CN106130717B - A kind of file storage decryption method and device - Google Patents

A kind of file storage decryption method and device Download PDF

Info

Publication number
CN106130717B
CN106130717B CN201610465910.6A CN201610465910A CN106130717B CN 106130717 B CN106130717 B CN 106130717B CN 201610465910 A CN201610465910 A CN 201610465910A CN 106130717 B CN106130717 B CN 106130717B
Authority
CN
China
Prior art keywords
bits
bit
new
last
mantissa
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610465910.6A
Other languages
Chinese (zh)
Other versions
CN106130717A (en
Inventor
贾伟
郭锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201610465910.6A priority Critical patent/CN106130717B/en
Publication of CN106130717A publication Critical patent/CN106130717A/en
Application granted granted Critical
Publication of CN106130717B publication Critical patent/CN106130717B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation

Abstract

The invention discloses a kind of file storage decryption method and devices, this method comprises: ciphertext is split according to 8, if the ciphertext cannot be divided into 8 bits of integer, multiple 8 bits and a mantissa are obtained after segmentation;The mantissa is the last one inadequate eight binary number, radix subject to last 8 bits in the multiple 8 bit;By the multiple 8 bit since the quasi- radix, same or position is carried out according to Fibonacci sequence rule from back to front and is calculated, obtain multiple 8 new bits;It combines the 8 new bits in reverse order, and connects the upper quasi- cardinal sum mantissa, obtain original plaintext.This method, which is realized, simplifies decrypting process, and reduces cost.

Description

A kind of file storage decryption method and device
Technical field
The present invention relates to data storage security technical fields, store decryption method and device more particularly to a kind of file.
Background technique
Currently, existing cloud service provider can provide underlying cryptographic cipher key scheme to protect application and development based on cloud And service or they all transfer to their user to determine these safeguard measures.When cloud service provider is healthy and strong close to supporting When the plan development of key management, need to do more work to overcome the obstacle of use.Traditional file data stores reversible encryption Generally use two ways: exclusive or encryption or displacement encryption, both decryption need key that could decrypt, and key also needs Protection, backup and recovery and later maintenance, comparatively laborious, cost is relatively high.Unsuitable key storage may endanger all Encryption data, Lost Security Key mean to be lost the data that these keys are protected, so also needing to be implemented carrying out safety backup and extensive Multiple solution, if access key storage, also need role's separation help to access control etc. the problems such as and challenge.Pass Key must be used in the file data decrypting process of system, can be just decrypted, be decrypted using key, process using key It is comparatively laborious, higher cost.
Summary of the invention
The object of the present invention is to provide a kind of file storage decryption method and devices, to realize simplified decrypting process, and drop Low cost.
In order to solve the above technical problems, the present invention provides a kind of file storage decryption method, this method comprises:
Ciphertext is split according to 8, if the ciphertext cannot be divided into 8 bits of integer, after segmentation To multiple 8 bits and a mantissa;The mantissa be the last one inadequate eight binary number, the multiple 8 Radix subject to last 8 bits in binary number;
By the multiple 8 bit since the quasi- radix, from back to front according to Fibonacci sequence rule into Row is same or position calculates, and obtains multiple 8 new bits;
It combines the 8 new bits in reverse order, and connects the upper quasi- cardinal sum mantissa, obtain original bright Text.
Preferably, the method also includes: initial data is read out from database.
Preferably, the formula that the same or position calculates are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ is expression It carries out same or position and calculates symbol, a and b are two binary numbers that carry out same or position and calculate.
Preferably, it is described by the multiple 8 bit since the quasi- radix, from back to front according to Fibonacci Ordered series of numbers rule carries out same or position and calculates, and obtains multiple 8 new bits, comprising:
By the quasi- radix and 8 bit of penultimate carry out with or position calculate, obtain new the one 8 two into New the one 8 bit and 8 bit of third last are carried out same or position and calculated, obtained new by number processed New the 2nd 8 bit and fourth from the last 8 bits are carried out same or position and counted by the 2nd 8 bit It calculates, obtains the 3rd 8 new bit, and so on, obtain multiple 8 new bits.
The present invention also provides a kind of files to store decryption device, which includes:
Divide module, for ciphertext to be split according to 8, if the ciphertext cannot be divided into integer 8 two into Number processed obtains multiple 8 bits and a mantissa after segmentation;The mantissa is the last one inadequate eight binary system It counts, radix subject to the last one 8 bit in the multiple 8 bit;
Computing module, for by the multiple 8 bit since the quasi- radix, from back to front according to striking Poona Contract ordered series of numbers rule carries out same or position and calculates, and obtains multiple 8 new bits;
Composite module for combining the 8 new bits in reverse order, and connects the upper quasi- cardinal sum tail Number, obtains original plaintext.
Preferably, described device further include:
Read module, for reading out initial data from database.
Preferably, the formula that the same or position calculates are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ is expression It carries out same or position and calculates symbol, a and b are two binary numbers that carry out same or position and calculate.
Preferably, the computing module, for by the multiple 8 bit since the quasi- radix, from backward It is preceding to carry out the calculating of same or position according to Fibonacci sequence rule, obtain multiple 8 new bits, comprising:
The computing module is calculated for the quasi- radix and 8 bit of penultimate to be carried out same or position, is obtained To the one 8 new bit, new the one 8 bit and 8 bit of third last are carried out same Or position calculates, and obtains the 2nd 8 new bit, by new the 2nd 8 bit and fourth from the last 8 two into Number processed carries out same or position and calculates, and obtains the 3rd 8 new bit, and so on, obtain multiple 8 new bits.
A kind of file storage decryption method provided by the present invention and device, ciphertext are split according to 8, if described Ciphertext cannot be divided into 8 bits of integer, and multiple 8 bits and a mantissa are obtained after segmentation;The mantissa For the last one inadequate eight binary number, base subject to last 8 bits in the multiple 8 bit Number;By the multiple 8 bit since the quasi- radix, from back to front according to Fibonacci sequence rule carry out with or Position calculates, and obtains multiple 8 new bits;It combines the 8 new bits in reverse order, and connects the upper standard Cardinal sum mantissa, obtains original plaintext.As it can be seen that being based on Fibonacci sequence rule, that is, Fibonacci to the ciphertext in file storage Algorithm is decrypted, and is decrypted using Fibonacci design method and same or calculating is retrodicted, it is exactly more for retrodicting Fibonacci design method A 8 bit carries out same or position according to Fibonacci sequence rule from back to front since 8 bits reciprocal It calculates, obtains multiple new binary numbers, due to being calculated using Fibonacci sequence rule and same or position, decrypting process is without making With key, reaching reduces cost, also simplifies decryption oprerations, that is, avoids decrypting using code key, reaches decryption simple to operation Operation so the present invention, which realizes, simplifies decrypting process, and reduces cost.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is the flow diagram that a kind of file provided by the present invention stores decryption method;
Fig. 2 is decrypting process schematic diagram;
Fig. 3 is a kind of structural schematic diagram of file storage decryption device provided by the present invention.
Specific embodiment
Core of the invention is to provide a kind of file storage decryption method and device, to realize simplified decrypting process, and drops Low cost.
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Referring to FIG. 1, Fig. 1 is the flow diagram that a kind of file provided by the present invention stores decryption method, this method Include:
S11: ciphertext is split according to 8, if ciphertext cannot be divided into 8 bits of integer, after segmentation To multiple 8 bits and a mantissa;
Wherein, mantissa is the last one inadequate eight binary number, last 8 in multiple 8 bits Radix subject to binary number;
S12: it by multiple 8 bits since quasi- radix, is carried out from back to front according to Fibonacci sequence rule same Or position calculates, and obtains multiple 8 new bits;
S13: combining 8 new bits in reverse order, and connects Shang Zhun cardinal sum mantissa, obtains original plaintext.
It is decrypted as it can be seen that being based on Fibonacci sequence rule, that is, Fibonacci design method to the ciphertext in file storage, benefit With retrodict Fibonacci design method and with or calculate and be decrypted, retrodict Fibonacci design method be exactly multiple 8 bits from 8 bits reciprocal start, and carry out same or position according to Fibonacci sequence rule from back to front and calculate, and obtain multiple new Binary number, due to using Fibonacci sequence rule and with or position calculate, decrypting process reaches reduction without using key Cost also simplifies decryption oprerations, that is, avoids decrypting using code key, reaches decryption oprerations simple to operation, so of the invention It realizes and simplifies decrypting process, and reduce cost.
Based on the above method, further, the above method further include: read out initial data from database.
Wherein, the formula that same or position calculates are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ carries out same for expression Or position calculates symbol, a and b are two binary numbers that carry out same or position and calculate.
Further, the process of step S12 specifically: by quasi- radix and 8 bit of penultimate carry out with or Position calculates, and obtains the one 8 new bit, by new the one 8 bit and 8 bit of third last into Row with or position calculate, obtain the 2nd 8 new bit, by new the 2nd 8 bit and fourth from the last 8 two into Number processed carries out same or position and calculates, and obtains the 3rd 8 new bit, and so on, obtain multiple 8 new bits.
The above method can be used for entire cloud management platform, stores to file and is decrypted based on Fibonacci design method, utilize It retrodicts Fibonacci design method and same or calculating is decrypted, Fibonacci design method is Fibonacci design method.
It is detailed, it is based on method, specific embodiment is as follows:
1, ciphertext by 8 segmentations, if integer cannot be divided into, the last one inadequate eight referred to as mantissa, together When penultimate be known as base value;If can be divided into just several, the last one binary number is known as base value, is not present Mantissa;It can refer to Fig. 2, Fig. 2 is decryption schematic diagram;
2, inclusive OR operation is carried out according to Fibonacci sequence rule, is carried out with base value and the previous encryption number of base value Same or position calculates, and obtains the plaintext number of encryption number, and so on, so that original plaintext ordered series of numbers can be obtained, inclusive OR operation is phase It is all 1, is not all 0;
3, new ordered series of numbers is combined in order the upper base value of connection and mantissa, data as before encrypting, as original number According to.Sequence combination said herein is intuitively to see it is that sequence combines in Fig. 2, and convenient for intuitive explanation, the means actually used are down Sequence combination.
See it is that sequence combines in Fig. 2, the process for obtaining 8 new bits in fact is by retrodicting Fibonacci Algorithm is carried out with or is calculated, be carried out by quasi- radix and 8 bit of penultimate with or position calculate, obtain new the New the one 8 bit and 8 bit of third last are carried out same or position and calculated, obtained by one 8 bits The 2nd 8 new bit, and so on, multiple 8 new bits are obtained, then obtained multiple 8 two newly In system number, the one 8 new bit is first calculated result, and the 2nd 8 new bit is second calculating As a result, the sequence of so calculated result is the one 8 bit, the 2nd 8 system number, the 3rd 8 bit etc..But When combining these new 8 bits, first calculated result is placed on the last one, and second calculated result is placed on reciprocal the Two, so practical combinations process is that inverted order combines.
Wherein, ciphertext is divided with 8, successively presses inclusive OR bit manipulation from back to front according to Fibonacci sequence rule.
Wherein, it carries out same or position according to Fibonacci sequence rule to calculate, i.e. F (0)=0, F (1)=1, F (n)=F (n- 1) ⊙ F (n-2) (n >=2, n ∈ N*), F (n) are ordered series of numbers, and the expression formula of F (n) is recurrence formula.It is from last in this method A 8 bit number and 8 bit number of penultimate start recursion.
Wherein, the formula that same or position calculates is a ⊙ b=ab+a'b', and a' is non-a, and b' is non-b, is avoided using code key solution It is close, to reach decryption oprerations simple to operation.
Referring to FIG. 3, Fig. 3 is a kind of structural schematic diagram of file storage decryption device provided by the present invention, the device packet It includes:
Divide module 101, for ciphertext to be split according to 8, if ciphertext cannot be divided into 8 binary systems of integer Number, obtains multiple 8 bits and a mantissa after segmentation;Mantissa be the last one inadequate eight binary number, multiple 8 Radix subject to 8 bit of the last one in bit;
Computing module 102, for by multiple 8 bits since quasi- radix, from back to front according to Fibonacci number Column rule carries out same or position and calculates, and obtains multiple 8 new bits;
Composite module 103 for combining 8 new bits in reverse order, and connects Shang Zhun cardinal sum mantissa, obtains Original plaintext.
It is solved as it can be seen that the device is based on Fibonacci sequence rule, that is, Fibonacci design method to the ciphertext in file storage It is close, it is decrypted using Fibonacci design method and same or calculating is retrodicted, retrodicting Fibonacci design method is exactly multiple 8 binary systems Number carries out same or position according to Fibonacci sequence rule from back to front and calculates, obtain more since 8 bits reciprocal A new binary number, due to being calculated using Fibonacci sequence rule and same or position, decrypting process reaches without using key Cost is reduced, decryption oprerations are also simplified, that is, avoids decrypting using code key, reaches decryption oprerations simple to operation, so should Device, which is realized, simplifies decrypting process, and reduces cost.
Based on above-mentioned apparatus, described device further include:
Read module, for reading out initial data from database.
Wherein, the formula that same or position calculates are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ carries out same for expression Or position calculates symbol, a and b are two binary numbers that carry out same or position and calculate.
Above-mentioned apparatus can be used for entire cloud management platform.
Further, computing module is specifically used for quasi- radix and 8 bit of penultimate carrying out same or position meter It calculates, obtains the one 8 new bit, new the one 8 bit and 8 bit of third last are carried out same Or position calculates, and obtains the 2nd 8 new bit, by new the 2nd 8 bit and fourth from the last 8 bits It carries out same or position to calculate, obtains the 3rd 8 new bit, and so on, obtain multiple 8 new bits.
To sum up, a kind of file storage decryption method provided by the present invention and device, ciphertext is split according to 8, If ciphertext cannot be divided into 8 bits of integer, multiple 8 bits and a mantissa are obtained after segmentation;Mantissa is The last one inadequate eight binary number, radix subject to last 8 bits in multiple 8 bits;It will Multiple 8 bits carry out same or position according to Fibonacci sequence rule from back to front and calculate, obtain more since quasi- radix A 8 new bits;It combines 8 new bits in reverse order, and connects Shang Zhun cardinal sum mantissa, obtain original bright Text.It is decrypted as it can be seen that being based on Fibonacci sequence rule, that is, Fibonacci design method to the ciphertext in file storage, using retrodicting Fibonacci design method and with or calculate to be decrypted, retrodicting Fibonacci design method is exactly multiple 8 bits from inverse one A 8 bit starts, from back to front according to Fibonacci sequence rule carry out with or position calculate, obtain multiple new two into Number processed, due to being calculated using Fibonacci sequence rule and same or position, for decrypting process without using key, reaching reduces cost, Decryption oprerations are also simplified, that is, avoid decrypting using code key, reach decryption oprerations simple to operation, so the present invention realizes letter Change decrypting process, and reduces cost.
A kind of file storage decryption method provided by the present invention and device are described in detail above.It answers herein With a specific example illustrates the principle and implementation of the invention, the explanation of above example is only intended to help to manage Solve method and its core concept of the invention.It should be pointed out that for those skilled in the art, not departing from , can be with several improvements and modifications are made to the present invention under the premise of the principle of the invention, these improvement and modification also fall into this hair In bright scope of protection of the claims.

Claims (6)

1. a kind of file stores decryption method characterized by comprising
Ciphertext is split according to 8, if the ciphertext cannot be divided into 8 bits of integer, is obtained after segmentation more A 8 bit and a mantissa;The mantissa be the last one inadequate eight binary number, the multiple 8 two into Radix subject to last 8 bits in number processed;
The quasi- radix and 8 bit of penultimate are carried out same or position to calculate, obtain the one 8 new binary system Number, by new the one 8 bit and 8 bit of third last carry out with or position calculate, obtain new the New the 2nd 8 bit and fourth from the last 8 bits are carried out same or position and calculated by 28 bits, The 3rd 8 new bit is obtained, and so on, obtain multiple 8 new bits;
It combines the multiple 8 new bits in reverse order, and connects the upper quasi- cardinal sum mantissa, obtain original bright Text.
2. the method as described in claim 1, which is characterized in that further include: initial data is read out from database.
3. the method as described in claim 1, which is characterized in that the formula that the same or position calculates are as follows: a ⊙ b=ab+a'b', A' is non-a, and b' is non-b, and ⊙ calculates symbol to indicate to carry out same or position, and a and b are two binary systems that carry out same or position and calculate Number.
4. a kind of file storage decryption device characterized by comprising
Divide module, for ciphertext to be split according to 8, if the ciphertext cannot be divided into 8 bits of integer, Multiple 8 bits and a mantissa are obtained after segmentation;The mantissa is the last one inadequate eight binary number, described Radix subject to the last one 8 bit in multiple 8 bits;
Computing module, for by the quasi- radix and 8 bit of penultimate carry out with or position calculate, obtain new the New the one 8 bit and 8 bit of third last are carried out same or position and calculated by one 8 bits, The 2nd 8 new bit is obtained, new the 2nd 8 bit and fourth from the last 8 bits are carried out Same or position calculates, and obtains the 3rd 8 new bit, and so on, obtain multiple 8 new bits;
Composite module for combining the multiple 8 new bits in reverse order, and connects the upper quasi- cardinal sum tail Number, obtains original plaintext.
5. device as claimed in claim 4, which is characterized in that further include:
Read module, for reading out initial data from database.
6. device as claimed in claim 4, which is characterized in that the formula that the same or position calculates are as follows: a ⊙ b=ab+a'b', A' is non-a, and b' is non-b, and ⊙ calculates symbol to indicate to carry out same or position, and a and b are two binary systems that carry out same or position and calculate Number.
CN201610465910.6A 2016-06-23 2016-06-23 A kind of file storage decryption method and device Active CN106130717B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610465910.6A CN106130717B (en) 2016-06-23 2016-06-23 A kind of file storage decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610465910.6A CN106130717B (en) 2016-06-23 2016-06-23 A kind of file storage decryption method and device

Publications (2)

Publication Number Publication Date
CN106130717A CN106130717A (en) 2016-11-16
CN106130717B true CN106130717B (en) 2019-05-28

Family

ID=57268552

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610465910.6A Active CN106130717B (en) 2016-06-23 2016-06-23 A kind of file storage decryption method and device

Country Status (1)

Country Link
CN (1) CN106130717B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107276744B (en) * 2017-05-27 2020-12-18 王蕴卓 File storage encryption method and system
CN110659508B (en) * 2019-08-16 2021-08-31 苏州浪潮智能科技有限公司 Encryption and decryption method and device based on Lucas number sequence and readable medium
CN112235319B (en) * 2020-12-09 2021-03-16 卓尔智联(武汉)研究院有限公司 Data encryption and decryption method and device and encryption and decryption circuit

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101076968A (en) * 2004-10-13 2007-11-21 加利福尼亚大学董事会 Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups
CN103684760A (en) * 2012-09-24 2014-03-26 腾讯科技(深圳)有限公司 Method, device and system for encryption and decryption of communication

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6529487B1 (en) * 1999-07-09 2003-03-04 Qualcomm Incorporated Method and apparatus for securely transmitting distributed RAND for use in mobile station authentication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101076968A (en) * 2004-10-13 2007-11-21 加利福尼亚大学董事会 Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups
CN103684760A (en) * 2012-09-24 2014-03-26 腾讯科技(深圳)有限公司 Method, device and system for encryption and decryption of communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于广义斐波那契数列的密码系统设计";苏蕴娜 等;《西南师范大学学报》;20151130;第40卷(第11期);第61-66页

Also Published As

Publication number Publication date
CN106130717A (en) 2016-11-16

Similar Documents

Publication Publication Date Title
CN106850221B (en) Information encryption and decryption method and device
CN103780622B (en) A kind of data classification encryption method of facing cloud storage
CN102006300B (en) Method, device and system for encrypting cloud storage data
CN107276744B (en) File storage encryption method and system
CN101149768B (en) Special processor software encryption and decryption method
CN102855448B (en) A kind of Field-level database encryption device
JP2020074039A (en) Method and system for encrypting data
CN108629027A (en) Customer data base method for reconstructing, device, equipment and medium on block chain
CN104811298B (en) One kind realizes encrypted method and device
CN110213354A (en) Cloud storage data confidentiality guard method
CN105956492B (en) A kind of file storage encryption method and device
CN106130717B (en) A kind of file storage decryption method and device
CN107579813A (en) information encryption and decryption method and device
CN111199053A (en) System and method for multi-character wildcard search of encrypted data
CN108038128A (en) A kind of search method, system, terminal device and storage medium for encrypting file
CN103051446B (en) A kind of key encrypting and storing method
CN108462574A (en) A kind of lightweight cipher encrypting method and system
CN104809407A (en) Method and system for encrypting, decrypting and verifying cloud storage front end data
CN103067170A (en) Encrypting file system, encrypting method and deciphering method based on EXT2 file system
CN108829899B (en) Data table storage, modification, query and statistical method
US20160042187A1 (en) System and method for initializing tokens in a dictionary encryption scheme
CN105281898A (en) Apparatus and method for generating key
US11354427B2 (en) Encrypting/decrypting method for multi-digit number and encrypting/decrypting server
Gupta et al. Enhancement of Cloud Security and removal of anti-patterns using multilevel encryption algorithms.
CN105933120A (en) Spark platform-based password hash value recovery method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant