CN113065168A - Method, device and storage medium for storing and verifying authenticity of video data - Google Patents

Method, device and storage medium for storing and verifying authenticity of video data Download PDF

Info

Publication number
CN113065168A
CN113065168A CN202110378086.1A CN202110378086A CN113065168A CN 113065168 A CN113065168 A CN 113065168A CN 202110378086 A CN202110378086 A CN 202110378086A CN 113065168 A CN113065168 A CN 113065168A
Authority
CN
China
Prior art keywords
key
data
value
video data
check value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110378086.1A
Other languages
Chinese (zh)
Other versions
CN113065168B (en
Inventor
戴林
薛超
任少卿
于宏志
靳龙雪
阚积伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tiandy Technologies Co Ltd
Original Assignee
Tiandy Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tiandy Technologies Co Ltd filed Critical Tiandy Technologies Co Ltd
Priority to CN202110378086.1A priority Critical patent/CN113065168B/en
Publication of CN113065168A publication Critical patent/CN113065168A/en
Application granted granted Critical
Publication of CN113065168B publication Critical patent/CN113065168B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Television Signal Processing For Recording (AREA)

Abstract

The invention provides a method, a device and a storage medium for authenticity storage and verification of video data, belongs to the technical field of security video monitoring, and realizes authenticity storage and verification of the video data. The method comprises the steps of starting an encryption verification module and initializing the encryption verification module; providing an interface for calculating a key data check value; determining key frame data of the video data, calculating a key data check value of the key frame data, and packaging and storing the key data check value; playing back and analyzing the video data, and performing secondary calculation on the key frame data to obtain a key value of the key data; and comparing the key data check value with the key data key value.

Description

Method, device and storage medium for storing and verifying authenticity of video data
Technical Field
The invention relates to the technical field of security video monitoring, in particular to a method, a device and a storage medium for storing and verifying the authenticity of video data.
Background
In the field of security video monitoring, video data provides important basis for event investigation and evidence collection, but the video data recorded by video equipment can be transcribed or downloaded, the video data can be rewritten, deleted or added outside the equipment, the modified data can be written back to the original video equipment, and the authenticity of the video data is questioned.
Disclosure of Invention
The invention aims to provide a method, a device and a storage medium for storing and verifying the authenticity of video data, which are used for storing and verifying the authenticity of the video data.
In a first aspect, the present invention provides a method for storing and verifying video data authenticity, where the method includes the following steps:
starting an encryption verification module and initializing the encryption verification module;
providing an interface for calculating a key data check value;
determining key frame data of the video data, calculating a key data check value of the key frame data, and packaging and storing the key data check value;
playing back and analyzing the video data, and performing secondary calculation on the key frame data to obtain a key value of the key data;
and comparing the key data check value with the key data key value.
Further, after the step of comparing the key data check value with the key value of the key data, the method further includes:
and normally playing back the videos with the consistent comparison result, and generating prompt information with the inconsistent comparison result.
Further, the steps of determining key frame data of the video data, calculating a key data check value of the key frame data, and packaging and storing the key data check value include:
screening key frames of real-time audio and video data and confirming the key frame data;
calculating a key data check value in real time by using an encryption algorithm;
and packaging the key data check value into virtual frame data in real time, and storing the virtual frame data into a storage medium.
Further, the step of playing back and analyzing the video data and performing secondary calculation on the key frame data to obtain a key value of the key data includes:
and playing back and analyzing the video data, and performing secondary calculation on the key frame data by using an encryption algorithm to obtain a key value of the key data.
Further, the encryption algorithm is an asymmetric encryption algorithm.
Further, the step of storing the virtual frame data in a storage medium includes:
and storing the virtual frame data and the key frame data to a storage medium.
Further, after the step of calculating the key data check value in real time by using an encryption algorithm, the method further comprises the following steps:
and generating prompt information by checking the value of the key data which is not packaged in real time.
In a second aspect, the present invention further provides a device for storing and verifying the authenticity of video data, including:
the encryption checking module is used for preparing an environment for subsequently calculating the key data checking value;
the algorithm module is used for calculating a key data check value and a key data key value;
the storage module is used for packaging and storing the key data check value;
and the analysis module is used for comparing the key data check value with the key value of the key data.
In a third aspect, the present invention further provides an electronic device, which includes a memory and a processor, where the memory stores a computer program operable on the processor, and the processor implements the steps of the above method when executing the computer program.
In a fourth aspect, the present invention also provides a computer readable storage medium having stored thereon machine executable instructions which, when invoked and executed by a processor, cause the processor to carry out the method described above.
The invention provides a method for storing and verifying the authenticity of video data, which comprises the following steps: when the encryption check module is started and initialized, an interface for calculating a key data check value is provided, key frame data is determined from the video data, the key data check value of the key frame data is calculated and the key data check value is packaged and stored, when the authenticity of the video data is checked, the video data is played back and analyzed, secondary calculation is carried out on the key frame data to obtain a key data key value, and the key data check value and the key data key value are compared. By using the method, the video data can be stored in an authentic mode and the authenticity of the video data can be effectively verified.
Accordingly, the device for storing and verifying the authenticity of the video data, the electronic device and the computer-readable storage medium provided by the embodiment of the invention also have the technical effects.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a method for storing and verifying authenticity of video data according to an embodiment of the present invention;
fig. 2 is a flowchart of a detailed method of the third step of storing and verifying the authenticity of the video data according to the embodiment of the present invention;
fig. 3 is a device for storing and verifying authenticity of video data according to an embodiment of the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "comprising" and "having," and any variations thereof, as referred to in embodiments of the present invention, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements but may alternatively include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the field of security video monitoring, video data provides important basis for event investigation and evidence collection, but the video data recorded by video equipment can be transcribed or downloaded, the video data can be rewritten, deleted or added outside the equipment, the modified data can be written back to the original video equipment, so that the authenticity of the video data is questioned, and due to market demands, the authenticity of the video data needs to be verified in certain important occasions, such as judicial evidence collection and other applications.
Therefore, a method for verifying the authenticity of the recorded data is urgently needed.
In order to solve the above problems, embodiments of the present invention provide a method for storing and verifying authenticity of video data.
Example 1:
as shown in fig. 1, an embodiment of the present invention provides a method for storing and verifying video data authenticity, where the method includes the following steps:
s1: and starting the encryption checking module and initializing the encryption checking module to prepare an environment for subsequent calculation of the key data check value.
S2: an interface is provided for calculating a critical data check value.
S3: determining key frame data of the video data, calculating a key data check value of the key frame data, packaging and storing the key data check value, and using the key data check value as a comparison value for subsequently verifying the authenticity of the video data.
S4: and playing back and analyzing the video data, and performing secondary calculation on the key frame data to obtain a key value of the key data.
S5: and comparing the key data check value with the key data key value.
By adopting the method for storing and verifying the authenticity of the video data, provided by the embodiment of the invention, after the encryption verification module is started and initialized, an interface for calculating the verification value of the key data is provided, the key frame data is determined from the video data, the verification value of the key data of the key frame data is calculated and the verification value of the key data is packaged and stored, when the authenticity of the video data is verified, the video data is played back and analyzed, the key data key value is obtained by carrying out secondary calculation on the key frame data, and the verification value of the key data and the key data key value are compared. By using the method, the video data can be stored in an authentic mode and the authenticity of the video data can be effectively verified.
In a possible embodiment, after the step of comparing the key data check value with the key data key value, the method further includes:
s6: and normally playing back the videos with the consistent comparison result, and generating prompt information with the inconsistent comparison result.
As shown in fig. 2: in a possible implementation, the step S3 includes:
s31: and screening key frames of the real-time audio and video data and confirming the key frame data.
S32: and calculating the key data check value in real time by using an encryption algorithm, wherein the encryption algorithm is an asymmetric encryption algorithm, so that the key data check value is ensured to be safe and reliable.
S33A: the key data check value is packaged into the virtual frame data in real time, the virtual frame data are stored in the storage medium, the key data check value is stored in a virtual frame mode, video data analysis is facilitated, program processing is more convenient, efficiency is higher, the key frame data are stored in the storage medium in real time while the virtual frame data are stored in the storage medium in an encrypted mode, on one hand, the risk that the original data are falsified can be avoided, on the other hand, the risk that the separated storage is lost can be reduced, no additional storage medium is needed, and use cost is reduced.
In a possible implementation manner, after the step of calculating the key data check value in real time by using the encryption algorithm, the method further includes:
S33B: and generating prompt information for the key data check value which is not packaged in real time, wherein the video precondition capable of complete verification and comparison is that the packaged key data check value is virtual frame data, and for unreliable data without the virtual frame data, generating the prompt information for the type of data.
In a possible implementation manner, the step of playing back and analyzing the video data and performing secondary calculation on the key frame data to obtain a key value of the key data includes:
and playing back and analyzing the video data, and performing secondary calculation on the key frame data by using an encryption algorithm to obtain a key value of the key data, wherein the encryption algorithm is an asymmetric encryption algorithm and is calculated by using the encryption algorithm to ensure that the key value of the key data is safe and reliable.
Example 2:
as shown in fig. 3, an embodiment of the present invention further provides a video data authenticity storage and verification apparatus, including:
and the encryption checking module 1 is used for preparing an environment for subsequently calculating the key data checking value.
And the algorithm module 2 is used for calculating a key data check value and a key data key value.
And the storage module 3 is used for packaging and storing the key data check value.
And the analysis module 4 is used for comparing the key data check value with the key data key value.
Example 3:
in response to the method, an embodiment of the present invention further provides an electronic device, which includes a memory and a processor, where the memory stores a computer program that is executable on the processor, and the processor implements the steps of the method when executing the computer program.
Example 4
An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores machine executable instructions, and when the computer executable instructions are called and executed by a processor, the computer executable instructions cause the processor to execute the method provided in embodiment 1.
The video data authenticity storage and verification device, the electronic equipment and the storage medium provided by the embodiment of the invention have the same technical characteristics as the video data authenticity storage and verification method provided by the embodiment, so the same technical problems can be solved, and the same technical effect is achieved.
The apparatus provided by the embodiment of the present invention may be specific hardware on the device, or software or firmware installed on the device, etc. The device provided by the embodiment of the present invention has the same implementation principle and technical effect as the method embodiments, and for the sake of brief description, reference may be made to the corresponding contents in the method embodiments without reference to the device embodiments. It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the foregoing systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
For another example, the division of the unit is only one division of logical functions, and there may be other divisions in actual implementation, and for another example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments provided by the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; and the modifications, changes or substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention. Are intended to be covered by the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for storing and verifying the authenticity of video data, the method comprising the steps of:
starting an encryption verification module and initializing the encryption verification module;
providing an interface for calculating a key data check value;
determining key frame data of the video data, calculating a key data check value of the key frame data, and packaging and storing the key data check value;
playing back and analyzing the video data, and performing secondary calculation on the key frame data to obtain a key value of the key data;
and comparing the key data check value with the key data key value.
2. The method for video data authenticity storage and verification according to claim 1 further comprising, after the step of comparing the key data verification value to the key data key value:
and normally playing back the videos with the consistent comparison result, and generating prompt information with the inconsistent comparison result.
3. The method of claim 1, wherein the steps of determining key frame data of the video data, calculating a key data check value of the key frame data, and encapsulating and storing the key data check value comprise:
screening key frames of real-time audio and video data and confirming the key frame data;
calculating a key data check value in real time by using an encryption algorithm;
and packaging the key data check value into virtual frame data in real time, and storing the virtual frame data into a storage medium.
4. The method for storing and verifying the authenticity of the video data according to claim 1, wherein the step of playing back and analyzing the video data, and performing a secondary calculation on the key frame data to obtain the key value of the key data comprises:
and playing back and analyzing the video data, and performing secondary calculation on the key frame data by using an encryption algorithm to obtain a key value of the key data.
5. Method for the authenticity storage and verification of video data according to claim 3 or 4, characterized in that said encryption algorithm is an asymmetric encryption algorithm.
6. The method for video data authenticity storage and verification according to claim 3, wherein the step of storing virtual frame data to a storage medium comprises:
and storing the virtual frame data and the key frame data to a storage medium.
7. The method for video data authenticity storage and verification according to claim 3, wherein after the step of calculating the key data verification value in real time using an encryption algorithm, further comprising:
and generating prompt information by checking the value of the key data which is not packaged in real time.
8. The utility model provides a video data authenticity storage and check device which characterized in that includes:
the encryption checking module is used for preparing an environment for subsequently calculating the key data checking value;
the algorithm module is used for calculating a key data check value and a key data key value;
the storage module is used for packaging and storing the key data check value;
and the analysis module is used for comparing the key data check value with the key value of the key data.
9. An electronic device comprising a memory and a processor, wherein the memory stores a computer program operable on the processor, and wherein the processor implements the steps of the method of any of claims 1 to 7 when executing the computer program.
10. A computer readable storage medium having stored thereon machine executable instructions which, when invoked and executed by a processor, cause the processor to execute the method of any of claims 1 to 7.
CN202110378086.1A 2021-04-08 2021-04-08 Method, device and storage medium for storing and checking authenticity of video data Active CN113065168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110378086.1A CN113065168B (en) 2021-04-08 2021-04-08 Method, device and storage medium for storing and checking authenticity of video data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110378086.1A CN113065168B (en) 2021-04-08 2021-04-08 Method, device and storage medium for storing and checking authenticity of video data

Publications (2)

Publication Number Publication Date
CN113065168A true CN113065168A (en) 2021-07-02
CN113065168B CN113065168B (en) 2023-09-19

Family

ID=76566310

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110378086.1A Active CN113065168B (en) 2021-04-08 2021-04-08 Method, device and storage medium for storing and checking authenticity of video data

Country Status (1)

Country Link
CN (1) CN113065168B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114760533A (en) * 2022-05-17 2022-07-15 北京达佳互联信息技术有限公司 Check value storage method, frame data check device and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399669A (en) * 2008-10-23 2009-04-01 福建实达数码科技有限公司 Authentication method for realizing data reality of recorded sound or video
CN105611428A (en) * 2015-12-22 2016-05-25 北京安寻网络科技有限公司 Video evidence preserving and verifying method and device
CN107220141A (en) * 2017-05-26 2017-09-29 青岛海信电器股份有限公司 Data file method of calibration and device
CN107871063A (en) * 2017-11-16 2018-04-03 王磊 Anti-tamper video and audio recording digital signature method, device and storage medium
CN108289194A (en) * 2017-12-28 2018-07-17 天津天地伟业信息系统集成有限公司 Video quick playback method and device
CN109413444A (en) * 2018-10-30 2019-03-01 苏州科达科技股份有限公司 Completeness check data creation method, integrity checking method and the device of video
CN110351369A (en) * 2019-07-12 2019-10-18 北京联合信任技术服务有限公司 Electronic evidence security method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399669A (en) * 2008-10-23 2009-04-01 福建实达数码科技有限公司 Authentication method for realizing data reality of recorded sound or video
CN105611428A (en) * 2015-12-22 2016-05-25 北京安寻网络科技有限公司 Video evidence preserving and verifying method and device
CN107220141A (en) * 2017-05-26 2017-09-29 青岛海信电器股份有限公司 Data file method of calibration and device
CN107871063A (en) * 2017-11-16 2018-04-03 王磊 Anti-tamper video and audio recording digital signature method, device and storage medium
CN108289194A (en) * 2017-12-28 2018-07-17 天津天地伟业信息系统集成有限公司 Video quick playback method and device
CN109413444A (en) * 2018-10-30 2019-03-01 苏州科达科技股份有限公司 Completeness check data creation method, integrity checking method and the device of video
CN110351369A (en) * 2019-07-12 2019-10-18 北京联合信任技术服务有限公司 Electronic evidence security method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114760533A (en) * 2022-05-17 2022-07-15 北京达佳互联信息技术有限公司 Check value storage method, frame data check device and electronic equipment
CN114760533B (en) * 2022-05-17 2024-04-09 北京达佳互联信息技术有限公司 Check value storage method, frame data check method, device and electronic equipment

Also Published As

Publication number Publication date
CN113065168B (en) 2023-09-19

Similar Documents

Publication Publication Date Title
CN108985081B (en) Watermark encryption method, device, medium and electronic equipment
AU2019295815B2 (en) Blockchain-based data verification method and apparatus, and electronic device
Gilbert et al. Youprove: authenticity and fidelity in mobile sensing
JP3579154B2 (en) Method and system for protected distribution of multimedia titles
CN109583230A (en) Data based on block chain deposit card method and device, electronic equipment
US8839446B2 (en) Protecting archive structure with directory verifiers
CN110958319B (en) Method and device for managing infringement and evidence-based block chain
EP1830295A1 (en) Method for verifying the conformity of the logical content of a computer device with a reference content
CN111143869A (en) Application package processing method and device, electronic equipment and storage medium
US20160162686A1 (en) Method for verifying integrity of dynamic code using hash background of the invention
US8819361B2 (en) Retaining verifiability of extracted data from signed archives
CN109447809B (en) Video active identification method combined with block chain
CN111222181B (en) AI model supervision method, system, server and storage medium
CN108184146B (en) Method for calculating popularity of live broadcast platform and related equipment
CN111265860B (en) Game archiving processing method and device, terminal equipment and readable storage medium
CN108132864B (en) Terminal verification method, terminal device and computer readable medium
CN113065168A (en) Method, device and storage medium for storing and verifying authenticity of video data
CN110347678B (en) Financial data storage method, system, device and equipment
US10671456B2 (en) Method and device for acquiring application information
CN113268737A (en) Environment security verification method, system and client
CN109871703B (en) Big data transaction management method, device, storage medium and server
CN109002710A (en) A kind of detection method, device and computer readable storage medium
US11791986B2 (en) Unauthorized use detection system, information processing apparatus, computer-readable recording medium and unauthorized use detection method
CN114780932A (en) Cross-block chain data interaction verification method, system and equipment for management three-mode platform
CN111582954A (en) False data identification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant