CN105610570B - Translation and compiling environment installs register method and system - Google Patents
Translation and compiling environment installs register method and system Download PDFInfo
- Publication number
- CN105610570B CN105610570B CN201510967645.7A CN201510967645A CN105610570B CN 105610570 B CN105610570 B CN 105610570B CN 201510967645 A CN201510967645 A CN 201510967645A CN 105610570 B CN105610570 B CN 105610570B
- Authority
- CN
- China
- Prior art keywords
- user
- registration
- computer
- information
- unique
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000013519 translation Methods 0.000 title claims abstract description 21
- 238000009434 installation Methods 0.000 claims abstract description 8
- 238000012797 qualification Methods 0.000 claims description 5
- 238000012360 testing method Methods 0.000 claims 1
- 238000012795 verification Methods 0.000 claims 1
- 230000003362 replicative effect Effects 0.000 abstract 1
- 230000009286 beneficial effect Effects 0.000 description 2
- 210000004556 brain Anatomy 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012550 audit Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1015—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1078—Logging; Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of translation and compiling environment installation register method and systems, are related to financial security field.This method comprises: the registration translation and compiling environment request that capture user in registration end issues;The unique check code issued described in the registration end of request in computer and relative users is calculated, computer unique encodings, user information and unique check code are then subjected to once signed encryption;Encrypted information is sent to top service device, obtain the encryption information with the user of registration permission and registers end where valid license is fed back to user, valid license is legal, succeeds in registration.The method of the invention registration is convenient, prevents user from replicating software and uses, prevents the Brute Force of user, realizes effective control.
Description
Technical field
The present invention relates to financial security field more particularly to a kind of translation and compiling environment installation register method and systems.
Background technique
Currently, POS machine is largely popularized, various industries are employed for, for the ease of the application and development of POS, are needed exploitation
The various embedded compiled environment used are integrated, and the integrated software of company oneself research and development is by massive duplication, non-in order to prevent
Method use, it is desirable to provide one kind register to use method for control use user group and its corresponding service life.
Summary of the invention
The purpose of the present invention is to provide a kind of translation and compiling environment installation register method and systems, to solve in the prior art
Existing foregoing problems.
To achieve the goals above, translation and compiling environment of the present invention installs register method, this method comprises:
S1, the registration translation and compiling environment request that capture user in registration end issues;
Category is calculated according to the unique encodings and user information of the need registration computer carried in request in S2, registration end
In unique check code of the computer and the user, then by the computer unique encodings, user information, described unique
Check code carries out once signed encryption;
S3 registers end for encrypted information and is sent to top service device, and top service device judges whether the user has
There is registration permission, if it is, examination & approval are qualified, into S4;If it is not, then the user is prompted not have registration permission;
S4, the encryption information of record registration permission qualification, and institute is sent to using the encryption information as valid license
In the mailbox that user's offer is provided;
S5, whether the verifying valid license in registration end is legal, if legal, prompts user registration success;If no
It is legal, then prompt user's registration unsuccessfully without access right.
Preferably, before step S1 further include: user fills in user information at registration end.
It is highly preferred that the user information includes: national title, Business Name, Personal name, effective email address and makes
Use the time limit.
Preferably, the computer unique encodings include: the CPU sequence number and hard disk serial number of the computer.
Preferably, according to the unique encodings and user information of the need registration computer carried in request, using hash algorithm
The unique check code for belonging to the computer and the user is calculated.
Preferably, step S3 is specifically realized as steps described below:
S31 judges whether the identity of the user is true, if it is, into S32;If it is not, then prompting the user
Without registration permission;
S32 judges whether the service life of user's application is reasonable, if it is, examination & approval are qualified, into S4;If
It is no, then prompt the user not have registration permission.
Preferably, step S5 is specifically realized as steps described below:
Registration termination receives the valid license of importing, is tested in real time the valid license using cured public key
Card, obtains user information, computer unique encodings and unique check code;If using hash algorithm verify unique check code it is correct and
The computer unique encodings are consistent with the unique encodings of computer where registration end, then prompt user registration success;Conversely, then prompting
User's registration is unsuccessfully without access right.
A kind of translation and compiling environment installation Accreditation System, the system comprises: registration end module and top service device;
The registration end module includes: that user information fills in module, and computerized information trapping module, unique check code calculate mould
Block, sends and receives information module and authentication module at encrypting module;
User information fills in module, stores user information, and the user information includes national title, Business Name, individual
Title, effective email address and service life;
Computerized information trapping module, the unique encodings of computer where capture registration end, the unique encodings include: the electricity
The CPU sequence number and hard disk serial number of brain;
Unique check code computing module fills in the user information of module storage according to user information and computerized information captures mould
The unique encodings calculating of the computer of block capture belongs to the computer and unique check code of the user;
Encrypting module, using cured private key by the computer unique encodings, the user information, unique check code
Carry out once signed encryption;
Module is sent and received information, top service device is sent by the information after encrypted signature, from top service device
Receive valid license;
Authentication module, verifies whether the valid license has registration permission;
Top service device, top service device judge whether the user has registration permission, if it is, examination & approval qualification
As a result it is sent to registration end;If it is not, then the prompt that the user does not have registration permission is sent to registration end.
The beneficial effects of the present invention are:
The method of the present invention has the advantages that convenient, colleges and universities and safety, specifically:
1, user's registration is convenient, it is only necessary to which filling in personal simple information click application for registration button can be completed registration.
2, License can only be one-to-one, and both a licence can only be used on a computer, prevents user's duplication soft
Part uses.
3, the method can not be cracked substantially using asymmetric and current mainstream algorithm, can prevent user Brute Force,
It is illegal to use.
4, application approval is handled in software publishing side, can check and control the letter such as usage amount and user group of current user
Breath, can accomplish effectively to manage.
Detailed description of the invention
Fig. 1 is translation and compiling environment installation register method flow diagram;
Fig. 2 is translation and compiling environment installation Accreditation System structural schematic diagram.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing, to the present invention into
Row is further described.It should be appreciated that the specific embodiments described herein are only used to explain the present invention, it is not used to
Limit the present invention.
The characteristics of register method of the present invention be fill in conveniently, difficulty crack, user, can bullet after installing composing software
A login dialog frame out, as long as following information is filled in the inside: country, company, user name, personal effectively mailbox,
Service life, then application is clicked in networking, and after application, server will receive the application for registration of client, have special messenger to user information
It is audited, audit, which has passed through to give, to be given an written reply, and a license can be sent to the email address of client, as long as user is this
License imported into inside tool and can use.The license can repeatedly make on that computer that user applies
With, avoid the problem that software reinstallation need repeatedly registration.License can be protected not using certain Encryption Algorithm when login
By Brute Force, algorithm uses RSA-2048, Hash-256, SM4 etc. of mainstream, and uses self-defined structure and random number,
Guarantee that the licence generated every time is different.
Embodiment
Referring to Fig.1, translation and compiling environment described in the present embodiment installs register method, this method comprises:
S1, registration end capture the registration translation and compiling environment request of user's sending;
Category is calculated according to the unique encodings and user information of the need registration computer for including in request in S2, registration end
In unique check code of the computer and the user, then by the computer unique encodings, user information, described unique
Once signed encryption is carried out after check code combination;
S3 registers end for encrypted information and is sent to top service device, and top service device judges whether the user has
There is registration permission, if it is, examination & approval are qualified, into S4;If it is not, then the user is prompted not have registration permission;
S4, the encryption information of record registration permission qualification, and institute is sent to using the encryption information as valid license
In the mailbox that user's offer is provided;
S5, whether the verifying valid license in registration end is legal, if legal, prompts user registration success;If no
It is legal, then prompt user's registration unsuccessfully without access right.
Explanation is explained in more detail:
(1) before step S1 further include: user fills in user information at registration end.The user information includes: country
Title, Business Name, Personal name, effective email address and service life.
(2) the computer unique encodings include: the CPU sequence number and hard disk serial number of the computer.
(3) it according to the unique encodings and user information of the need registration computer for including in request, is calculated using hash algorithm
Obtain the unique check code for belonging to the computer and the user.
(4) step S3 is specifically realized as steps described below:
S31 judges whether the identity of the user is true, if it is, into S32;If it is not, then prompting the user
Without registration permission;
S32 judges whether the service life of user's application is reasonable, if it is, examination & approval are qualified, into S4;If
It is no, then prompt the user not have registration permission.
(5) step S5 is specifically realized as steps described below:
Registration termination receives the valid license of importing, is tested in real time the valid license using cured public key
Card, obtains user information, computer unique encodings and unique check code;If using hash algorithm verify unique check code it is correct and
The computer unique encodings are consistent with the unique encodings of computer where registration end, then prompt user registration success;Conversely, then prompting
User's registration is unsuccessfully without access right.
It is a kind of to realize the system such as translation and compiling environment installation register method, the system comprises: registration end module and upper layer clothes
Business device;
The registration end module includes: that user information fills in module, computerized information trapping module, unique check code calculating mould
Block, sends and receives information module and authentication module at encrypting module;
User information fills in module, stores user information, and the user information includes national title, Business Name, individual
Title, effective email address and service life;
Computerized information trapping module, the unique encodings of computer where capture registration end, the unique encodings include: the electricity
The CPU sequence number and hard disk serial number of brain;
Unique check code computing module fills in the user information of module storage according to user information and computerized information captures mould
The unique encodings calculating of the computer of block capture belongs to the computer and unique check code of the user;
Encrypting module, using cured private key by the computer unique encodings, the user information, unique check code
Carry out once signed encryption;
Module is sent and received information, top service device is sent by the information after encrypted signature, from top service device
Receive valid license;
Authentication module, verifies whether the valid license has registration permission;
Top service device, top service device judge whether the user has registration permission, if it is, examination & approval qualification
As a result it is sent to registration end;If it is not, then the prompt that the user does not have registration permission is sent to registration end.
By using above-mentioned technical proposal disclosed by the invention, following beneficial effect has been obtained:
1, user's registration is convenient, it is only necessary to which filling in personal simple information click application for registration button can be completed registration.
2, License can only be one-to-one, and both a licence can only be used on a computer, prevents user's duplication soft
Part uses.
3, the method can not be cracked substantially using asymmetric and current mainstream algorithm, can prevent user Brute Force,
It is illegal to use.
4, application approval is handled in software publishing side, can check and control the letter such as usage amount and user group of current user
Breath, can accomplish effectively to manage.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
Depending on protection scope of the present invention.
Claims (6)
1. a kind of translation and compiling environment installs register method, which is characterized in that this method comprises:
S1, the registration translation and compiling environment request that capture user in registration end issues;
S2, registration end are calculated according to the unique encodings and user information of the need registration computer carried in request and belong to institute
Computer and unique check code of the user are stated, then by the computer unique encodings, the user information, unique verification
Code carries out once signed encryption;
S3 registers end for encrypted information and is sent to top service device, and top service device judges whether the user has note
Volume permission, if it is, examination & approval are qualified, into S4;If it is not, then the user is prompted not have registration permission;
S4, the encryption information of record registration permission qualification, and the use is sent to using the encryption information as valid license
In the mailbox that family provides;
S5, whether the verifying valid license in registration end is legal, if legal, prompts user registration success;If illegal,
Then prompt user's registration unsuccessfully without access right;
The step S3 is specifically realized as steps described below:
S31 judges whether the identity of the user is true, if it is, into S32;If it is not, then the user is prompted not have
There is registration permission;
S32 judges whether the service life of user's application is reasonable, if it is, examination & approval are qualified, into S4;If it is not, then
The user is prompted not have registration permission;
The step S5, specifically includes: registration termination receives the valid license of importing, using cured public key in real time to described
Valid license is verified, and user information, computer unique encodings and unique check code are obtained;If verified using hash algorithm
Unique check code is correct and the computer unique encodings are consistent with the registration end place unique encodings of computer, then prompts user's registration
Success;Conversely, then prompting user's registration unsuccessfully without access right.
2. translation and compiling environment installs register method according to claim 1, which is characterized in that before step S1 further include: use
User information is filled at registration end in family.
3. translation and compiling environment installs register method according to claim 2, which is characterized in that the user information includes: country
Title, Business Name, Personal name, effective email address and service life.
4. translation and compiling environment installs register method according to claim 1, which is characterized in that the computer unique encodings include:
The CPU sequence number and hard disk serial number of the computer.
5. translation and compiling environment installs register method according to claim 1, which is characterized in that need to register according to include in request
The unique school for belonging to the computer and the user is calculated using hash algorithm for the unique encodings and user information of computer
Test code.
6. a kind of system for realizing translation and compiling environment installation register method as described in claim 1, which is characterized in that the system packet
It includes: registration end module and top service device;
The registration end module includes: that user information fills in module, computerized information trapping module, unique check code computing module,
Encrypting module sends and receives information module and authentication module;
User information fills in module, stores user information, the user information include national title, Business Name, Personal name,
Effective email address and service life;
Computerized information trapping module, the unique encodings of computer where capture registration end, the unique encodings include: the computer
CPU sequence number and hard disk serial number;
Unique check code computing module fills in the user information of module storage according to user information and computerized information trapping module is caught
The unique encodings calculating of the computer obtained belongs to the computer and unique check code of the user;
Encrypting module is carried out the computer unique encodings, the user information, unique check code using cured private key
Once signed encryption;
Module is sent and received information, top service device is sent by the information after encrypted signature, is received from top service device
Valid license;
Authentication module, verifies whether the valid license has registration permission;
Top service device, top service device judge whether the user has registration permission, if it is, the result that examination & approval are qualified
It is sent to registration end;If it is not, then the prompt that the user does not have registration permission is sent to registration end.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510967645.7A CN105610570B (en) | 2015-12-21 | 2015-12-21 | Translation and compiling environment installs register method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510967645.7A CN105610570B (en) | 2015-12-21 | 2015-12-21 | Translation and compiling environment installs register method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105610570A CN105610570A (en) | 2016-05-25 |
CN105610570B true CN105610570B (en) | 2019-05-14 |
Family
ID=55990119
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510967645.7A Active CN105610570B (en) | 2015-12-21 | 2015-12-21 | Translation and compiling environment installs register method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105610570B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109800545A (en) * | 2017-11-16 | 2019-05-24 | 航天信息股份有限公司 | A kind of method and system based on national secret algorithm protection computer software |
CN108595962B (en) * | 2018-04-19 | 2022-06-03 | 深圳鼎智通讯股份有限公司 | POS machine terminal decoding base authorization code checking method |
CN109241702A (en) * | 2018-09-03 | 2019-01-18 | 福建联迪商用设备有限公司 | A kind of software use authorization method and client |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1782941A (en) * | 2004-12-04 | 2006-06-07 | 鸿富锦精密工业(深圳)有限公司 | Software authorizing and protecting device and method |
CN101030855A (en) * | 2006-03-02 | 2007-09-05 | 腾讯科技(深圳)有限公司 | Method and server for verifying account register information |
JP2009258820A (en) * | 2008-04-14 | 2009-11-05 | Nec Corp | Account management system, account management device, and account management method |
CN102932459A (en) * | 2012-11-05 | 2013-02-13 | 广州杰赛科技股份有限公司 | Security control method of virtual machine |
CN103078858A (en) * | 2012-12-31 | 2013-05-01 | 上海同岩土木工程科技有限公司 | Web service and signature certificate-based software trial authorization method |
CN103561037A (en) * | 2013-11-11 | 2014-02-05 | 西安诺瓦电子科技有限公司 | Method for building display terminal group and method and system for remotely controlling display terminals |
-
2015
- 2015-12-21 CN CN201510967645.7A patent/CN105610570B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1782941A (en) * | 2004-12-04 | 2006-06-07 | 鸿富锦精密工业(深圳)有限公司 | Software authorizing and protecting device and method |
CN101030855A (en) * | 2006-03-02 | 2007-09-05 | 腾讯科技(深圳)有限公司 | Method and server for verifying account register information |
JP2009258820A (en) * | 2008-04-14 | 2009-11-05 | Nec Corp | Account management system, account management device, and account management method |
CN102932459A (en) * | 2012-11-05 | 2013-02-13 | 广州杰赛科技股份有限公司 | Security control method of virtual machine |
CN103078858A (en) * | 2012-12-31 | 2013-05-01 | 上海同岩土木工程科技有限公司 | Web service and signature certificate-based software trial authorization method |
CN103561037A (en) * | 2013-11-11 | 2014-02-05 | 西安诺瓦电子科技有限公司 | Method for building display terminal group and method and system for remotely controlling display terminals |
Also Published As
Publication number | Publication date |
---|---|
CN105610570A (en) | 2016-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104580264B (en) | Login method, entering device and login and Accreditation System | |
CN103795724B (en) | Method for protecting account security based on asynchronous dynamic password technology | |
CN110677376B (en) | Authentication method, related device and system and computer readable storage medium | |
CN109951296A (en) | A kind of remote data integrity verification method based on short signature | |
CN104735065B (en) | A kind of data processing method, electronic equipment and server | |
CN103985036A (en) | Two-dimension code payment method with biological characteristics | |
CN109145540A (en) | A kind of intelligent terminal identity identifying method and device based on block chain | |
CN108989346A (en) | The effective identity trustship agility of third party based on account concealment authenticates access module | |
CN102223374A (en) | Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence | |
CN106060078B (en) | User information encryption method, register method and verification method applied to cloud platform | |
CN105791259B (en) | A kind of method of personal information protection | |
CN107196922A (en) | Identity identifying method, user equipment and server | |
CN105554018B (en) | Genuine cyber identification verification method | |
CN109547451A (en) | The method of authentic authentication service authentication based on TEE | |
CN111210287A (en) | Tax UKey-based invoicing method and system | |
CN106936588A (en) | A kind of trustship method, the apparatus and system of hardware controls lock | |
CN105610570B (en) | Translation and compiling environment installs register method and system | |
CN102281138A (en) | Method and system for improving safety of verification code | |
CN106953732A (en) | The key management system and method for chip card | |
WO2016115646A1 (en) | An electronic voting method and system implemented in a portable device | |
GB2488310A (en) | A method and system for authenticating a computer user by using an array of elements | |
CN105703910A (en) | Dynamic password verifying method based on Wechat service number | |
CN105978855A (en) | System and method for protecting personal information security in real-name system | |
CN105978994A (en) | Web system oriented logging-in method | |
CN101674284A (en) | Authentication method and system, user side server and authentication server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |