CN106850195B - Group key negotiation and communication method in instant communication - Google Patents

Group key negotiation and communication method in instant communication Download PDF

Info

Publication number
CN106850195B
CN106850195B CN201610243622.6A CN201610243622A CN106850195B CN 106850195 B CN106850195 B CN 106850195B CN 201610243622 A CN201610243622 A CN 201610243622A CN 106850195 B CN106850195 B CN 106850195B
Authority
CN
China
Prior art keywords
group
session key
key
encryption algorithm
group member
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610243622.6A
Other languages
Chinese (zh)
Other versions
CN106850195A (en
Inventor
周卫华
单旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201610243622.6A priority Critical patent/CN106850195B/en
Publication of CN106850195A publication Critical patent/CN106850195A/en
Application granted granted Critical
Publication of CN106850195B publication Critical patent/CN106850195B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a group key negotiation and communication method in instant messaging. The method comprises the following steps: 1) the group creator creates a group and generates a session key for the group; 2) for each member i, the group creator uses the public key of the member i to encrypt the session key by adopting an asymmetric encryption algorithm; then generating an instant message with a set format and sending the instant message to the member i; 3) after each group member receives the instant message with the set format, decrypting the session key ciphertext by using a private key of the group member according to the asymmetric encryption algorithm used by the session key ciphertext indicated in the algorithm family field to obtain the session key; simultaneously saving the symmetric encryption algorithm indicated in the algorithm family field; 4) the group member encrypts the communication information to be sent by adopting the session key and the symmetric encryption algorithm and then sends the encrypted communication information to the target member; 5) and the group member decrypts the received ciphertext of the communication information by using the session key and the symmetric encryption algorithm.

Description

Group key negotiation and communication method in instant communication
Technical Field
The invention relates to the technical field of network communication security, in particular to a group key negotiation and communication method in instant messaging in IP domain encrypted communication.
Background
The rapid development and wide application of mobile communication technology brings great convenience to people's lives, but also brings many potential safety hazards. Because the wireless channel has openness, the call information of the mobile phone can be intercepted and positioned, tracked and monitored by using corresponding receiving equipment. To this end, the present invention designs a key management method for encrypted communication in an IP domain, thereby protecting the security of data and files in mobile communication.
Based on an asymmetric encryption mechanism, group messages and group files are generally encrypted by a certain group member by using a public key of a server and then sent to the server, the server decrypts the encrypted contents by using a private key of the server, then the decrypted contents are sequentially encrypted by using the public keys of the group members respectively and then sent to each group member respectively, and finally the group members decrypt the contents by using the private keys of the group members. As the number of group members increases, this can result in increased performance requirements for the server by group communications, as well as risk of compromise on the server. In addition, modifications and customizations to the server may be difficult in some scenarios, making encrypted communication functions in these systems difficult to implement.
Disclosure of Invention
The invention mainly solves the problems of group key management and distribution in the current popular instant communication system based on IP. The invention provides a group key negotiation and communication method in instant communication, a group creator generates a group session key, distributes the group session key to group members, and then is used for encrypting group messages and files in group communication, thereby better solving the problem.
The technical scheme of the invention is as follows:
a group key negotiation method in instant communication includes the following steps:
1) the group creator creates a group and generates a session key for the group;
2) for each group member i, the group creator uses the public key of the group member i to encrypt the session key by adopting an asymmetric encryption algorithm; then generating an instant message with a set format and sending the instant message to a corresponding group member i; wherein, the instant message with the set format comprises the following fields: algorithm family, identification bit, key id, group id and group session key; the algorithm family field is used for identifying the adopted encryption algorithm, the identification bit field is used for identifying the type of the message, the key id field is used for identifying the session key id generated at this time, the group id field is used for identifying the id of the group, and the group session key field is used for storing the ciphertext of the session key;
3) after each group member receives the instant message with the set format, extracting the ciphertext of the session key, and then decrypting the ciphertext of the session key by using the private key of the group member according to the asymmetric encryption algorithm used by the ciphertext of the session key indicated in the algorithm family field to obtain the session key and storing the session key.
A communication method of instant communication includes the following steps:
1) the group creator creates a group and generates a session key for the group;
2) for each group member i, the group creator uses the public key of the group member i to encrypt the session key by adopting an asymmetric encryption algorithm; then generating an instant message with a set format and sending the instant message to a corresponding group member i; wherein, the instant message with the set format comprises the following fields: algorithm family, identification bit, key id, group id and group session key; the algorithm family field is used for identifying the adopted encryption algorithm, the identification bit field is used for identifying the type of the message, the key id field is used for identifying the session key id generated at this time, the group id field is used for identifying the id of the group, and the group session key field is used for storing the ciphertext of the session key;
3) after each group member receives the instant message with the set format, extracting the ciphertext of the session key, and then decrypting the ciphertext of the session key by using a private key of the group member according to the asymmetric encryption algorithm used by the ciphertext of the session key indicated in the algorithm family field to obtain the session key and storing the session key; simultaneously saving the symmetric encryption algorithm indicated in the algorithm family field;
4) the group members encrypt the communication information to be sent by adopting the session key and the symmetric encryption algorithm and then send the encrypted communication information to the target group members;
5) and the group member decrypts the received ciphertext of the communication information by using the session key and the symmetric encryption algorithm.
Further, the group creator encrypts the session key by using a public key of the group member i and adopting an asymmetric encryption algorithm, signs an encrypted session key ciphertext by using a private key of the group creator, and then generates the instant message with the set format and sends the instant message to the corresponding group member i; after receiving the instant message with the set format, the corresponding group member i firstly verifies the signature by using the public key of the group creator, and after the verification is passed, decrypts the session key by using the private key of the corresponding group member i and sends a confirmation message to the group creator.
Further, when the group member sends the group file, the group file is encrypted by using the session key and a symmetric encryption algorithm, the encrypted file is uploaded to a group server, and the group member is informed to download the encrypted file; and after the group member downloads the encrypted group file, decrypting the encrypted file by using the session key and the symmetric encryption algorithm.
Further, the communication information to be sent includes instant messages, files, pictures or voice messages.
Further, when the group creator wants to dismiss the created group, a dismissal notification is sent to each group member in the group, and after receiving the group dismissal notification, the group member deletes the stored session key of the corresponding group.
In a typical instant messaging system, instant messaging is one of the most basic communication functions in common. The end-to-end instant messaging provides a simple and easy-to-use communication channel for key agreement between the communicating parties. The invention modifies the instant messaging message format into a short signaling message for key exchange by redefining it.
1 group session key agreement specific instant message
Before group communication, the session key used by the group needs to be negotiated first. The specific signaling short message format defined in the present invention for group session key agreement, as shown in fig. 1, includes the following fields:
● version number (1B) to identify the current version
● family of algorithms (1B) for identifying the encryption algorithm used, including symmetric encryption algorithms and asymmetric encryption algorithms (e.g., 00010001 for asymmetric encryption algorithm SM 2; 00010010 for symmetric encryption algorithm SM1, etc.)
● identification bit (4B), content 0xFFFF, used to identify the message as the type of signaling short message for key agreement
● Key id (4B), used to identify the session Key id generated this time
● group id (4B), id for identifying group
● group session keys (97-300B), group session key ciphertext. The session key ciphertext is generated by encrypting the generated group session key using the asymmetric encryption algorithm defined in the "algorithm group". For example, if the asymmetric encryption algorithm defined by the algorithm group is SM2, the session key is obtained by encrypting the session key using SM2 algorithm. The length will vary depending on the algorithm used.
When a group creator creates a group, a session key for use in encrypting communications for the group is generated for the group. The session key is encrypted in turn using the public key of each group member using an asymmetric encryption algorithm defined in the "algorithm family". Then constructing the above group session key negotiation to customize instant message, and sequentially and respectively sending to each group member. Wherein each member acquires the public keys of the other members in advance.
Each group member receives a customized signaling instant message containing a group session key ciphertext from a group creator, extracts the group session key ciphertext from the customized message, checks an asymmetric encryption algorithm used by the session key ciphertext indicated by an algorithm family in the message, and decrypts and stores the group session key ciphertext by using a private key of the group member and the asymmetric encryption algorithm. Meanwhile, the group members should also store the asymmetric encryption algorithm indicated by the "algorithm family" in the instant message, which is used for symmetric encryption of group communication applications such as subsequent files, instant messages, voice messages, and the like.
When the group creator actively disperses the created group, each member in the group deletes the respective stored group session key after receiving the group dispersion notification message.
When the group member sends the group instant message, the group instant message is encrypted by using the stored group session key and the symmetric encryption algorithm, and then the encrypted ciphertext is sent to the group member. And after the group member receives the encrypted group instant message, decrypting the ciphertext by using the stored group session key and the symmetric encryption algorithm.
When the group member sends the group file, the group file is firstly encrypted by using the stored group session key and a symmetric encryption algorithm, then the encrypted file is sent and uploaded to the group server, and the group member is informed to download. The group members download the encrypted file and decrypt the encrypted file using the stored group session key and the symmetric encryption algorithm.
Compared with the prior art, the invention has the following positive effects:
the method can use the asymmetric encryption algorithm to carry out group key agreement based on any instant message channel, can reduce the complexity of a key management system, improve the efficiency of key exchange, and can ensure the security of the key exchange.
Drawings
FIG. 1 is a diagram illustrating a signaling SMS format for group session key negotiation;
FIG. 2 is a flow chart of the method of the present invention.
Detailed Description
The present invention is described in further detail below with reference to the attached drawings.
Application example:
user a creates a group and joins group members B, C.
A generates a session key a for the own group communication.
A uses the public key of the member B to encrypt the session key a by using an asymmetric encryption algorithm (such as SM2), then uses the own private key to sign the encrypted session key ciphertext, and generates a signaling short message according to the figure 1 to send to the member B.
After receiving the signaling short message sent by A, the group member B firstly verifies the signature of the ciphertext of the encrypted session key in the signaling short message by using the public key of A, decrypts the session key by using the private key of the group member B after verification, stores the session key for use and sends a confirmation message to A. If the signature verification is incorrect, the message is discarded.
A uses the public key of the member C to encrypt the session key a by using an asymmetric encryption algorithm (such as SM2), then uses the own private key to sign the encrypted session key ciphertext, and generates a signaling short message according to the figure 1 to send to the member C.
After receiving the signaling short message sent by A, the group member C firstly uses the public key of A to verify the signature of the ciphertext of the encrypted session key in the signaling short message, uses the private key of the group member C to decrypt the session key after verification, stores the session key for use, and sends a confirmation message to A. If the signature verification is incorrect, the message is discarded.
After the group session key negotiation is completed, group communication including instant messages, files, pictures, voice messages and the like is encrypted and decrypted by using the negotiated group session key and algorithm.
In summary, the present invention discloses a method for managing session keys of IP domain group.
The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. It will be apparent to those skilled in the art that various modifications and variations can be made in the present examples without departing from the spirit and scope of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (10)

1. A group key negotiation method in instant communication includes the following steps:
1) the group creator creates a group and generates a session key for the group;
2) for each group member i, the group creator uses the public key of the group member i to encrypt the session key by adopting an asymmetric encryption algorithm; then generating an instant message with a set format and sending the instant message to a corresponding group member i; wherein, the instant message with the set format comprises the following fields: algorithm family, identification bit, key id, group id and group session key; the algorithm family field is used for identifying the adopted encryption algorithm, the identification bit field is used for identifying the type of the message, the key id field is used for identifying the session key id generated at this time, the group id field is used for identifying the id of the group, and the group session key field is used for storing the ciphertext of the session key;
3) after each group member receives the instant message with the set format, extracting the ciphertext of the session key, and then decrypting the ciphertext of the session key by using the private key of the group member according to the asymmetric encryption algorithm used by the ciphertext of the session key indicated in the algorithm family field to obtain the session key and storing the session key.
2. The method of claim 1, wherein the group creator encrypts the session key using a public key of the group member i by using an asymmetric encryption algorithm, signs an encrypted session key ciphertext by using a private key thereof, and then generates the instant message of the set format to send to the corresponding group member i; after receiving the instant message with the set format, the corresponding group member i firstly verifies the signature by using the public key of the group creator, and after the verification is passed, decrypts the session key by using the private key of the corresponding group member i and sends a confirmation message to the group creator.
3. The method of claim 1 or 2, wherein the formatted instant message further comprises a version number field.
4. The method of claim 3, wherein when the group creator wants to dismiss the created group, a dismissal notification is sent to each group member in the group, and the group member deletes the saved session key of the corresponding group after receiving the group dismissal notification.
5. A communication method of instant communication includes the following steps:
1) the group creator creates a group and generates a session key for the group;
2) for each group member i, the group creator uses the public key of the group member i to encrypt the session key by adopting an asymmetric encryption algorithm; then generating an instant message with a set format and sending the instant message to a corresponding group member i; wherein, the instant message with the set format comprises the following fields: algorithm family, identification bit, key id, group id and group session key; the algorithm family field is used for identifying the adopted encryption algorithm, the identification bit field is used for identifying the type of the message, the key id field is used for identifying the session key id generated at this time, the group id field is used for identifying the id of the group, and the group session key field is used for storing the ciphertext of the session key;
3) after each group member receives the instant message with the set format, extracting the ciphertext of the session key, and then decrypting the ciphertext of the session key by using a private key of the group member according to the asymmetric encryption algorithm used by the ciphertext of the session key indicated in the algorithm family field to obtain the session key and storing the session key; simultaneously saving the symmetric encryption algorithm indicated in the algorithm family field;
4) the group members encrypt the communication information to be sent by adopting the session key and the symmetric encryption algorithm and then send the encrypted communication information to the target group members;
5) and the group member decrypts the received ciphertext of the communication information by using the session key and the symmetric encryption algorithm.
6. The method of claim 5, wherein the group creator encrypts the session key using the public key of the group member i by using an asymmetric encryption algorithm, signs the encrypted session key ciphertext by using its own private key, and then generates the instant message of the set format to send to the corresponding group member i; after receiving the instant message with the set format, the corresponding group member i firstly verifies the signature by using the public key of the group creator, and after the verification is passed, decrypts the session key by using the private key of the corresponding group member i and sends a confirmation message to the group creator.
7. The method of claim 5 or 6, wherein when the group member sends the group file, the group file is first encrypted using the session key and a symmetric encryption algorithm, then the encrypted file is uploaded to the group server, and the group member is notified of the download; and after the group member downloads the encrypted group file, decrypting the encrypted file by using the session key and the symmetric encryption algorithm.
8. A method according to claim 5 or 6, wherein the communication to be sent comprises an instant message, a file, a picture or a voice message.
9. The method according to claim 5 or 6, wherein when the group creator wants to dismiss the created group, a dismissal notification is sent to each group member in the group, and after receiving the group dismissal notification, the group member deletes the saved session key of the corresponding group.
10. The method of claim 5 or 6, wherein the formatted instant message further comprises a version number field.
CN201610243622.6A 2016-04-18 2016-04-18 Group key negotiation and communication method in instant communication Expired - Fee Related CN106850195B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610243622.6A CN106850195B (en) 2016-04-18 2016-04-18 Group key negotiation and communication method in instant communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610243622.6A CN106850195B (en) 2016-04-18 2016-04-18 Group key negotiation and communication method in instant communication

Publications (2)

Publication Number Publication Date
CN106850195A CN106850195A (en) 2017-06-13
CN106850195B true CN106850195B (en) 2020-05-19

Family

ID=59145224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610243622.6A Expired - Fee Related CN106850195B (en) 2016-04-18 2016-04-18 Group key negotiation and communication method in instant communication

Country Status (1)

Country Link
CN (1) CN106850195B (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107635227B (en) * 2017-10-30 2021-01-29 中国联合网络通信集团有限公司 Group message encryption method and device
CN108011885B (en) * 2017-12-07 2020-12-15 北京科技大学 E-mail encryption method and system based on group cryptosystem
CN109462481B (en) * 2018-11-23 2022-04-26 上海扈民区块链科技有限公司 Secret signcryption method based on asymmetric bilinear pairings
EP3661113A1 (en) * 2018-11-30 2020-06-03 Siemens Aktiengesellschaft Method and device for the transmission of data in a publish-subscribe system
CN109587149A (en) * 2018-12-11 2019-04-05 许昌许继软件技术有限公司 A kind of safety communicating method and device of data
CN109525612B (en) * 2019-01-15 2021-06-04 北京云中融信网络科技有限公司 Multi-terminal message encryption transmission method and system
CN109743185B (en) * 2019-03-19 2020-12-01 全链通有限公司 Group communication method based on domain name block chain, block chain link point and medium
CN109995786B (en) * 2019-04-08 2020-11-13 北京深思数盾科技股份有限公司 Method and device for authorizing data in organization
TWI712307B (en) * 2019-09-18 2020-12-01 遊戲橘子數位科技股份有限公司 Methods for encrypting and decrypting the group message and transporting the encrypted group message
WO2021237388A1 (en) * 2020-05-23 2021-12-02 游戏橘子数位科技股份有限公司 Methods for encrypting and decrypting group message, and method for transmitting message
CN111918285B (en) * 2020-06-17 2022-09-23 南京如般量子科技有限公司 Anti-quantum computing group communication method and system based on ID cryptography
CN112118267B (en) * 2020-09-25 2022-10-18 南方电网科学研究院有限责任公司 Anonymous communication method and related device
CN112423262B (en) * 2020-10-14 2024-05-14 北京汽车研究总院有限公司 Motorcade key negotiation method, storage medium and vehicle
CN112491540B (en) * 2020-11-13 2021-10-19 常熟理工学院 Anonymous wireless network data query implementation method
CN114980037A (en) * 2021-02-20 2022-08-30 南京如般量子科技有限公司 Group communication method and system based on asymmetric key pool with hierarchical structure
CN113923178B (en) * 2021-09-30 2024-02-27 在秀网络科技(深圳)有限公司 Method and system for storing and extracting instant messaging and group data files
CN114726545B (en) * 2022-03-02 2024-06-25 广州市悦智计算机有限公司 Encryption session maintaining method based on block chain decentralization group
CN115361222B (en) * 2022-08-26 2023-08-01 杭州安司源科技有限公司 Communication processing method, device and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104396183A (en) * 2012-05-29 2015-03-04 Abb技术股份公司 A method and system for transferring firmware or software to a plurality of devices

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7234063B1 (en) * 2002-08-27 2007-06-19 Cisco Technology, Inc. Method and apparatus for generating pairwise cryptographic transforms based on group keys
CN101465725A (en) * 2007-12-18 2009-06-24 中国电子科技集团公司第五十研究所 Key distribution method for public key system based on identification
CN104683291B (en) * 2013-11-27 2020-04-10 北京大唐高鸿数据网络技术有限公司 Session key negotiation method based on IMS system
CN104618110B (en) * 2015-01-15 2018-04-17 中国科学院信息工程研究所 A kind of VoIP security conferences session key transmission method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104396183A (en) * 2012-05-29 2015-03-04 Abb技术股份公司 A method and system for transferring firmware or software to a plurality of devices

Also Published As

Publication number Publication date
CN106850195A (en) 2017-06-13

Similar Documents

Publication Publication Date Title
CN106850195B (en) Group key negotiation and communication method in instant communication
US10237247B2 (en) User interface systems and methods for secure message oriented communications
CN104602238B (en) A kind of wireless network connecting method, device and system
CN104219051B (en) The communication means and system of a kind of inner group message
US20150244520A1 (en) One-time-pad data encryption with media server
EP2765734A1 (en) Encryption method, decryption method, and related device
CN105792190B (en) Data encryption, decryption and transmission method in communication system
CN106603504A (en) VoIP (Voice over Internet Protocol) encrypting and monitoring methods and VoIP encrypting and monitoring devices
CN106850522A (en) The implementation method of Group file encrypted transmission in a kind of instant messaging
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN109194701B (en) Data processing method and device
CN105208028A (en) Data transmission method and related device and equipment
CN102857889A (en) Method and device for encrypting short messages
CN108390755B (en) Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip
CN103067897A (en) Asymmetrical mobile phone short message encryption method
CN113300999A (en) Information processing method, electronic device, and readable storage medium
CN106878277B (en) Method and device for realizing voice encryption based on DMR standard
CN112291196B (en) End-to-end encryption method and system suitable for instant messaging
CN102523563B (en) Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN103997405A (en) Secret key generation method and device
CN106211146B (en) Adding method, information communicating method and call method and system are recorded in safety communication
KR101760376B1 (en) Terminal and method for providing secure messenger service
KR100931986B1 (en) Terminal and method for transmitting message and receiving message
WO2015156145A1 (en) Re-encryption method, re-encryption system, and re-encryption device
CN104243291A (en) Instant messaging method and system thereof capable of guaranteeing safety of user communication content

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200519