CN103294496A - Burning system - Google Patents

Burning system Download PDF

Info

Publication number
CN103294496A
CN103294496A CN2012100497797A CN201210049779A CN103294496A CN 103294496 A CN103294496 A CN 103294496A CN 2012100497797 A CN2012100497797 A CN 2012100497797A CN 201210049779 A CN201210049779 A CN 201210049779A CN 103294496 A CN103294496 A CN 103294496A
Authority
CN
China
Prior art keywords
burning
authentication
encipheror
eigenwert
seeds
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100497797A
Other languages
Chinese (zh)
Other versions
CN103294496B (en
Inventor
陈晓晖
黄呈俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Winbond Electronics Corp
Nuvoton Technology Corp
Original Assignee
Winbond Electronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Winbond Electronics Corp filed Critical Winbond Electronics Corp
Priority to CN201210049779.7A priority Critical patent/CN103294496B/en
Publication of CN103294496A publication Critical patent/CN103294496A/en
Application granted granted Critical
Publication of CN103294496B publication Critical patent/CN103294496B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a burning system. The burning system comprises an design end and an authentication burning end, wherein the design end is used for sending out an encryption program; the authentication burning end can obtain a characteristic value according to the encryption program, and compares the characteristic value with an authentication seed; and if the characteristic value and the authentication seed are matched, a special processing is performed on the encryption program to generate a program to be burned, and the program to be burned is burned into a chip according to a limitation condition. With the system provided by the invention, loss to software providers, which is caused by unlimited number of burning by burning operators, can be avoided.

Description

Programming system
Technical field
The present invention relates to a kind of burning device, particularly can treat the burning device of burning program burning in a chip with one relevant for a kind of.
Background technology
Generally speaking, if procedure code will be imported in the chip, typically use a burning device.The provider of software hands to burning person with software, and the burning action is carried out in order.Usually the provider of software collects the charges according to the burning number of times.But for unworthy burning person, it may lie about the burning number of times, or steals software, thereby causes software provider's loss.
Summary of the invention
The invention provides a kind of programming system, it comprises a design end and an authentication burning end.The design end is in order to send an encipheror.Authentication burning end obtains an eigenwert according to encipheror, and comparative feature value and an authentication seeds.If eigenwert coupling authentication seeds is then carried out a particular procedure to encipheror, treat burning program in order to produce one, and according to a restrictive condition, will treat that burning program is burned onto in the chip.
By the present invention, when burning person takes this encipheror, need earlier according to this customizing messages, by an authentication procedure, can prove that its employed burning device is legal, just the software provider approves, and then according to the restrictive condition (as burning number of times or time) of software provider institute standard, carries out the burning action.Therefore, can avoid the unlimited burning of burning person and the loss of bringing for the software provider.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, does not constitute limitation of the invention.In the accompanying drawings:
Fig. 1 is the synoptic diagram of programming system of the present invention;
Fig. 2 is a possible embodiment of authentication burning end of the present invention;
The process that Fig. 3 carries out burning for authentication burning end of the present invention;
Fig. 4 is another possibility embodiment of authentication burning end of the present invention.
Drawing reference numeral:
100: programming system; 110: the design end;
120: authentication burning end; 121: chip;
131: encipheror; 132,133: authentication seeds;
210: the seed generator; 220: control module;
230: storage element; 410: server;
420: burning device.
Embodiment
For the features and advantages of the present invention can be become apparent, cited below particularlyly go out preferred embodiment, and cooperate appended graphicly, be described in detail below.
The present invention is applicable to a burning device, and the provider of software is as long as be packaged into an encipheror with an original program and customizing messages encryption.When burning person takes this encipheror, need earlier according to this customizing messages, by an authentication procedure, can prove that its employed burning device is legal, just the software provider approves, and then according to the restrictive condition (as burning number of times or time) of software provider institute standard, carry out the burning action.
Fig. 1 is the synoptic diagram of programming system of the present invention.In the present embodiment, programming system 100 comprises a design end 110 and one authentication burning end 120.Design end 110 sends an encipheror 131.For example, the program designer writes out an original program according to client's demand.In a possibility embodiment, the program designer is packaged in original program with a customizing messages, and encrypts the result after the packing, in order to produce encipheror 131.The present invention not limit design end 110 sends the method for encipheror 131.In a possibility embodiment, design end 110 is exported encipheror 131 by world-wide web.
Because encipheror 131 has a customizing messages, so authentication burning end 120 can obtain an eigenwert according to encipheror 131.Authentication burning end 120 is compared eigenwert with an authentication seeds.If during eigenwert coupling authentication seeds, 120 pairs of encipherors of authentication burning end 131 carry out a particular procedure, treat burning program in order to produce one, and according to a restrictive condition, will treat that burning program is burned onto in the chip 121.
In a possibility embodiment, restrictive condition is contained in the customizing messages, and is set by design end 110, and the required condition of observing during in order to standard authentication burning end 120 burning/recording chips is burnt record number of times or the recordable time of demonstrate,proving burning end 120 as standard.
Be example with the burning number of times, if default burning number of times is 1000 times (being restrictive condition), then at identical encipheror, 120 at authentication burning end can carry out 1000 times burnings action.When the burning number of times surpassed 1000 times, authentication burning end 120 just can't be with the data burning in chip.
In the present embodiment, authentication burning end 120 can't change restrictive condition, unless authentication burning end 120 receives new encipheror.After authentication burning end 120 receives new encipheror, will carry out the burning action according to new restrictive condition.For example, suppose, authentication burning end 120 successively receives one first encipheror and one second encipheror, and wherein first encipheror corresponds to first restrictive condition (as burning 1000 times), and second encipheror corresponds to one second restrictive condition (as burning 2000 times).
At first encipheror, authentication burning end 120 is met the burning action of carrying out 1000 times together.At second encipheror, authentication burning end 120 is met the burning action of carrying out 2000 times together.Yet the present invention does not limit the order of authentication burning end 120 burnings first or second encipheror.In a possibility embodiment, at same encipheror, authentication burning end 120 can not carry out burning continuously.As long as the burning action of authentication burning end 120 meets restrictive condition.
For example, authentication burning end 120 may be carried out 500 times burning action earlier at first encipheror, again at second encipheror, carries out 2000 times burning action, at last again at first encipheror, carries out 500 times burning action.
Be example with the recordable time, after authentication burning end 120 receives new encipheror, will carry out the burning action according to new restrictive condition.The present invention does not limit the kind of restrictive condition.In a possibility embodiment, suppose, authentication burning end 120 successively receives one first encipheror and one second encipheror, wherein first encipheror corresponds to first restrictive condition (as can carry out burning in a special time, for example 30 days authentication burning ends 120 can carry out the burning action), second encipheror corresponds to one second restrictive condition (can carry out the burning action as 60 days), and then authenticating burning end 120 will carry out the burning action according to first and second restrictive condition.
In other embodiments, design end 110 sets restrictive condition and also can comprise recordable time and burning number of times simultaneously, for example can carry out the number of times of burning in a special time, and it is inferior to carry out burning 1000 as 30 days authentication burning ends 120.
In the present embodiment, 120 pairs of encipherors of authentication burning end 131 carry out a particular procedure, treat burning program in order to produce one.The present invention does not limit the kind of particular procedure.One may embodiment in, after through particular procedure (as decryption processing), authentication burning end 120 obtains an original program, and with this original program direct burning to chip 121.
In another embodiment, except decryption processing, particular procedure has more encryption.In order to improve the security of data, after decryption processing, authentication burning end 120 is encrypted this original program again, treats burning program in order to produce one, and will treat that the burning program burning is in chip 121.
The present invention does not limit authentication burning end 120 employed encryption methods.Authentication burning end 120 employed encryption methods can be same or different from design end 110 employed encryption methods.As long as the data of burning in chip 121 are different from original program, just can reach the function of protection.
In a possibility embodiment, design end 110 produces encipheror 131 according to the authentication seeds 132 that authentication burning end 120 provides.In other embodiments, design end 110 can produce an authentication seeds 133 voluntarily and give authentication burning end 120.In addition, design end 110 authentication seeds that produce 133 may comprise or not comprise a restrictive condition.The different embodiment that produce authentication seeds below will be described.
Fig. 2 is that one of authentication burning end 120 of the present invention may embodiment.In the present embodiment, authentication seeds 132 is produced by authentication burning end 120, and offers design end 110.Design end 110 just is packaged in authentication seeds 132, a restrictive condition and an original program together after receiving authentication seeds 132, and encrypts the result after the packing, in order to produce encipheror 131.In the present embodiment, authentication seeds 132 can be described as a customizing messages with restrictive condition.
In the present embodiment, authentication burning end 120 comprises a seed generator 210, a control module 220, a storage element 230 and a chip 121.Seed generator 210 is in order to produce authentication seeds 132.The present invention does not limit the kind of seed generator 210.As long as the device of authentication information can be provided, all can be used as the seed generator.In a possibility embodiment, seed generator 210 can be a random number producer.Random number producer produces different authentication seeds under different time.In addition, authentication seeds 132 also can be stored in the storage element 230 except offering design end 110.
Control module 220 receives encipheror 131, and encipheror 131 is stored in the storage element 230.Control module 220 obtains an eigenwert (or an identification code) according to encipheror 131, and eigenwert and storage element 230 stored authentication seeds 132 are made comparisons.When eigenwert coupling authentication seeds, 220 pairs of encipherors of control module 131 carry out a particular procedure, and according to a restrictive condition, treat that with one burning program is burned onto in the chip 121.
In a possibility embodiment, the design end is packed a restrictive condition in encipheror 131, and therefore, after finishing particular procedure, control module 220 can obtain a restrictive condition and and treat burning program.Control module 220 treats that with one burning program is burned onto in the chip 121 again according to restrictive condition
The process that Fig. 3 carries out burning for authentication burning end 120 of the present invention.At first, be written into one and treat burning program (step S310).The present invention does not limit the state for the treatment of burning program.For example, treat that burning program can be one and encrypted or the unencryption procedure code.In a possibility embodiment, can utilize the graceful key change method in Di Fei-Hull (Diffie-Hellman key exchange), produce and treat burning program.
Then, be written into a recording status (step S320).In the present embodiment, this recording status is the state of actual burn, as burning number of times or recordable time.Then, judge again whether recording status has met a restrictive condition (step S330).In the present embodiment, restrictive condition is a default burning number of times.
When the actual burn number of times has reached default burning number of times, then stop burning (step S340).If the actual burn number of times does not reach default burning number of times, then continue burning/recording chip (step S350), and amendment record state (step S360).In one embodiment, the actual burn number of times will add 1.Then, store amended recording status (step S370), whether execution in step S320 meets restrictive condition in order to judge recording status again again.
In other embodiments, if be written into the new burning program for the treatment of, then authenticate burning state and the old burning program for the treatment of that burning end 120 can record last time earlier, carry out burning at the burning program of newly treating again, etc. new treat that the burning program burning is finished after, capture the burning state of last time again, to carry out the old burning work for the treatment of burning program.
Fig. 4 is another possibility embodiment of authentication burning end of the present invention.In the present embodiment, design end 110 more provides an authentication seeds 133 to authentication burning end 120 except encipheror 131.In a possibility embodiment, encipheror 131 comprises an original program and a restrictive condition.In other embodiments, encipheror 131 only comprises an original program, and authentication seeds 133 comprises a restrictive condition.For improving security, in a possibility embodiment, authentication seeds 133 is through encryptions.
As shown in the figure, authentication burning end 120 comprises a server (network server) 410 and one burning device 420.Server 410 receives authentication seeds 133.Burning device 420 is handled enciphered datas 131, in order to obtaining an eigenwert, and according to eigenwert, links up with server 410.
In a possibility embodiment, burning device 420 sends a control command and gives server 410 according to eigenwert, judges in order to make server 410 whether burning device 420 is a specific burning device.In the present embodiment, server 410 is learnt out this eigenwert according to the control command that burning device 420 sends, and this eigenwert is compared with authentication seeds 133, again according to comparative result, and restored burning device 420.Burning device 420 determines whether to carry out the burning action according to the answer result of server 410.
For example, if eigenwert coupling authentication seeds 133, then burning device 420 carries out a particular procedure according to the answer of server 410 to encipheror 131, treats burning program in order to produce one.In a possibility embodiment, encipheror 131 has a restrictive condition.Burning device 420 will treat that according to restrictive condition the burning program burning is in chip 121.
In other embodiments, restrictive condition is provided by server 410.For example, if eigenwert coupling authentication seeds 133, then server 410 is replied a restrictive condition and is given burning device 420 according to eigenwert.In addition, after answer, server 410 deletion authentication seeds 133 repeat burning to avoid burning device 420.
In the present embodiment, though burning device 420 receives encipheror 131, before not obtaining authentication as yet (confirming namely whether an eigenwert mates an authentication seeds), can't burning encipheror 131.On the contrary, obtain an eigenwert at burning device 420 according to encipheror 131, and during an authentication seeds 133 coupling on this eigenwert and the server 410, burning device 420 could be handled encipheror 131, and according to a restrictive condition, carries out burning and move.Therefore, after burning person obtains encipheror, need to have only the burning device of coupling could understand the also encipheror of burning correspondence by specific burning device ability burning encipheror.
Unless define in addition, all belong to (comprising technology and science vocabulary) persond having ordinary knowledge in the technical field of the present invention's general understanding at these all vocabulary.In addition, unless clear expression, it is consistent that the definition of vocabulary in general dictionary should be interpreted as in the article with its correlative technology field meaning, and should not be construed as perfect condition or too formal voice.
Though the present invention discloses as above with preferred embodiment; so it is not in order to limit the present invention; have in the technical field under any and know the knowledgeable usually; without departing from the spirit and scope of the invention; when can doing a little change and retouching, so the present invention's protection domain attached claim person of defining after looking is as the criterion.

Claims (11)

1. a programming system is characterized in that, comprising:
One design end is in order to send an encipheror; And
One authentication burning end, according to described encipheror, obtain an eigenwert, and more described eigenwert and an authentication seeds, if described eigenwert is mated described authentication seeds, then described encipheror is carried out a particular procedure, treat burning program in order to produce one, and according to a restrictive condition, the described burning program for the treatment of is burned onto in the chip.
2. programming system as claimed in claim 1 is characterized in that, described restrictive condition is a burning number of times or a recordable time.
3. programming system as claimed in claim 1 is characterized in that, described particular procedure is deciphered described encipheror, in order to produce an original program, encrypt described original program again, in order to produce the described burning program for the treatment of, wherein said encipheror is different from the described burning program for the treatment of.
4. programming system as claimed in claim 3, it is characterized in that, described authentication burning end produces described authentication seeds and gives described design end, and wherein said design end is encrypted and the described authentication seeds of packing, described restrictive condition and described original program, in order to produce described encipheror.
5. programming system as claimed in claim 4 is characterized in that, described authentication burning end comprises:
One seed generator is in order to produce described authentication seeds;
One storage element is in order to store described encipheror and described authentication seeds; And
One control module, according to described encipheror, obtain described eigenwert, and with described eigenwert and the comparison of described authentication seeds, when described eigenwert is mated described authentication seeds, described control module carries out described particular procedure to described encipheror, and according to described restrictive condition, the described burning program for the treatment of is burned onto in the described chip.
6. programming system as claimed in claim 5 is characterized in that, described seed generator is a random number producer.
7. programming system as claimed in claim 1 is characterized in that, described design end produces described authentication seeds, and described authentication seeds is sent to described authentication burning end.
8. programming system as claimed in claim 7 is characterized in that, described authentication burning end comprises:
One server receives described authentication seeds; And
One burning device is handled described enciphered data, in order to obtain described eigenwert, and according to described eigenwert, link up with described server, if described eigenwert is mated described authentication seeds, then described encipheror is carried out described particular procedure, in order to produce the described burning program for the treatment of.
9. programming system as claimed in claim 8 is characterized in that, if described eigenwert is mated described authentication seeds, described server provides described restrictive condition to described burning device according to described eigenwert.
10. programming system as claimed in claim 8 is characterized in that, if described eigenwert is mated described authentication seeds, then burning device is handled described encipheror, in order to learn described restrictive condition and to produce the described burning program for the treatment of.
11. programming system as claimed in claim 8 is characterized in that, if described eigenwert is mated described authentication seeds, then described server is deleted described authentication seeds.
CN201210049779.7A 2012-02-29 2012-02-29 Programming system Active CN103294496B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210049779.7A CN103294496B (en) 2012-02-29 2012-02-29 Programming system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210049779.7A CN103294496B (en) 2012-02-29 2012-02-29 Programming system

Publications (2)

Publication Number Publication Date
CN103294496A true CN103294496A (en) 2013-09-11
CN103294496B CN103294496B (en) 2016-12-14

Family

ID=49095435

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210049779.7A Active CN103294496B (en) 2012-02-29 2012-02-29 Programming system

Country Status (1)

Country Link
CN (1) CN103294496B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683105A (en) * 2014-06-05 2015-06-03 深圳市迈斯威志科技有限公司 Remote encryption, decryption and writing processing method for MCU writer
WO2016127606A1 (en) * 2015-02-11 2016-08-18 京东方科技集团股份有限公司 Burning method and burning system
CN106529309A (en) * 2016-09-19 2017-03-22 芯海科技(深圳)股份有限公司 Method for limiting programming number of programmer by encrypting programming file
CN107729723A (en) * 2017-11-08 2018-02-23 深圳市希顿科技有限公司 A kind of integrated circuit burning program method and programming system
CN107783773A (en) * 2017-11-22 2018-03-09 广东乐心医疗电子股份有限公司 Firmware burning method and system
CN108513172A (en) * 2018-02-13 2018-09-07 广州视源电子科技股份有限公司 Data limit carving method, device, system and server, television set
CN109326032A (en) * 2018-10-14 2019-02-12 浙江鸿利锁业有限公司 A kind of lockset rent method and the leasing system using it
CN109901851A (en) * 2019-02-28 2019-06-18 广州小鹏汽车科技有限公司 A kind of firmware burning system and method
CN110489959A (en) * 2019-09-06 2019-11-22 珠海格力电器股份有限公司 Guard method, method for burn-recording, device, storage medium and the equipment of recordable paper
CN117633733A (en) * 2024-01-25 2024-03-01 九音科技(南京)有限公司 Method for acquiring software by chip product, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101175269A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Communication terminal and its method and device for system bootstrapping
CN101281478A (en) * 2008-05-14 2008-10-08 北京泰得思达科技发展有限公司 Method adopting multiplexing technique to perform paralleling burning record
CN101281477A (en) * 2008-05-14 2008-10-08 北京泰得思达科技发展有限公司 System adopting multiplexing technique to perform paralleling burning record

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101175269A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Communication terminal and its method and device for system bootstrapping
CN101281478A (en) * 2008-05-14 2008-10-08 北京泰得思达科技发展有限公司 Method adopting multiplexing technique to perform paralleling burning record
CN101281477A (en) * 2008-05-14 2008-10-08 北京泰得思达科技发展有限公司 System adopting multiplexing technique to perform paralleling burning record

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
徐元哲: "Fs88x6系列加密芯片烧录器的设计与实现", 《中国优秀硕士学位论文》, 31 January 2011 (2011-01-31), pages 15 *
朱同: "CFP系列芯片的烧录器设计", 《中国优秀硕士学位论文》, 30 September 2008 (2008-09-30), pages 54 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683105A (en) * 2014-06-05 2015-06-03 深圳市迈斯威志科技有限公司 Remote encryption, decryption and writing processing method for MCU writer
WO2016127606A1 (en) * 2015-02-11 2016-08-18 京东方科技集团股份有限公司 Burning method and burning system
CN106529309A (en) * 2016-09-19 2017-03-22 芯海科技(深圳)股份有限公司 Method for limiting programming number of programmer by encrypting programming file
CN107729723A (en) * 2017-11-08 2018-02-23 深圳市希顿科技有限公司 A kind of integrated circuit burning program method and programming system
CN107783773B (en) * 2017-11-22 2021-01-12 广东乐心医疗电子股份有限公司 Firmware burning method and system
CN107783773A (en) * 2017-11-22 2018-03-09 广东乐心医疗电子股份有限公司 Firmware burning method and system
CN108513172A (en) * 2018-02-13 2018-09-07 广州视源电子科技股份有限公司 Data limit carving method, device, system and server, television set
CN109326032A (en) * 2018-10-14 2019-02-12 浙江鸿利锁业有限公司 A kind of lockset rent method and the leasing system using it
CN109326032B (en) * 2018-10-14 2021-06-11 浙江鸿利锁业有限公司 Lock leasing method and leasing device applying same
CN109901851A (en) * 2019-02-28 2019-06-18 广州小鹏汽车科技有限公司 A kind of firmware burning system and method
CN109901851B (en) * 2019-02-28 2022-07-12 广州小鹏汽车科技有限公司 Firmware burning system and method
CN110489959A (en) * 2019-09-06 2019-11-22 珠海格力电器股份有限公司 Guard method, method for burn-recording, device, storage medium and the equipment of recordable paper
CN110489959B (en) * 2019-09-06 2022-04-26 珠海格力电器股份有限公司 Protection method, burning method and device for burning file, storage medium and equipment
CN117633733A (en) * 2024-01-25 2024-03-01 九音科技(南京)有限公司 Method for acquiring software by chip product, computer equipment and storage medium
CN117633733B (en) * 2024-01-25 2024-04-12 九音科技(南京)有限公司 Method for acquiring software by chip product, computer equipment and storage medium

Also Published As

Publication number Publication date
CN103294496B (en) 2016-12-14

Similar Documents

Publication Publication Date Title
CN103294496A (en) Burning system
CN109040090B (en) A kind of data ciphering method and device
CN109377244B (en) Food fast traceability system and method based on multi-chain interconnection block chain network
CN110519260B (en) Information processing method and information processing device
CN103546576B (en) A kind of embedded device remote automatic upgrading method and system
US9836612B2 (en) Protecting data
CN102138300B (en) Message authentication code pre-computation with applications to secure memory
EP2506488A2 (en) Secure dynamic on-chip key programming
CN105468990A (en) Sensitive information management control method and apparatus
CN110912877B (en) Data transmitting and receiving method and device based on IEC61850 model in transformer substation
CN104168116A (en) Database identity authentication method and system
CN109274661A (en) A kind of bidirectional identity authentication prevents the key storage and extracting method of Replay Attack
CN111837372A (en) System and method for privacy preserving data retrieval for connected power tools
JP6930053B2 (en) Data encryption method and system using device authentication key
CN109753770A (en) Determine method and device, method for burn-recording and device, the electronic equipment of burning data
CN105653932B (en) The method and apparatus of software upgrading verification
CN106257859A (en) A kind of password using method
JP6246516B2 (en) Information processing system
CN110880965A (en) Outgoing electronic document encryption method, system, terminal and storage medium
CN107358067B (en) Method for realizing encryption and decryption by deriving SCK with L icense in dongle
TWI499929B (en) Programming system
CN103378966A (en) Secret key programming on safety dynamic piece
US11720693B2 (en) System and method for securely transferring data
JP2021190819A (en) Communication apparatus, communication method and program
Rani et al. Key insertion and splay tree encryption algorithm for secure data outsourcing in cloud

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant