CN114221771B - Deep learning-oriented security token transmission and verification acceleration method and device - Google Patents
Deep learning-oriented security token transmission and verification acceleration method and device Download PDFInfo
- Publication number
- CN114221771B CN114221771B CN202111458776.4A CN202111458776A CN114221771B CN 114221771 B CN114221771 B CN 114221771B CN 202111458776 A CN202111458776 A CN 202111458776A CN 114221771 B CN114221771 B CN 114221771B
- Authority
- CN
- China
- Prior art keywords
- security token
- fpga
- verification
- transmission
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 62
- 238000012795 verification Methods 0.000 title claims abstract description 46
- 238000000034 method Methods 0.000 title claims abstract description 18
- 230000001133 acceleration Effects 0.000 title claims abstract description 14
- 230000011664 signaling Effects 0.000 claims description 12
- 230000002452 interceptive effect Effects 0.000 claims description 9
- 230000001360 synchronised effect Effects 0.000 claims description 8
- 230000006378 damage Effects 0.000 claims description 7
- 230000008030 elimination Effects 0.000 claims description 6
- 238000003379 elimination reaction Methods 0.000 claims description 6
- 238000013135 deep learning Methods 0.000 claims description 4
- 238000004064 recycling Methods 0.000 claims description 3
- 238000011084 recovery Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a deep learning-oriented security token transmission and verification acceleration method and device. The method adopts an FPGA chip to realize the following steps: generating a security token based on the random memory sequence of the FPGA; completing the transmission of the security token by using a network bypass channel; and carrying out validity check on the security token. The invention can reduce the possibility of data leakage and tampering.
Description
Technical Field
The invention relates to the technical field of data security, in particular to a deep learning-oriented security token transmission and verification acceleration method and device.
Background
With the advent and wide application of cloud computing technology, the original resource sharing mode is converted into a forward resource consumption mode due to the characteristics of cross-domain, heterogeneous and the like. Among cloud resource consumers, not only are a large number of users using cloud resources for a long period of time, but also some dynamic temporary users occasionally access cloud resources. In order to ensure data security, an agent is usually embedded in cloud resources, and the agent authenticates the dynamic temporary users through an identity authentication system in the institution, and then provides dynamic security tokens for the dynamic temporary users, so that the temporary users can access specific cloud resource services in the validity period by using the dynamic security tokens. However, the conventional computer architecture is required for the transmission and verification of the security token at present, and the data is easy to leak and tamper because the data needs to pass through a plurality of devices such as a network card, a memory, a CPU and the like.
Disclosure of Invention
The invention aims to solve the technical problem of providing a deep learning-oriented security token transmission and verification acceleration method and device, which can reduce the possibility of data leakage and tampering.
The technical scheme adopted for solving the technical problems is as follows: the method for transmitting and checking the security token oriented to deep learning is provided, and the following steps are realized by adopting an FPGA chip:
generating a security token based on the random memory sequence of the FPGA;
completing the transmission of the security token by using a network bypass channel;
and carrying out validity check on the security token.
The generation of the security token based on the random memory sequence of the FPGA specifically comprises the following substeps:
generating a true random number which is not less than a preset bit based on the random memory sequence of the FPGA;
registering a digital public key of the FPGA with a public key center based on the true random number;
solidifying a digital private key by a logic gate array circuit of the FPGA based on the true random number;
solidifying a security token generation algorithm by using a logic gate array circuit of the FPGA;
and generating a unique security token based on the digital private key by calling the security token generation algorithm.
The method for completing the transmission of the security token by using the network bypass channel specifically comprises the following substeps:
solidifying a network bypass transmission protocol by using a logic gate array circuit of the FPGA;
and carrying out interactive transmission of the security signaling at a preset rate through a bypass channel of the network link, and ensuring that the security token encapsulated and transferred in the security signaling is complete and effective through the network bypass transmission protocol.
The verification of the validity of the security token specifically comprises the following substeps:
solidifying a validity checking algorithm by using a logic gate array circuit of the FPGA;
the digital public key synchronization of all FPGA nodes in the network is ensured to be issued by the public key center through a network bypass transmission protocol;
and verifying the security tokens from FPGA nodes of other networks by adopting the validity verification algorithm based on the digital public keys which are synchronized locally.
The deep learning-oriented security token transmission and verification acceleration method further comprises the step of recovering and destroying the security token, and specifically comprises the following steps: the FPGA sets the effective life cycle of the security token; and for the security token needing to be recovered in advance before the effective lifetime is reached, synchronizing each FPGA node in the network in a broadcast mode through a network bypass channel, and carrying out local verification and elimination by each FPGA node before the effective lifetime of the security token is reached.
The technical scheme adopted for solving the technical problems is as follows: the utility model provides a security token transmission and check-up accelerating device towards deep learning, adopts the FPGA chip to realize, includes:
the security token generation module is used for generating a security token based on the random memory sequence of the FPGA;
the transmission module is used for completing the transmission of the security token by utilizing a network bypass channel;
and the verification module is used for verifying the validity of the security token.
The security token generation module comprises:
the true random number generation unit is used for generating true random numbers with not less than preset bits based on the random memory sequence of the FPGA;
a digital public key registration unit for registering the digital public key of the FPGA with a public key center based on the true random number;
the digital private key solidifying unit is used for solidifying the digital private key based on the true random number by a logic gate array circuit of the FPGA;
the security token algorithm generating unit is used for solidifying the security token generating algorithm by using the logic gate array circuit of the FPGA;
and the security token generation unit is used for generating a unique security token based on the digital private key by calling the security token generation algorithm.
The transmission module includes:
the network bypass transmission protocol solidifying unit is used for solidifying the network bypass transmission protocol by using the logic gate array circuit of the FPGA;
and the interactive transmission unit is used for carrying out interactive transmission of the security signaling at a preset rate through a bypass channel of the network link, and ensuring that the security token encapsulated and transferred in the security signaling is complete and effective through the network bypass transmission protocol.
The verification module comprises:
the verification algorithm solidifying unit is used for solidifying a validity verification algorithm by using a logic gate array circuit of the FPGA;
the digital public key synchronization unit is used for ensuring that the public key center distributes digital public key synchronization of all FPGA nodes in the network through a network bypass transmission protocol;
and the verification unit is used for verifying the security tokens from the FPGA nodes of other networks by adopting the validity verification algorithm based on the digital public keys which are synchronized locally.
The deep learning-oriented security token transmission and verification acceleration device further comprises a recovery destruction module, wherein the recovery destruction module receives synchronous information through a network bypass channel for the security token needing to be recovered in advance before the effective life period is reached, and performs local verification and elimination before the effective life period of the security token is reached.
Advantageous effects
Due to the adoption of the technical scheme, compared with the prior art, the invention has the following advantages and positive effects: the invention completes the generation, transmission and verification of the security token by using the FPGA, and as all data are processed and stored in the FPGA, the data are prevented from passing through a plurality of devices such as a network card, a memory, a CPU and the like, thereby reducing the possibility of data leakage and tampering.
Drawings
Fig. 1 is a flow chart of a first embodiment of the present invention.
Detailed Description
The invention will be further illustrated with reference to specific examples. It is to be understood that these examples are illustrative of the present invention and are not intended to limit the scope of the present invention. Further, it is understood that various changes and modifications may be made by those skilled in the art after reading the teachings of the present invention, and such equivalents are intended to fall within the scope of the claims appended hereto.
The first embodiment of the invention relates to a deep learning-oriented security token transmission and verification acceleration method, which is implemented by adopting an FPGA chip as shown in fig. 1, and comprises the following steps:
and step 1, generating a security token based on the random memory sequence of the FPGA. The method specifically comprises the following steps: step 1a, generating a true random number of not less than 4096 bits based on a random memory sequence of the FPGA; step 1b, registering a digital public key of the FPGA with a public key center based on the true random number; step 1c, solidifying a digital private key by a logic gate array circuit of the FPGA based on the true random number; step 1d, solidifying a security token generation algorithm by using a logic gate array circuit of the FPGA; and step 1e, generating a unique security token based on the digital private key by calling the security token generation algorithm.
And 2, completing the transmission of the security token by using a network bypass channel. The method specifically comprises the following steps: step 2a, solidifying a network bypass transmission protocol by using a logic gate array circuit of the FPGA; step 2b, carrying out interactive transmission of security signaling at a rate not exceeding 1Mbps through a bypass channel of the network link; and 2c, ensuring that the security token encapsulated and transferred in the security signaling is complete and effective through the network bypass transmission protocol.
And 3, carrying out validity verification on the security token. The method specifically comprises the following steps: step 3a, solidifying a validity checking algorithm by using a logic gate array circuit of the FPGA; step 3b, ensuring that a public key center issues digital public key synchronization of all FPGA nodes in a network through a network bypass transmission protocol; and 3c, checking the security tokens from FPGA nodes of other networks by adopting the validity checking algorithm based on the digital public keys which are synchronized locally.
And 4, recycling and destroying the security token. The method comprises the following steps: step 4a, the FPGA sets the effective life cycle of the security token; and 4b, synchronizing the security tokens needing to be recovered in advance before the effective life time is reached to each FPGA node in the network in a broadcast mode through a network bypass channel, and carrying out local verification and elimination by each FPGA node before the effective life time of the security tokens is reached.
It is easy to find that the method and the device complete the generation, transmission, verification and recovery destruction of the security token by using the FPGA, and as all data are processed and stored in the FPGA, the data are prevented from being required to pass through a plurality of devices such as a network card, a memory and a CPU, and the possibility of data leakage and tampering is reduced.
The second embodiment of the invention relates to a deep learning-oriented security token transmission and verification acceleration device, which is realized by adopting an FPGA chip and comprises: the security token generation module is used for generating a security token based on the random memory sequence of the FPGA; the transmission module is used for completing the transmission of the security token by utilizing a network bypass channel; and the verification module is used for verifying the validity of the security token.
The security token generation module comprises: the true random number generation unit is used for generating true random numbers with not less than preset bits based on the random memory sequence of the FPGA; a digital public key registration unit for registering the digital public key of the FPGA with a public key center based on the true random number; the digital private key solidifying unit is used for solidifying the digital private key based on the true random number by a logic gate array circuit of the FPGA; the security token algorithm generating unit is used for solidifying the security token generating algorithm by using the logic gate array circuit of the FPGA; and the security token generation unit is used for generating a unique security token based on the digital private key by calling the security token generation algorithm.
The transmission module includes: the network bypass transmission protocol solidifying unit is used for solidifying the network bypass transmission protocol by using the logic gate array circuit of the FPGA; and the interactive transmission unit is used for carrying out interactive transmission of the security signaling at a preset rate through a bypass channel of the network link, and ensuring that the security token encapsulated and transferred in the security signaling is complete and effective through the network bypass transmission protocol.
The verification module comprises: the verification algorithm solidifying unit is used for solidifying a validity verification algorithm by using a logic gate array circuit of the FPGA; the digital public key synchronization unit is used for ensuring that the public key center distributes digital public key synchronization of all FPGA nodes in the network through a network bypass transmission protocol; and the verification unit is used for verifying the security tokens from the FPGA nodes of other networks by adopting the validity verification algorithm based on the digital public keys which are synchronized locally.
The deep learning-oriented security token transmission and verification acceleration device further comprises a recovery destruction module, wherein the recovery destruction module receives synchronous information through a network bypass channel for the security token needing to be recovered in advance before the effective life period is reached, and performs local verification and elimination before the effective life period of the security token is reached.
Claims (4)
1. The deep learning-oriented security token transmission and verification acceleration method is characterized by comprising the following steps of:
generating a security token based on the random memory sequence of the FPGA specifically comprises the following steps:
generating a true random number which is not less than a preset bit based on the random memory sequence of the FPGA;
registering a digital public key of the FPGA with a public key center based on the true random number;
solidifying a digital private key by a logic gate array circuit of the FPGA based on the true random number;
solidifying a security token generation algorithm by using a logic gate array circuit of the FPGA;
generating a unique security token based on the digital private key by invoking the security token generation algorithm;
the method for completing the transmission of the security token by using the network bypass channel specifically comprises the following steps:
solidifying a network bypass transmission protocol by using a logic gate array circuit of the FPGA;
interactive transmission of security signaling is carried out at a preset rate through a bypass channel of a network link, and the integrity and effectiveness of the security token encapsulated and transferred in the security signaling are ensured through the network bypass transmission protocol;
the validity verification of the security token specifically comprises the following steps:
solidifying a validity checking algorithm by using a logic gate array circuit of the FPGA;
the digital public key synchronization of all FPGA nodes in the network is ensured to be issued by the public key center through a network bypass transmission protocol; and verifying the security tokens from FPGA nodes of other networks by adopting the validity verification algorithm based on the digital public keys which are synchronized locally.
2. The deep learning oriented security token transmission and verification acceleration method of claim 1, further comprising the step of reclaiming and destroying the security token, in particular: the FPGA sets the effective life cycle of the security token; and for the security token needing to be recovered in advance before the effective lifetime is reached, synchronizing each FPGA node in the network in a broadcast mode through a network bypass channel, and carrying out local verification and elimination by each FPGA node before the effective lifetime of the security token is reached.
3. The deep learning-oriented security token transmission and verification acceleration device is characterized by being realized by adopting an FPGA chip, and comprises:
the security token generation module is used for generating a security token based on the random memory sequence of the FPGA; the security token generation module comprises:
the true random number generation unit is used for generating true random numbers with not less than preset bits based on the random memory sequence of the FPGA;
a digital public key registration unit for registering the digital public key of the FPGA with a public key center based on the true random number;
the digital private key solidifying unit is used for solidifying the digital private key based on the true random number by a logic gate array circuit of the FPGA;
the security token algorithm generating unit is used for solidifying the security token generating algorithm by using the logic gate array circuit of the FPGA; a security token generation unit for generating a unique security token based on the digital private key by calling the security token generation algorithm;
the transmission module is used for completing the transmission of the security token by utilizing a network bypass channel; the transmission module includes:
the network bypass transmission protocol solidifying unit is used for solidifying the network bypass transmission protocol by using the logic gate array circuit of the FPGA;
the interactive transmission unit is used for carrying out interactive transmission of the security signaling at a preset rate through a bypass channel of a network link, and ensuring that the security token encapsulated and transferred in the security signaling is complete and effective through the network bypass transmission protocol;
the verification module is used for verifying the validity of the security token; the verification module comprises:
the verification algorithm solidifying unit is used for solidifying a validity verification algorithm by using a logic gate array circuit of the FPGA;
the digital public key synchronization unit is used for ensuring that the public key center distributes digital public key synchronization of all FPGA nodes in the network through a network bypass transmission protocol;
and the verification unit is used for verifying the security tokens from the FPGA nodes of other networks by adopting the validity verification algorithm based on the digital public keys which are synchronized locally.
4. The deep learning oriented security token transmission and verification acceleration device of claim 3, further comprising a recycling destruction module, wherein the recycling destruction module receives synchronization information through a network bypass channel for a security token that needs to be recycled in advance before the effective lifetime is reached, and performs local verification and elimination before the effective lifetime of the security token is reached.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111458776.4A CN114221771B (en) | 2021-12-02 | 2021-12-02 | Deep learning-oriented security token transmission and verification acceleration method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111458776.4A CN114221771B (en) | 2021-12-02 | 2021-12-02 | Deep learning-oriented security token transmission and verification acceleration method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114221771A CN114221771A (en) | 2022-03-22 |
CN114221771B true CN114221771B (en) | 2024-01-30 |
Family
ID=80699405
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111458776.4A Active CN114221771B (en) | 2021-12-02 | 2021-12-02 | Deep learning-oriented security token transmission and verification acceleration method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114221771B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220280A (en) * | 2013-04-03 | 2013-07-24 | 天地融科技股份有限公司 | Dynamic password token and data transmission method and system for dynamic password token |
GB201510528D0 (en) * | 2015-06-16 | 2015-07-29 | Provost Fellows Foundation Scholars & The Other Members O Board Of The College Of The Holy & Undiv T | Digital token exchange system |
WO2017167771A1 (en) * | 2016-03-29 | 2017-10-05 | Koninklijke Philips N.V. | Handshake protocols for identity-based key material and certificates |
CN111371556A (en) * | 2020-02-21 | 2020-07-03 | 运易通科技有限公司 | Block link point accounting method, device, equipment and storage medium |
CN112560067A (en) * | 2020-12-25 | 2021-03-26 | 平安普惠企业管理有限公司 | Access method, device and equipment based on token authority verification and storage medium |
-
2021
- 2021-12-02 CN CN202111458776.4A patent/CN114221771B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220280A (en) * | 2013-04-03 | 2013-07-24 | 天地融科技股份有限公司 | Dynamic password token and data transmission method and system for dynamic password token |
GB201510528D0 (en) * | 2015-06-16 | 2015-07-29 | Provost Fellows Foundation Scholars & The Other Members O Board Of The College Of The Holy & Undiv T | Digital token exchange system |
WO2017167771A1 (en) * | 2016-03-29 | 2017-10-05 | Koninklijke Philips N.V. | Handshake protocols for identity-based key material and certificates |
CN111371556A (en) * | 2020-02-21 | 2020-07-03 | 运易通科技有限公司 | Block link point accounting method, device, equipment and storage medium |
CN112560067A (en) * | 2020-12-25 | 2021-03-26 | 平安普惠企业管理有限公司 | Access method, device and equipment based on token authority verification and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN114221771A (en) | 2022-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109274505B (en) | Anonymous electronic election method based on block chain technology | |
CN111726226B (en) | Signature system, signature method, first server and storage medium | |
CN103078744B (en) | Public key-based bidirectional radio frequency identification authorization method | |
CN109257346B (en) | Concealed transmission system based on block chain | |
CN105912618A (en) | Block chain based charging pile charging transaction communication method and device | |
CN1799018A (en) | Securing access to an application service based on a proximity token | |
CN109815051A (en) | The data processing method and system of block chain | |
US9338003B2 (en) | Secure modules using unique identification elements | |
CN105812366A (en) | Server, anti-crawler system and anti-crawler verification method | |
CN109936620B (en) | Block chain-based storage method, device, system and storage medium | |
CN113378148A (en) | Internet of things equipment identity authentication system and method based on block chain | |
CN115442047A (en) | Electronic signature method and system for business management file | |
US20210184854A1 (en) | Device validation using tokens | |
Al-madani et al. | IoT data security via blockchain technology and service-centric networking | |
CN109831479A (en) | The data processing method and system of block chain | |
CN113822675A (en) | Block chain based message processing method, device, equipment and storage medium | |
CN100476844C (en) | Method for realizing binding function between electronic key and computer | |
CN114221771B (en) | Deep learning-oriented security token transmission and verification acceleration method and device | |
CN103198526B (en) | The concurrent operations method of the multiple board units of roadside unit process | |
CN112926983A (en) | Block chain-based deposit certificate transaction encryption system and method | |
CN109698839B (en) | Desensitization data comparison method and device based on asymmetric algorithm | |
CN106254341A (en) | Data fingerprint extracting method and system for centralized electronic data safety system | |
CN113938496B (en) | Block chain network method and system based on Internet of things equipment | |
CN115766023A (en) | Encryption algorithm-based vehicle cross-functional domain secret key and certificate dynamic updating system | |
CN116132058A (en) | Block chain consensus method, apparatus, device and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |