CN114025329A - Method for realizing standby NFC key in CCC application mobile terminal - Google Patents
Method for realizing standby NFC key in CCC application mobile terminal Download PDFInfo
- Publication number
- CN114025329A CN114025329A CN202111306067.4A CN202111306067A CN114025329A CN 114025329 A CN114025329 A CN 114025329A CN 202111306067 A CN202111306067 A CN 202111306067A CN 114025329 A CN114025329 A CN 114025329A
- Authority
- CN
- China
- Prior art keywords
- nfc
- key
- vehicle
- mobile phone
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 230000003993 interaction Effects 0.000 claims abstract description 5
- 238000013475 authorization Methods 0.000 claims abstract description 3
- 238000012795 verification Methods 0.000 claims description 4
- 230000004044 response Effects 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 abstract description 2
- 238000004891 communication Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/47—Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a method for realizing a standby NFC key in a CCC application mobile terminal, wherein a vehicle enterprise provides a legal authorization NFC card to a vehicle owner; when a vehicle owner shares a key through a mobile phone APP, setting a mobile phone NFC as a card reader mode, and starting a frequency field and an NFC card for interaction; the mobile phone NFC requests a random number, and a signature result and a certificate chain are returned; the mobile phone verifies the signature result and the certificate chain information, and the upper card issuing sheet is identified to the cloud of the vehicle enterprise; the vehicle enterprise returns a public key of a vehicle end certificate of the bound vehicle and special data of NFCID; the NFC mobile phone and the NFC card generate standard shareinfo and shareinfo | PD as data sources to generate an AESKEY symmetric key through a standard ECDH mode. The method for realizing the standby NFC key in the CCC application mobile terminal facilitates simple and rapid vehicle NFC key sharing, ensures encryption manufacturing and avoids data leakage.
Description
Technical Field
The invention relates to the technical field of vehicle networks and intelligent automobile digital keys, in particular to a method for realizing a standby NFC key in a CCC application mobile terminal.
Background
In the current CCC (Car Connectivity association-automotive alliance) alliance, the current CCC alliance comprises two protocol versions of Digital Key specifications (Car Connectivity association Digital Key Release 2-automotive alliance Digital Key protocol 2.0 specification) and CCC3.0(Car Connectivity association Digital Key Release 3-automotive alliance Digital Key protocol 3.0 specification), wherein the former supports the NFC use function, and the latter adds the BLE communication and UWB positioning functions on the basis of the former;
in the CCC2.0 protocol specification, all digital keys must be carried by mobile phones, and no matter whether the mobile phones of car owners are activated or the keys are shared, data interaction must be performed in an on _ line mode. When the proportion of the number of the functional modules supporting the NFC is less than 20 percent, such as when keys are shared by family or friends, the other party must be a mobile phone supporting the functions of the NFC module, and otherwise the mobile phone cannot be used. More times, when selling the automobile with the digital key, the automobile enterprises can prepare a matched spare key (NFC card) for the automobile owner, and can use the automobile under some emergency situations. Due to the obvious technical and regulatory definition of CCC2.0 on the key sharing policy, it is difficult for a vehicle enterprise to provide a spare NFC key that can be used for unbound factory vehicles.
Therefore, we propose a method for implementing a standby NFC key in a mobile end of a CCC application in order to solve the problems proposed in the above.
Disclosure of Invention
The invention aims to provide a method for realizing a standby NFC key in a CCC application mobile terminal, so as to solve the problem that a vehicle enterprise is difficult to provide a usable standby NFC key for unbound factory vehicles due to the obvious technical and rule definition of CCC2.0 on a key sharing strategy in the prior art.
In order to achieve the purpose, the invention provides the following technical scheme: a method for realizing a standby NFC key in a CCC application mobile terminal comprises the following steps:
the method comprises the following steps: providing, by the vehicle enterprise, a legally authorized NFC card to the vehicle owner;
step two: when the car owner shares the key through the mobile phone APP, the mobile phone NFC is set to be in a card reader mode, and the frequency field and the NFC card are started for interaction.
Step three: and (3) requesting a random number (a) by the NFC of the mobile phone, enabling the NFC card to perform standard SHA256with ECDSA, and returning a signature result and a certificate chain.
Step four: the mobile phone verifies the signature result and the certificate chain information, and the card sending sheet is identified to the cloud of the vehicle enterprise.
Step five: the vehicle enterprise returns a public key of a vehicle end certificate of the bound vehicle and special data of NFCID;
step six: the NFC mobile phone and the NFC card generate a standard shareinfo, shareinfo | PD is used as a data source to generate an AESKEY symmetric key, and the AESKEY symmetric key is issued for standard sharing key data (sharing) to be encrypted through an AES _ CBC mode and sent to the NFC card.
Step seven: the NFC card generates ECC _ KP, uses ECC _ SK to sign sharing, shares format response according to standard format and encrypts through AES _ CBC mode
Step eight: the NFC mobile phone selects CFA, calls a standard CCC instruction < < Automizeredpoint > >, forms private mailbox standby NFC key for sharing verification to realize method attack data in a CCC application mobile terminal, and the result is encrypted and sent to the NFC card through an AES _ CBC mode.
Step nine: the method of storing the standby NFC key of the mailbox by the NFC in the CCC application mobile terminal is attestion, and the standby NFC key can be used as a key for a standard sharer user subsequently.
Preferably, the PD includes a vehicle identification code, a vehicle end certificate, a vehicle end public key, an anti-theft token, an apparatus public and private key, a vehicle number, and key slot position information.
Compared with the prior art, the invention has the beneficial effects that: the method for realizing the standby NFC key in the CCC application mobile terminal facilitates simple and rapid sharing of the vehicle NFC key, can ensure encryption manufacturing, and avoids data leakage and the like.
Drawings
FIG. 1 is a schematic flow chart of the system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides a technical solution: a method for realizing a standby NFC key in a CCC application mobile terminal comprises the following steps:
the method comprises the following steps: providing a legally authorized NFC (Near Field Communication) card to the vehicle owner by the vehicle enterprise;
step two: when the car owner shares the key through the mobile phone APP, the mobile phone NFC is set to be in a card reader mode, and the frequency field and the NFC card are started for interaction.
Step three: and (3) requesting a random number (a) by the NFC of the mobile phone, enabling the NFC card to perform standard SHA256with ECDSA, and returning a signature result and a certificate chain.
Step four: the mobile phone verifies the signature result and the certificate chain information, and the card issuing sheet is identified to the cloud of the vehicle enterprise by an identification Number (NFCID).
Step five: the Vehicle enterprise returns a Vehicle end certificate Public Key (Vehicle Public Key-V _ PK) of the bound Vehicle and NFCID special proprietary Data (Prop Data-PD);
step six: the NFC mobile phone and the NFC card generate a Standard shareinfo in an ECDH (Elliptic Curve Diffie-Hellman key Exchange-Elliptic Curve Diffie-Hellman key Exchange) mode, the shareinfo | PD serves as a data source to generate an AESKEY symmetric key, and the shared key data (sharing) used for the Standard is sent to the NFC card in an AES _ CBC (Advanced Encryption Standard) mode for Encryption and sending to the NFC card.
Step seven: the NFC card generates ECC _ KP (ECC Key Pair-elliptic curve Key Pair), signs the sharing by using ECC _ SK (ECC Public Key-Public Key), shares format response according to standard format and encrypts by AES _ CBC mode
Step eight: the NFC mobile phone selects CFA (CCC Framework AID-CCC component application AID), calls a standard CCC instruction < < authorization endpoint > >, forms private mailbox standby NFC key for sharing verification to realize method attack data in a CCC application mobile terminal, and sends the result to the NFC card through AES-CBC mode encryption.
Step nine: the method of storing the standby NFC key of the mailbox by the NFC in the CCC application mobile terminal is attestion, and the standby NFC key can be used as a key for a standard sharer user subsequently.
Further, the PD includes a vehicle identification code, a vehicle end certificate, a vehicle end public key, an antitheft token, an equipment public and private key, a vehicle number, and key slot position information.
When key sharing is carried out through a mobile phone APP specifically, a mobile phone NFC is set to be in a card reader mode, and a frequency field is started to interact with an NFC card;
and requesting a random number (a) through the NFC of the mobile phone, enabling the NFC card to perform standard SHA256withECDSA (elliptic curve signature), and returning a signature result (signature) and a certificate chain (chain) to the mobile phone.
Verifying the signature result (signature) and certificate chain (chain) information by the mobile phone, sending a card issuing NFCID to the cloud of the vehicle enterprise, and inquiring card special information;
the vehicle enterprise returns a vehicle end certificate public key (V _ PK) and NFCID special Private Data (PD) of the bound vehicle; the NFC mobile phone and the NFC card generate a standard shareinfo, shareinfo | PD is used as a data source to generate an AESKEY symmetric key, and the AESKEY symmetric key is issued for standard sharing key data (sharing) to be encrypted through an AES _ CBC mode and sent to the NFC card.
The NFC card generates ECC _ KP, uses ECC _ SK to sign (sharing), responds according to a standard format sharing format and is encrypted through an AES _ CBC mode, the NFC mobile phone selects CFA, calls a standard CCC instruction < < Autoorize end > >, forms private mailbox authentication data for sharing verification, and sends the result to the NFC card through the AES _ CBC mode in an encrypted mode.
The NFC holds the mailbox authentication, which can subsequently be used as a standard sharer user to use the key.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and all the changes or substitutions should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (2)
1. A method for realizing a standby NFC key in a CCC application mobile terminal is characterized by comprising the following steps:
the method comprises the following steps: providing, by the vehicle enterprise, a legally authorized NFC card to the vehicle owner;
step two: when a vehicle owner shares a key through a mobile phone APP, setting a mobile phone NFC as a card reader mode, and starting a frequency field and an NFC card for interaction;
step three: the NFC of the mobile phone requests a random number (a), the NFC card carries out standard SHA256withECDSA on the random number, and a signature result and a certificate chain are returned;
step four: the mobile phone verifies the signature result and the certificate chain information, and the upper card issuing sheet is identified to the cloud of the vehicle enterprise;
step five: the vehicle enterprise returns a public key of a vehicle end certificate of the bound vehicle and special data of NFCID;
step six: the NFC mobile phone and the NFC card generate a standard shareinfo in a standard ECDH mode, the shareinfo | PD serves as a data source to generate an AESKEY symmetric key, and data (sharing) used for the standard is sent to the NFC card in an AES _ CBC mode in an encrypted mode;
step seven: the NFC card generates ECC _ KP, uses ECC _ SK to sign sharing, and shares format response according to a standard format and encrypts through an AES _ CBC mode;
step eight: the NFC mobile phone selects CFA, calls a standard CCC instruction < < authorization end > >, forms private mailbox standby NFC key for sharing verification to realize method attack data in a CCC application mobile terminal, and sends the result to an NFC card through AES-CBC mode encryption;
step nine: the method of storing the standby NFC key of the mailbox by the NFC in the CCC application mobile terminal is attestion, and the standby NFC key can be used as a key for a standard sharer user subsequently.
2. A method for implementing the standby NFC key in a mobile terminal for CCC application according to claim 1, wherein: the PD comprises a vehicle identification code, a vehicle end certificate, a vehicle end public key, an anti-theft token, an equipment public and private key, a vehicle number and key slot position information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111306067.4A CN114025329A (en) | 2021-11-05 | 2021-11-05 | Method for realizing standby NFC key in CCC application mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111306067.4A CN114025329A (en) | 2021-11-05 | 2021-11-05 | Method for realizing standby NFC key in CCC application mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114025329A true CN114025329A (en) | 2022-02-08 |
Family
ID=80061552
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111306067.4A Pending CN114025329A (en) | 2021-11-05 | 2021-11-05 | Method for realizing standby NFC key in CCC application mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114025329A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115273289A (en) * | 2022-09-20 | 2022-11-01 | 上海银基信息安全技术股份有限公司 | Physical key activation method, system, device, equipment and medium |
CN115675361A (en) * | 2022-11-30 | 2023-02-03 | 成都赛力斯科技有限公司 | Cabin state adjusting method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110136306A (en) * | 2019-05-16 | 2019-08-16 | 广州小鹏汽车科技有限公司 | Vehicle key control method and system |
US20200148168A1 (en) * | 2018-11-09 | 2020-05-14 | Ford Global Technologies, Llc | System and method for distributing digital vehicle keys to passive nfc devices via nfc |
US20200160635A1 (en) * | 2018-11-19 | 2020-05-21 | Aisin Seiki Kabushiki Kaisha | Door lock system and handle of door for vehicle |
CN112509180A (en) * | 2019-09-13 | 2021-03-16 | 福特全球技术公司 | Spare key with wireless function |
CN113301167A (en) * | 2021-06-30 | 2021-08-24 | 深圳市雪球科技有限公司 | Cross-specification sharing method, device and equipment of digital key |
-
2021
- 2021-11-05 CN CN202111306067.4A patent/CN114025329A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200148168A1 (en) * | 2018-11-09 | 2020-05-14 | Ford Global Technologies, Llc | System and method for distributing digital vehicle keys to passive nfc devices via nfc |
US20200160635A1 (en) * | 2018-11-19 | 2020-05-21 | Aisin Seiki Kabushiki Kaisha | Door lock system and handle of door for vehicle |
CN110136306A (en) * | 2019-05-16 | 2019-08-16 | 广州小鹏汽车科技有限公司 | Vehicle key control method and system |
CN112509180A (en) * | 2019-09-13 | 2021-03-16 | 福特全球技术公司 | Spare key with wireless function |
CN113301167A (en) * | 2021-06-30 | 2021-08-24 | 深圳市雪球科技有限公司 | Cross-specification sharing method, device and equipment of digital key |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115273289A (en) * | 2022-09-20 | 2022-11-01 | 上海银基信息安全技术股份有限公司 | Physical key activation method, system, device, equipment and medium |
CN115675361A (en) * | 2022-11-30 | 2023-02-03 | 成都赛力斯科技有限公司 | Cabin state adjusting method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102219756B1 (en) | Method for managing the state of connected devices | |
CN1251549C (en) | Method for enabling PKI functionsin a smart card | |
CN101978675B (en) | System and method for securely issuing subscription credentials to communication devices | |
CN109842862A (en) | Secure short range wireless communication connection is established in the car | |
Förster et al. | PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET) | |
CN101765105B (en) | Method for realizing communication encryption as well as system and mobile terminal therefor | |
CN114025329A (en) | Method for realizing standby NFC key in CCC application mobile terminal | |
CN109874125A (en) | The car owner's authorization method and system of bluetooth key, storage medium and vehicle Cloud Server | |
CN102118246A (en) | System and method for performing an asymmetric key exchange between a vehicle and a remote device | |
HRP20160140T1 (en) | A qualified electronic signature system, associated method and mobile phone device for a qualified electronic signature | |
CN101990201B (en) | Method, system and device for generating general bootstrapping architecture (GBA) secret key | |
CN103037366A (en) | Mobile terminal user authentication method and mobile terminal based on asymmetric cryptographic technique | |
WO2019056971A1 (en) | Authentication method and device | |
WO2011076102A1 (en) | Implementing method, system of universal card system and smart card | |
CN114764956B (en) | Control method and device for vehicle and readable storage medium | |
CN104506527A (en) | Multidimensional information pointer platform and data access method thereof | |
CN104994006A (en) | Back-to-back instant communication method and device based on WeChat public number | |
CN114867011A (en) | Vehicle-mounted data transmission device and method, vehicle and vehicle-mounted data transmission system | |
CN111247770B (en) | Method and related system for protecting vehicle external communication by using IBC | |
CN103916851A (en) | Safety certification method, device and system | |
CN108933761A (en) | A kind of the control flow encryption method and system of Intelligent hardware product | |
CN107396359A (en) | A kind of method and apparatus for controlling access mobile data network | |
CN104639326B (en) | A kind of method of controlling security based on certification, apparatus and system | |
KR20140071843A (en) | Method and system for providing a genuine certification service based on nfc tag | |
CN102013979A (en) | Anti-counterfeiting authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |