CN107623684A - The access method combined using ABAC model cootrols network service - Google Patents

The access method combined using ABAC model cootrols network service Download PDF

Info

Publication number
CN107623684A
CN107623684A CN201710805909.8A CN201710805909A CN107623684A CN 107623684 A CN107623684 A CN 107623684A CN 201710805909 A CN201710805909 A CN 201710805909A CN 107623684 A CN107623684 A CN 107623684A
Authority
CN
China
Prior art keywords
attribute
access
network service
mrow
rule table
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710805909.8A
Other languages
Chinese (zh)
Other versions
CN107623684B (en
Inventor
刘刚
柳佳雨
王义峰
张润南
纪少敏
崔娟
王荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201710805909.8A priority Critical patent/CN107623684B/en
Publication of CN107623684A publication Critical patent/CN107623684A/en
Application granted granted Critical
Publication of CN107623684B publication Critical patent/CN107623684B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention discloses a kind of access method for utilizing and being combined based on attribute access Controlling model ABAC control network services, it is intended to which, more to save the time, the mode for saving resource protects the sensitive information in network Services Composition not compromised, avoids it by unauthorized access.The present invention's concretely comprises the following steps:1. extracting attribute constraint from policy library, the distributed storage of attribute constraint is realized;2. a kind of access control mechanisms are proposed, the constraint of separate computations body attribute and environment attribute constraint.Present invention, avoiding influence of the unrelated strategy to the lookup time during access control in policy library, solves the problem of resource waste in network service combination invoked procedure, greatly reduces the average allocating time of network service combination.

Description

The access method combined using ABAC model cootrols network service
Technical field
The invention belongs to field of computer technology, further relates to one kind profit in computer network security technology field With improved based on attribute access Controlling model ABAC (Attribute Based Access Control) control network services Access method.The present invention, which can be used for conducting interviews to the process that access network services and network service combine, to be controlled to protect System sensitive information, network service combination is avoided by unauthorized access.
Background technology
Network service is mutually related a series of, and the operational set for completing some functions jointly is packaged, there is provided one Individual interface, network service access person can be by calling the interface access network services.Network service is in this way access Person provides service.In this high flexibility of network service, under high dynamic and cross-domain distributed environment, it is easy to cause quick Feel the leakage of information and the unauthorized access of resource.Can be to the access process of network service based on attribute access Controlling model ABAC It is controlled, using network service access person's attribute, the visit of network service attribute and environment attribute to being stored in policy library Ask that control strategy carries out the calculating of property value, realize fine granularity mandate, so as to avoid the non-of the leakage of sensitive information and resource Method accesses.Using being controlled based on attribute access Controlling model ABAC to the access process of network service, there are as below methods:
Paper " the Attributed based access control for that E.Yuan and J.Tong deliver at it Web services”(IEEE International Conference on Web Services,2005,2005:561- 569) a kind of access method for utilizing and network service being controlled based on attribute access Controlling model ABAC is proposed in.The tool of this method Body step is:First, simple object access protocol (Simple Object Access Protocal) client passes through master Body attribute authority (aa) gets the attribute of network service access person, and the attribute information of accessed network service access person is put into In soap message head, SOAP request message is sent to soap message processor.Second, soap message processor gets SOAP please After seeking message, SOAP request message is transmitted to policy decision point PDP (Policy Decision Point), PDP passes through acquisition The attribute of the Resource Properties arrived, environment attribute and the network service access person in SOAP request message calculate policing rule For value so as to draw the result of decision (allow or refuse), the result of decision is sent to soap message processor.3rd, if decision-making Result is to allow, then original SOAP request is passed to web service endpoint by soap message processor, to network service access Person provides service.Otherwise, soap message processor will refuse the access request of network service access person.It is insufficient existing for this method Part is:On the one hand, because the policy library based on attribute access Controlling model is huge, strategy can be caused to search the increase of time; On the other hand, when being combined due to access network services, the access process of each network service is mutually solely in network service combination Vertical and network service access process existence time retardance, therefore work as and utilize this method to carry out network service combined access During control, resource and waste of time can be caused.
Paper " Shen H, the Hong F.An Attribute-Based that H.Shen and F.Hong deliver at it Access Control Model for Web Services”(International Conference on Parallel and Distributed Computing,Applications and Technologies.IEEE,2006:Carried in 74-79) WS-ABAC models are gone out, and the sensitive attribute information of user are protected by automated trust negotiation mechanism.The specific step of this method Suddenly it is:First, network service access person sends SOAP request message to WS-ABAC modules.Second, WS-ABAC get network It is authoritative (Resource Authorities) according to resource after the request message of service access person, environment authority (Environment Authorities) and attribute authority (aa) (Attribute Authorities) get network service ginseng Count, the attribute of environment attribute and network service access person, then the policing rule in policy library calculates the result of decision. 3rd, if the result of decision is to allow, SOAP request message is sent to corresponding network service by WS-ABAC modules.Otherwise, WS-ABAC modules will refuse the access request of network service access person.In the method, the attribute of network service access person is direct Obtained by the context handler in WS-ABAC, eliminate the repeating process of attribute information, reduce the probability of attribute error. Weak point is existing for this method:On the one hand, the context handler in WS-ABAC only obtains web service parameter conduct Object attribute in ABAC models, object attribute type is very little, it is impossible to which the access to network service access person carries out fine-grained Control.On the other hand, when being combined due to access network services, the access process of each network service is phase in network service combination Mutual independent and network service access process existence time retardance, therefore visited when carrying out network service combination using this method During the control asked, resource and waste of time can be caused.
In summary, current prior art is the net asked using the attribute of the network service access person got The attribute and environment attribute of network service, the policing rule in policy library calculate the result of decision, then according to decision-making knot Fruit authorizes to network service access person.But it is network service access person that current this mode, which is only applicable to single network service, The situation of service is provided.During network service request, if in service discovery stage (service discovery Phase) do not find and meet the single network service of user's request it is necessary to enter Services Composition stage (service Composition phase), multiple network services are subjected to Automatic Combined, provide the user with service jointly.If with existing Technology controls the access that network services combine, when one in Services Composition service is due to body attribute, object attribute or ring Border attribute is unsatisfactory for policing rule and refuses to provide the user service, then the network service applied just all wastes.This is just Cause a large amount of wastes of time and resource.
The content of the invention
It is an object of the invention to for above-mentioned the deficiencies in the prior art, propose a kind of using based on attribute access control mould Type ABAC controls the access method of network service, it is intended to which, with the time is more saved, the mode for saving resource is protected in network service Sensitive information is not compromised, avoids it by unauthorized access.
Realizing the thinking of the object of the invention is, first to being improved based on attribute access Controlling model ABAC, proposes one The new tactful method for expressing of kind, and access control policy is subjected to distributed storage, to save the time of strategy retrieval.It is in addition The time during network service access and the waste of resource are reduced, proposes a kind of new strategic decision-making mechanism, it is right in two steps Network service conducts interviews control decision.
The method of the present invention, including step are as follows:
(1) the access control watch chain of network service combination to be controlled is obtained:
(1a) extracts all nets in network service combination to be visited from based on attribute access Controlling model ABAC policy librarys Body attribute constraint and environment attribute constraint in network Service Properties constraint definition;
(1b) constrains body attribute constraint and environment attribute, is stored respectively in each net in network service combination to be visited In the access rule table of network service;
The access rule table of all-network service is put into access rule watch chain by (1c), and access rule watch chain represents networking The set of access rule table corresponding to all-network service in Services Composition;
(2) an access rule table is chosen:
Put in order from access rule watch chain according to set and choose an access rule table;
(3) according to the following formula, the body attribute constraint factor in selected access rule table is calculated:
Wherein, C represents the body attribute constraint factor in selected access rule table, the meter of body attribute constraint factor The sum that body attribute constrains in the access rule table that result is 0 or 1, n expression are selected is calculated, ∪ is represented or operation, SjRepresent J-th of body attribute constraint in selected access rule table;
(4) judge whether the body attribute constraint factor in selected access rule table is 0, if so, then refusing network The access request of service access person, perform step (10);Otherwise, step (5) is performed;
(5) the environment attribute constraint factor in selected access rule table is obtained:
According to the following formula, the body attribute that each result of calculation in selected access rule table is 1 is constrained corresponding Environment attribute constraint is combined:
Wherein, G represents the environment attribute constraint factor of access rule table, and the result of calculation of environment attribute constraint factor is 0 Or 1, m represent the sum of environment attribute constraint in access rule table, EiRepresent i-th of environment attribute constraint in access rule table;
(6) judge whether access rule table is last in access control rule watch chain, if so, then performing step (7);Otherwise, step (2) is performed;
(7) all environment attribute constraint factors are put into environment attribute constraint chain, environment attribute constraint chain represents all The set of the environment attribute constraint factor of access rule table;
(8) put in order from network service combination according to network service and choose a network service;
(9) environment attribute constraint factor corresponding to selected network service is calculated;
(10) judge whether environment attribute constraint factor is 0, if so, then refuse the access request of network service access person, Perform step (13);Otherwise, step (11) is performed;
(11) selected network service is accessed;
(12) judge whether selected network service is last in network service combination, if so, performing step (13);Otherwise, step (8) is performed;
(13) whole access process is terminated.
The present invention has the following advantages that compared with prior art:
First, the present invention is overcome using the access based on attribute access Controlling model ABAC control network service combinations The mutual independence and time delay of each network service access during prior art is combined due to network service, when easily causing Between and the wasting of resources deficiency so that the present invention be applied to control network service combine access process, solve network clothes The waste problem of resource under business combination environment, greatly reduces the mean access time of network service combination, and its performance obtains Very big lifting.
Second, the present invention constrains body attribute constraint and environment attribute, is stored respectively in network service combination to be visited In each network service access rule table in, overcome prior art due to based in attribute access Controlling model ABAC due to The huge caused strategy of policy library searches the deficiency of waste of time so that the present invention realizes point of access control policy Cloth stores, and avoids the influence that the unrelated strategy in policy library searches strategy during access control the time, greatly reduces It is tactful to search the time and the influence of time is searched strategy in policy library expansion.
Brief description of the drawings
Fig. 1 is the flow chart of the inventive method.
Embodiment
1 couple of present invention is described further below in conjunction with the accompanying drawings.
Step 1, the access control watch chain of network service combination to be visited is obtained.
From based on attribute access Controlling model ABAC policy librarys, extract all-network in network service combination to be visited and take Body attribute constraint during business attribute constraint defines constrains with environment attribute.
Attribute constraint is defined as follows:
D=< AT > < OP > < VALUE >
Wherein, D expressions attribute type expression formula, < AT > expression attribute types, < OP > expressions≤, >=, <, >, =,!=collection close in a logical operator, this set can by user add custom logic operator, < VALUE > tables Show property value, F represents attribute constraint minor, and x represents the sum of attribute type expression formula, DpRepresent p-th of attribute type expression Formula, T represent attribute constraint, and the result of calculation of attribute constraint is 0 or 1, y represent the sum of attribute constraint minor, FqRepresent q-th Attribute constraint minor.
If the attribute type in attribute constraint is body attribute type, the attribute constraint is referred to as body attribute about Beam, if the attribute type in attribute constraint is environment attribute type, the attribute constraint is referred to as environment attribute constraint.
By body attribute constraint and environment attribute constraint, each network clothes in network service combination to be visited are stored respectively in In the access rule table of business.
Access rule table is as follows:
Label Body attribute constrains Environment attribute constrains
1 S1 E1
2 S2 E2
3 S3 E3
…… …… ……
n Sn En
S in table1, S2, S3... ..., Sn, respectively the 1st in expression access rule table, the 2nd ... ..., n-th of main body Attribute constraint, E1, E2, E3... ..., En, 1st is represented in access rule table respectively, and the 2nd ... ..., n-th of environment attribute is about Beam.Every a line in access rule table represents an access control policy.Represent when body attribute constraint and environment attribute constraint When being 1, network service access person may have access to network service corresponding to the access rule table.
The access rule table of all-network service is put into access rule watch chain, access rule watch chain represents network service The set of access rule table corresponding to all-network service, the expression according to the following formula of access rule watch chain in combination:
L=[A1,A2,...,At]
Wherein, L represents access rule watch chain, A1,A2,...,AtRespectively the 1st in the combination of expression network service, the 2nd It is individual ... ..., the access rule table corresponding to t-th of network service.
Step 2, an access rule table is chosen.
Put in order from access rule watch chain according to set and choose an access rule table.
Step 3, according to the following formula, the body attribute constraint factor in selected access rule table is calculated:
Wherein, C represents the body attribute constraint factor in selected access rule table, the meter of body attribute constraint factor Calculate the sum that body attribute constrains in the access rule table that result is 0 or 1, n expression are selected, SjRepresent selected access rule Then j-th of body attribute constraint in table.
Step 4, judge whether the body attribute constraint factor in selected access rule table is 0, if so, then refusing net The access request of network service access person, perform step 13;Otherwise, step 5 is performed.
Step 5, the environment attribute constraint factor in selected access rule table is obtained.
According to the following formula, each value in selected access rule table is constrained into corresponding environment category for 1 body attribute Property constraint be combined:
Wherein, G represents the environment attribute constraint factor of access rule table, and the result of calculation of environment attribute constraint factor is 0 Or 1, m represent the sum of environment attribute constraint in access rule table, EiRepresent i-th of environment attribute constraint in access rule table.
Step 6, judge whether access rule table is last in access control rule watch chain, if so, then performing step Rapid 7;Otherwise, step 2 is performed.
Step 7, all environment attribute constraint factors are put into environment attribute constraint chain, environment attribute constraint chain represents institute There is the set of the environment attribute constraint factor of access control list, environment attribute constrains the expression according to the following formula of chain:
R=[G1,G2,...,Gw]
Wherein, R represents environment attribute constraint chain, G1,G2,...,GwRespectively the 1st in the combination of expression network service, the 2nd It is individual ... ..., the environment attribute constraint factor of the access rule table corresponding to w-th of network service.
Step 8, put in order from network service combination according to network service and choose a network service.
Step 9, environment attribute constraint factor corresponding to selected network service is calculated.
Step 10, judge whether environment attribute constraint factor is 0, if so, the access for then refusing network service access person please Ask, perform step 13;Otherwise, step 11 is performed.
Step 11, selected network service is accessed.
Step 12, judge whether selected network service is last in network service combination, if so, performing step Rapid 13;Otherwise, step 8 is performed.
Step 13, whole access process is terminated.

Claims (2)

1. it is a kind of using the access method based on attribute access Controlling model ABAC control network service combinations, it is characterized in that, bag Include following steps:
(1) the access control watch chain of network service combination to be visited is obtained:
(1a) extracts all-network in network service combination to be visited and taken from based on attribute access Controlling model ABAC policy librarys Body attribute constraint during business attribute constraint defines constrains with environment attribute;
(1b) constrains body attribute constraint and environment attribute, is stored respectively in each network clothes in network service combination to be visited In the access rule table of business;
The access rule table of all-network service is put into access rule watch chain by (1c), and access rule watch chain represents network service The set of access rule table corresponding to all-network service in combination;
(2) an access rule table is chosen:
Put in order from access rule watch chain according to set and choose an access rule table;
(3) according to the following formula, the body attribute constraint factor in selected access rule table is calculated:
<mrow> <mi>C</mi> <mo>=</mo> <munderover> <mrow> <mi></mi> <mo>&amp;cup;</mo> </mrow> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>n</mi> </munderover> <msub> <mi>S</mi> <mi>j</mi> </msub> </mrow>
Wherein, C represents the body attribute constraint factor in selected access rule table, the calculating knot of body attribute constraint factor The sum that body attribute constrains in the access rule table that fruit is 0 or 1, n expression are selected, ∪ is represented or operation, SjSelected by expression J-th of body attribute constraint in the access rule table taken;
(4) judge whether the body attribute constraint factor in selected access rule table is 0, if so, then refusing network service The access request of visitor, perform step (10);Otherwise, step (5) is performed;
(5) the environment attribute constraint factor in selected access rule table is obtained:
According to the following formula, the body attribute that each result of calculation in selected access rule table is 1 is constrained into corresponding environment Attribute constraint is combined:
<mrow> <mi>G</mi> <mo>=</mo> <munderover> <mrow> <mi></mi> <mo>&amp;cup;</mo> </mrow> <mrow> <mi>i</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>m</mi> </munderover> <msub> <mi>E</mi> <mi>i</mi> </msub> </mrow>
Wherein, G represents the environment attribute constraint factor of access rule table, and the result of calculation of environment attribute constraint factor is 0 or 1, m Represent the sum of environment attribute constraint in access rule table, EiRepresent i-th of environment attribute constraint in access rule table;
(6) judge whether access rule table is last in access control rule watch chain, if so, then performing step (7);It is no Then, step (2) is performed;
(7) all environment attribute constraint factors are put into environment attribute constraint chain, environment attribute constraint chain represents all access The set of the environment attribute constraint factor of rule list;
(8) put in order from network service combination according to network service and choose a network service;
(9) environment attribute constraint factor corresponding to selected network service is calculated;
(10) judge whether environment attribute constraint factor is 0, if so, then refusing the access request of network service access person, perform Step (13);Otherwise, step (11) is performed;
(11) selected network service is accessed;
(12) judge whether selected network service is last in network service combination, if so, performing step (13); Otherwise, step (8) is performed;
(13) whole access process is terminated.
2. the access method according to claim 1 based on attribute access Controlling model ABAC control network service combinations, Characterized in that, the attribute constraint described in step (1a) is defined as follows:
D=< AT > < OP > < VALUE >
<mrow> <mi>F</mi> <mo>=</mo> <munderover> <mrow> <mi></mi> <mo>&amp;cap;</mo> </mrow> <mrow> <mi>p</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>x</mi> </munderover> <msub> <mi>D</mi> <mi>p</mi> </msub> </mrow>
<mrow> <mi>T</mi> <mo>=</mo> <munderover> <mrow> <mi></mi> <mo>&amp;cup;</mo> </mrow> <mrow> <mi>q</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>y</mi> </munderover> <msub> <mi>F</mi> <mi>q</mi> </msub> </mrow>
Wherein, D expressions attribute type expression formula, < AT > expression attribute types, < OP > expressions≤, >=, <, > ,=,!= A logical operator in set, the set can be added custom logic operator by user, and < VALUE > represent attribute Value, F represent attribute constraint minor, and x represents the sum of attribute type expression formula, DpRepresent p-th of attribute type expression formula, T tables Show attribute constraint, the result of calculation of attribute constraint is 0 or 1, y represent the sum of attribute constraint minor, FqRepresent q-th of attribute about Beam minor.
CN201710805909.8A 2017-09-08 2017-09-08 Method for controlling access of network service combination by using ABAC model Active CN107623684B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710805909.8A CN107623684B (en) 2017-09-08 2017-09-08 Method for controlling access of network service combination by using ABAC model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710805909.8A CN107623684B (en) 2017-09-08 2017-09-08 Method for controlling access of network service combination by using ABAC model

Publications (2)

Publication Number Publication Date
CN107623684A true CN107623684A (en) 2018-01-23
CN107623684B CN107623684B (en) 2020-02-21

Family

ID=61089807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710805909.8A Active CN107623684B (en) 2017-09-08 2017-09-08 Method for controlling access of network service combination by using ABAC model

Country Status (1)

Country Link
CN (1) CN107623684B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108712369A (en) * 2018-03-29 2018-10-26 中国工程物理研究院计算机应用研究所 A kind of more attribute constraint access control decision system and method for industrial control network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2631841A2 (en) * 2012-02-27 2013-08-28 Axiomatics AB Provisioning authorization claims using attribute-based access-control policies
CN103795688A (en) * 2012-10-31 2014-05-14 中国航天科工集团第二研究院七○六所 Attribute-based fuzzy access control calculation method
CN104683362A (en) * 2015-03-27 2015-06-03 合肥工业大学 Access control system and access control method of fine-grained privacy security
CN104735055A (en) * 2015-02-12 2015-06-24 河南理工大学 Cross-domain security access control method based on credibility
US20160248777A1 (en) * 2014-10-20 2016-08-25 International Business Machines Corporation Policy access control lists attached to resources

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2631841A2 (en) * 2012-02-27 2013-08-28 Axiomatics AB Provisioning authorization claims using attribute-based access-control policies
CN103795688A (en) * 2012-10-31 2014-05-14 中国航天科工集团第二研究院七○六所 Attribute-based fuzzy access control calculation method
US20160248777A1 (en) * 2014-10-20 2016-08-25 International Business Machines Corporation Policy access control lists attached to resources
CN104735055A (en) * 2015-02-12 2015-06-24 河南理工大学 Cross-domain security access control method based on credibility
CN104683362A (en) * 2015-03-27 2015-06-03 合肥工业大学 Access control system and access control method of fine-grained privacy security

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108712369A (en) * 2018-03-29 2018-10-26 中国工程物理研究院计算机应用研究所 A kind of more attribute constraint access control decision system and method for industrial control network
CN108712369B (en) * 2018-03-29 2022-01-07 中国工程物理研究院计算机应用研究所 Multi-attribute constraint access control decision system and method for industrial control network

Also Published As

Publication number Publication date
CN107623684B (en) 2020-02-21

Similar Documents

Publication Publication Date Title
CN104580027B (en) A kind of OpenFlow message forwarding methods and equipment
CN109067579B (en) 5G network slice topology design and reliable mapping method for failure of bottom node
CN104243337B (en) A kind of method and device across cluster load balance
CN103905311B (en) Flow table matching method and device and switch
CN103902646B (en) Distributed task managing system and method
CN102541858B (en) Based on mapping and the data balancing processing method of stipulations, Apparatus and system
CN102904955B (en) The self-adapting stretching control system of Web application in cloud computing platform and method thereof
CN107679849A (en) Payment channel selection method and system and computer readable storage medium
CN107005485A (en) A kind of method, corresponding intrument and system for determining route
CN108108825A (en) Finding method, server and the O&M end of fault car
CN109150572A (en) Realize the method, apparatus and computer readable storage medium of alarm association
CN106127038A (en) The processing method of a kind of blacklist and system
CN104836810A (en) Coordinated detection method of NDN low-speed cache pollution attack
CN109561403A (en) A kind of short message dispatching method, equipment and storage medium
WO2023093238A1 (en) Method and apparatus for performing service processing by using learning model
CN110061881A (en) A kind of energy consumption perception virtual network mapping algorithm based on Internet of Things
CN106572116A (en) Role-and-attribute-based cross-domain secure switch access control method of integrated network
CN108353022A (en) A kind of processing method of data message, apparatus and system
CN108259238A (en) The method that network function service chaining maps in data center
CN110855424B (en) Method and device for synthesizing asymmetric flow xDR in DPI field
CN107317890A (en) A kind of data transfer implementation method of intelligent vehicle contained network
CN106131141A (en) A kind of distributed type assemblies load balancing parallel dispatch system and method
CN106502779B (en) A kind of task immigration method of the load judgment method based on NoC multicore isomorphism system
CN107623684A (en) The access method combined using ABAC model cootrols network service
CN109787836A (en) Based on the determination method and device of the VNF scheduling scheme of genetic algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant