CN106850195B - Group key negotiation and communication method in instant communication - Google Patents
Group key negotiation and communication method in instant communication Download PDFInfo
- Publication number
- CN106850195B CN106850195B CN201610243622.6A CN201610243622A CN106850195B CN 106850195 B CN106850195 B CN 106850195B CN 201610243622 A CN201610243622 A CN 201610243622A CN 106850195 B CN106850195 B CN 106850195B
- Authority
- CN
- China
- Prior art keywords
- group
- session key
- key
- encryption algorithm
- group member
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a group key negotiation and communication method in instant messaging. The method comprises the following steps: 1) the group creator creates a group and generates a session key for the group; 2) for each member i, the group creator uses the public key of the member i to encrypt the session key by adopting an asymmetric encryption algorithm; then generating an instant message with a set format and sending the instant message to the member i; 3) after each group member receives the instant message with the set format, decrypting the session key ciphertext by using a private key of the group member according to the asymmetric encryption algorithm used by the session key ciphertext indicated in the algorithm family field to obtain the session key; simultaneously saving the symmetric encryption algorithm indicated in the algorithm family field; 4) the group member encrypts the communication information to be sent by adopting the session key and the symmetric encryption algorithm and then sends the encrypted communication information to the target member; 5) and the group member decrypts the received ciphertext of the communication information by using the session key and the symmetric encryption algorithm.
Description
Technical Field
The invention relates to the technical field of network communication security, in particular to a group key negotiation and communication method in instant messaging in IP domain encrypted communication.
Background
The rapid development and wide application of mobile communication technology brings great convenience to people's lives, but also brings many potential safety hazards. Because the wireless channel has openness, the call information of the mobile phone can be intercepted and positioned, tracked and monitored by using corresponding receiving equipment. To this end, the present invention designs a key management method for encrypted communication in an IP domain, thereby protecting the security of data and files in mobile communication.
Based on an asymmetric encryption mechanism, group messages and group files are generally encrypted by a certain group member by using a public key of a server and then sent to the server, the server decrypts the encrypted contents by using a private key of the server, then the decrypted contents are sequentially encrypted by using the public keys of the group members respectively and then sent to each group member respectively, and finally the group members decrypt the contents by using the private keys of the group members. As the number of group members increases, this can result in increased performance requirements for the server by group communications, as well as risk of compromise on the server. In addition, modifications and customizations to the server may be difficult in some scenarios, making encrypted communication functions in these systems difficult to implement.
Disclosure of Invention
The invention mainly solves the problems of group key management and distribution in the current popular instant communication system based on IP. The invention provides a group key negotiation and communication method in instant communication, a group creator generates a group session key, distributes the group session key to group members, and then is used for encrypting group messages and files in group communication, thereby better solving the problem.
The technical scheme of the invention is as follows:
a group key negotiation method in instant communication includes the following steps:
1) the group creator creates a group and generates a session key for the group;
2) for each group member i, the group creator uses the public key of the group member i to encrypt the session key by adopting an asymmetric encryption algorithm; then generating an instant message with a set format and sending the instant message to a corresponding group member i; wherein, the instant message with the set format comprises the following fields: algorithm family, identification bit, key id, group id and group session key; the algorithm family field is used for identifying the adopted encryption algorithm, the identification bit field is used for identifying the type of the message, the key id field is used for identifying the session key id generated at this time, the group id field is used for identifying the id of the group, and the group session key field is used for storing the ciphertext of the session key;
3) after each group member receives the instant message with the set format, extracting the ciphertext of the session key, and then decrypting the ciphertext of the session key by using the private key of the group member according to the asymmetric encryption algorithm used by the ciphertext of the session key indicated in the algorithm family field to obtain the session key and storing the session key.
A communication method of instant communication includes the following steps:
1) the group creator creates a group and generates a session key for the group;
2) for each group member i, the group creator uses the public key of the group member i to encrypt the session key by adopting an asymmetric encryption algorithm; then generating an instant message with a set format and sending the instant message to a corresponding group member i; wherein, the instant message with the set format comprises the following fields: algorithm family, identification bit, key id, group id and group session key; the algorithm family field is used for identifying the adopted encryption algorithm, the identification bit field is used for identifying the type of the message, the key id field is used for identifying the session key id generated at this time, the group id field is used for identifying the id of the group, and the group session key field is used for storing the ciphertext of the session key;
3) after each group member receives the instant message with the set format, extracting the ciphertext of the session key, and then decrypting the ciphertext of the session key by using a private key of the group member according to the asymmetric encryption algorithm used by the ciphertext of the session key indicated in the algorithm family field to obtain the session key and storing the session key; simultaneously saving the symmetric encryption algorithm indicated in the algorithm family field;
4) the group members encrypt the communication information to be sent by adopting the session key and the symmetric encryption algorithm and then send the encrypted communication information to the target group members;
5) and the group member decrypts the received ciphertext of the communication information by using the session key and the symmetric encryption algorithm.
Further, the group creator encrypts the session key by using a public key of the group member i and adopting an asymmetric encryption algorithm, signs an encrypted session key ciphertext by using a private key of the group creator, and then generates the instant message with the set format and sends the instant message to the corresponding group member i; after receiving the instant message with the set format, the corresponding group member i firstly verifies the signature by using the public key of the group creator, and after the verification is passed, decrypts the session key by using the private key of the corresponding group member i and sends a confirmation message to the group creator.
Further, when the group member sends the group file, the group file is encrypted by using the session key and a symmetric encryption algorithm, the encrypted file is uploaded to a group server, and the group member is informed to download the encrypted file; and after the group member downloads the encrypted group file, decrypting the encrypted file by using the session key and the symmetric encryption algorithm.
Further, the communication information to be sent includes instant messages, files, pictures or voice messages.
Further, when the group creator wants to dismiss the created group, a dismissal notification is sent to each group member in the group, and after receiving the group dismissal notification, the group member deletes the stored session key of the corresponding group.
In a typical instant messaging system, instant messaging is one of the most basic communication functions in common. The end-to-end instant messaging provides a simple and easy-to-use communication channel for key agreement between the communicating parties. The invention modifies the instant messaging message format into a short signaling message for key exchange by redefining it.
1 group session key agreement specific instant message
Before group communication, the session key used by the group needs to be negotiated first. The specific signaling short message format defined in the present invention for group session key agreement, as shown in fig. 1, includes the following fields:
● version number (1B) to identify the current version
● family of algorithms (1B) for identifying the encryption algorithm used, including symmetric encryption algorithms and asymmetric encryption algorithms (e.g., 00010001 for asymmetric encryption algorithm SM 2; 00010010 for symmetric encryption algorithm SM1, etc.)
● identification bit (4B), content 0xFFFF, used to identify the message as the type of signaling short message for key agreement
● Key id (4B), used to identify the session Key id generated this time
● group id (4B), id for identifying group
● group session keys (97-300B), group session key ciphertext. The session key ciphertext is generated by encrypting the generated group session key using the asymmetric encryption algorithm defined in the "algorithm group". For example, if the asymmetric encryption algorithm defined by the algorithm group is SM2, the session key is obtained by encrypting the session key using SM2 algorithm. The length will vary depending on the algorithm used.
When a group creator creates a group, a session key for use in encrypting communications for the group is generated for the group. The session key is encrypted in turn using the public key of each group member using an asymmetric encryption algorithm defined in the "algorithm family". Then constructing the above group session key negotiation to customize instant message, and sequentially and respectively sending to each group member. Wherein each member acquires the public keys of the other members in advance.
Each group member receives a customized signaling instant message containing a group session key ciphertext from a group creator, extracts the group session key ciphertext from the customized message, checks an asymmetric encryption algorithm used by the session key ciphertext indicated by an algorithm family in the message, and decrypts and stores the group session key ciphertext by using a private key of the group member and the asymmetric encryption algorithm. Meanwhile, the group members should also store the asymmetric encryption algorithm indicated by the "algorithm family" in the instant message, which is used for symmetric encryption of group communication applications such as subsequent files, instant messages, voice messages, and the like.
When the group creator actively disperses the created group, each member in the group deletes the respective stored group session key after receiving the group dispersion notification message.
When the group member sends the group instant message, the group instant message is encrypted by using the stored group session key and the symmetric encryption algorithm, and then the encrypted ciphertext is sent to the group member. And after the group member receives the encrypted group instant message, decrypting the ciphertext by using the stored group session key and the symmetric encryption algorithm.
When the group member sends the group file, the group file is firstly encrypted by using the stored group session key and a symmetric encryption algorithm, then the encrypted file is sent and uploaded to the group server, and the group member is informed to download. The group members download the encrypted file and decrypt the encrypted file using the stored group session key and the symmetric encryption algorithm.
Compared with the prior art, the invention has the following positive effects:
the method can use the asymmetric encryption algorithm to carry out group key agreement based on any instant message channel, can reduce the complexity of a key management system, improve the efficiency of key exchange, and can ensure the security of the key exchange.
Drawings
FIG. 1 is a diagram illustrating a signaling SMS format for group session key negotiation;
FIG. 2 is a flow chart of the method of the present invention.
Detailed Description
The present invention is described in further detail below with reference to the attached drawings.
Application example:
user a creates a group and joins group members B, C.
A generates a session key a for the own group communication.
A uses the public key of the member B to encrypt the session key a by using an asymmetric encryption algorithm (such as SM2), then uses the own private key to sign the encrypted session key ciphertext, and generates a signaling short message according to the figure 1 to send to the member B.
After receiving the signaling short message sent by A, the group member B firstly verifies the signature of the ciphertext of the encrypted session key in the signaling short message by using the public key of A, decrypts the session key by using the private key of the group member B after verification, stores the session key for use and sends a confirmation message to A. If the signature verification is incorrect, the message is discarded.
A uses the public key of the member C to encrypt the session key a by using an asymmetric encryption algorithm (such as SM2), then uses the own private key to sign the encrypted session key ciphertext, and generates a signaling short message according to the figure 1 to send to the member C.
After receiving the signaling short message sent by A, the group member C firstly uses the public key of A to verify the signature of the ciphertext of the encrypted session key in the signaling short message, uses the private key of the group member C to decrypt the session key after verification, stores the session key for use, and sends a confirmation message to A. If the signature verification is incorrect, the message is discarded.
After the group session key negotiation is completed, group communication including instant messages, files, pictures, voice messages and the like is encrypted and decrypted by using the negotiated group session key and algorithm.
In summary, the present invention discloses a method for managing session keys of IP domain group.
The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. It will be apparent to those skilled in the art that various modifications and variations can be made in the present examples without departing from the spirit and scope of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Claims (10)
1. A group key negotiation method in instant communication includes the following steps:
1) the group creator creates a group and generates a session key for the group;
2) for each group member i, the group creator uses the public key of the group member i to encrypt the session key by adopting an asymmetric encryption algorithm; then generating an instant message with a set format and sending the instant message to a corresponding group member i; wherein, the instant message with the set format comprises the following fields: algorithm family, identification bit, key id, group id and group session key; the algorithm family field is used for identifying the adopted encryption algorithm, the identification bit field is used for identifying the type of the message, the key id field is used for identifying the session key id generated at this time, the group id field is used for identifying the id of the group, and the group session key field is used for storing the ciphertext of the session key;
3) after each group member receives the instant message with the set format, extracting the ciphertext of the session key, and then decrypting the ciphertext of the session key by using the private key of the group member according to the asymmetric encryption algorithm used by the ciphertext of the session key indicated in the algorithm family field to obtain the session key and storing the session key.
2. The method of claim 1, wherein the group creator encrypts the session key using a public key of the group member i by using an asymmetric encryption algorithm, signs an encrypted session key ciphertext by using a private key thereof, and then generates the instant message of the set format to send to the corresponding group member i; after receiving the instant message with the set format, the corresponding group member i firstly verifies the signature by using the public key of the group creator, and after the verification is passed, decrypts the session key by using the private key of the corresponding group member i and sends a confirmation message to the group creator.
3. The method of claim 1 or 2, wherein the formatted instant message further comprises a version number field.
4. The method of claim 3, wherein when the group creator wants to dismiss the created group, a dismissal notification is sent to each group member in the group, and the group member deletes the saved session key of the corresponding group after receiving the group dismissal notification.
5. A communication method of instant communication includes the following steps:
1) the group creator creates a group and generates a session key for the group;
2) for each group member i, the group creator uses the public key of the group member i to encrypt the session key by adopting an asymmetric encryption algorithm; then generating an instant message with a set format and sending the instant message to a corresponding group member i; wherein, the instant message with the set format comprises the following fields: algorithm family, identification bit, key id, group id and group session key; the algorithm family field is used for identifying the adopted encryption algorithm, the identification bit field is used for identifying the type of the message, the key id field is used for identifying the session key id generated at this time, the group id field is used for identifying the id of the group, and the group session key field is used for storing the ciphertext of the session key;
3) after each group member receives the instant message with the set format, extracting the ciphertext of the session key, and then decrypting the ciphertext of the session key by using a private key of the group member according to the asymmetric encryption algorithm used by the ciphertext of the session key indicated in the algorithm family field to obtain the session key and storing the session key; simultaneously saving the symmetric encryption algorithm indicated in the algorithm family field;
4) the group members encrypt the communication information to be sent by adopting the session key and the symmetric encryption algorithm and then send the encrypted communication information to the target group members;
5) and the group member decrypts the received ciphertext of the communication information by using the session key and the symmetric encryption algorithm.
6. The method of claim 5, wherein the group creator encrypts the session key using the public key of the group member i by using an asymmetric encryption algorithm, signs the encrypted session key ciphertext by using its own private key, and then generates the instant message of the set format to send to the corresponding group member i; after receiving the instant message with the set format, the corresponding group member i firstly verifies the signature by using the public key of the group creator, and after the verification is passed, decrypts the session key by using the private key of the corresponding group member i and sends a confirmation message to the group creator.
7. The method of claim 5 or 6, wherein when the group member sends the group file, the group file is first encrypted using the session key and a symmetric encryption algorithm, then the encrypted file is uploaded to the group server, and the group member is notified of the download; and after the group member downloads the encrypted group file, decrypting the encrypted file by using the session key and the symmetric encryption algorithm.
8. A method according to claim 5 or 6, wherein the communication to be sent comprises an instant message, a file, a picture or a voice message.
9. The method according to claim 5 or 6, wherein when the group creator wants to dismiss the created group, a dismissal notification is sent to each group member in the group, and after receiving the group dismissal notification, the group member deletes the saved session key of the corresponding group.
10. The method of claim 5 or 6, wherein the formatted instant message further comprises a version number field.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610243622.6A CN106850195B (en) | 2016-04-18 | 2016-04-18 | Group key negotiation and communication method in instant communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610243622.6A CN106850195B (en) | 2016-04-18 | 2016-04-18 | Group key negotiation and communication method in instant communication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106850195A CN106850195A (en) | 2017-06-13 |
CN106850195B true CN106850195B (en) | 2020-05-19 |
Family
ID=59145224
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610243622.6A Expired - Fee Related CN106850195B (en) | 2016-04-18 | 2016-04-18 | Group key negotiation and communication method in instant communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106850195B (en) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107635227B (en) * | 2017-10-30 | 2021-01-29 | 中国联合网络通信集团有限公司 | Group message encryption method and device |
CN108011885B (en) * | 2017-12-07 | 2020-12-15 | 北京科技大学 | E-mail encryption method and system based on group cryptosystem |
CN109462481B (en) * | 2018-11-23 | 2022-04-26 | 上海扈民区块链科技有限公司 | Secret signcryption method based on asymmetric bilinear pairings |
EP3661113A1 (en) * | 2018-11-30 | 2020-06-03 | Siemens Aktiengesellschaft | Method and device for the transmission of data in a publish-subscribe system |
CN109587149A (en) * | 2018-12-11 | 2019-04-05 | 许昌许继软件技术有限公司 | A kind of safety communicating method and device of data |
CN109525612B (en) * | 2019-01-15 | 2021-06-04 | 北京云中融信网络科技有限公司 | Multi-terminal message encryption transmission method and system |
CN109743185B (en) * | 2019-03-19 | 2020-12-01 | 全链通有限公司 | Group communication method based on domain name block chain, block chain link point and medium |
CN109995786B (en) * | 2019-04-08 | 2020-11-13 | 北京深思数盾科技股份有限公司 | Method and device for authorizing data in organization |
TWI712307B (en) * | 2019-09-18 | 2020-12-01 | 遊戲橘子數位科技股份有限公司 | Methods for encrypting and decrypting the group message and transporting the encrypted group message |
WO2021237388A1 (en) * | 2020-05-23 | 2021-12-02 | 游戏橘子数位科技股份有限公司 | Methods for encrypting and decrypting group message, and method for transmitting message |
CN111918285B (en) * | 2020-06-17 | 2022-09-23 | 南京如般量子科技有限公司 | Anti-quantum computing group communication method and system based on ID cryptography |
CN112118267B (en) * | 2020-09-25 | 2022-10-18 | 南方电网科学研究院有限责任公司 | Anonymous communication method and related device |
CN112423262B (en) * | 2020-10-14 | 2024-05-14 | 北京汽车研究总院有限公司 | Motorcade key negotiation method, storage medium and vehicle |
CN112491540B (en) * | 2020-11-13 | 2021-10-19 | 常熟理工学院 | Anonymous wireless network data query implementation method |
CN114980037A (en) * | 2021-02-20 | 2022-08-30 | 南京如般量子科技有限公司 | Group communication method and system based on asymmetric key pool with hierarchical structure |
CN113923178B (en) * | 2021-09-30 | 2024-02-27 | 在秀网络科技(深圳)有限公司 | Method and system for storing and extracting instant messaging and group data files |
CN114726545B (en) * | 2022-03-02 | 2024-06-25 | 广州市悦智计算机有限公司 | Encryption session maintaining method based on block chain decentralization group |
CN115361222B (en) * | 2022-08-26 | 2023-08-01 | 杭州安司源科技有限公司 | Communication processing method, device and system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104396183A (en) * | 2012-05-29 | 2015-03-04 | Abb技术股份公司 | A method and system for transferring firmware or software to a plurality of devices |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7234063B1 (en) * | 2002-08-27 | 2007-06-19 | Cisco Technology, Inc. | Method and apparatus for generating pairwise cryptographic transforms based on group keys |
CN101465725A (en) * | 2007-12-18 | 2009-06-24 | 中国电子科技集团公司第五十研究所 | Key distribution method for public key system based on identification |
CN104683291B (en) * | 2013-11-27 | 2020-04-10 | 北京大唐高鸿数据网络技术有限公司 | Session key negotiation method based on IMS system |
CN104618110B (en) * | 2015-01-15 | 2018-04-17 | 中国科学院信息工程研究所 | A kind of VoIP security conferences session key transmission method |
-
2016
- 2016-04-18 CN CN201610243622.6A patent/CN106850195B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104396183A (en) * | 2012-05-29 | 2015-03-04 | Abb技术股份公司 | A method and system for transferring firmware or software to a plurality of devices |
Also Published As
Publication number | Publication date |
---|---|
CN106850195A (en) | 2017-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106850195B (en) | Group key negotiation and communication method in instant communication | |
US10237247B2 (en) | User interface systems and methods for secure message oriented communications | |
CN104602238B (en) | A kind of wireless network connecting method, device and system | |
CN104219051B (en) | The communication means and system of a kind of inner group message | |
US20150244520A1 (en) | One-time-pad data encryption with media server | |
EP2765734A1 (en) | Encryption method, decryption method, and related device | |
CN105792190B (en) | Data encryption, decryption and transmission method in communication system | |
CN106603504A (en) | VoIP (Voice over Internet Protocol) encrypting and monitoring methods and VoIP encrypting and monitoring devices | |
CN106850522A (en) | The implementation method of Group file encrypted transmission in a kind of instant messaging | |
CN107579903B (en) | Picture message secure transmission method and system based on mobile device | |
CN109194701B (en) | Data processing method and device | |
CN105208028A (en) | Data transmission method and related device and equipment | |
CN102857889A (en) | Method and device for encrypting short messages | |
CN108390755B (en) | Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip | |
CN103067897A (en) | Asymmetrical mobile phone short message encryption method | |
CN113300999A (en) | Information processing method, electronic device, and readable storage medium | |
CN106878277B (en) | Method and device for realizing voice encryption based on DMR standard | |
CN112291196B (en) | End-to-end encryption method and system suitable for instant messaging | |
CN102523563B (en) | Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology | |
CN103997405A (en) | Secret key generation method and device | |
CN106211146B (en) | Adding method, information communicating method and call method and system are recorded in safety communication | |
KR101760376B1 (en) | Terminal and method for providing secure messenger service | |
KR100931986B1 (en) | Terminal and method for transmitting message and receiving message | |
WO2015156145A1 (en) | Re-encryption method, re-encryption system, and re-encryption device | |
CN104243291A (en) | Instant messaging method and system thereof capable of guaranteeing safety of user communication content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200519 |