CN106022146A - Dynamic linking control method facing virtual desktop resource protection - Google Patents

Dynamic linking control method facing virtual desktop resource protection Download PDF

Info

Publication number
CN106022146A
CN106022146A CN201610349588.0A CN201610349588A CN106022146A CN 106022146 A CN106022146 A CN 106022146A CN 201610349588 A CN201610349588 A CN 201610349588A CN 106022146 A CN106022146 A CN 106022146A
Authority
CN
China
Prior art keywords
virtual desktop
operation terminal
user operation
control system
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610349588.0A
Other languages
Chinese (zh)
Other versions
CN106022146B (en
Inventor
李晓勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING PENGCHUANG TIANDI TECHNOLOGY CO LTD
Original Assignee
BEIJING PENGCHUANG TIANDI TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING PENGCHUANG TIANDI TECHNOLOGY CO LTD filed Critical BEIJING PENGCHUANG TIANDI TECHNOLOGY CO LTD
Priority to CN201610349588.0A priority Critical patent/CN106022146B/en
Publication of CN106022146A publication Critical patent/CN106022146A/en
Application granted granted Critical
Publication of CN106022146B publication Critical patent/CN106022146B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Computer And Data Communications (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a dynamic linking control method facing virtual desktop resource protection; the dynamic linking control method comprises the following steps: building connection between a user operation terminal and a virtual desktop server; disconnecting the user operation terminal from the virtual desktop server. The method can effectively separate the user operation terminal from the virtual desktip server; the connection and registration of the user operation terminal with/on the virtual desktop system must be authorized by a virtual desktop management platform, thus ensuring validness of the virtual desktop management mechanism.

Description

A kind of Dynamic link library control method of Virtual desktop protection of resources
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of device of access control under virtual desktop environment.
Background technology
Virtual desktop technology is a kind of possible technique means realizing application terminal centralization, original scattered data can be made to process by virtual desktop technology and storage convergence is possibly realized.While data process and storage realizes centralization, user can access the data in virtual desktop by addressing means multiple types, multipoint.Virtual desktop agreement is relied on to communicate between user operation terminal and virtual desktop server.
Application virtual desktop technology has the advantage of safety, confidentiality, but user operation terminal is because anthelmintic or DDOS attack etc., and virtual desktop network performance here can be caused to decline.And if user is unruly, the IP address of direct virtual desktop and the user name/password known can be connected remotely to virtual desktop, managing platform without virtual desktop completely, the resource making Virtual Administrative Platform not know that it manages is the most occupied the most at leisure.It is thus desirable to method for designing, it is possible to user operation terminal and virtual desktop are cut off and are intercepted and captured operation its whole data access process to virtual desktop of control of user.
Summary of the invention
Present invention solves the technical problem that the Dynamic link library control method being to propose a kind of Virtual desktop protection of resources, improve the Information Security under virtual desktop environment.Under virtual desktop environment, between user operation terminal and virtual desktop server, it is deployed with corresponding virtual desktop management platform and virtual desktop isolation and access control system.
In order to solve problem above, the Dynamic link library control method of a kind of Virtual desktop protection of resources, comprise the following steps:
Virtual desktop isolation and access control system are intercepted and captured the connection certification of user operation terminal and are asked and hand to virtual desktop management platform;
Schedule virtual desktop resource this connection identifier of user is returned to virtual desktop isolation and access control system after virtual desktop management Platform Analysis certification;
Virtual desktop isolation and access control system complete the connection with user identity connection identifier to virtual desktop of the user operation terminal;
User operation terminal disconnects and this time connecting, and virtual desktop isolation and access control system are intercepted and captured the connection of user operation terminal and removed behavior and hand to virtual desktop management platform;
Regain virtual desktop resource after virtual desktop management Platform Analysis and notify that virtual desktop isolation and access control system disconnect user this time to the connection of virtual desktop;
Virtual desktop isolation and access control system refuse the connection to any unauthenticated of virtual desktop of the user operation terminal.
Further, preferred as one, in order to reduce the complexity of application, user operation terminal obtains the process of virtual desktop serve from virtual desktop server two stages: connection establishment stage and remove the disconnected phase.
Further, preferred as one, the isolation of described virtual desktop and access control system are intercepted and captured the connection certification of user operation terminal and are asked and hand to virtual desktop management platform step to farther include: virtual desktop isolation and access control system ensure that virtual desktop will not be interfered by user operation terminal, thus the unsafe problems blocking user operation terminal self is propagated or infects virtual desktop system.
Further, preferred as one, the isolation of described virtual desktop and access control system are intercepted and captured the connection certification of user operation terminal and are asked and hand to virtual desktop management platform step to farther include: virtual desktop isolation and access control system prevent user from just connecting without certification by operating terminal and accessing virtual desktop, virtual desktop resource is caused to be abused, mismanagement.
Further, preferred as one, the isolation of described virtual desktop and access control system are intercepted and captured the connection certification of user operation terminal and are asked and hand to virtual desktop management platform step to farther include: in the connection establishment stage, the connection certification that user operation terminal is initiated to virtual desktop isolation and access control system, authentication method not only includes user name identity card, the modes such as digital certificate, dynamic password can also be supported.
Further, preferred as one, schedule virtual desktop resource this connection identifier of user is returned to virtual desktop isolation and access control system step farther includes after the management Platform Analysis certification of described virtual desktop: the hardware informations such as in connection identifier, the characteristic information of user operation terminal can be hard disk mark, NIC address or these information comprehensive.
Further, preferred as one, the isolation of described virtual desktop and access control system complete user operation terminal and farther include to the Connection Step with user identity connection identifier of virtual desktop: virtual desktop isolation and access control system are it should be guaranteed that can filter each the information transmitted, to guarantee that the method cannot be bypassed or get around in user operation terminal to the connection procedure of virtual desktop.
Further, preferred as one, regain virtual desktop resource after virtual desktop management Platform Analysis and notify that virtual desktop is isolated the step this time connected to virtual desktop with access control system disconnection user and farther included: virtual desktop manages the platform cancellation user operation terminal link information to virtual desktop, and virtual desktop is isolated and access control system can not find out the link information of user operation terminal by refusal user directly accessing virtual desktop.
Further, preferred as one, virtual desktop isolation includes with the step of access control system refusal user operation terminal to the connection of any unauthenticated of virtual desktop, if user does not sends connection request by operation terminal to virtual desktop isolation and access control system, even if user knows the IP address of virtual desktop to be accessed, the user name and password word etc., also cannot walk around virtual desktop isolation and access control system privately connects and accesses virtual desktop system.
The beneficial effects of the present invention is, first, prevent user from just connecting without certification by operating terminal and accessing virtual desktop, cause virtual desktop resource to be abused, mismanagement;The modes such as second, authentication method not only includes user name identity card, it is also possible to support digital certificate, dynamic password;The hardware informations such as the 3rd, the network admittance of user operation terminal is controlled by this structural support, the most only allows the user operation terminal with some feature to be connected to virtual desktop, and these features can be hard disk mark, NIC address or these information comprehensive;4th, user operation terminal can be blocked to the interference of virtual desktop system and destruction, such as virus wooden horse infects, the impact etc. of DDOS attack.To sum up, the network between user operation terminal and virtual desktop can effectively be isolated by this method, ensures the effectiveness of virtual desktop administrative mechanism.
Accompanying drawing explanation
When considered in conjunction with the accompanying drawings, by referring to detailed description below, can more completely be more fully understood that the present invention and easily learn the advantage that many of which is adjoint, but accompanying drawing described herein is used for providing a further understanding of the present invention, constitute the part of the present invention, the schematic description and description of the present invention is used for explaining the present invention, is not intended that inappropriate limitation of the present invention.
Fig. 1 is the flow chart in connection establishment stage in the present invention.
Fig. 2 is the flow chart removing the disconnected phase in the present invention.
Detailed description of the invention
Referring to Fig. 1, Fig. 2, embodiments of the invention are illustrated.
Understandable for enabling above-mentioned purpose, feature and advantage to become apparent from, the present invention is further detailed explanation with detailed description of the invention below in conjunction with the accompanying drawings.
The Dynamic link library control method of a kind of Virtual desktop protection of resources, comprises the following steps:
Virtual desktop isolation and access control system are intercepted and captured the connection certification of user operation terminal and are asked and hand to virtual desktop management platform;
Schedule virtual desktop resource this connection identifier of user is returned to virtual desktop isolation and access control system after virtual desktop management Platform Analysis certification;
Virtual desktop isolation and access control system complete the connection with user identity connection identifier to virtual desktop of the user operation terminal;
User operation terminal disconnects this connection, and virtual desktop isolation and access control system are intercepted and captured the connection of user operation terminal and removed behavior and hand to virtual desktop management platform;
Regain virtual desktop resource after virtual desktop management Platform Analysis and notify that virtual desktop isolation and access control system disconnect user this time to the connection of virtual desktop;
Virtual desktop isolation and access control system refuse the connection to any unauthenticated of virtual desktop of the user operation terminal.
Embodiment one:
The application in enterprise's cloud service of the Dynamic link library control method of a kind of Virtual desktop protection of resources, comprises the following steps:
S1, user isolate to the virtual desktop of enterprise and access control system initiates certification request;
The virtual desktop management platform of enterprise is handed in request by the isolation of S2, virtual desktop and access control system;
After S3, virtual desktop management platform authentication, transfer the virtual desktop resource of enterprises and notify that virtual desktop isolation and access control system allow the connection setting up virtual desktop to user operation terminal;
User operation terminal and virtual desktop are coupled together by the isolation of S4, virtual desktop and access control system as bridge;
S5, user disconnect, and this operation of user is handed to virtual desktop management platform by virtual desktop isolation and access control system;
After S6, virtual desktop management platform receives, notice virtual desktop isolation and access control system no longer allow user operation terminal to the connection of virtual desktop;
The isolation of S7, virtual desktop and the connection of access control system refusal user's unauthenticated.
Embodiment two:
The application in army's cloud service of the Dynamic link library control method of a kind of Virtual desktop protection of resources, comprises the following steps:
S1, user isolate to the virtual desktop of army and access control system initiates certification request;
The virtual desktop management platform of army is handed in request by the isolation of S2, virtual desktop and access control system;
After S3, virtual desktop management platform authentication, transfer the virtual desktop resource within army and notify that virtual desktop isolation and access control system allow the connection setting up virtual desktop to user operation terminal;
User operation terminal and virtual desktop are coupled together by the isolation of S4, virtual desktop and access control system as bridge;
S5, user disconnect, and this operation of user is handed to virtual desktop management platform by virtual desktop isolation and access control system;
After S6, virtual desktop management platform receives, notice virtual desktop isolation and access control system no longer allow user operation terminal to the connection of virtual desktop;
The isolation of S7, virtual desktop and the connection of access control system refusal user's unauthenticated.
Embodiment three:
The application in colleges and universities' cloud service of the dynamic connection method of a kind of Virtual desktop protection of resources, comprises the following steps:
S1, user isolate to the virtual desktop of colleges and universities and access control system initiates certification request;
The virtual desktop management platform of colleges and universities is handed in request by the isolation of S2, virtual desktop and access control system;
After S3, virtual desktop management platform authentication, transfer the virtual desktop resource within colleges and universities and notify that virtual desktop isolation and access control system allow the connection setting up virtual desktop to user operation terminal;
User operation terminal and virtual desktop are coupled together by the isolation of S4, virtual desktop and access control system as bridge;
S5, user disconnect, and this operation of user is handed to virtual desktop management platform by virtual desktop isolation and access control system;
After S6, virtual desktop management platform receives, notice virtual desktop isolation and access control system no longer allow user operation terminal to the connection of virtual desktop;
The isolation of S7, virtual desktop and the connection of access control system refusal user's unauthenticated.
As it has been described above, explained embodiments of the invention, but as long as can have a lot of deformation essentially without the inventive point and effect departing from the present invention, this will be readily apparent to persons skilled in the art.Therefore, within such variation is also integrally incorporated in protection scope of the present invention.

Claims (11)

1. the Dynamic link library control method of a Virtual desktop protection of resources, it is characterised in that comprise the following steps:
First stage, that is the connection establishment stage of virtual desktop, comprise the following steps:
User operation terminal sends the certification request connecting virtual desktop;
Virtual desktop isolation and access control system are intercepted and captured the connection certification of described user operation terminal and are asked and hand to virtual desktop management platform;
Schedule virtual desktop resource this connection identifier of user is returned to the isolation of described virtual desktop and access control system after the management Platform Analysis certification of described virtual desktop;
The isolation of described virtual desktop and access control system complete the connection with user identity connection identifier to virtual desktop of the user operation terminal;
Second stage, that is the dismounting disconnected phase of virtual desktop, comprise the following steps:
User operation terminal sends and disconnects the request this time connected;
Virtual desktop isolation and access control system are intercepted and captured the connection of user operation terminal and are removed behavior and hand to virtual desktop management platform;
Regain virtual desktop resource after described virtual desktop management Platform Analysis and notify that virtual desktop isolation and access control system disconnect user this time to the connection of virtual desktop;
The isolation of described virtual desktop and access control system refuse the connection to any unauthenticated of virtual desktop of the user operation terminal.
2. the method that the Dynamic link library control method of Virtual desktop protection of resources as claimed in claim 1 is applied to virtual desktop serve, described virtual desktop serve comprises two stages: virtual desktop connection establishment stage and virtual desktop remove the disconnected phase, wherein the virtual desktop connection establishment stage mainly completes to be set up between user operation terminal and virtual desktop server the process of Dynamic link library by virtual desktop isolation and access control system and virtual desktop management platform, after user operation terminal disconnects and this time connecting, the dismounting disconnected phase of virtual desktop can be entered, make user operation terminal must again send certification request and could connect virtual desktop system.
The Dynamic link library control method of a kind of Virtual desktop protection of resources the most according to claim 1; it is characterized in that; between user operation terminal and virtual desktop server; isolated and control to connect demolishing process by virtual desktop isolation and access control system, and come certification schedule virtual desktop resource by virtual desktop management platform.
Virtual desktop the most according to claim 1 isolation and access control system are intercepted and captured the connection certification of user operation terminal and are asked and hand to virtual desktop management platform step, comprise further: user operation terminal initiates certification request to virtual desktop isolation and access control system, virtual desktop isolation and access control system set up the connection to virtual desktop of the user operation terminal after intercepting and capturing the most at once, but temporary suspension request is handed to virtual desktop manage platform processes.
Virtual desktop the most according to claim 4 isolation and access control system are intercepted and captured the connection certification of user operation terminal and are asked and hand to virtual desktop management platform step, comprise further: authentication method not only includes usemame/password, the modes such as digital certificate, dynamic password can also be supported.
Schedule virtual desktop resource this connection identifier of user is returned to virtual desktop isolation and access control system step after virtual desktop the most according to claim 1 management Platform Analysis certification, farther include: virtual desktop management platform is according to the identity information resolving subscriber identity information and the present terminal obtained from connection request, generate corresponding connection identifier, return to virtual desktop isolation and access control system together with connection identifier by finding the virtual desktop information being suitable for distributing to this user operation terminal from virtual desktop server.
Schedule virtual desktop resource this connection identifier of user returns to virtual desktop isolation and access control system step after virtual desktop the most according to claim 6 management Platform Analysis certification, farther includes: the identity information of present terminal can be the comprehensive of the hardware informations such as its hard disk mark, NIC address or these information.
Virtual desktop the most according to claim 1 isolation and access control system complete the user operation terminal Connection Step with user identity connection identifier to virtual desktop, farther include: virtual desktop isolation and access control system are according to the information received, setting up a connection supported from user operation terminal to virtual desktop, then user just can connect and log in this virtual desktop of use.
9. support the connection from user operation terminal to virtual desktop according to described in claims 8, each the information connecting upper transmission can be filtered by virtual desktop isolation and access control system, to guarantee that the method cannot be bypassed or get around, user operation terminal and virtual desktop are isolated on the physical layer of network.
10. isolate according to the virtual desktop described in claims 1 and access control system refusal user operation terminal farther include to the Connection Step of any unauthenticated of virtual desktop: virtual desktop isolation and access control system receive virtual desktop manage platform disconnect notice after, remove this connection, even if user knows that the IP address of this virtual desktop, user name/password word are the most no longer possible is privately connected to virtual desktop.
11. 1 kinds can be effectively isolated user operation terminal and virtual desktop and ensure that the dynamic connection management device of virtual desktop administrative mechanism effectiveness, and this device includes:
One and above server, implement hardware virtualization technology on the server, fictionalize multiple virtual machine, and described virtual machine is disposed virtual desktop system;
One and above user operation terminal, user operates on terminal operation platform, accesses described virtual desktop system, and sends the request of data exchange;
Virtual desktop management platform, is deployed in described virtual desktop and user operation terminal room;
Virtual desktop isolation and access control system, be deployed in described virtual desktop and user operation terminal room;
The isolation of described virtual desktop and access control system are as the agency of virtual desktop serve, intercept and capture user terminal be sent to the connection request of virtual desktop server and hand to virtual desktop management platform, virtual desktop management platform is suitable for distributing to the virtual desktop of this user operation terminal according to the identity information analysis in connection request, and notice virtual desktop isolation and access control system set up a connection supported from user operation terminal to virtual desktop;
The isolation of described virtual desktop and access control system are as the agency of virtual desktop serve, after virtual desktop server response user operation terminal connection request, can intercept and capture and filter user operation terminal and virtual desktop should between flow of information, play an effect cut off between;
Virtual desktop isolation and access control system are as the agency of virtual desktop serve, after intercepting the operation that user operation terminal disconnects, can hand to virtual desktop management platform and cancel connection to virtual desktop on the isolation of this user's virtual desktop and access control system, after removing this connection, user cannot connect virtual desktop the most privately.
CN201610349588.0A 2016-05-24 2016-05-24 A kind of Dynamic link library control method of Virtual desktop protection of resources Active CN106022146B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610349588.0A CN106022146B (en) 2016-05-24 2016-05-24 A kind of Dynamic link library control method of Virtual desktop protection of resources

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610349588.0A CN106022146B (en) 2016-05-24 2016-05-24 A kind of Dynamic link library control method of Virtual desktop protection of resources

Publications (2)

Publication Number Publication Date
CN106022146A true CN106022146A (en) 2016-10-12
CN106022146B CN106022146B (en) 2018-01-12

Family

ID=57093242

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610349588.0A Active CN106022146B (en) 2016-05-24 2016-05-24 A kind of Dynamic link library control method of Virtual desktop protection of resources

Country Status (1)

Country Link
CN (1) CN106022146B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100229185A1 (en) * 2009-03-03 2010-09-09 Cisco Technology, Inc. Event / calendar based auto-start of virtual disks for desktop virtualization
CN104753887A (en) * 2013-12-31 2015-07-01 中国移动通信集团黑龙江有限公司 Safety control implementation method and system and cloud desktop system
CN105049414A (en) * 2015-06-03 2015-11-11 北京朋创天地科技有限公司 Dataflow control method facing virtual desktop and information safety device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100229185A1 (en) * 2009-03-03 2010-09-09 Cisco Technology, Inc. Event / calendar based auto-start of virtual disks for desktop virtualization
CN104753887A (en) * 2013-12-31 2015-07-01 中国移动通信集团黑龙江有限公司 Safety control implementation method and system and cloud desktop system
CN105049414A (en) * 2015-06-03 2015-11-11 北京朋创天地科技有限公司 Dataflow control method facing virtual desktop and information safety device

Also Published As

Publication number Publication date
CN106022146B (en) 2018-01-12

Similar Documents

Publication Publication Date Title
JP3262689B2 (en) Remote control system
CN104753887B (en) Security management and control implementation method, system and cloud desktop system
US7607021B2 (en) Isolation approach for network users associated with elevated risk
JP4168052B2 (en) Management server
CN109743163A (en) Purview certification method, apparatus and system in micro services framework
JP5382819B2 (en) Network management system and server
CN103428211B (en) Network authentication system based on switch and authentication method thereof
CN104426837B (en) The application layer message filtering method and device of FTP
ES2768049T3 (en) Procedures and systems to secure and protect repositories and directories
CN102104592A (en) Session migration between network policy servers
CA2688553A1 (en) System and method for providing network and computer firewall protection with dynamic address isolation to a device
CN109413080B (en) Cross-domain dynamic authority control method and system
CN101488857B (en) Authenticated service virtualization
CN104159225A (en) Wireless network based real-name registration system management method and system
CN104754582A (en) Client and method for maintaining BYOD (Bring Your Own Device) safety
US9686256B2 (en) Method and system for accessing network through public device
US10333977B1 (en) Deceiving an attacker who is harvesting credentials
CN106792684B (en) Multi-protection wireless network safety protection system and protection method
US20160345170A1 (en) Wireless network segmentation for internet connected devices using disposable and limited security keys and disposable proxies for management
TWI476627B (en) The management system and method of network service level and function of cloud virtual desktop application
CN106685785B (en) Intranet access system based on IPsec VPN proxy
CN105592180A (en) Portal authentication method and device
CN105721441B (en) Identity authentication method in virtualization environment
CN105049414A (en) Dataflow control method facing virtual desktop and information safety device
CN102882861A (en) Method of achieving IP address cheating prevention based on analysis of dynamic host configuration protocol (DHCP) message

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant