CN112257059B - Dynamic trusted file execution control method and system - Google Patents

Dynamic trusted file execution control method and system Download PDF

Info

Publication number
CN112257059B
CN112257059B CN202011082139.7A CN202011082139A CN112257059B CN 112257059 B CN112257059 B CN 112257059B CN 202011082139 A CN202011082139 A CN 202011082139A CN 112257059 B CN112257059 B CN 112257059B
Authority
CN
China
Prior art keywords
trusted
dynamic
file
program
legal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011082139.7A
Other languages
Chinese (zh)
Other versions
CN112257059A (en
Inventor
杨钊
姬一文
郇福喜
李蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kirin Software Co Ltd
Original Assignee
Kirin Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kirin Software Co Ltd filed Critical Kirin Software Co Ltd
Priority to CN202011082139.7A priority Critical patent/CN112257059B/en
Publication of CN112257059A publication Critical patent/CN112257059A/en
Application granted granted Critical
Publication of CN112257059B publication Critical patent/CN112257059B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A dynamic trusted file execution control method and a system belong to the technical field of dynamic trusted files, and the method comprises the following steps: executing the first trusted program; creating a dynamic trusted file in the execution process of the first trusted program, and setting the obtained legal information of the first trusted program to the dynamic trusted file; judging whether the dynamic trusted file inherits the legal information or not; if yes, continuing to execute the dynamic trusted file; if not, judging whether a program for calling and executing the dynamic file is the first trusted program; if yes, continuing to execute the dynamic trusted file; if not, refusing to execute the dynamic trusted file. The dynamic trusted file execution control method and the system can solve the problem that the dynamic trusted file generated by the trusted program on the trusted computing system cannot be executed, and ensure the normal execution of the trusted program in the trusted computing environment.

Description

Dynamic trusted file execution control method and system
Technical Field
The invention belongs to the technical field of dynamic trusted files, and particularly relates to a dynamic trusted file execution control method and system.
Background
In an age of informatization becoming more and more popular and important, the security requirements on information technology are also becoming higher and higher. The trusted computing technology is an important branch of the information security field, which can enable a computer operating system to immunize against viruses, trojans and other external malicious programs to a great extent, and the trusted computing technology mainly realizes execution control over programs running on the computer operating system through trusted measurement and a white list mechanism.
The credibility measurement and white list mechanism in credible calculation needs the pre-measurement value and the white list are static and are set and added in the system initialization stage, thus ensuring the security and reliability of the program execution environment after the system runs and preventing the execution of external programs and programs with damaged integrity. For part of trusted application programs, dynamic executable programs or dynamic libraries are created or generated in the execution process, and these dynamic programs and dynamic libraries also need to be executed or loaded, but at present, the pre-measurement values and white lists relied on in the trusted computing technology cannot be applied to the dynamic programs and dynamic libraries, so that these dynamic files expected to be executed or loaded are rejected, and the original trusted application program is caused to be abnormally executed.
Disclosure of Invention
In order to solve the above problems, the present invention provides a method for controlling execution of a dynamic trusted file, the method comprising the steps of:
executing the first trusted program;
creating a dynamic trusted file in the execution process of the first trusted program, and setting the obtained legal information of the first trusted program to the dynamic trusted file;
judging whether the dynamic trusted file inherits the legal information or not;
if yes, continuing to execute the dynamic trusted file;
if not, judging whether a program for calling and executing the dynamic file is the first trusted program or not;
if yes, continuing to execute the dynamic trusted file;
if not, refusing to execute the dynamic trusted file.
Preferably, the step of determining whether the dynamic trusted file inherits the legal information includes:
acquiring an index node security domain of the dynamic trusted file;
judging whether a legal trusted mark of the first trusted program exists in the index node security domain;
if so, judging that the dynamic trusted file inherits the legal information;
if not, judging that the dynamic trusted file does not inherit the legal information.
Preferably, the step of determining whether the dynamic trusted file inherits the legal information includes:
acquiring an index node security domain of the dynamic trusted file;
judging whether legal certificate information of the first trusted program exists in the security domain of the index node;
if so, judging that the dynamic trusted file inherits the legal information;
if not, judging that the dynamic trusted file does not inherit the legal information.
Preferably, the determining whether the program for calling and executing the dynamic file is the first trusted program comprises the steps of:
acquiring an index node security domain of the dynamic trusted file;
acquiring a first digest value corresponding to the first trusted program in the index node security domain;
acquiring a second abstract value corresponding to a program for calling and executing the dynamic file;
judging whether the first abstract value and the second abstract value are equal;
if yes, judging that the program for calling and executing the dynamic file is the first trusted program;
if not, judging that the program for calling and executing the dynamic file is not the first credible program.
Preferably, the step of setting the obtained legal information of the first trusted program to the dynamic trusted file includes:
and filling the legal information of the first trusted program into the index node security domain of the dynamic trusted file.
Preferably, the filling legal information of the first trusted program into the security domain of the inode of the dynamic trusted file includes:
obtaining a legal credible mark corresponding to the first credible program;
and filling the legal credible mark into the index node security domain.
Preferably, the filling of the legal information of the first trusted program into the security domain of the inode of the dynamic trusted file includes the steps of:
obtaining legal certificate information corresponding to the first trusted program;
and filling the legal certificate information into the safe domain of the index node.
Preferably, the filling legal information of the first trusted program into the security domain of the inode of the dynamic trusted file includes:
acquiring a first abstract value corresponding to the first trusted program;
and filling the first digest value into the index node security domain.
The invention also provides a dynamic trusted file execution control system, which comprises:
the running module is used for executing the first trusted program;
the acquisition module is used for creating a dynamic trusted file in the execution process of the first trusted program and setting the acquired legal information of the first trusted program to the dynamic trusted file;
the judging module is used for judging whether the dynamic trusted file inherits the legal information or not and judging whether a program for calling and executing the dynamic file is the first trusted program or not;
the execution module is used for executing preset operation according to the judgment result of the judgment module;
when the judging module judges whether the dynamic trusted file inherits the legal information, or when the judging module judges whether the dynamic trusted file inherits the legal information, and judges whether a program for executing the dynamic file is called, and the result of the first trusted program is yes, the executing module continues to execute the dynamic trusted file; and when the judging module judges whether the result of the dynamic trusted file inheriting the legal information is negative and judges whether the result of calling the program for executing the dynamic file is the first trusted program is negative, the executing module refuses to execute the dynamic trusted file.
The dynamic trusted file execution control method and system provided by the application can solve the problem that the dynamic trusted file generated by the trusted program on the trusted computing system cannot be executed, and ensure the normal execution of the trusted program in the trusted computing environment.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic flow chart of a dynamic trusted file execution control method provided by the present invention;
fig. 2 is a schematic diagram of a dynamic trusted file execution control system according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It is to be understood that these descriptions are only illustrative and are not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1, in an embodiment of the present application, the present application provides a dynamic trusted file execution control method, where the method includes:
s1: executing a first trusted program;
s2: creating a dynamic trusted file in the execution process of the first trusted program, and setting the obtained legal information of the first trusted program to the dynamic trusted file;
s3: judging whether the dynamic trusted file inherits the legal information or not;
s4: if yes, continuing to execute the dynamic trusted file;
s5: if not, judging whether a program for calling and executing the dynamic file is the first trusted program or not;
s6: if yes, continuing to execute the dynamic trusted file;
s7: if not, refusing to execute the dynamic trusted file. In the embodiment of the application, when a first trusted program is executed, a dynamic trusted file is firstly created in the execution process of the first trusted program, the obtained legal information of the first trusted program is set on the dynamic trusted file, and then whether the dynamic trusted file inherits the legal information is judged; if the dynamic trusted file inherits the legal information of the first trusted program, continuing to execute the dynamic trusted file; if the dynamic trusted file does not inherit the legal information of the first trusted program, judging whether a program for calling and executing the dynamic file is the first trusted program, namely judging whether the program for executing the dynamic trusted file and the first trusted program for creating the dynamic trusted file are the same trusted program; if the two are corresponding, the program calling and executing the dynamic file is the first trusted program, and the dynamic trusted file is continuously executed at the moment; if the two are not corresponding, the program calling and executing the dynamic file is not the same trusted program, and the dynamic trusted file is refused to be executed at the moment.
In this embodiment of the present application, the step S3 of determining whether the dynamic trusted file inherits the legal information includes the steps of:
acquiring an index node security domain of the dynamic trusted file;
judging whether a legal credible mark of the first credible program exists in the index node security domain or not;
if so, judging that the dynamic trusted file inherits the legal information;
if not, judging that the dynamic trusted file does not inherit the legal information.
In this embodiment of the present application, when determining whether the dynamic trusted file inherits the legal information, the determination may be implemented by determining whether a legal trusted flag of the first trusted program exists in an index node security domain of the dynamic trusted file. Specifically, an index node security domain of the dynamic trusted file is obtained first, and then whether a legal trusted tag of the first trusted program exists in the index node security domain is judged; if the dynamic trusted file does not inherit the legal trusted mark of the first trusted program, judging that the dynamic trusted file inherits the legal information; if the dynamic trusted file does not inherit the legal trusted mark of the first trusted program, the dynamic trusted file is judged to inherit the legal information.
In this embodiment of the present application, the step S3 of determining whether the dynamic trusted file inherits the legal information includes the steps of:
acquiring an index node security domain of the dynamic trusted file;
judging whether legal certificate information of the first trusted program exists in the security domain of the index node;
if so, judging that the dynamic trusted file inherits the legal information;
if not, judging that the dynamic trusted file does not inherit the legal information.
In this embodiment of the present application, when determining whether the dynamic trusted file inherits the legal information, the determination may be implemented by determining whether legal certificate information of the first trusted program exists in an index node security domain of the dynamic trusted file. Specifically, an index node security domain of the dynamic trusted file is obtained first, and then whether legal certificate information of the first trusted program exists in the index node security domain is judged; if the dynamic trusted file does not inherit the legal certificate information of the first trusted program, judging that the dynamic trusted file inherits the legal information; if the dynamic trusted file does not inherit the legal certificate information of the first trusted program, the dynamic trusted file is judged not to inherit the legal information.
In this embodiment of the present application, the step of determining whether the program for calling and executing the dynamic file is the first trusted program in step S5 includes the steps of:
acquiring an index node security domain of the dynamic trusted file;
acquiring a first digest value corresponding to the first trusted program in the index node security domain;
acquiring a second abstract value corresponding to a program for calling and executing the dynamic file;
judging whether the first abstract value and the second abstract value are equal;
if yes, judging that a program for calling and executing the dynamic file is the first trusted program;
if not, judging that the program for calling and executing the dynamic file is not the first trusted program.
In this embodiment of the present application, when determining whether the program that calls and executes the dynamic file is the first trusted program, the determination may be performed by determining whether a first digest value corresponding to the first trusted program in an inode security domain of the dynamic trusted file is equal to a second digest value corresponding to the program that calls and executes the dynamic file. Specifically, a first digest value corresponding to the first trusted program in the index node security domain of the dynamic trusted file is obtained, a second digest value corresponding to a program for executing the dynamic file is called, and then whether the first digest value is equal to the second digest value is judged; if the first trusted program and the second trusted program are equal, the first trusted program corresponds to a program for calling and executing the dynamic file; and if the first trusted program and the program calling to execute the dynamic file do not correspond to each other, the first trusted program and the program calling to execute the dynamic file do not correspond to each other.
In this embodiment of the present application, the step S2 of setting the obtained legal information of the first trusted program to the dynamic trusted file includes the steps of:
and filling the legal information of the first trusted program into the index node security domain of the dynamic trusted file.
In this embodiment of the application, when the obtained legal information of the first trusted program is set on the dynamic trusted file, at this time, the legal information of the first trusted program is filled into an index node security domain of the dynamic trusted file. Specifically, the legal information includes a legal trusted mark, legal certificate information, and a first digest value corresponding to the first trusted program.
In this embodiment of the present application, the filling the legal information of the first trusted program into the security domain of the inode of the dynamic trusted file includes:
acquiring a legal trusted mark corresponding to the first trusted program;
and filling the legal credible mark into the index node security domain.
In this embodiment of the present application, when filling the legal information of the first trusted program into the index node security domain of the dynamic trusted file, specifically, filling the legal trusted mark corresponding to the first trusted program into the index node security domain.
In this embodiment of the present application, the filling the legal information of the first trusted program into the security domain of the inode of the dynamic trusted file includes:
obtaining legal certificate information corresponding to the first trusted program;
and filling the legal certificate information into the safe domain of the index node.
In this embodiment of the present application, when filling the legal information of the first trusted program into the security domain of the index node of the dynamic trusted file, specifically, filling the legal certificate information corresponding to the first trusted program into the security domain of the index node.
In this embodiment of the present application, the filling the legal information of the first trusted program into the security domain of the inode of the dynamic trusted file includes:
acquiring a first abstract value corresponding to the first trusted program;
and filling the first digest value into the index node security domain.
In this embodiment of the present application, when filling the legal information of the first trusted program into the index node security domain of the dynamic trusted file, specifically, filling a first digest value corresponding to the first trusted program into the index node security domain.
As shown in fig. 2, in an embodiment of the present application, the present invention further provides a dynamic trusted file execution control system, where the system includes:
an execution module 10, configured to execute a first trusted program;
an obtaining module 20, configured to create a dynamic trusted file in the execution process of the first trusted program, and set the obtained legal information of the first trusted program to the dynamic trusted file;
a judging module 30, configured to judge whether the dynamic trusted file inherits the legal information, and judge whether a program that calls to execute the dynamic file is the first trusted program;
an executing module 40, configured to execute a preset operation according to the determination result of the determining module 30;
when the judging module 30 judges whether the dynamic trusted file inherits the legal information, or when the judging module 30 judges whether the dynamic trusted file inherits the legal information, and judges whether the program for executing the dynamic file is the first trusted program, the executing module 40 continues to execute the dynamic trusted file; when the determining module 30 determines whether the result of the dynamic trusted file inheriting the legal information is negative and determines whether the result of the first trusted program is negative, the executing module 40 refuses to execute the dynamic trusted file.
The dynamic trusted file execution control system provided by the application can execute the above dynamic trusted file execution control method.
The dynamic trusted file execution control method and the system can solve the problem that the dynamic trusted file generated by the trusted program on the trusted computing system cannot be executed, and ensure the normal execution of the trusted program in the trusted computing environment.
It should be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (8)

1. A dynamic trusted file execution control method, characterized in that the method comprises the steps of:
executing the first trusted program;
creating a dynamic trusted file in the execution process of the first trusted program, and setting the obtained legal information of the first trusted program to the dynamic trusted file;
judging whether the dynamic trusted file inherits the legal information or not;
if yes, continuing to execute the dynamic trusted file;
if not, judging whether a program for calling and executing the dynamic file is the first trusted program;
if yes, continuing to execute the dynamic trusted file;
if not, refusing to execute the dynamic trusted file;
wherein, the step of judging whether the dynamic trusted file inherits the legal information comprises the following steps:
acquiring an index node security domain of the dynamic trusted file;
judging whether a legal credible mark of the first credible program exists in the index node security domain or not;
if so, judging that the dynamic trusted file inherits the legal information;
if not, judging that the dynamic trusted file does not inherit the legal information.
2. The dynamic trusted file execution control method according to claim 1, wherein said determining whether said dynamic trusted file inherits said legal information comprises:
acquiring an index node security domain of the dynamic trusted file;
judging whether legal certificate information of the first trusted program exists in the security domain of the index node;
if so, judging that the dynamic trusted file inherits the legal information;
if not, judging that the dynamic trusted file does not inherit the legal information.
3. The dynamic trusted file execution control method according to claim 1, wherein said determining whether the program calling for execution of the dynamic file is the first trusted program comprises:
acquiring an index node security domain of the dynamic trusted file;
acquiring a first digest value corresponding to the first trusted program in the index node security domain;
acquiring a second abstract value corresponding to a program for calling and executing the dynamic file;
judging whether the first abstract value and the second abstract value are equal;
if yes, judging that the program for calling and executing the dynamic file is the first trusted program;
if not, judging that the program for calling and executing the dynamic file is not the first credible program.
4. The method according to claim 1, wherein the step of setting the obtained legal information of the first trusted program on the dynamic trusted file comprises:
and filling the legal information of the first trusted program into the index node security domain of the dynamic trusted file.
5. The method according to claim 4, wherein the populating of the inode security domain of the dynamic trusted file with the legal information of the first trusted program comprises the steps of:
obtaining a legal credible mark corresponding to the first credible program;
and filling the legal credible mark into the index node security domain.
6. The method according to claim 4, wherein the populating of the inode security domain of the dynamic trusted file with the legal information of the first trusted program comprises the steps of:
obtaining legal certificate information corresponding to the first trusted program;
and filling the legal certificate information into the security domain of the index node.
7. The method according to claim 4, wherein the populating of the inode security domain of the dynamic trusted file with the legal information of the first trusted program comprises the steps of:
acquiring a first abstract value corresponding to the first trusted program;
and filling the first digest value into the index node security domain.
8. A dynamic trusted file execution control system, the system comprising:
the running module is used for executing the first trusted program;
the acquisition module is used for creating a dynamic trusted file in the execution process of the first trusted program and setting the acquired legal information of the first trusted program to the dynamic trusted file;
the judging module is used for judging whether the dynamic trusted file inherits the legal information or not and judging whether a program for calling and executing the dynamic file is the first trusted program or not;
the execution module is used for executing preset operation according to the judgment result of the judgment module;
when the judging module judges whether the dynamic trusted file inherits the legal information, or when the judging module judges whether the dynamic trusted file inherits the legal information, and judges whether a program for executing the dynamic file is called, and the result of the first trusted program is yes, the executing module continues to execute the dynamic trusted file; and when the judging module judges whether the result of the dynamic trusted file inheriting the legal information is negative and judges whether the result of calling the program for executing the dynamic file is the first trusted program is negative, the executing module refuses to execute the dynamic trusted file.
CN202011082139.7A 2020-10-12 2020-10-12 Dynamic trusted file execution control method and system Active CN112257059B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011082139.7A CN112257059B (en) 2020-10-12 2020-10-12 Dynamic trusted file execution control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011082139.7A CN112257059B (en) 2020-10-12 2020-10-12 Dynamic trusted file execution control method and system

Publications (2)

Publication Number Publication Date
CN112257059A CN112257059A (en) 2021-01-22
CN112257059B true CN112257059B (en) 2023-03-28

Family

ID=74241908

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011082139.7A Active CN112257059B (en) 2020-10-12 2020-10-12 Dynamic trusted file execution control method and system

Country Status (1)

Country Link
CN (1) CN112257059B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114818012B (en) * 2022-06-29 2022-10-21 麒麟软件有限公司 Linux file integrity measuring method based on white list

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5190800B2 (en) * 2006-02-21 2013-04-24 日本電気株式会社 Program execution control system, execution control method, and computer program for execution control
US8560823B1 (en) * 2007-04-24 2013-10-15 Marvell International Ltd. Trusted modular firmware update using digital certificate
CN104618396B (en) * 2015-03-04 2018-01-02 浪潮集团有限公司 A kind of trustable network access and access control method
CN106295319B (en) * 2016-08-02 2019-07-19 中标软件有限公司 Operating system safety protecting method
CN110837643B (en) * 2018-08-17 2022-09-23 阿里巴巴集团控股有限公司 Activation method and device of trusted execution environment
US11206141B2 (en) * 2018-09-21 2021-12-21 International Business Machines Corporation Merging multiple compute nodes with trusted platform modules utilizing provisioned node certificates
CN109992992B (en) * 2019-01-25 2021-07-13 中国科学院数据与通信保护研究教育中心 Credible sensitive data protection method and system

Also Published As

Publication number Publication date
CN112257059A (en) 2021-01-22

Similar Documents

Publication Publication Date Title
US8082442B2 (en) Securely sharing applications installed by unprivileged users
US8181219B2 (en) Access authorization having embedded policies
US8397290B2 (en) Granting least privilege access for computing processes
US8745743B2 (en) Anti-virus trusted files database
US10325116B2 (en) Dynamic privilege management in a computer system
US20090126017A1 (en) Methods and systems for preventing security breaches
US20150178495A1 (en) Pervasive Package Identifiers
US9906537B2 (en) System, method, and computer program product for conditionally performing an action based on an attribute
US9871800B2 (en) System and method for providing application security in a cloud computing environment
GB2566347A (en) Computer device and method for controlling process components
KR20060050768A (en) Access authorization api
CN112257059B (en) Dynamic trusted file execution control method and system
CN110348180B (en) Application program starting control method and device
US11677754B2 (en) Access control systems and methods
US10809924B2 (en) Executable memory protection
US20200401492A1 (en) Container-level monitoring
US20230198997A1 (en) Access control systems and methods
JP7248219B2 (en) System and method for computer security
GB2561861A (en) Computer device and method for isolating untrusted content
US20230367877A1 (en) In-memory scanning for fileless malware on a host device
CN114489860A (en) Method for checking dynamic link library loading based on kernel-level buffer area of operating system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant