CN113839924B - Terminal interaction method and device, storage medium and electronic equipment - Google Patents

Terminal interaction method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN113839924B
CN113839924B CN202111015922.6A CN202111015922A CN113839924B CN 113839924 B CN113839924 B CN 113839924B CN 202111015922 A CN202111015922 A CN 202111015922A CN 113839924 B CN113839924 B CN 113839924B
Authority
CN
China
Prior art keywords
key
target
data
sequence
data transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111015922.6A
Other languages
Chinese (zh)
Other versions
CN113839924A (en
Inventor
李阅苗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Technology Co Ltd
Haier Smart Home Co Ltd
Original Assignee
Qingdao Haier Technology Co Ltd
Haier Smart Home Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Technology Co Ltd, Haier Smart Home Co Ltd filed Critical Qingdao Haier Technology Co Ltd
Priority to CN202111015922.6A priority Critical patent/CN113839924B/en
Publication of CN113839924A publication Critical patent/CN113839924A/en
Application granted granted Critical
Publication of CN113839924B publication Critical patent/CN113839924B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a terminal interaction method and device, a storage medium and electronic equipment. Wherein the method comprises the following steps: receiving a data transmission request, wherein the data transmission request is initiated by a first device and is used for requesting to transmit target data to a second device; responding to a data transmission request, and determining a target key, wherein the target key is a quantum key generated by edge equipment; the target key is sent to the first device to cause the first device to transmit target data to the second device based on the target key. The invention solves the technical problem of lower data transmission security between terminal devices.

Description

Terminal interaction method and device, storage medium and electronic equipment
Technical Field
The present invention relates to the field of data transmission, and in particular, to a terminal interaction method and apparatus, a storage medium, and an electronic device.
Background
If communication and data transmission are to be performed between terminal devices currently located in the same community, a server is generally used to establish a transfer channel for data transmission. The transmitting terminal transmits the data to the server, and the server forwards the data to the receiving terminal. Therefore, during the transmission process, the data security is protected by the encryption means between the terminal and the server. If the server key is stolen, the security of data transmission between terminal devices is difficult to ensure.
Meanwhile, the data interaction is carried out through the server, the data interaction needs to be carried out through encryption means with the server, and the data forwarding is carried out through the server, so that more time is consumed for data transmission, and the data interaction efficiency is low.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the invention provides a terminal interaction method and device, a storage medium and electronic equipment, which are used for at least solving the technical problem of low data transmission security between terminal equipment.
According to an aspect of an embodiment of the present invention, there is provided a terminal interaction method, including: receiving a data transmission request, wherein the data transmission request is initiated by first equipment and is used for requesting to transmit target data to second equipment; determining a target key in response to the data transmission request, wherein the target key is a quantum key generated by edge equipment; and transmitting the target key to the first device so that the first device transmits the target data to the second device based on the target key.
According to an aspect of an embodiment of the present invention, there is provided a terminal interaction method, including: transmitting a data transmission request, wherein the data transmission request is used for requesting to transmit target data to second equipment; receiving a target key sent by edge equipment, wherein the target key is a quantum key generated by the edge equipment; under the condition that a connection request for requesting to establish a target data channel sent by the second device is received, verifying a target signature carried in the connection request, wherein the target signature is a signature generated by the second device by using the target key; under the condition that the target signature verification is successful, encrypting the target data by using the target key to obtain target encrypted data; and transmitting the target encrypted data to the second device through the target data channel.
According to another aspect of the embodiment of the present invention, there is also provided a terminal interaction device, including: a receiving unit, configured to receive a data transmission request, where the data transmission request is initiated by a first device and is used to request transmission of target data to a second device; the determining unit is used for responding to the data transmission request and determining a target key, wherein the target key is a quantum key generated by the edge equipment; and a transmitting unit configured to transmit the target key to the first device, so that the first device transmits the target data to the second device based on the target key.
According to another aspect of the embodiment of the present invention, there is also provided a terminal interaction device, including: a request transmitting unit configured to transmit a data transmission request, where the data transmission request is used to request transmission of target data to a second device; a key receiving unit, configured to receive a target key sent by an edge device, where the target key is a quantum key generated by the edge device; a verification unit, configured to verify, when a connection request sent by the second device and used for requesting to establish a target data channel is received, a target signature carried in the connection request, where the target signature is a signature generated by the second device by using the target key; the data encryption unit is used for encrypting the target data by using the target key under the condition that the target signature verification is successful, so as to obtain target encrypted data; and the data transmitting unit is used for transmitting the target encrypted data to the second device through the target data channel.
According to yet another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium having a computer program stored therein, wherein the computer program is configured to perform the above-described terminal interaction method when run.
According to still another aspect of the embodiments of the present invention, there is also provided an electronic device including a memory, in which a computer program is stored, and a processor configured to execute the terminal interaction method described above by the computer program.
In the embodiment of the invention, the edge equipment is adopted to receive the data transmission request of the first equipment, the target key is determined in response to the data transmission request, the target key is the quantum key generated by the edge equipment and is sent to the first equipment, so that the first equipment transmits target data to the second equipment based on the target key.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
FIG. 1 is a schematic illustration of an application environment of an alternative terminal interaction method according to an embodiment of the invention;
FIG. 2 is a flow chart of an alternative terminal interaction method according to an embodiment of the invention;
FIG. 3 is a flow chart of an alternative terminal interaction method according to an embodiment of the invention;
FIG. 4 is a schematic diagram of an alternative interaction timing sequence of a terminal interaction device according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of an edge device structure of an alternative terminal interaction device according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of an interaction timing diagram of an alternative terminal interaction device according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of an alternative terminal interaction device according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of an alternative terminal interaction device according to an embodiment of the present invention;
Fig. 9 is a schematic structural view of an alternative electronic device according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an aspect of the embodiment of the present invention, a terminal interaction method is provided, and optionally, the terminal interaction method may be applied to, but not limited to, an environment as shown in fig. 1. Both the first device 102 and the second device 104 interact with the edge device 120 via the network 110 to enable establishment of a target data channel and transmission of target data between the first device 102 and the second device 104. Taking the edge device 120 as an example, it is not limited to sequentially performing S102 to S106 to perform the terminal interaction method.
A data transmission request is received. A data transfer request is initiated by a first device for requesting transfer of target data to a second device. A target key is determined. And responding to the data transmission request, and determining a target key, wherein the target key is a quantum key generated by the edge equipment. A key is sent. The target key is sent to the first device to cause the first device to transmit target data to the second device based on the target key.
Alternatively, in the present embodiment, the first device 102 and the second device 104 may include, but are not limited to, at least one of the following: smart devices such as Mobile phones (e.g., android phones, IOS phones, etc.), notebook computers, tablet computers, palm computers, MIDs (Mobile INTERNET DEVICES ), PAD, desktop computers, smart televisions, etc. The network may include, but is not limited to: a wired network, a wireless network, wherein the wired network comprises: local area networks, metropolitan area networks, and wide area networks, the wireless network comprising: bluetooth, WIFI, and other networks that enable wireless communications. The edge device 120 may be a server, a single server, a server cluster including a plurality of servers, or a cloud server. The above is merely an example, and is not limited in any way in the present embodiment.
As an optional implementation manner, as shown in fig. 2, the terminal interaction method includes:
S202, receiving a data transmission request, wherein the data transmission request is initiated by first equipment and is used for requesting to transmit target data to second equipment;
S204, a target key is determined in response to a data transmission request, wherein the target key is a quantum key generated by edge equipment;
S206, the target key is sent to the first device, so that the first device transmits target data to the second device based on the target key.
Alternatively, the quantum key is not limited to a key based on the quantum mechanical measurement principle, and has higher security. The edge device sends the target key to the first device, so that the first device transmits the target data to the second device based on the target key is not limited to sending the target key to the second device, the second device generates a target signature by using the target key when receiving the target key, establishes a target data channel with the first device based on the target key, and sends a connection request for establishing the target data channel to the first device, the connection request carries the target signature generated by using the target key, the target signature is not limited to being a digital signature, and a signature algorithm used is not limited. The second device sends a connection request carrying the target signature to the first device, and the first device verifies the target signature under the condition that the connection request is received. And under the condition that the target signature verification is successful, the first device is connected with the target data channel created by the second device so as to realize direct data transmission between the first device and the second device. In data transmission using the target data channel, the transmission data is not limited to being encrypted using the target key. When the first equipment and the second equipment use the target data channel to carry out data interaction, the target key is used for encrypting the transmitted data, the direct data channel is used for guaranteeing the data transmission safety and improving the data transmission rate, and meanwhile, the target key is used for encrypting the transmitted data, so that the safety of the data transmission is guaranteed again
In the embodiment of the application, the edge equipment is adopted to receive the data transmission request of the first equipment, the target key is determined in response to the data transmission request, the target key is the quantum key generated by the edge equipment and is sent to the first equipment, so that the first equipment transmits target data to the second equipment based on the target key.
As an alternative embodiment, before receiving the data transmission request, the method further includes:
s1, under the condition that the first device is detected to be located in the device connection range, creating a first mirror image device for the first device in the edge device;
s2, connecting the first mirror device and the first device.
Alternatively, the first device and the second device are not limited to terminal devices of different communities located within a device connection range of the edge device. The equipment connection range of the edge equipment is not limited to cover a plurality of equipment communities, a plurality of terminal equipment with the same or different quantity exist in different equipment communities, and the data interaction of the terminal equipment in the same equipment community or between different equipment communities is realized through the terminal interaction method.
Alternatively, the device community is not limited to a local community constituted by a plurality of terminal devices having a device area communication network, for example, a plurality of smart home terminal devices in the same home network, a plurality of office terminal devices in the same office local network, and the like. Under the condition of running based on the same running server, the terminal devices in different device communities do not need to interact with the running server through a network, so that the data interaction of the two terminal devices is realized.
Alternatively, the edge device is not limited to a physical device established for a plurality of device communities for enabling data interaction of terminal devices within connection range thereof. The edge device is not limited to include a key generation module and a mirror device module. The key generation module is used for generating a key applied to data channel establishment and data encryption, and the mirror image equipment module is used for establishing mirror image equipment of the terminal equipment in the edge equipment so as to realize data interaction between the edge equipment and the terminal equipment.
Optionally, under the condition that the first device is located in a preset connection range of the edge device, the first device is connected with the edge device, a request for creating the mirror device is initiated to a mirror device module in the edge device, a first mirror device matched with the first device is created in the mirror device module, and the first mirror device is connected with the first device, so that interaction between the first device and the edge device is achieved through the first mirror device.
In the embodiment of the application, under the condition that the first equipment is in the range of the edge equipment, the first mirror image equipment corresponding to the first equipment is established in the edge equipment, so that the interaction between the edge equipment and the first equipment is performed based on the first mirror image equipment, and the interaction safety between the edge equipment and the first equipment is improved compared with the interaction between the edge equipment and the first equipment.
As an alternative embodiment, receiving the data transmission request includes: receiving a data transmission request of a first device through the first mirror device; transmitting the target key to the first device includes: the target key is sent to the first device by the first mirroring device.
Optionally, in the case that the first mirroring device is created in the edge device and the first mirroring device is connected to the first device, a data transmission request of the first device is received through the first mirroring device, and the target key is sent to the first device through the first mirroring device.
As an optional implementation manner, the sending, by the first mirroring device, the target key to the first device includes:
s1, a first mirror image device obtains a target key through interface service;
s2, the target key is sent to the first device.
Optionally, the first mirror device obtains the target key through an interface server in the edge device, and sends the obtained target key to the first device.
In the embodiment of the application, the target key is acquired through the interface server, the target key is sent to the first device through the first mirror device, and the target key for transmission is arranged in the interface service inside the edge device, so that the leakage of the target key caused by the exposure of the interface service outside the edge device is avoided, and the safety of the target key is improved.
As an alternative embodiment, as shown in fig. 3, after determining the target key, the method includes:
S302, under the condition that the second device is detected to be located in the device connection range, creating a second mirror image device for the second device in the edge device, and connecting the second mirror image device and the second device;
S304, the second mirror image equipment acquires a target key through a message service, wherein the message service is used for receiving the target key transmitted by the interface service;
And S306, transmitting the target key to the second device through the second mirror device.
Optionally, under the condition that the second device is located in a preset connection range of the edge device, the second device is connected with the edge device, a request for creating the mirror device is initiated to a mirror device module in the edge device, a second mirror device matched with the second device is created in the mirror device module, and the second mirror device is connected with the second device, so that interaction between the second device and the edge device is achieved through the second mirror device.
Optionally, in the event that the target key is determined and the second device is not within range of the device connection, storing the target key with the messaging service. And under the condition that the second device enters the device connection range and the second mirror image device is created, transmitting the target key to the second mirror image device through the message server, so that the target key is transmitted to the second device.
Optionally, in a case where the second device is located within the device connection range and the second device is connected to the second mirror device, the interface service acquires the target key and simultaneously sends the target key to the message service, so that the message service sends the target key to the second device through the second mirror device.
In the embodiment of the application, under the condition that the first device initiates the data transmission request, the second device can temporarily store the target key for data transmission by using the message service without being in the connection range of the edge device, and when the second device enters the connection range of the device, the second device acquires the target key from the message service through the second mirror device and sends the target key to the second device, so that the second device establishes a target data channel based on the target key, and the safe transmission of the target data is realized.
Taking the first device as a device a and the second device as a device B as an example, the data transmission between the first device and the second device based on the edge device is not limited to that shown in fig. 4. In the case where the device a enters the connection range of the edge device, S402 is executed, and a creation request is transmitted to the mirror device module of the edge device. After receiving the creation request of the device a, the mirroring device module executes S404 to create the mirroring device a. After the mirroring device a is created, the device a performs S406 to connect the mirroring device a. Also, in the case where the device B enters the connection range of the edge device, S408 is performed, and a creation request is transmitted to the mirror device module of the edge device. After receiving the creation request of the device B, the mirroring device module executes S410 to create the mirroring device B. After the mirroring device B is created, the device B performs S412 to connect the mirroring device B. The device a executes S414 to apply for communication, and the communication object is the device B. After receiving the communication application, the mirroring device a executes S416 to apply the key to the key generation module. When the key application is received, the key generation module executes S418 to generate a quantum key. After the quantum key is generated, S420 is performed, the key is returned to the mirroring device a, S422 is performed, and the key is pushed to the mirroring device B. After the key is returned to the mirroring device a, the mirroring device a performs S424, returning the key to the device a. After the key is pushed to the mirroring device B, the mirroring device B performs S426 to push the key. Upon receiving the key, device B executes S428 to generate a signature. A signature is generated based on the key and is added to the connection request. And S430, establishing a connection request, and sending the connection request to the device A with the signature. After receiving the connection establishment request, the device a executes S432 to verify the signature. The signature is verified using the key. If the authentication is successful, S434 is performed to encrypt the data, and the data is encrypted using the key. After the data encryption, S436 is performed, and the encrypted data is transmitted to the device B. After receiving the encrypted data, device B executes S438 to decrypt the data. Therefore, the data interaction between the device A and the device B is realized based on the edge device, and the safety of the data in the interaction process is improved.
As an alternative embodiment, before the target key is sent to the first device by the first mirroring device, the method further includes:
s1, generating a candidate key at regular time according to a key generation period;
and S2, adding the candidate keys to a key sequence, wherein the candidate keys in the key sequence are ordered according to the generation time.
Alternatively, the key generation module in the edge device is not limited to generating the key at regular intervals according to a preset key generation period, and adding the key generated at regular intervals to the key sequence. In the key sequence, keys are not limited to being ordered by generation time. The key sequence is not limited to having a preset number of key sequence bits, and the generated candidate keys are sequentially added to each sequence bit in the key sequence according to the generation time.
Alternatively, the target generating module generates the key according to the key generating period timing, and is not limited to setting a clock unit in the key generating module, and the clock unit is used for triggering timing to realize the timing generation of the key.
Alternatively, the target key is not limited to determining the target key from the key sequence based on the request receipt time.
As an optional implementation manner, the determining the target key in response to the data transmission request includes:
S1, determining a target moment of receiving a data transmission request;
s2, determining a candidate key positioned at the first sequence of the key sequence at the target moment as a target key.
Optionally, the target key is determined from the key sequence according to the target time when the data transmission request is received. In the case where the candidate keys in the key sequence are ordered in the order of the generation time, the candidate keys located at the first sequence of the key sequence are not limited to be determined as the target keys. The target key is determined here as the target time at which the data transmission request was received, so that the transmission time of the target data is not associated. And when the second device enters the device connection range, the target data is transmitted.
As an alternative embodiment, after determining, as the target key, the candidate key located at the first of the sequence of the key sequence at the target time, the method further includes: the target key is shifted out of the key sequence and the key sequence is updated.
Optionally, the candidate key in the key sequence is removed from the key sequence under the condition of being determined as the target key, and the key sequence is updated, so that the interaction between different terminal devices uses different keys, and the independence and the security of the data interaction between the terminal devices are ensured.
As an alternative embodiment, the timing generation key includes: under the condition that candidate keys are stored in all sequence orders in the key sequence, stopping generating the key; in the case that no candidate key is stored for all sequence bits in the key sequence, the reception of the data transmission request is stopped.
Alternatively, the generation of the key is stopped in case the sequence bits of the key sequence are all present with the key, i.e. the key sequence is full. And stopping the consumption of the key under the condition that no key exists in all sequence bits of the sequence of the key, namely the key sequence is empty. Consumption of the key is not limited to determining the target key from the key sequence and removing the target key from the key sequence.
Taking the first device as device a and the second device as device B as an example, the device structure of the edge device and the interactions with the first device and the second device are not limited to those shown in fig. 5. The edge device 510 includes a key generation module 512 and a mirror device module 514. The key generation module 512 is provided with a clock module 516 and a quantum key generator. The clock module 516 periodically triggers the quantum key generator to generate a quantum key and places the quantum key in a key queue. The quantum key generator comprises an initiating terminal and a receiving terminal, and is connected with the receiving terminal through a photon channel, and is communicated and transmitted through the general channel, and the quantum key is generated through the photon channel. Device a502 connects to mirror device a in mirror device module 514, mirror device a obtains the target key from the key queue from the interface while the interface pushes the target key to the message, which sends the target key to mirror device B, which sends to device B504. The interface sends the obtained target to the mirror device a, which sends the target to the device a502. A data channel is created by device B to connect with device a while encrypted data is transmitted using the data channel to enable secure encrypted communications between device a502 and device B504.
The specific generation of the key is not limited to that shown in fig. 6. The clock timing performs S602, triggering the quantum key initiation terminal. If triggered, the initiator executes S604 to determine a random number. In the case of determining the random number, S606 modulation is performed. By performing S608 photon communication, sending photons through the photon channel, and in the case where the receiving end receives photons, performing S610 measurement to determine the polarization state of the photons. And after the measurement, the result is sent to the initiating terminal by executing S612 a general channel to execute S614, the measurement value is synchronized, and a key negotiation protocol is determined. After determining the protocol, the originating terminal performs S616 to calculate the key. In the case that the key result is obtained, S618 is performed to add the key to the key queue. The key queue is not limited to adding a synchronization mechanism, and key generation is stopped when the queue is full, and key consumption is stopped when the queue is empty. The interface service obtains the key from the key queue by executing S620, and may also execute S622, push the key to the message service, so as to send the key to the first mirror device through the interface service, and push the key to the second mirror device through the message server.
In the embodiment of the application, the generation of the quantum key is carried out through the edge equipment, the key is used for establishing the data channel between the equipment and encrypting the data, the direct data transmission of the two equipment is realized, the data is encrypted again by using the key on the basis of ensuring the data transmission safety by using the data channel, and the data transmission safety is improved.
According to an aspect of the embodiment of the present invention, there is provided a terminal interaction method, applied to a first device, as an optional implementation manner, where the terminal interaction method includes:
S1, sending a data transmission request, wherein the data transmission request is used for requesting to transmit target data to second equipment;
S2, receiving a target key sent by edge equipment, wherein the target key is a quantum key generated by the edge equipment;
S3, under the condition that a connection request for requesting to establish a target data channel sent by the second equipment is received, verifying a target signature carried in the connection request, wherein the target signature is a signature generated by the second equipment by using a target key;
s4, under the condition that the target signature verification is successful, encrypting the target data by using the target key to obtain target encrypted data;
s5, the target encrypted data is sent to the second device through the target data channel.
As an alternative implementation manner, after the target encrypted data is sent to the second device through the target data channel, feedback data returned by the second device is received; and decrypting the feedback data by using the target key to obtain target feedback data.
Optionally, the target key is used for encrypting data transmitted between the first device and the second device, and when the second device transmits the feedback data to the first device, the target key is used for encrypting the target feedback data to obtain the feedback data, so that the data transmission security is improved by transmitting the encrypted feedback data.
In the embodiment of the application, the first device initiates a data transmission request to the edge device, receives the target key returned by the edge device, verifies the target signature in the connection request sent by the second device based on the target key, and sends the target encrypted data obtained by encrypting the target key to the second device through the target data channel under the condition that verification is successful, so that a direct data transmission channel between the first device and the second device is established based on the edge device, the encrypted data is transmitted by using the data transmission channel, and the data security is improved.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present invention. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required for the present invention.
According to another aspect of the embodiment of the invention, a terminal interaction device for implementing the terminal interaction method is also provided. As shown in fig. 7, the apparatus includes:
A receiving unit 702, configured to receive a data transmission request, where the data transmission request is initiated by a first device and is used to request transmission of target data to a second device;
a determining unit 704, configured to determine a target key in response to the data transmission request, where the target key is a quantum key generated by the edge device;
the transmitting unit 706 transmits the target key to the first device, so that the first device transmits the target data to the second device based on the target key.
Optionally, the terminal interaction device further includes a first creating unit, configured to create, before receiving the data transmission request, a first mirror device for the first device in the edge device if the first device is detected to be located in the device connection range; the first mirroring device and the first device are connected.
Optionally, the terminal interaction device is further configured to receive a data transmission request, including: receiving a data transmission request of a first device through the first mirror device; transmitting the target key to the first device includes: the target key is sent to the first device by the first mirroring device.
Optionally, the terminal interaction device further includes a generating unit, configured to generate, at regular time, a candidate key according to a key generation period before the target key is sent to the first device through the first mirroring device; the candidate keys are added to a key sequence, wherein the candidate keys in the key sequence are ordered by generation time.
Optionally, the determining unit 704 is further configured to determine a target time when the data transmission request is received; and determining the candidate key positioned at the first sequence of the key sequence at the target moment as a target key.
Optionally, the sending unit 706 is further configured to obtain, by the first mirror device through an interface service, the target key; the target key is sent to the first device.
Optionally, the terminal interaction device further includes a second creating unit, configured to create a second mirror device for the second device in the edge device and connect the second mirror device and the second device when detecting that the second device is located in the device connection range after determining the target key; the second mirror image equipment acquires a target key through a message service, wherein the message service is used for receiving the target key transmitted by the interface service; the target key is sent to the second device by the second mirroring device.
Optionally, the terminal interaction device further includes an updating unit, configured to, after determining, as the target key, a candidate key located at the first sequence of the key sequence at the target time, shift the target key out of the key sequence, and update the key sequence.
Optionally, the generating unit is further configured to stop generating the key when all sequence digits in the key sequence store the candidate key; in the case that no candidate key is stored for all sequence bits in the key sequence, the reception of the data transmission request is stopped.
In the embodiment of the application, the edge equipment is adopted to receive the data transmission request of the first equipment, the target key is determined in response to the data transmission request, the target key is the quantum key generated by the edge equipment and is sent to the first equipment, so that the first equipment transmits target data to the second equipment based on the target key.
According to another aspect of the embodiment of the invention, a terminal interaction device for implementing the terminal interaction method is also provided. As shown in fig. 8, the apparatus includes:
a request transmitting unit 802 configured to transmit a data transmission request, where the data transmission request is used to request transmission of target data to the second device;
A key receiving unit 804, configured to receive a target key sent by an edge device, where the target key is a quantum key generated by the edge device;
A verification unit 806, configured to verify, when a connection request sent by the second device and used for requesting to establish a target data channel is received, a target signature carried in the connection request, where the target signature is a signature generated by the second device by using the target key;
A data encryption unit 808, configured to encrypt the target data with the target key to obtain target encrypted data if the target signature verification is successful;
The data transmitting unit 810 is configured to transmit the target encrypted data to the second device through the target data channel.
Optionally, the terminal interaction device further includes a feedback unit, configured to receive feedback data returned by the second device after the target encrypted data is sent to the second device through the target data channel; and decrypting the feedback data by using the target key to obtain target feedback data.
In the embodiment of the application, the first device initiates a data transmission request to the edge device, receives the target key returned by the edge device, verifies the target signature in the connection request sent by the second device based on the target key, and sends the target encrypted data obtained by encrypting the target key to the second device through the target data channel under the condition that verification is successful, so that a direct data transmission channel between the first device and the second device is established based on the edge device, the encrypted data is transmitted by using the data transmission channel, and the data security is improved.
According to still another aspect of the embodiment of the present invention, there is further provided an electronic device for implementing the terminal interaction method, where the electronic device may be a terminal device or a server as shown in fig. 1. The present embodiment is described taking the electronic device as a terminal device as an example. As shown in fig. 9, the electronic device comprises a memory 902 and a processor 904, the memory 902 having stored therein a computer program, the processor 904 being arranged to perform the steps of any of the method embodiments described above by means of the computer program.
Alternatively, in this embodiment, the electronic device may be located in at least one network device of a plurality of network devices of the computer network.
Alternatively, in the present embodiment, the above-described processor may be configured to execute the following steps by a computer program:
s1, receiving a data transmission request, wherein the data transmission request is initiated by first equipment and is used for requesting to transmit target data to second equipment;
S2, a target key is determined in response to a data transmission request, wherein the target key is a quantum key generated by edge equipment;
And S3, the target key is sent to the first device, so that the first device transmits target data to the second device based on the target key.
Alternatively, it will be understood by those skilled in the art that the structure shown in fig. 9 is only schematic, and the electronic device may also be a terminal device such as a smart phone (e.g. an Android phone, an IOS phone, etc.), a tablet computer, a palm computer, and a Mobile internet device (Mobile INTERNET DEVICES, MID), a PAD, etc. Fig. 9 is not limited to the structure of the electronic device described above. For example, the electronic device may also include more or fewer components (e.g., network interfaces, etc.) than shown in FIG. 9, or have a different configuration than shown in FIG. 9.
The memory 902 may be used to store software programs and modules, such as program instructions/modules corresponding to the terminal interaction method and apparatus in the embodiment of the present invention, and the processor 904 executes the software programs and modules stored in the memory 902, thereby executing various functional applications and data processing, that is, implementing the terminal interaction method described above. The memory 902 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 902 may further include memory remotely located relative to the processor 904, which may be connected to the terminal via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. The memory 902 may be used for storing information such as a key and target data, but not limited to. As an example, as shown in fig. 9, the memory 902 may include, but is not limited to, the receiving unit 702, the determining unit 704, and the transmitting unit 706 in the terminal interaction device. In addition, other module units in the terminal interaction device may be further included, but are not limited to, and are not described in detail in this example.
Optionally, the transmission device 906 is used to receive or transmit data via a network. Specific examples of the network described above may include wired networks and wireless networks. In one example, the transmission means 906 includes a network adapter (Network Interface Controller, NIC) that can connect to other network devices and routers via a network cable to communicate with the internet or a local area network. In one example, the transmission device 906 is a Radio Frequency (RF) module for communicating wirelessly with the internet.
In addition, the electronic device further includes: a display 908 for displaying the key and signature; and a connection bus 910 for connecting the respective module parts in the above-described electronic device.
In other embodiments, the terminal device or the server may be a node in a distributed system, where the distributed system may be a blockchain system, and the blockchain system may be a distributed system formed by connecting the plurality of nodes through a network communication. Among them, the nodes may form a Peer-To-Peer (P2P) network, and any type of computing device, such as a server, a terminal, etc., may become a node in the blockchain system by joining the Peer-To-Peer network.
According to one aspect of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The computer instructions are read from the computer-readable storage medium by a processor of a computer device, which executes the computer instructions, causing the computer device to perform the methods provided in the various alternative implementations of the terminal interaction aspects described above. Wherein the computer program is arranged to perform the steps of any of the method embodiments described above when run.
Alternatively, in the present embodiment, the above-described computer-readable storage medium may be configured to store a computer program for executing the steps of:
s1, receiving a data transmission request, wherein the data transmission request is initiated by first equipment and is used for requesting to transmit target data to second equipment;
S2, a target key is determined in response to a data transmission request, wherein the target key is a quantum key generated by edge equipment;
And S3, the target key is sent to the first device, so that the first device transmits target data to the second device based on the target key.
Alternatively, in this embodiment, it will be understood by those skilled in the art that all or part of the steps in the methods of the above embodiments may be performed by a program for instructing a terminal device to execute the steps, where the program may be stored in a computer readable storage medium, and the storage medium may include: flash disk, read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), magnetic disk or optical disk, etc.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
The integrated units in the above embodiments may be stored in the above-described computer-readable storage medium if implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solution of the present invention may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing one or more computer devices (which may be personal computers, servers or network devices, etc.) to perform all or part of the steps of the method described in the embodiments of the present invention.
In the foregoing embodiments of the present invention, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In several embodiments provided by the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, such as the division of the units, is merely a logical function division, and may be implemented in another manner, for example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.

Claims (14)

1. The terminal interaction method is characterized by being applied to edge equipment and comprising the following steps of:
receiving a data transmission request, wherein the data transmission request is initiated by first equipment and is used for requesting to transmit target data to second equipment;
determining a target key in response to the data transmission request, wherein the target key is a quantum key generated by edge equipment;
transmitting the target key to the first device, so that the first device transmits the target data to the second device based on the target key;
Wherein said determining a target key in response to said data transfer request comprises:
Determining a target moment when a data transmission request is received;
Determining a candidate key positioned at the first sequence of the key sequence at the target moment as the target key;
Wherein said sending the target key to the first device comprises: transmitting the target key to a first device through a first mirroring device;
Wherein the method further comprises, prior to sending the target key to the first device by the first mirroring device:
Generating candidate keys regularly according to the key generation period; wherein the timing generation key comprises: under the condition that candidate keys are stored in all sequence orders in the key sequence, stopping generating the key; stopping receiving the data transmission request under the condition that candidate keys are not stored in all sequence orders in the key sequence;
The first device and the second device are terminal devices which are located in the device connection range of the edge device and are in different device communities, the edge device is a physical device which is established for a plurality of device communities and is used for realizing data interaction of the terminal devices in the device connection range, and the first mirror device is a first mirror device which is established by the edge device through a mirror device module and is matched with the first device.
2. The method of claim 1, wherein prior to receiving the data transmission request, the method further comprises:
Creating a first mirror device for the first device in the edge device if the first device is detected to be within a device connection range;
and connecting the first mirror device and the first device.
3. The method according to claim 2, characterized in that:
The receiving a data transmission request includes: the data transmission request of the first device is received by the first mirror device.
4. The method of claim 1, wherein prior to sending the target key to the first device by the first mirroring device, the method further comprises:
and adding the candidate keys to a key sequence, wherein the candidate keys in the key sequence are ordered according to generation time.
5. The method of claim 1, wherein the sending the target key to the first device by the first mirroring device comprises:
the first mirror device obtains the target key through an interface service;
And sending the target key to the first device.
6. The method of claim 5, wherein after determining the target key, the method comprises:
if the second device is detected to be located in the device connection range, creating a second mirror device for the second device in the edge device, and connecting the second mirror device and the second device;
The second mirror device obtains the target key through a message service, wherein the message service is used for receiving the target key transmitted by the interface service;
and sending the target key to the second device through the second mirror device.
7. The method of claim 1, wherein after determining a candidate key at the first of the sequence of key sequences at the target time instant as the target key, the method further comprises:
and moving the target key out of the key sequence and updating the key sequence.
8. The method of claim 7, wherein the timing generation key comprises:
Stopping generating the key under the condition that all sequence orders in the key sequence store the candidate key;
And stopping receiving the data transmission request under the condition that all sequence bit numbers in the key sequence do not store the candidate key.
9. A terminal interaction method, which is applied to a first device, comprising:
Transmitting a data transmission request, wherein the data transmission request is used for requesting to transmit target data to second equipment;
Receiving a target key sent by edge equipment, wherein the target key is a quantum key generated by the edge equipment;
Under the condition that a connection request for requesting to establish a target data channel sent by the second equipment is received, verifying a target signature carried in the connection request, wherein the target signature is a signature generated by the second equipment by using the target key;
Under the condition that the target signature verification is successful, encrypting the target data by using the target key to obtain target encrypted data;
Transmitting the target encrypted data to the second device through the target data channel;
wherein the target key is determined by:
Determining a target time when the second equipment receives a data transmission request;
Determining a candidate key positioned at the first sequence of the key sequence at the target moment as the target key;
The target key sent by the receiving edge device includes: the first mirror image device in the receiving edge device sends the target key;
Wherein, before determining the candidate key located at the first sequence of the key sequence at the target time as the target key, the method further comprises: acquiring a candidate key generated by edge equipment at regular time according to a key generation period; under the condition that candidate keys are stored in all sequence orders in the key sequence, stopping generating the key; stopping receiving the data transmission request under the condition that candidate keys are not stored in all sequence orders in the key sequence;
The first device and the second device are terminal devices of different device communities and located in the device connection range of the edge device, and the edge device is a physical device which is established for a plurality of device communities and is used for realizing data interaction of the terminal devices in the device connection range of the device communities.
10. The method of claim 9, wherein after transmitting the target encrypted data to the second device over the target data channel, the method further comprises:
Receiving feedback data returned by the second equipment;
And decrypting the feedback data by using the target key to obtain target feedback data.
11. A terminal interaction device, characterized in that it is applied to an edge device, and comprises:
A receiving unit, configured to receive a data transmission request, where the data transmission request is initiated by a first device and is used to request transmission of target data to a second device;
the determining unit is used for responding to the data transmission request and determining a target key, wherein the target key is a quantum key generated by the edge equipment;
A transmitting unit configured to transmit the target key to the first device, so that the first device transmits the target data to the second device based on the target key;
The determining unit is further used for determining the target time when the data transmission request is received; determining a candidate key positioned at the first sequence of the key sequence at the target moment as the target key;
The sending unit is further used for sending the target key to the first device through the first mirror device;
The terminal interaction device further comprises: a generation unit configured to periodically generate a candidate key according to a key generation period before the target key is transmitted to the first device through the first mirroring device; wherein the timing generation key comprises: under the condition that candidate keys are stored in all sequence orders in the key sequence, stopping generating the key; stopping receiving the data transmission request under the condition that candidate keys are not stored in all sequence orders in the key sequence;
The first device and the second device are terminal devices of different device communities and located in the device connection range of the edge device, and the edge device is a physical device which is established for a plurality of device communities and is used for realizing data interaction of the terminal devices in the device connection range of the device communities.
12. A terminal interaction device, characterized in that it is applied to a first apparatus, comprising:
A request transmitting unit configured to transmit a data transmission request, where the data transmission request is used to request transmission of target data to a second device;
The key receiving unit is used for receiving a target key sent by the edge equipment, wherein the target key is a quantum key generated by the edge equipment;
The verification unit is used for verifying a target signature carried in a connection request under the condition that the connection request for requesting to establish a target data channel sent by the second device is received, wherein the target signature is a signature generated by the second device by using the target key;
The data encryption unit is used for encrypting the target data by utilizing the target key under the condition that the target signature verification is successful, so as to obtain target encrypted data;
A data transmitting unit configured to transmit the target encrypted data to the second device through the target data channel;
wherein the target key is determined by: determining a target time when the second equipment receives a data transmission request; acquiring a candidate key generated by edge equipment at regular time according to a key generation period; under the condition that candidate keys are stored in all sequence orders in the key sequence, stopping generating the key; stopping receiving the data transmission request under the condition that candidate keys are not stored in all sequence orders in the key sequence; determining a candidate key positioned at the first sequence of the key sequence at the target moment as the target key;
the key receiving unit is further configured to receive the target key sent by the first mirror device in the edge device;
The first device and the second device are terminal devices of different device communities and located in the device connection range of the edge device, and the edge device is a physical device which is established for a plurality of device communities and is used for realizing data interaction of the terminal devices in the device connection range of the device communities.
13. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored program, wherein the program when run performs the method of any one of claims 1 to 10.
14. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method according to any of the claims 1 to 10 by means of the computer program.
CN202111015922.6A 2021-08-31 2021-08-31 Terminal interaction method and device, storage medium and electronic equipment Active CN113839924B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111015922.6A CN113839924B (en) 2021-08-31 2021-08-31 Terminal interaction method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111015922.6A CN113839924B (en) 2021-08-31 2021-08-31 Terminal interaction method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN113839924A CN113839924A (en) 2021-12-24
CN113839924B true CN113839924B (en) 2024-04-23

Family

ID=78961850

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111015922.6A Active CN113839924B (en) 2021-08-31 2021-08-31 Terminal interaction method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113839924B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116915922B (en) * 2023-09-13 2023-12-01 中移(苏州)软件技术有限公司 Image transmission method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106535184A (en) * 2016-10-18 2017-03-22 深圳市金立通信设备有限公司 Key management method and system
CN106878015A (en) * 2017-04-14 2017-06-20 江苏亨通问天量子信息研究院有限公司 Encryption satellite communication system and method
CN106953729A (en) * 2017-04-14 2017-07-14 江苏亨通问天量子信息研究院有限公司 Satellite communication encryption system and method based on quantum key
CN109347635A (en) * 2018-11-14 2019-02-15 中云信安(深圳)科技有限公司 A kind of Internet of Things security certification system and authentication method based on national secret algorithm
CN112398651A (en) * 2021-01-12 2021-02-23 南京易科腾信息技术有限公司 Quantum secret communication method and device, electronic equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8924573B2 (en) * 2012-03-12 2014-12-30 Microsoft Corporation Secure capability negotiation between a client and server
US11153079B2 (en) * 2019-11-25 2021-10-19 Verizon Patent And Licensing Inc. Systems and methods for utilizing quantum entropy for secure virtual private network connections

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106535184A (en) * 2016-10-18 2017-03-22 深圳市金立通信设备有限公司 Key management method and system
CN106878015A (en) * 2017-04-14 2017-06-20 江苏亨通问天量子信息研究院有限公司 Encryption satellite communication system and method
CN106953729A (en) * 2017-04-14 2017-07-14 江苏亨通问天量子信息研究院有限公司 Satellite communication encryption system and method based on quantum key
CN109347635A (en) * 2018-11-14 2019-02-15 中云信安(深圳)科技有限公司 A kind of Internet of Things security certification system and authentication method based on national secret algorithm
CN112398651A (en) * 2021-01-12 2021-02-23 南京易科腾信息技术有限公司 Quantum secret communication method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113839924A (en) 2021-12-24

Similar Documents

Publication Publication Date Title
US20220006627A1 (en) Quantum key distribution node apparatus and method for quantum key distribution thereof
EP2538606B1 (en) Provisioning a shared secret to a portable electronic device and to a service entity
CN108886468B (en) System and method for distributing identity-based key material and certificates
CN112640510B (en) Method and apparatus for establishing a wireless secure link while maintaining privacy from tracking
KR20190005878A (en) Method and system for secure data transmission
CN108574569B (en) Authentication method and authentication device based on quantum key
EP3602997B1 (en) Mutual authentication system
CN106788989B (en) Method and equipment for establishing secure encrypted channel
US8750512B2 (en) Authenticating an ephemeral Diffie-Hellman using a trusted third party
JP7224855B2 (en) Communication device, control method and program
CN108173644A (en) Data transfer encryption method, device, storage medium, equipment and server
CN107172001B (en) Control method and device of website proxy server and key proxy server
CN106576043A (en) Virally distributable trusted messaging
CN104836784A (en) Information processing method, client, and server
CN111654481B (en) Identity authentication method, identity authentication device and storage medium
CN113839924B (en) Terminal interaction method and device, storage medium and electronic equipment
KR102266654B1 (en) Method and system for mqtt-sn security management for security of mqtt-sn protocol
CN114142995B (en) Key security distribution method and device for block chain relay communication network
JP6577999B2 (en) Data transmission / reception method and system
CN116506158A (en) Internet of things equipment encryption transmission method and system based on smart city
CN113452513B (en) Key distribution method, device and system
JP4793405B2 (en) Common key generation method, common key generation system, and parent device and child device in common key generation system
CN110536287B (en) Forward safety implementation method and device
CN111147344B (en) Virtual private network implementation method, device, equipment and medium
CN117997522A (en) Quantum session key-based data interaction method, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant