rid
jif exist and prove that this mobile reading device is legal, continue authentication processing; If there is no prove that this mobile reading device is illegal, abandon certification; If mobile reading device is legal, to the mobile reading device Rid of server stores
jcorresponding △ T
jthe △ T obtained is deciphered with private key
j' compare; If private key deciphers the △ T obtained
j' be not more than the △ T of server stores
j, illustrate that this message is message playback, abandon certification; Otherwise, search label information in the server, calculate and judge
whether set up, if
establishment care label is legal, the △ T that server update stores
jfor private key deciphers the △ T obtained
j', utilize the symmetric key Sy of mobile reading device
jenciphered message Tid
i, T
info, Nr
j, obtain M
7=E
syj(Tid
i|| T
info|| Nr
j); Server is by information M
7send to mobile reading device;
Wherein, Nr
jthe random number that a jth mobile reading device produces, Nt
ibe the random number that i-th label produces, h (.) is one-way Hash function, E
pkc () is the public key encryption information c with server, D
skc () is the private key decryption information c with server, E
syjc () uses symmetric key Sy
jenciphered message c;
Step 3, rapid authentication stage;
(1) mobile reading device sends authentication query request; Mobile reading device produces random number N r
j, then calculate M
1=Nr
j⊕ K
iand M
2=h (Nr
j); Mobile reading device is by M
1and M
2send to label;
(2) the label shared key K that utilizes oneself to store
i, calculate and judge
whether set up; If
set up, prove that mobile reading device is legal, otherwise label does not respond; If after label checking mobile reading device is legal, produce random number N t
i; Then calculate: M
3=Nt
i⊕ K
i, M
4=h (Nt
i⊕ Nr
j), M
5=h (Tid
i⊕ Nt
i); Label is by information M
3, M
4, M
5send to mobile reading device;
(3), after mobile reading device receives message, shared key K is utilized
icalculate Nt
i, then verify
whether set up, if
set up and prove that label is legal; First mobile reading device searches whether there is Tid in self
i, and verify
whether set up; If
set up, authentication success.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310050622.0A CN103177273B (en) | 2013-02-08 | 2013-02-08 | Based on the mobile wireless radio frequency identification authentication method of low cost label |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310050622.0A CN103177273B (en) | 2013-02-08 | 2013-02-08 | Based on the mobile wireless radio frequency identification authentication method of low cost label |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103177273A CN103177273A (en) | 2013-06-26 |
CN103177273B true CN103177273B (en) | 2015-10-21 |
Family
ID=48637114
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310050622.0A Expired - Fee Related CN103177273B (en) | 2013-02-08 | 2013-02-08 | Based on the mobile wireless radio frequency identification authentication method of low cost label |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103177273B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI627551B (en) * | 2013-08-29 | 2018-06-21 | Xu yi hong | System and method for verifying non-contact sensing tags |
CN104883681B (en) * | 2015-05-04 | 2018-05-01 | 河南理工大学 | A kind of mobile RFID mutual authentication method based on Dynamic-shared key |
CN105046300B (en) * | 2015-07-23 | 2018-01-09 | 北京锐安科技有限公司 | radio frequency identification authentication method and system |
CN106712962B (en) * | 2016-12-23 | 2019-12-24 | 西安电子科技大学 | Bidirectional authentication method and system for mobile RFID system |
CN106998252B (en) * | 2017-05-18 | 2019-10-25 | 西安电子科技大学 | Lightweight RFID cluster label authentication method based on cloud database |
CN108563969A (en) * | 2018-04-26 | 2018-09-21 | 深圳市盛路物联通讯技术有限公司 | A kind of radio frequency identification authentication method and system |
CN109388991B (en) * | 2018-09-21 | 2021-06-18 | 昆明理工大学 | Method for identifying RFID (radio frequency identification) tag by single reader by taking tail code continuous identification quantity as index |
CN109714763B (en) * | 2018-12-18 | 2021-08-10 | 江南大学 | Radio frequency identification security authentication method and system |
CN111641657B (en) * | 2020-06-05 | 2022-02-11 | 南京信息工程大学 | RFID-based information anonymous retrieval method and system in intelligent medical environment |
CN115866586A (en) * | 2022-11-02 | 2023-03-28 | 周礼真 | Intelligent security authentication and identification system based on big data |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101488854A (en) * | 2008-01-18 | 2009-07-22 | 华为技术有限公司 | Wireless RFID system authentication method and apparatus |
CN102497264A (en) * | 2011-11-10 | 2012-06-13 | 西安电子科技大学 | RFID security authentication method based on EPC C-1G-2 standard |
CN102868534A (en) * | 2012-09-17 | 2013-01-09 | 西安电子科技大学 | RFID (Radio Frequency Identification) safety certification method based on two-deck searching |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070133807A1 (en) * | 2005-12-12 | 2007-06-14 | Electronics And Telecommunications Research Institute | Tag authentication apparatus and method for radio frequency identification system |
-
2013
- 2013-02-08 CN CN201310050622.0A patent/CN103177273B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101488854A (en) * | 2008-01-18 | 2009-07-22 | 华为技术有限公司 | Wireless RFID system authentication method and apparatus |
CN102497264A (en) * | 2011-11-10 | 2012-06-13 | 西安电子科技大学 | RFID security authentication method based on EPC C-1G-2 standard |
CN102868534A (en) * | 2012-09-17 | 2013-01-09 | 西安电子科技大学 | RFID (Radio Frequency Identification) safety certification method based on two-deck searching |
Non-Patent Citations (3)
Title |
---|
余恬恬,等.基于Hash函数的RFID挑战-应答认证协议.《计算机工程》.2009,第35卷(第24期),156-161. * |
李慧贤.轻量级RFID双向认证协议涉及与分析.《西安电子科技大学学报(自然科学版)》.2012,第39卷(第1期),172-178. * |
谌绍巍,等.一种改进的Hash函数RFID双向安全认证协议.《计算机系统应用》.2010,第19卷(第3期),67-70. * |
Also Published As
Publication number | Publication date |
---|---|
CN103177273A (en) | 2013-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103177273B (en) | Based on the mobile wireless radio frequency identification authentication method of low cost label | |
He et al. | Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol | |
Qingling et al. | A minimalist mutual authentication protocol for RFID system & BAN logic analysis | |
Choi et al. | Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems | |
Jung et al. | HRP: A HMAC-based RFID mutual authentication protocol using PUF | |
CN102510335A (en) | RFID (Radio Frequency Identification Device) mutual authentication method based on Hash | |
Chen et al. | An ownership transfer scheme using mobile RFIDs | |
CN102880891A (en) | Radio frequency identification (RFID) safety communication method established according to ultra-lightweight RFID bidirectional authentication protocol | |
CN103279775A (en) | RFID (Radio Frequency Identification) system capable of ensuring confidentiality and data integrity and implementation method thereof | |
CN104115442A (en) | RFID bidirectional authentication method based on asymmetric secret key and Hash function | |
CN104883681A (en) | Mobile RFID mutual authentication method based on dynamic shared secret key | |
Chen et al. | A secure ownership transfer protocol using EPCglobal Gen-2 RFID | |
Picazo-Sanchez et al. | Two RFID Standard-based Security protocols for healthcare environments | |
Jannati et al. | Cryptanalysis and enhancement of a secure group ownership transfer protocol for RFID tags | |
Shariq et al. | URASP: An ultralightweight RFID authentication scheme using permutation operation | |
CN103152181B (en) | A kind of RFID data encryption method | |
CN106027237A (en) | Group based key array security authentication protocol in RFID (Radio Frequency Identification) system | |
CN109766966B (en) | RFID tag random number synchronous updating method | |
Huang et al. | An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags | |
Yang et al. | A student information management system based on fingerprint identification and data security transmission | |
CN104980280A (en) | RFID safe authentication method based on Chua's multiscroll chaos sequence | |
Shi et al. | The Lightweight RFID Grouping‐Proof Protocols with Identity Authentication and Forward Security | |
Chen et al. | A novel mutual authentication scheme for RFID conforming EPCglobal class 1 generation 2 standards | |
Safkhani et al. | Cryptanalysis of Chen\textit {et al.}'s RFID Access Control Protocol | |
He et al. | Research on RFID technology security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20151021 Termination date: 20160208 |