CN105022970B - The method of the processing security service of computing device and computing device - Google Patents
The method of the processing security service of computing device and computing device Download PDFInfo
- Publication number
- CN105022970B CN105022970B CN201410177686.1A CN201410177686A CN105022970B CN 105022970 B CN105022970 B CN 105022970B CN 201410177686 A CN201410177686 A CN 201410177686A CN 105022970 B CN105022970 B CN 105022970B
- Authority
- CN
- China
- Prior art keywords
- core
- safe mode
- storage element
- security service
- order
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
Disclosed herein a kind of method for handling security service, applied to a processing unit of a computing device, for controlling the multiple security services of the processing unit processes, comprising:One storage element is provided;One first order is stored in the storage element, first order includes one first security service information;And a core of the processing unit is controlled to perform following steps under a safe mode:The storage element is accessed to obtain first order;One first security service related to the first security service information according to first command process;And the storage element is accessed to obtain one second order, second order includes one second security service information;Wherein, in control the core access the storage element with obtain this first with this second order during, control the core to stay in the safe mode.
Description
Technical field
The present invention is the method on computing device and control computing device processing security service, is filled especially with respect to calculating
The core for the processing unit put can handle multiple security services (secure service) based on patten transformation once
Computing device and the method for control computing device processing security service.
Background technology
For the credible performing environment (trusted of core support of the security level of lifting system, now many processing units
Execution environment, TEE, hereinafter referred to as safe mode) under operation, the ring relative with credible performing environment
Border referred to as opening performing environment (rich execution environment, REE, or horn of plenty performing environment, hereinafter referred to as
For general modfel).Under general modfel, the core of processing unit performs general operation system (normal operation
System, normal OS), with the most of operation related to user's behavior of processing, such as browse webpage, broadcasting multimedia,
Download application program etc.;In the secure mode, the core of processing unit performs SOS (secure operation
System, secure OS), to handle the operation related to system and data safety, such as digital copyright protecting (digital
Right management, DRM) or online transaction payment etc. security service.When security service produces, the core of processing unit will
Safe mode is switched to from general modfel to handle the security service.In implementation, core is exhaled by a specific safe mode
Instruction is cried, core is produced patten transformation, implies that from general modfel and enters safe mode, such as designed by peace scheme (ARM) company
SMC (secure monitor call, security monitoring calling) instructions, or the SMX designed by Intel (Intel) company
(safer mode extension, safe mode extension) instruction.One security service, which generally has to service corresponding to one, to be known
Other information (service identification, service ID).Such as with SMC instruction notification core processing security services
When, it is necessary to the service identification information of the security service is sent in the lump, core enters after safe mode to be identified according to the service again
The information processing security service, and return general modfel after the completion of security service processing.
Referring to Fig. 1, the schematic diagram that the core that it is known processing unit is changed between general modfel and safe mode.When
Core 130 learns first security service (service identification information in general modfel 110 when time T1:001) produce, just send out
Go out SMC instructions (such as the SMC for being 001 with service identification information:001), first safety is handled to enter safe mode 120
Service, is returned after pending in general modfel 110;In time T2, core 130 learns second security service (clothes
Business identification information:002) produce, just send SMC instructions (such as the SMC for being 002 with service identification information:002), with entrance
Safe mode 120 handles second security service, is returned after pending in general modfel 110.This is designed with a limit
System, core 130 can only handle a security service after safe mode is entered, even in the process for handling first security service
In second security service produced, core 130 can only also be finished when first security service, return to general modfel
Second SMC instruction could be sent after 110 again to handle second security service.This causes core performing safety operation system
It is severely limited during system, influences the overall efficiency of processing unit or the computing device even with the processing unit.
The content of the invention
In view of the deficiency of prior art, a purpose of the invention is to provide at a kind of computing device and control computing device
The method for managing security service, makes the core of processing unit have more preferably efficiency in safe mode.
Disclosed herein a kind of method for handling security service, applied to a processing unit of a computing device, it is used for
The multiple security services of the processing unit processes are controlled, comprising:One storage element is provided;One first order is stored in the storage list
Member, first order include one first security service information;And a core of the processing unit is controlled under a safe mode
Perform following steps:The storage element is accessed to obtain first order;According to first command process and first safety clothes
One first related security service of information of being engaged in;And the storage element is accessed to obtain one second order, second order includes
One second security service information;Wherein, in control the core access the storage element with obtain this first with this second order
Period, the core is controlled to stay in the safe mode.
The present invention separately discloses a kind of computing device, comprising:One processing unit is general in one comprising a core, the core
Enter a safe mode according to a safe mode call instruction under pattern;And a storage element, the processing unit is coupled, is stored
One first order, first order include one first security service information;Wherein the core accesses the storage under the safe mode
For memory cell to obtain first order, related to the first security service information according to first command process one first is safe
Service, and the storage element is accessed to obtain one second order, second order includes one second security service information, the core
The heart in access the storage element with obtain this first with this second order during be to stay in the safe mode.
The computing device of the present invention and the method for control computing device processing security service can allow the core of processing unit
In safe mode, general modfel is just returned to after handling multiple security services.Compared to known techniques, core of the invention is not required to
To be limited for a long time by SOS, but multiple security services can be flexibly handled in safe mode, or even can
With the mechanism of the design time segment (time slice) in SOS, SOS is set to possess multithreading
(multi-thread) function, efficiency of the increase core in safe mode.
Feature, implementation and effect for the present invention, schema is hereby coordinated to make preferred embodiment detailed description as follows.
Brief description of the drawings
Fig. 1 is that the core of known processing unit is changed to handle the signal of security service between general modfel and safe mode
Figure;
Fig. 2 is that the core of the computing device of the present invention is changed to handle security service between general modfel and safe mode
The schematic diagram of one embodiment;
Fig. 3 is the schematic diagram of an embodiment of the method that present invention control computing device handles security service;
Fig. 4 is that the core of the computing device of the present invention is changed to handle security service between general modfel and safe mode
The schematic diagram of another embodiment;And
Fig. 5 is the schematic diagram of another embodiment for the method that present invention control computing device handles security service.
Embodiment
The technical terms of following description refers to the idiom of the art, if this specification is to part term
It is illustrated or defines, the explanation system of the part term is defined by the explanation of this specification or definition.
The method that the disclosure of the present invention includes computing device and controls computing device processing security service, can make core
The heart handles multiple security services in safe mode.The apparatus and method can be applied to have setting for safe mode and general modfel
The processing unit of meter, be embodied as it is possible under the premise of, the art tool usually intellectual being capable of taking off according to this specification
Dew content selects equivalent component or step to realize the present invention, that is, the implementation of the present invention be not limited to after the implementation chatted
Example.By the members that are included of computing device of the present invention it is independent for may be known tip assemblies, therefore do not influenceing this
On the premise of the abundant exposure of device invention and exploitativeness, illustrate that for the details of known tip assemblies memorandum will be given below.This
Outside, the method for control computing device processing security service of the invention can be come by the computing device of the present invention or its equivalent device
Perform, on the premise of the abundant exposure of this method invention and exploitativeness is not influenceed, the explanation of following methods invention will focus on
In step content and non-hardware.
Changed referring to Fig. 2, it is the core of the computing device of the present invention between general modfel and safe mode to handle
The schematic diagram of one embodiment of security service.The computing device of the present invention can be consumer electronic product, such as TV, hand
Machine, multimedia player etc. have a computing device of data processing and computing capability, these devices generally comprise processing unit with
Storage element.Processing unit comprises at least a core 210, and it is operable in general modfel 110 and safe mode 120, and
Can all it enter line access to storage element 220 under general modfel 110 and safe mode 120.Storage element 220 may, for example, be
Some section of the system storage of computing device, or some hardware register.Please refer to Fig. 3, it is control of the present invention
The schematic diagram of one embodiment of the method for computing device processing security service processed.(step after above-mentioned storage element 220 is provided
S310), when security service produces, the core 210 that security service can handle triggering security service produces patten transformation (step
Rapid S320).(it is represented by dotted lines before core 210 enters safe mode 120 in Fig. 2), first by the life related to security service
(Cmd) 225 is made, such as includes the order of service identification information, is stored in storage element 220 (step S330), then produces peace
Syntype call instruction (such as SMC instructions of An Mou companies design), core 210 just enters safe mode 120 according to this instruction
(step S340).It note that compared to known techniques, safe mode call instruction herein is not required to the service of service safe to carry
Identification information, because service identification information is stored into storage element 220 in step S330.Core 210 enters safe mode
The reading order 225 from storage element 220 afterwards, and the peace related according to the service identification information processing included in order 225
Full service (step S350).In general, the more other services of the priority layer of security service are high, so when core 210 has been handled
After current security service, if also there being other orders 225 in storage element 220, core 210 will enter safety at this
In the time of pattern 120, it can be finished being handled together to 225 related security services of other orders in storage element 220, then return
To general modfel 110.Enter safe mode 120 that is, working as core 210 and handle security service, return to general modfel
Before 110, can first check whether there be other orders in storage element 220, for example, in a manner of poll (polling) every
One preset time checks storage element 220, to be determined just to return to general mould without other pending security services, core 210
Formula 110.Those others order system be other orders for being related to security service, its can be handled in core 210 it is current
Storage element 220 is stored into during security service, can also be before the current security service of the start to process of core 210 just
It is stored into storage element 220.
Changed referring to Fig. 4, it is the core of the computing device of the present invention between general modfel and safe mode to handle
The schematic diagram of another embodiment of security service.Become stronger day by day with the function of processing unit, its core number provided is also cured
It is more.When processing unit has more than two cores, wherein at least one can be designed to security kernel (secure core), only
There is security kernel to enter in safe mode and handle security service, remaining core then handles other clothes in general modfel
Business.In embodiment as shown in Figure 4, the processing unit of computing device includes two cores, is core 410 and core 420 respectively,
Core 410 is security kernel, and it can enter safe mode because of the triggering of safe mode call instruction, and core 420 is then
Non-security core, or general core.But in other embodiments, the processing unit of computing device can include more multinuclear
The heart, such as four cores, and security kernel is also not necessarily limited to one, such as the two of which that can be designed in four cores is safe kernel
The heart.Please refer to Fig. 5, it is the signal of another embodiment of the method for present invention control computing device processing security service
Figure.It is identical with previous embodiment, the storage element for being used for storing the order 225 comprising security service information is equally first provided
220 (step S510).When security service produces, security service produces patten transformation (step S520) by core 410 is triggered, so
And this security service event is probably to be received by security kernel 410 or non-security core 420;Either received by whichever, all
Can be by the order 225 related to security service, such as the order 225 of service identification information is included, it is stored in storage element 220
(step S530).Whether the core for next judging to receive security service event is security kernel (step S540).If
Core 420 receives the security service event, because core 420 is not security kernel, the security service can not be handled, so must
Beard and hair puts up a notice Notify to notify core 410 to handle the security service (step S550), and core 410 can be because this notice
Notify and produce Exception handling (exception) (step S560), this Exception handling will make core 410 enter safe mode
120.But if above-mentioned security service event when producing is received by core 410, then step S540 will be judged as YES and
It is directly entered step S570.In step S570, core 410 judges whether oneself is in safe mode 120, if non-be in
Safe mode 120, then the generation safe mode call instruction of core 410 (step S580), core 410 just enter peace according to this instruction
Syntype 120 to handle the security service (step S590), that is, the reading order 225 from storage element 220 of core 410, and
The security service related according to the processing of order 225;And if step S570's is judged as YES, that is, core 410 is in Exception handling
It is caused to be in safe mode 120 (representing that core 410 is handling other security services) at that time, then in current safety clothes
Business can immediately treat the security service (step S590) after being disposed, and be not required to leave the re-enter of safe mode 120.
Above-mentioned storage element may, for example, be some section of the system storage of computing device, or computing unit
Some hardware register, core all can enter line access under general modfel 110 and safe mode 120 to both.Step S550's
Notify that Notify can be a software interrupt (software generated interrupt, SGI), or in a hardware
It is disconnected.Hardware interrupts are, for example, that mailbox interrupts (mailbox interrupt) mechanism, positioned at general modfel 110 under this mechanism
Core 420 will order 225 write-in hardware registers, and then sending in the hardware register of interrupt notification core 410 has new order
Produce.
It is worth noting that, when core 410 handles security service in safe mode 120, if now there is new safety
Service is produced, and this security service event will be received by core 420, and the order for being relevant to this security service is stored in by core 420
Storage element (step S530), and the Notify that gives notice is to notify core 410 (step S550 and S560).Core 410 according to
Learn there is new order 225 to produce in storage element 220 according to the notice Notify of core 420, therefore handled current safety
General modfel 110 will not be returned after service immediately, but accesses storage element 220 according to above-mentioned notice to obtain other orders
225, and handle the security service related to the order.In other words, under the framework of the present embodiment, will not as in known because
Security kernel 410 handles security service just in safe mode 120 and causes next security service not send;Opposite,
In the present invention, core 410 is after safe mode 120 is entered, the interruption that can be sent with processing core 420, therefore in safety
The notice Notify corresponding to different security services, and continuous processing more than one security service can be still received in pattern 120.
Such as core 420 continues new order 225 being stored in storage element 220 in safe mode 120 when core 410, then core 410
The security service of processing kainogenesis can be continued, that is, core 410 can be located during once safe mode 120 is entered
More than one security service is managed, core 410 there are more elasticity when performing SOS.
In addition, the present invention can allow SOS to support the dispatcher of multithreading by timeslice off line system
Make (scheduling).And when the design of having time segment mechanism, core 410 can be returned in advance at the end of time segment
General modfel 110 is returned, even if security service is not disposed yet.For example, when core 410 is handling security service, need
Will be by direct memory access (DMA) (direct memory access, DMA) unit mobile data, it makes directly in assigning instruction
After memory access unit starts action, if the work of direct memory access (DMA) unit is still at the end of the time segment of this time
When not completing, and not having other orders pending in storage element 220, now core 410 is in order to avoid in safe mode 120
Empty time-consuming, just first return in general modfel 110 and support to handle other services;When direct memory access (DMA) unit completes work
Afterwards, that is, the core (core 410 or core 420) in general modfel 110 is notified.If core 410 is connected to the notice, then carry out
Step S570~S590, if core 420 is connected to the notice, then step S550~S590 is carried out, core 410 is entered safety
Pattern 120 handles the follow-up work of the security service.That is, core 410 can during security service is handled bullet
Property in general modfel 110 with being changed in safe mode 120, will not make whole by computing resource waste during wait
The running of processing unit is more efficiently.In a preferred embodiment, if the design of SOS having time segment,
At the end of time segment, core 410 can first confirm storage element 220 in whether pending processing order, if so, then core
410 will continue to stay in safe mode 120 and handle security service, if storage element 220 is empty, return to general modfel 110.
In another embodiment, security kernel 410 is not that the notice of foundation core 420 enters peace from general modfel 110
Syntype 120, but a preset time (such as time segment) is set, when preset time reaches, core 410 is voluntarily sent
Without the safe mode call instruction of service identification information, make oneself to enter safe mode 120, therefore core 410 can week
Enter in safe mode 120 to phase property and check whether there is new security service generation.It is above-mentioned in a preferred embodiment
Mode can be with notifying parallel, that is to say, that core 410 checks whether there is except that can periodically enter in safe mode 120
Outside security service produces, also it can enter in safe mode 120 via the notice of another core 420 and check whether there is safety clothes
Business produces.
Because the art tool usually intellectual can understand by the disclosure that Fig. 2 and Fig. 4 device is invented
The implementation detail of Fig. 3 and Fig. 5 method invention and change, therefore, will in the exposure for not influenceing this method invention to avoid superfluous text
Ask and exploitativeness on the premise of, repeat explanation give memorandum herein.Taken off before note that in icon, the shape of component, chi
Order of very little, ratio and step etc. is only to illustrate, and is to understand the present invention for the art tool usually intellectual to be used, non-
To limit the present invention.In addition, the art personage can disclosure under this invention and the demand of itself it is optionally real
The part or all of technical characteristic of any embodiment is applied, or optionally implements the part or all of technology spy of multiple embodiments
The combination of sign, elasticity when thereby the increase present invention is implemented.
Although embodiments of the invention are as described above, but those embodiments are not to be used for limiting the present invention, this technology neck
Domain tool usually intellectual can impose change according to the content expressed or implied of the present invention to the technical characteristic of the present invention, it is all this
Many variations may belong to the patent protection category sought by the present invention, and in other words, scope of patent protection of the invention must regard
The claim institute defender of this specification is defined.
Claims (17)
- A kind of 1. method for handling security service, applied to the processing unit of computing device, for controlling the processing unit processes Multiple security services, comprising:Storage element is provided;First order is stored in the storage element, first order includes the first security service information;AndA core of the processing unit is controlled to perform following steps under safe mode:The storage element is accessed to obtain first order;First security service related to the first security service information according to first command process;AndThe storage element is accessed to obtain the second order, second order includes the second security service information;Wherein, in control the core to access the storage element with obtain first order to according to second command process and this During the second related security service of two security service information, the core is controlled to stay in the safe mode.
- 2. the method as described in claim 1, it is characterised in that the step of accessing the storage element to obtain second order is more Comprising:Second order is stored in the storage element;The core under the safe mode is given notice;AndThe core is controlled to access the storage element according to the notice to obtain second order.
- 3. method as claimed in claim 2, it is characterised in that the notice is one of software interrupt and hardware interrupts.
- 4. the method as described in claim 1, it is characterised in that should according to preset time access in the core of the safe mode Other orders in storage element.
- 5. the method as described in claim 1, it is characterised in that further include:The core is made to enter the safe mode after stopping preset time under general modfel.
- 6. the method as described in claim 1, it is characterised in that further include:The core is made to enter the safe mode by general modfel according to notice;Wherein, the notice system react this first order be stored in the storage element.
- 7. the method as described in claim 1, it is characterised in that further include:Produce safe mode call instruction;AndThe core is made to enter the safe mode by general modfel according to the safe mode call instruction;Wherein, the safe mode call instruction does not include the first security service information.
- 8. the method as described in claim 1, it is characterised in that the step of controlling the core to be performed under the safe mode is more wrapped Contain:Those orders in the storage element are scheduled, those orders are performed in a manner of using multithreading.
- 9. the method as described in claim 1, it is characterised in that further include:When the core stops preset time under the safe mode, and when in the storage element without order, the core is made to leave this Safe mode simultaneously enters general modfel.
- 10. a kind of computing device, comprising:Processing unit, comprising core, the core enters safe mode under general modfel according to safe mode call instruction;AndStorage element, couples the processing unit, the order of storage first, and first order includes the first security service information;The wherein core accesses the storage element to obtain first order, according to first command process under the safe mode First security service related to the first security service information, and the storage element is accessed to obtain the second order, this Two orders include the second security service information, and the core first is ordered to the core foundation with obtaining this in accessing the storage element It is to stay in the safe mould during second command process, second security service related to the second security service information Formula.
- 11. computing device as claimed in claim 10, it is characterised in that the safe mode call instruction is not comprising first peace Full information on services.
- 12. computing device as claimed in claim 10, it is characterised in that the processing unit further includes another core, and this is another Second order is stored in the storage element under the general modfel and given notice by core, to notify the core to access the storage Memory cell with obtain this second order.
- 13. computing device as claimed in claim 12, it is characterised in that the core under the general modfel according to the notice by The general modfel enters the safe mode.
- 14. computing device as claimed in claim 10, it is characterised in that the core is under the safe mode according to preset time Access other orders in the storage element.
- 15. computing device as claimed in claim 10, it is characterised in that the core stops preset time under the general modfel Enter the safe mode afterwards.
- 16. computing device as claimed in claim 10, it is characterised in that the core those in the storage element are ordered into Row scheduling, performs those orders in a manner of using multithreading.
- 17. computing device as claimed in claim 10, it is characterised in that when the core stops under the safe mode to be preset Between, and the storage element in without order when, the core leave the safe mode and enter the general modfel.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410177686.1A CN105022970B (en) | 2014-04-29 | 2014-04-29 | The method of the processing security service of computing device and computing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410177686.1A CN105022970B (en) | 2014-04-29 | 2014-04-29 | The method of the processing security service of computing device and computing device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105022970A CN105022970A (en) | 2015-11-04 |
CN105022970B true CN105022970B (en) | 2018-03-02 |
Family
ID=54412931
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410177686.1A Expired - Fee Related CN105022970B (en) | 2014-04-29 | 2014-04-29 | The method of the processing security service of computing device and computing device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105022970B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105791284B (en) | 2016-02-29 | 2019-04-05 | 华为技术有限公司 | A kind of data security transmission device and method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101165668A (en) * | 2006-10-18 | 2008-04-23 | 松下电器产业株式会社 | Storage medium control device and control method thereof |
CN101379537A (en) * | 2006-02-06 | 2009-03-04 | 松下电器产业株式会社 | Secure processing device, method and program |
CN101685391A (en) * | 2002-01-04 | 2010-03-31 | 微软公司 | Methods and system for managing computational resources of a coprocessor in a computing system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7409570B2 (en) * | 2005-05-10 | 2008-08-05 | Sony Computer Entertainment Inc. | Multiprocessor system for decrypting and resuming execution of an executing program after transferring the program code between two processors via a shared main memory upon occurrence of predetermined condition |
-
2014
- 2014-04-29 CN CN201410177686.1A patent/CN105022970B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101685391A (en) * | 2002-01-04 | 2010-03-31 | 微软公司 | Methods and system for managing computational resources of a coprocessor in a computing system |
CN101379537A (en) * | 2006-02-06 | 2009-03-04 | 松下电器产业株式会社 | Secure processing device, method and program |
CN101165668A (en) * | 2006-10-18 | 2008-04-23 | 松下电器产业株式会社 | Storage medium control device and control method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN105022970A (en) | 2015-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106104555B (en) | For protecting the behavioural analysis of peripheral equipment | |
JP2021089774A (en) | Scan and pay method and device utilized in mobile device | |
US11137909B2 (en) | Secure data entry via a virtual keyboard | |
CN106817480A (en) | The system for carrying out management and control to mobile device access right based on the time and using white list mode | |
CN102779382B (en) | Self-service issuing device for social security financial IC (integrated circuit) card and data processing method thereof | |
CN107870976A (en) | Resume identification device, method and computer-readable recording medium | |
Women | Gender equality: women’s rights in review 25 years after Beijing | |
CN106534572A (en) | Information display method and device and terminal | |
CN103699777A (en) | Medicine taking method for outpatient department and pharmacy system | |
CN110163473A (en) | A kind of monitoring method and equipment of Task Progress | |
CN103493088A (en) | Label privileges | |
CN107632889A (en) | A kind of method, equipment and computer-readable recording medium for realizing service degradation | |
CN104067228B (en) | Context induction in catechumen's application | |
US20110313938A1 (en) | Time-slicing method and system for digital books | |
CN107944000A (en) | Flight freight rate update method, device, electronic equipment, storage medium | |
CN107729755A (en) | A kind of terminal safety management method, terminal and computer-readable recording medium | |
CN107766712A (en) | Message prompt method, terminal and computer-readable medium | |
CN104091102B (en) | A kind of multi-user management method and its device based on Android system | |
CN105022970B (en) | The method of the processing security service of computing device and computing device | |
CN105659247B (en) | The proactive Threat Management system of context-aware | |
CN110069174B (en) | Message processing method and device | |
CN104903813B (en) | System and method for the predictive power management in calculating center | |
CN112634090A (en) | Home decoration information reporting management method, system, computer device and storage medium | |
US20160182933A1 (en) | Method and System for Distributing and Playing Media | |
CN107463379A (en) | Interface switching method and device, computer installation and computer-readable recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180302 Termination date: 20190429 |
|
CF01 | Termination of patent right due to non-payment of annual fee |