CN112073185B - Cloud game safety transmission method and device - Google Patents

Cloud game safety transmission method and device Download PDF

Info

Publication number
CN112073185B
CN112073185B CN202010803944.8A CN202010803944A CN112073185B CN 112073185 B CN112073185 B CN 112073185B CN 202010803944 A CN202010803944 A CN 202010803944A CN 112073185 B CN112073185 B CN 112073185B
Authority
CN
China
Prior art keywords
client
key
game
game server
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010803944.8A
Other languages
Chinese (zh)
Other versions
CN112073185A (en
Inventor
舒伟
方杜斌
董琼康
邓宗荣
黄鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Dianyun Technology Co ltd
Original Assignee
Guangzhou Dianyun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Dianyun Technology Co ltd filed Critical Guangzhou Dianyun Technology Co ltd
Priority to CN202010803944.8A priority Critical patent/CN112073185B/en
Publication of CN112073185A publication Critical patent/CN112073185A/en
Application granted granted Critical
Publication of CN112073185B publication Critical patent/CN112073185B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/71Game security or game management aspects using secure communication between game devices and game servers, e.g. by encrypting game data or authenticating players
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/40Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterised by details of platform network
    • A63F2300/401Secure communication, e.g. using encryption or authentication
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/50Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
    • A63F2300/53Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers details of basic data processing
    • A63F2300/532Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers details of basic data processing using secure communication, e.g. by encryption, authentication

Abstract

The invention provides a cloud game safe transmission method and a cloud game safe transmission device, wherein the cloud game safe transmission method comprises the following steps: receiving a client session control request, generating a key pair and returning a public key; receiving a game server private key request and returning a private key; the client establishes key negotiation with the game server; the client and the game server conduct secure transmission according to key negotiation. According to the cloud game client information security protection method, a key pair is generated to establish a key protocol between the cloud game client and the game server, and data information is encrypted and transmitted through the key protocol, so that the cloud game client information security is protected.

Description

Cloud game safety transmission method and device
Technical Field
The invention relates to the technical field of computers, in particular to a cloud game safe transmission method and device.
Background
The cloud game is a game mode based on cloud computing, and in the running mode of the cloud game, all games run on a server side, and rendered game pictures are compressed and then transmitted to a user through a network. At the client, the user's game device does not need any high-end processor and graphics card, but only needs basic video decompression capability. If the ASCII (American Standard Code for Information Interchange ) code of the character corresponding to the communication data between the cloud game client and the game server is directly transmitted in the clear in the network, there is a safety hidden danger of information being stolen, especially when the user inputs sensitive information, such as a network game account number, there is a risk of account asset being stolen. Therefore, the encrypted transmission of the communication data between the client and the game server and the encrypted transmission of the user input information are the technical problems to be solved at present.
Disclosure of Invention
The invention provides a cloud game safe transmission method and a cloud game safe transmission device, which are used for encrypting transmitted data information by establishing key negotiation between a cloud game client and a game server, so that the information safety of a cloud game user can be protected.
In a first aspect, the present invention provides a cloud game secure transmission method, including:
receiving a client session control request, generating a key pair and returning a public key;
receiving a game server private key request and returning a private key;
the client establishes key negotiation with the game server;
the client and the game server conduct secure transmission according to key negotiation.
Optionally, the client logs in to the cloud game through a sensitive operation.
Optionally, the sensitive operation comprises a virtual key operation.
Optionally, receiving a client session control request; aiming at a client session control request, generating a key pair according to an asymmetric encryption principle, wherein the key pair comprises a public key and a private key; the public key is returned to the client.
Optionally, the game server receives the session control identifier sent by the client.
Optionally, the game server pushes the private key to the client through the long connection; the client verifies the public key and the private key and establishes key agreement.
Optionally, the client transmits data information to the game server, wherein the data information is encrypted by the public key; the game server receives the encrypted data information, decrypts the encrypted data information through the private key, and obtains the data information before the client is encrypted.
Optionally, the client exits the cloud game to destroy session control; the client and the service server destroy the key pair.
In another aspect, the present invention provides a cloud game secure transmission device, including:
the receiving module is used for receiving a client session control request, generating a key pair and returning a public key, receiving a game server private key request and returning a private key;
the establishing module is used for establishing key negotiation between the client and the game server;
and the transmission module is used for the client and the game server to carry out safe transmission according to key negotiation.
In another aspect, the invention provides a computer readable storage medium having stored thereon computer instructions which when executed perform the steps of any of the cloud game secure transmission methods described above.
According to the technical scheme, the method and the device generate a key pair and return a public key by receiving the client session control request; receiving a game server private key request and returning a private key; the client establishes key negotiation with the game server; the client and the game server conduct secure transmission according to key negotiation. The invention establishes key negotiation between the client and the game server, transmits data information according to the key negotiation, and carries out safe transmission on the data information generated by cloud games, thereby protecting the safety of the client information.
Drawings
FIG. 1 is a flow chart of a game security transmission method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a virtual key according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a flow chart of a game security transmission method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a game security transmission device according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
Fig. 1 is a flow chart illustrating a cloud game secure transmission method according to an embodiment of the present invention, and as shown in fig. 1, the cloud game secure transmission method according to the embodiment is as follows.
101. Receiving a client session control request, generating a key pair and returning a public key;
102. receiving a game server private key request and returning a private key;
103. the client establishes key negotiation with the game server;
104. the client and the game server conduct secure transmission according to key negotiation.
In a specific embodiment, step 101 may include: the cloud game client is connected with the cloud game server, the client logs in the cloud game through sensitive operation, the sensitive operation can comprise virtual key operation, for example, a virtual keyboard is used when the client inputs information, fig. 2 shows a schematic structural diagram of the virtual keys provided by an embodiment of the invention, as shown in fig. 2, the virtual keyboard is a virtual keyboard which is self-drawn by the client and has a size similar to that of a small mobile phone, a user can input the information like operating a common keyboard, in the cloud game, the virtual keyboard replaces the common keyboard, and the user can input the data information by touching the virtual keyboard. The cloud game server may include a cloud game service server and a cloud game server, when a user logs in to the cloud game, the cloud game service server requests to create a session (session control) from the service server, generates a key pair according to an asymmetric encryption algorithm for the session, where the key pair may include a public key and a private key, the asymmetric encryption algorithm may include an RSA algorithm, the RSA key pair may include RSA _public_key and RSA _private_key, and the cloud game service server returns the public key corresponding to the session to the client.
In a specific embodiment, step 102 may include: the cloud game client is connected with the game server, transmits session (session identity document, session control identifier) corresponding to the session to the game server, and the game server applies a private key to the service server according to the session.
In a specific embodiment, step 103 may include: the game server pushes the private key to the client through long connection, the cloud game client verifies the private key, if verification is successful, the private key negotiation is established with the game server successfully, and if verification fails, the private key negotiation is established with the game server failed.
In particular embodiments, step 104 may include: the cloud game client transmits data information to the game server, the client encrypts the data information by a public key, the game server receives the encrypted data information, the encrypted data information is decrypted by a private key, the data information before the client is encrypted is obtained, a key protocol comprises the process that the client encrypts the data information by a public key, and the game server decrypts the encrypted data information by the private key, and the client and the game server can perform safe transmission according to the key protocol.
In a specific embodiment, the client exits the cloud game to destroy the session, and the key pair of the client and the service server is correspondingly destroyed, so that the client cannot be reused, and the information input by the user at the time cannot be stolen.
Fig. 3 is a schematic flow chart of a cloud game secure transmission method according to an embodiment of the present invention, and as shown in fig. 3, the cloud game secure transmission method according to the embodiment is as follows.
In a specific embodiment, a user connects to a cloud game server, logs in a cloud game through a virtual keyboard key, and performs encryption transmission on interaction data of a cloud game client and the cloud game server, and a specific flow of a cloud game secure transmission method is as follows.
301. The client applies for a key pair when connecting to the cloud game service server, and may request to create session from the service server, for example, through https (hyper text transfer protocol over securesocket layer, hypertext transfer security protocol) protocol.
302. The service server creates an RSA key pair RSA _public_key and RSA _private_key for the session, wherein RSA _public_key is used by the client and RSA _private_key is used by the game server.
303. After the client requests the session from the service server, the service server returns the rsa _public_key corresponding to the session to the client through the https protocol.
304. The client applies for joining the game to the game server and transmits the session id corresponding to the session to the game server.
305. After receiving the client application, the game server applies a private key to the service server according to the session through https protocol, and the service server returns the rsa _private_key corresponding to the session to the game server.
306. After receiving the rsa _private_key in the key pair, the game server pushes the rsa _private_key to the client through a long connection, and the client verifies the rsa _private_key, and if verification is successful, the client establishes key negotiation with the game server.
307. The client transmits the data information to the game server, the client performs public key encryption on the transmitted data information, for example, the client inputs the character S, and the client uses rsa _public_key to encrypt and transmit the input character, so as to generate a transmission string S'.
308. The game server receives the encrypted data information, decrypts the encrypted data information by using the private key, for example, the game server decrypts the encrypted data information by using rsa _private_key after receiving the S', and obtains the character S before the client encrypts.
309. The client exits the cloud game, and when the session is destroyed, the key pair on the client and the service server is destroyed at the same time, so that the key pair cannot be reused.
In a specific embodiment, a user needs to input an account name and a password to complete a corresponding online game platform login operation in an online game playing process through a cloud game, session is initiated through a client, a service client generates a key pair rsa _public_key and rsa _private_key and returns a public key to the client, the client initiates a game adding application to a game server, the session is sent to the game server, the game server applies a private key to the service server according to the session, the game server pushes the private key to the client through long connection after receiving the private key, and the client establishes secret key negotiation with the game server after verifying the private key.
On the basis of establishing key negotiation, the cloud game client inputs an account name and a password, such as the account name A and the password 123, the cloud game client encrypts and transmits the input characters by using the rsa _public_key to generate a transmission string account name A 'and a transmission string password 123', the game server receives the account name A 'and the password 123' and then decrypts by using the rsa _private_key to obtain the account name A and the password 123 before encryption, the encrypted transmission can effectively ensure that information input by a user is not stolen in the transmission process, and meanwhile, the client inputs information by encryption transmission without encryption transmission on a connection layer, so that the input delay of the cloud game can be considered.
Fig. 4 is a schematic structural diagram of a cloud game security transmission device according to an embodiment of the present invention, and as shown in fig. 4, the cloud game security transmission device 4 of the present embodiment includes: a receiving module 41, a setting-up module 42 and a transmitting module 43.
A receiving module 41, configured to receive a client session control request, generate a key pair and return a public key, and receive a game server private key request and return a private key;
a setup module 42, configured to establish key agreement between the client and the game server;
the transmission module 43 is configured to perform secure transmission according to key negotiation by the client and the game server.
Because the above device is based on the transmission method, the working principle of the device is the same as that of the transmission method, and the description is omitted here.
The embodiment of the invention also provides a computer readable storage medium, wherein a computer program is stored in the computer readable storage medium, and the computer program is used for realizing the steps of any cloud game secure transmission method when being executed by a processor.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments can be used in any combination.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order. These words may be interpreted as names.
Those of ordinary skill in the art will appreciate that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions, which are defined by the scope of the appended claims.

Claims (5)

1. The safe transmission method of the cloud game is characterized by comprising the following steps of:
the cloud game service server receives a client session control request, generates a key pair and returns a public key, when a user logs in a cloud game, the cloud game service server requests to create session control, and the cloud game service server generates the key pair according to an asymmetric encryption algorithm aiming at the session, wherein the key pair can comprise a public key and a private key;
the cloud game service server receives a game server private key request and returns a private key, the game client is connected with the game server, a session control identifier corresponding to the session is sent to the game server, the game server applies the private key to the cloud game service server according to the session, and the cloud game service server receives the game server private key request and returns the private key in the key pair to the game server;
establishing key negotiation between the client and the game server;
the client and the game server carry out safe transmission according to the key negotiation, the client exits from the cloud game to destroy the session, and the key pair of the client and the cloud game service server can be correspondingly destroyed and cannot be reused;
the client establishes key agreement with the game server, including: pushing the private key to the client through long connection by the game server; the client verifies the public key and the private key and establishes key negotiation;
the client and the game server perform secure transmission according to the key negotiation, including: the client transmits data information to the game server, wherein the data information is encrypted by the public key; the game server receives the encrypted data information, decrypts the encrypted data information through the private key and acquires the data information before encryption of the client.
2. The transmission method according to claim 1, wherein the receiving the client session control request, generating a key pair and returning a public key, further comprises: the client logs in the cloud game through sensitive operation.
3. The transmission method according to claim 2, wherein the sensitive operation includes a virtual key operation.
4. A cloud game security device, comprising:
the receiving module is used for receiving a client session control request, generating a key pair and returning a public key, requesting to establish session control to a cloud game service server when a user logs in a cloud game, generating the key pair according to an asymmetric encryption algorithm by the cloud game service server aiming at the session, and receiving a game server private key request and returning the private key;
the establishing module is used for establishing key negotiation between the client and the game server, and comprises the following steps: pushing the private key to the client through long connection by the game server; the client verifies the public key and the private key and establishes key negotiation;
the transmission module is used for the client and the game server to carry out safe transmission according to the key negotiation, the client exits from the cloud game to destroy the session, and the key pairs of the client and the cloud game service server are correspondingly destroyed and cannot be reused; the client and the game server perform secure transmission according to the key negotiation, including: the client transmits data information to the game server, wherein the data information is encrypted by the public key; the game server receives the encrypted data information, decrypts the encrypted data information through the private key and acquires the data information before encryption of the client;
the client is connected with the game server, the session control identifier corresponding to the session is sent to the game server, the game server applies a private key to the cloud game service server according to the session, the cloud game service server receives a private key request of the game server, and the private key in the key pair is returned to the game server.
5. A computer readable storage medium storing computer instructions which when executed implement the secure transmission method of a cloud game according to any of claims 1-3.
CN202010803944.8A 2020-08-11 2020-08-11 Cloud game safety transmission method and device Active CN112073185B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010803944.8A CN112073185B (en) 2020-08-11 2020-08-11 Cloud game safety transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010803944.8A CN112073185B (en) 2020-08-11 2020-08-11 Cloud game safety transmission method and device

Publications (2)

Publication Number Publication Date
CN112073185A CN112073185A (en) 2020-12-11
CN112073185B true CN112073185B (en) 2023-06-30

Family

ID=73661295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010803944.8A Active CN112073185B (en) 2020-08-11 2020-08-11 Cloud game safety transmission method and device

Country Status (1)

Country Link
CN (1) CN112073185B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112642153A (en) * 2020-12-31 2021-04-13 星瀛科技(北京)有限公司 Method, system and equipment for transferring game control right in cloud game live broadcast process
CN113472792B (en) * 2021-07-01 2023-05-05 北京玩蟹科技有限公司 Communication encryption method and system for long-connection network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431411A (en) * 2007-11-09 2009-05-13 康佳集团股份有限公司 Dynamic encryption method for network game data
CN110034923A (en) * 2018-01-11 2019-07-19 武汉斗鱼网络科技有限公司 A kind of information processing method and relevant device
CN110536146A (en) * 2019-08-19 2019-12-03 广州点云科技有限公司 A kind of live streaming based on cloud game is started broadcasting method, apparatus and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7409061B2 (en) * 2000-11-29 2008-08-05 Noatak Software Llc Method and system for secure distribution of subscription-based game software
CN103023872B (en) * 2012-11-16 2016-01-06 杭州顺网科技股份有限公司 A kind of cloud game service platform
US9656161B1 (en) * 2014-02-20 2017-05-23 Aftershock Services, Inc. System and method for facilitating assumption of player identity in an online game
CN105376221B (en) * 2015-10-30 2019-05-21 福建天晴数码有限公司 Game message encryption mechanism and game system based on dynamic password
CN111193695B (en) * 2019-07-26 2021-07-06 腾讯科技(深圳)有限公司 Encryption method and device for third party account login and storage medium
CN110548281B (en) * 2019-08-19 2023-07-21 广州点云科技有限公司 Virtual key method based on cloud game terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431411A (en) * 2007-11-09 2009-05-13 康佳集团股份有限公司 Dynamic encryption method for network game data
CN110034923A (en) * 2018-01-11 2019-07-19 武汉斗鱼网络科技有限公司 A kind of information processing method and relevant device
CN110536146A (en) * 2019-08-19 2019-12-03 广州点云科技有限公司 A kind of live streaming based on cloud game is started broadcasting method, apparatus and storage medium

Also Published As

Publication number Publication date
CN112073185A (en) 2020-12-11

Similar Documents

Publication Publication Date Title
CN109309565B (en) Security authentication method and device
CN108781227B (en) Method and apparatus for encrypted password transmission over untrusted cloud networks
CN101051904B (en) Method for landing by account number cipher for protecting network application sequence
US9760721B2 (en) Secure transaction method from a non-secure terminal
EP2332089B1 (en) Authorization of server operations
CN109075976A (en) Certificate depending on key authentication is issued
WO2015072203A1 (en) Information delivery system
JP5006817B2 (en) Authentication information generation system, authentication information generation method, client device, and program
US10055591B1 (en) Secure protocol attack mitigation
WO2009146655A1 (en) A method, equipment and system for password inputting
CN111431713A (en) Private key storage method and device and related equipment
CN110380859B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol
CN111327629B (en) Identity verification method, client and server
CN112073185B (en) Cloud game safety transmission method and device
CN111130799B (en) Method and system for HTTPS protocol transmission based on TEE
CN109274646A (en) Key management client server side method, system and medium based on KMIP protocol
CN107104938B (en) Method for establishing secure data exchange channel, client and computer readable medium
CN110519222B (en) External network access identity authentication method and system based on disposable asymmetric key pair and key fob
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN114244508A (en) Data encryption method, device, equipment and storage medium
Andola et al. An enhanced smart card and dynamic ID based remote multi-server user authentication scheme
CN111249740A (en) Resource data access method and system
CN109726578A (en) A kind of anti-fake solution of novel dynamic two-dimension code
CN117336092A (en) Client login method and device, electronic equipment and storage medium
CN112689014A (en) Double-full-duplex communication method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant