CN108134799A - Novel encipher-decipher method and its device - Google Patents
Novel encipher-decipher method and its device Download PDFInfo
- Publication number
- CN108134799A CN108134799A CN201810049121.3A CN201810049121A CN108134799A CN 108134799 A CN108134799 A CN 108134799A CN 201810049121 A CN201810049121 A CN 201810049121A CN 108134799 A CN108134799 A CN 108134799A
- Authority
- CN
- China
- Prior art keywords
- ciphertext
- module
- encrypted
- deciphering
- decrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Document Processing Apparatus (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a kind of novel encipher-decipher method, including encrypting and decrypting;Encryption includes obtaining Encryption Algorithm and compiles encrypting module;Obtain the Encryption Algorithm in plain text and selected;To being encrypted in plain text;Decryption includes obtaining decipherment algorithm and compiles deciphering module;Obtain ciphertext;Deciphering module is selected to decrypt ciphertext.The present invention also provides the device for realizing the novel encipher-decipher method, including input module, encrypting module, deciphering module and display module;Input module input needs the text encrypted or decrypted, and is encrypted by encrypting module or is decrypted, and show and export by display module by deciphering module.The present invention encrypts legal effective word in name text by identification, and the statistical law according to ciphertext in each decipherment algorithm, it can be to being encrypted in plain text, or Automatic-searching decipherment algorithm is decrypted, therefore the method for the present invention and its device are enough suitable for a plurality of types of enciphering and deciphering algorithms, and fault-tolerant ability is strong.
Description
Technical field
Present invention relates particularly to a kind of novel encipher-decipher method and its devices.
Background technology
With the development and the improvement of people's living standards of national economy technology, people are for the protective awareness of personal information
Also it is increasingly stronger, and enterprise-like corporation etc. is also higher and higher for the security requirements of core business and data.With Internet era,
Intelligent epoch and the arriving of cloud era, the safety in data transmission procedure are also increasingly valued by people.
Encryption and decryption are one of essential links in privacy procedure.In order to improve the safety of message transmitting procedure
Property, all the content of transmission can be encrypted during information is transmitted for most of webpage.There is lock necessarily to have key, decrypt
Also become the important topic studied in information security.Although present cipher mode huge number, considers
Safety and execution efficiency, common encrypting web mode only have Url, Hex, Base64, MD5 etc. several.
The encryption and decryption tool of current same type existing on the market, although huge number, and all contain common
The encryption and decryption functions of encryption and decryption mode.But in actual use, user experience is often poor, and main cause is:Fault-tolerant ability is not
By force, and when needing the ciphertext decryption to multi-enciphering it operates excessively cumbersome.
Invention content
One of the objects of the present invention is to provide one kind can be suitable for a plurality of types of enciphering and deciphering algorithms, and fault-tolerant energy
The strong novel encipher-decipher method of power.
The second object of the present invention is to provide a kind of device for realizing the novel encipher-decipher method.
This novel encipher-decipher method provided by the invention, including ciphering process and decrypting process:
Ciphering process includes the following steps:
S1. all types of Encryption Algorithm are obtained, and Encryption Algorithm is compiled into corresponding encrypting module;
S2. obtaining needs encrypted plaintext, and is selected in the encrypting module obtained in step sl by user a kind of;
S3. the plaintext of acquisition is encrypted in the encrypting module of invocation step S2 selections, so as to obtain encrypted ciphertext;
Decrypting process includes the following steps:
A. all types of decipherment algorithms is obtained, and decipherment algorithm is compiled into corresponding deciphering module;
B. the ciphertext for needing to decrypt is obtained;
C. corresponding deciphering module is chosen;
D. ciphertext is decrypted in the deciphering module of invocation step C selections, so as to the plaintext after being decrypted.
Encryption Algorithm described in step S1, specifically includes URL Encryption Algorithm, HEX Encryption Algorithm, BASE64 Encryption Algorithm,
UNI Encryption Algorithm, MD5x16 Encryption Algorithm, MD5x32 Encryption Algorithm, Caesar substitution Encryption Algorithm and rail fence cipher Encryption Algorithm.
The encrypting module is specially encrypted to being encrypted in plain text using following principle:
R1. if desired encrypted plaintext meets the input rule of encrypting module, then encrypting module directly to adding in plain text
It is close;
R2. if desired encrypted plaintext does not meet the input rule of encrypting module, then encrypting module is in the plaintext of input
The part for meeting input rule is encrypted, and encrypted result is shown in plain text.
Decipherment algorithm described in step A, specifically includes URL decipherment algorithms, HEX decipherment algorithms, BASE64 decipherment algorithms,
UNI decipherment algorithms, MD5x16 decipherment algorithms and MD5x32 decipherment algorithms.
The ciphertext according to acquisition described in step C automatically selects a kind of deciphering module, is specially selected using following rule
Corresponding deciphering module:
If r1. user has clearly selected a kind of deciphering module, it is decrypted using the deciphering module;
If r2. user does not select deciphering module clearly, deciphering module is chosen using following steps:
A. it obtains II yard of the ASC of the ciphertext of input, and each character in II yard of ASC is counted;
B. according to II yard of the ASC counted in step a, corresponding deciphering module is chosen using following rule and is decrypted:
If in II yard of the ASC of ciphertext, " % " accounting is more than 1/3rd, then assert that the ciphertext is encrypted by URL Encryption Algorithm,
Deciphering module chooses URL deciphering modules;
If II yard of the ASC of ciphertext, started with " 0x ", and 90% character is 0~9 and A~F, then assert the ciphertext by HEX
Encryption Algorithm is encrypted, and deciphering module chooses HEX decipherment algorithms;
If in II yard of the ASC of ciphertext, total accounting of capitalization and lowercase be more than 60% or ciphertext with one
Or two "=" number terminates, then assert that the ciphertext is encrypted by BASE64 Encryption Algorithm, deciphering module chooses BASE64 decipherment algorithms;
If II yard of the ASC of ciphertext, all numbers or space then assert that the ciphertext is encoded for ASC II;
If in II yard of the ASC of ciphertext, using " u00 " as separator, then assert that the ciphertext is encrypted by UNI Encryption Algorithm, solve
Close module chooses UNI decipherment algorithms;
If II yard of the ASC of ciphertext, length is 16, and character is 0~9 and A~F, then assert the ciphertext by MD5x16
Decipherment algorithm Encryption Algorithm is encrypted, and deciphering module chooses MD5x16 decipherment algorithms;
If II yard of the ASC of ciphertext, length is 32, and character is 0~9 and A~F, then assert the ciphertext by MD5x32
Encryption Algorithm is encrypted, and deciphering module chooses MD5x32 decipherment algorithms.
Described in step D invocation step C selection deciphering module ciphertext is decrypted, specially using following steps into
Row decryption:
(1) deciphering module chosen according to step C, is checked and is screened to ciphertext content;
(2) ciphertext obtained to step (1) is decrypted using the step C deciphering modules chosen;
(3) if ciphertext can not be decrypted in selected deciphering module, directly original cipher text is returned, and prompt user
It can not determine that the ciphertext encodes.
The invention also discloses a kind of device for realizing the novel encipher-decipher method, including input module, encrypting module,
Deciphering module and display module;The text that input module needs to encrypt or decrypt for input;Encrypting module is used for will be from input
The text of module input is encrypted, and deciphering module for the text inputted from input module to be decrypted, use by display module
It is shown and is exported in by the text encrypted or decrypted.
This novel encipher-decipher method and its device provided by the invention legal in encrypting plaintext have by identifying
Imitate the statistical law of word and II yard of the ASC according to ciphertext in each decipherment algorithm, can to being encrypted in plain text or
The word Automatic-searching decipherment algorithm decrypted to needs is decrypted, therefore the method for the present invention and its device are enough suitable for multiple types
The enciphering and deciphering algorithm of type, and fault-tolerant ability is strong.
Description of the drawings
Fig. 1 is the encryption flow figure of the method for the present invention.
Fig. 2 is the decryption flow chart of the method for the present invention.
Fig. 3 is the functional block diagram of apparatus of the present invention.
Specific embodiment
It is the encryption flow figure of the method for the present invention as shown in Figure 1:Ciphering process includes the following steps:
S1. all types of Encryption Algorithm are obtained, and Encryption Algorithm is compiled into corresponding encrypting module;In the specific implementation,
Encryption Algorithm includes URL Encryption Algorithm, HEX Encryption Algorithm, BASE64 Encryption Algorithm, UNI Encryption Algorithm, MD5x16 encryption calculations
Method, MD5x32 Encryption Algorithm, Caesar substitution Encryption Algorithm and rail fence cipher Encryption Algorithm etc.;
S2. obtaining needs encrypted plaintext, and is selected in the encrypting module obtained in step sl by user a kind of;
S3. the plaintext of acquisition is encrypted in the encrypting module of invocation step S2 selections, so as to obtain encrypted ciphertext,
Specially it is encrypted using following rule:
R1. if desired encrypted plaintext meets the input rule of encrypting module, then encrypting module directly to adding in plain text
It is close;
R2. if desired encrypted plaintext does not meet the input rule of encrypting module, then encrypting module is in the plaintext of input
The part for meeting input rule is encrypted, and encrypted result is shown in plain text.
It is illustrated in figure 2 the decryption flow chart of the method for the present invention:Decrypting process includes the following steps:
A. all types of decipherment algorithms is obtained, and decipherment algorithm is compiled into corresponding deciphering module;In the specific implementation,
Decipherment algorithm specifically includes URL decipherment algorithms, HEX decipherment algorithms, BASE64 decipherment algorithms, UNI decipherment algorithms, MD5x16 decryption
Algorithm and MD5x32 decipherment algorithms etc.;
B. the ciphertext for needing to decrypt is obtained;
C. corresponding deciphering module is chosen, corresponding deciphering module is specially selected using following rule:
If r1. user has clearly selected a kind of deciphering module, it is decrypted using the deciphering module;
If r2. user does not select deciphering module clearly, deciphering module is chosen using following steps:
A. it obtains II yard of the ASC of the ciphertext of input, and each character in II yard of ASC is counted;
B. according to II yard of the ASC counted in step a, corresponding deciphering module is chosen using following rule and is decrypted:
If in II yard of the ASC of ciphertext, " % " accounting is more than 1/3rd, then assert that the ciphertext is encrypted by URL Encryption Algorithm,
Deciphering module chooses URL deciphering modules;
If II yard of the ASC of ciphertext, started with " 0x ", and 90% character is 0~9 and A~F, then assert the ciphertext by HEX
Encryption Algorithm is encrypted, and deciphering module chooses HEX decipherment algorithms;
If in II yard of the ASC of ciphertext, total accounting of capitalization and lowercase be more than 60% or ciphertext with one
Or two "=" number terminates, then assert that the ciphertext is encrypted by BASE64 Encryption Algorithm, deciphering module chooses BASE64 decipherment algorithms;
If II yard of the ASC of ciphertext, all numbers or space then assert that the ciphertext is encoded for ASC II;
If in II yard of the ASC of ciphertext, using " u00 " as separator, then assert that the ciphertext is encrypted by UNI Encryption Algorithm, solve
Close module chooses UNI decipherment algorithms;
If II yard of the ASC of ciphertext, length is 16, and character is 0~9 and A~F, then assert the ciphertext by MD5x16
Decipherment algorithm Encryption Algorithm is encrypted, and deciphering module chooses MD5x16 decipherment algorithms;
If II yard of the ASC of ciphertext, length is 32, and character is 0~9 and A~F, then assert the ciphertext by MD5x32
Encryption Algorithm is encrypted, and deciphering module chooses MD5x32 decipherment algorithms;
D. ciphertext is decrypted in the deciphering module of invocation step C selections, so as to the plaintext after being decrypted;Specially adopt
It is decrypted with following steps:
(1) deciphering module chosen according to step C, is checked and is screened to ciphertext content;
(2) ciphertext obtained to step (1) is decrypted using the step C deciphering modules chosen;
Step (1) and (2) in the specific implementation, it acts as:The deciphering module chosen using step C, to energy in ciphertext
The cipher text part being enough decrypted is decrypted, and remaining part can not then decrypt and directly return to ciphertext, and notifies user;
(3) if ciphertext can not be decrypted in selected deciphering module, directly original cipher text is returned, and prompt user
It can not determine that the ciphertext encodes.
The functional block diagram of the device of the novel encipher-decipher method of the present invention is illustrated in figure 3, including input module, encryption
Module, deciphering module and display module;The text that input module needs to encrypt or decrypt for input;Encrypting module is for will be from
The text of input module input is encrypted, and deciphering module shows mould for the text inputted from input module to be decrypted
Block is used to encrypt or the text of decryption is shown and exported.
Claims (7)
1. a kind of novel encipher-decipher method, including ciphering process and decrypting process:
Ciphering process includes the following steps:
S1. all types of Encryption Algorithm are obtained, and Encryption Algorithm is compiled into corresponding encrypting module;
S2. obtaining needs encrypted plaintext, and is selected in the encrypting module obtained in step sl by user a kind of;
S3. the plaintext of acquisition is encrypted in the encrypting module of invocation step S2 selections, so as to obtain encrypted ciphertext;
Decrypting process includes the following steps:
A. all types of decipherment algorithms is obtained, and decipherment algorithm is compiled into corresponding deciphering module;
B. the ciphertext for needing to decrypt is obtained;
C. corresponding deciphering module is chosen;
D. ciphertext is decrypted in the deciphering module of invocation step C selections, so as to the plaintext after being decrypted.
2. novel encipher-decipher method according to claim 1, it is characterised in that the Encryption Algorithm described in step S1 is specific to wrap
Include URL Encryption Algorithm, HEX Encryption Algorithm, BASE64 Encryption Algorithm, UNI Encryption Algorithm, MD5x16 Encryption Algorithm, MD5x32 adds
Close algorithm, Caesar substitution Encryption Algorithm and rail fence cipher Encryption Algorithm.
3. novel encipher-decipher method according to claim 2, it is characterised in that the encrypting module to adding in plain text
It is close, specially it is encrypted using following principle:
R1. if desired encrypted plaintext meets the input rule of encrypting module, then encrypting module directly to being encrypted in plain text;
R2. if desired encrypted plaintext does not meet the input rule of encrypting module, then encrypting module in the plaintext of input to meeting
The part of input rule is encrypted, and encrypted result is shown in plain text.
4. the novel encipher-decipher method according to one of claims 1 to 3, it is characterised in that the decipherment algorithm described in step A,
Specifically include URL decipherment algorithms, HEX decipherment algorithms, BASE64 decipherment algorithms, UNI decipherment algorithms, MD5x16 decipherment algorithms and
MD5x32 decipherment algorithms.
5. novel encipher-decipher method according to claim 4, it is characterised in that the ciphertext according to acquisition described in step C is certainly
A kind of dynamic deciphering module of selection, specially selects corresponding deciphering module using following rule:
If r1. user has clearly selected a kind of deciphering module, it is decrypted using the deciphering module;
If r2. user does not select deciphering module clearly, deciphering module is chosen using following steps:
A. it obtains II yard of the ASC of the ciphertext of input, and each character in II yard of ASC is counted;
B. according to II yard of the ASC counted in step a, corresponding deciphering module is chosen using following rule and is decrypted:
If in II yard of the ASC of ciphertext, " % " accounting is more than 1/3rd, then assert that the ciphertext is encrypted by URL Encryption Algorithm, decrypt
Module chooses URL deciphering modules;
If II yard of the ASC of ciphertext, started with " 0x ", and 90% character is 0~9 and A~F, then assert that the ciphertext is encrypted by HEX
Algorithm for encryption, deciphering module choose HEX decipherment algorithms;
If in II yard of the ASC of ciphertext, total accounting of capitalization and lowercase be more than 60% or ciphertext with one or two
A "=" number terminates, then assert that the ciphertext is encrypted by BASE64 Encryption Algorithm, and deciphering module chooses BASE64 decipherment algorithms;
If II yard of the ASC of ciphertext, all numbers or space then assert that the ciphertext is encoded for ASC II;
If in II yard of the ASC of ciphertext, using " u00 " as separator, then assert that the ciphertext is encrypted by UNI Encryption Algorithm, mould is decrypted
Block chooses UNI decipherment algorithms;
If II yard of the ASC of ciphertext, length is 16, and character is 0~9 and A~F, then assert that the ciphertext is decrypted by MD5x16
Algorithm for encryption algorithm for encryption, deciphering module choose MD5x16 decipherment algorithms;
If II yard of the ASC of ciphertext, length is 32, and character is 0~9 and A~F, then assert that the ciphertext is encrypted by MD5x32
Algorithm for encryption, deciphering module choose MD5x32 decipherment algorithms.
6. novel encipher-decipher method according to claim 5, it is characterised in that the invocation step C described in step D was selected
Ciphertext is decrypted in deciphering module, is specially decrypted using following steps:
(1) deciphering module chosen according to step C, is checked and is screened to ciphertext content;
(2) ciphertext obtained to step (1) is decrypted using the step C deciphering modules chosen;
(3) if ciphertext can not be decrypted in selected deciphering module, directly original cipher text is returned, and prompt user can not
Determine that the ciphertext encodes.
7. a kind of device for realizing the novel encipher-decipher method described in one of claim 1~6 including input module, adds
Close module, deciphering module and display module;The text that input module needs to encrypt or decrypt for input;Encrypting module is used for will
The text inputted from input module is encrypted, and deciphering module shows for the text inputted from input module to be decrypted
Module is used to encrypt or the text of decryption is shown and exported.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810049121.3A CN108134799B (en) | 2018-01-18 | 2018-01-18 | Novel coding and decoding method and device thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810049121.3A CN108134799B (en) | 2018-01-18 | 2018-01-18 | Novel coding and decoding method and device thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108134799A true CN108134799A (en) | 2018-06-08 |
CN108134799B CN108134799B (en) | 2021-06-22 |
Family
ID=62399817
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810049121.3A Active CN108134799B (en) | 2018-01-18 | 2018-01-18 | Novel coding and decoding method and device thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108134799B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109818969A (en) * | 2019-03-06 | 2019-05-28 | 电子科技大学成都学院 | Cryptographic algorithm encrypting and deciphering system |
CN110287147A (en) * | 2019-06-27 | 2019-09-27 | 北京奇艺世纪科技有限公司 | A kind of character string sorting method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101626293A (en) * | 2008-07-09 | 2010-01-13 | 上海格尔软件股份有限公司 | Method for encryption protection and decryption of data |
US20140208099A1 (en) * | 2013-01-21 | 2014-07-24 | Alcatel-Lucent Canada Inc. | Service plane encryption in ip/mpls networks |
CN105553934A (en) * | 2015-12-01 | 2016-05-04 | 辽宁中科信科技有限公司 | EAB universal coding and decoding method on the basis of cloud platform SAAS layer |
CN106357608A (en) * | 2016-08-19 | 2017-01-25 | 银江股份有限公司 | Method for encrypting and decrypting private data for personal healthcare data |
CN106385313A (en) * | 2016-09-08 | 2017-02-08 | 四川长虹电器股份有限公司 | Random cryptograph system based on grouping encryption algorithm and realization method thereof |
CN106789053A (en) * | 2016-12-13 | 2017-05-31 | 四川长虹电器股份有限公司 | Random ciphertext generation method and system, decryption method and system |
-
2018
- 2018-01-18 CN CN201810049121.3A patent/CN108134799B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101626293A (en) * | 2008-07-09 | 2010-01-13 | 上海格尔软件股份有限公司 | Method for encryption protection and decryption of data |
US20140208099A1 (en) * | 2013-01-21 | 2014-07-24 | Alcatel-Lucent Canada Inc. | Service plane encryption in ip/mpls networks |
CN105553934A (en) * | 2015-12-01 | 2016-05-04 | 辽宁中科信科技有限公司 | EAB universal coding and decoding method on the basis of cloud platform SAAS layer |
CN106357608A (en) * | 2016-08-19 | 2017-01-25 | 银江股份有限公司 | Method for encrypting and decrypting private data for personal healthcare data |
CN106385313A (en) * | 2016-09-08 | 2017-02-08 | 四川长虹电器股份有限公司 | Random cryptograph system based on grouping encryption algorithm and realization method thereof |
CN106789053A (en) * | 2016-12-13 | 2017-05-31 | 四川长虹电器股份有限公司 | Random ciphertext generation method and system, decryption method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109818969A (en) * | 2019-03-06 | 2019-05-28 | 电子科技大学成都学院 | Cryptographic algorithm encrypting and deciphering system |
CN110287147A (en) * | 2019-06-27 | 2019-09-27 | 北京奇艺世纪科技有限公司 | A kind of character string sorting method and device |
Also Published As
Publication number | Publication date |
---|---|
CN108134799B (en) | 2021-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100536393C (en) | Secret shared key mechanism based user management method | |
CN103812854B (en) | Identity authentication system, device and method and identity authentication requesting device | |
CN101043326B (en) | Dynamic information encrypting system and method | |
US20120134495A1 (en) | Cloud Storage Data Access Method, Apparatus and System Based on OTP | |
CN104322003B (en) | Cryptographic authentication and identification method using real-time encryption | |
CN101777158B (en) | Method and system for secure transaction | |
CN108123794A (en) | The generation method and encryption method of whitepack key, apparatus and system | |
CN106712946A (en) | Data secure transmission method | |
CN110474908A (en) | Transaction monitoring and managing method and device, storage medium and computer equipment | |
CN109543434A (en) | Block chain information encryption method, decryption method, storage method and device | |
CN110061967A (en) | Business datum providing method, device, equipment and computer readable storage medium | |
CN113411328B (en) | Efficient transmission system based on data pre-identification sensitive data | |
CN107707562A (en) | A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN103414552B (en) | One utilizes binary tree traversal mode to be encrypted, decryption method and device | |
Nyarko-Boateng et al. | Implementation of advanced encryption standard algorithm with key length of 256 bits for preventing data loss in an organization | |
CN108134799A (en) | Novel encipher-decipher method and its device | |
CN105279447A (en) | Method and device for data encryption, and method and device for data decryption | |
CN104301102B (en) | Widget communication means, apparatus and system | |
CN108650277A (en) | A kind of data encryption and transmission method | |
CN107493287A (en) | Industry control network data security system | |
CN103634313B (en) | Address list processing method and device, as well as mobile terminal | |
CN109726583A (en) | Cloud data base encryption server system | |
CN108701195B (en) | Data security protection method and device | |
CN104243291A (en) | Instant messaging method and system thereof capable of guaranteeing safety of user communication content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |