CN116527404B - Digital collection directional sharing method and system based on block chain - Google Patents

Digital collection directional sharing method and system based on block chain Download PDF

Info

Publication number
CN116527404B
CN116527404B CN202310797506.9A CN202310797506A CN116527404B CN 116527404 B CN116527404 B CN 116527404B CN 202310797506 A CN202310797506 A CN 202310797506A CN 116527404 B CN116527404 B CN 116527404B
Authority
CN
China
Prior art keywords
key
digital
ciphertext
digital collection
stock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310797506.9A
Other languages
Chinese (zh)
Other versions
CN116527404A (en
Inventor
张维
刘鹤翔
王斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Xiangjiang Shutu Information Technology Innovation Center Co ltd
Original Assignee
Hunan Xiangjiang Shutu Information Technology Innovation Center Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Xiangjiang Shutu Information Technology Innovation Center Co ltd filed Critical Hunan Xiangjiang Shutu Information Technology Innovation Center Co ltd
Priority to CN202310797506.9A priority Critical patent/CN116527404B/en
Publication of CN116527404A publication Critical patent/CN116527404A/en
Application granted granted Critical
Publication of CN116527404B publication Critical patent/CN116527404B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Abstract

The application relates to the technical field of blockchains, and discloses a blockchain-based digital collection directional sharing method and a blockchain-based digital collection directional sharing system, which are used for avoiding a plurality of invariants of a user on password management and ensuring safety. The method comprises the following steps: after at least one use end of the target digital stock is determined, the digital stock providing end searches and downloads a key value pair matched with the hash value of the target digital stock from the intelligent contract of the blockchain to store a ciphertext S'; decrypting the ciphertext S' by using the first private key of the user to obtain a secret key S, and encrypting the target digital stock by using the secret key S to obtain Z; obtaining a ciphertext Y by using a second public key encryption key S corresponding to the using end, and sending the ciphertext Y and a ciphertext Z of the target digital stock to the corresponding using end; the user end uses the second private key to decrypt the secret key S from the ciphertext Y, and then decrypts the target digital collection from the ciphertext Z according to the decrypted secret key S.

Description

Digital collection directional sharing method and system based on block chain
Technical Field
The application relates to the technical field of blockchains, in particular to a digital collection directional sharing method and system based on a blockchain.
Background
The digital college is a new form of digital publication, and has rich categories including but not limited to various forms of digital pictures, music, video, 3D models, electronic tickets, digital souvenirs and the like; and has the advantages of being price friendly, convenient for collection and the like.
The background of existing targeted sharing technology is that internet-based information sharing and dissemination is becoming more and more widespread and deep, leading to increased concerns about privacy and data security for individuals and organizations. To protect the security and privacy of data, conventional data sharing approaches typically employ rights access control, for example, users may choose to share data to a particular individual or organization, or encrypt the data to protect its security. However, these methods often require trust centers such as data storage providers, data centers, service providers, etc., which can result in data being centralized and opaque, as well as increasing the risk and cost of the data.
With the development of blockchain technology, data oriented sharing based on blockchains is possible. Blockchain technology can provide decentralised, secure and transparent data consensus mechanisms and intelligent contracts (the concept of which is common in the art and is a computer protocol that aims to propagate, verify or execute contracts in an informationized manner) that can ensure the privacy and security of data. However, the existing digital stock often has ownership transfer along with transactions, but there is a few conceptual mention of directionally sharing the digital stock. Therefore, as a supplement to the ownership transaction of the digital collection, how to enable owners to have greater control over the digital collection based on the dominant resources of the blockchain and ensure the privacy and security of the directed sharing becomes a significant research direction.
Meanwhile, in the transmission process of directional sharing, the digital collection often needs to be encrypted to ensure the security of the transmission process. The traditional mode can set the password by the user, but the password is easy to forget and crack. In addition, in order to prevent forgetting, some users may select a common password, and especially when the password set by the user is used with the transaction password of the financial products such as a bank card, a stock and the like, larger loss may be caused.
Disclosure of Invention
The application aims to disclose a block chain-based digital collection directional sharing method and a block chain-based digital collection directional sharing system, which are used for avoiding a plurality of invariants of a user on password management and ensuring safety.
In order to achieve the above purpose, the application discloses a digital collection directional sharing method based on a blockchain, which comprises the following steps:
step S1, a digital collection providing end determines a target digital collection for directional sharing;
step S2, the digital collection providing end automatically generates a secret key S corresponding to the target digital collection;
step S3, the digital collection providing end encrypts the secret key S by using the first public key of the digital collection providing end to obtain a ciphertext S'; performing hash operation on the target digital stock to obtain a corresponding hash value, and storing the hash value and the ciphertext S' in an intelligent contract of a blockchain in a key value pair mode; after the key value pair is stored, deleting the local key S;
s4, the digital collection providing end determines at least one using end of the target digital collection and acquires second public keys corresponding to the using ends respectively;
s5, the digital collection providing end recalculates the hash value of the target digital collection, and searches and downloads the key value pair matched with the hash value from the intelligent contract of the blockchain to store the ciphertext S';
s6, the digital stock providing end decrypts the ciphertext S' by using a first private key of the digital stock providing end to obtain the secret key S, and encrypts the target digital stock by using the secret key S to obtain Z;
step S7, the digital stock providing end encrypts the secret key S by a second public key corresponding to the using end to obtain a ciphertext Y, and sends the ciphertext Y and a ciphertext Z of the target digital stock to the corresponding using end; the user end decrypts the secret key S from the ciphertext Y by using the second private key of the user end, and then decrypts the target digital collection from the ciphertext Z according to the decrypted secret key S;
and S8, deleting the ciphertext S' downloaded locally and the secret key S obtained by decryption by the digital stock providing terminal after the directional sharing of all the used terminals is finished.
In order to achieve the above purpose, the application also discloses a digital collection directional sharing system based on a blockchain, which comprises a digital collection providing end and a using end, wherein the digital collection providing end and the using end are provided with a memory, a processor and a computer program which is stored on the memory and can run on the processor, and the two processors of the digital collection providing end and the using end interact with each other to execute the corresponding computer program so as to realize the method.
The application has the following beneficial effects:
1. hosting a key of the target digital collection based on a blockchain intelligent contract; the digital collection itself refers to a unique digital certificate generated by using a blockchain technology and corresponding to specific works and artworks, and the hash value obtained by performing hash operation on the ciphertext S' and the target digital collection required in the directional sharing transmission process is managed in an intelligent contract key value pair mode, so that the digital collection can be directly fused in intelligent contracts for digital collection transaction, source and circulation traceability, and special certificate storage contracts are not required to be independently adapted, so that the implementation, centralized management and maintenance are facilitated.
2. The automatically generated and decrypted secret key S can be deleted after the corresponding steps are executed by the digital collection providing end, so that the user does not need to input a password and strengthen memory, the user experience is improved, and the safety risk caused by the fact that the secret key S is stored in the digital collection providing end is avoided.
3. In the key value pair, the hash value obtained by carrying out hash operation on the target digital collection is stored, so that the storage space is greatly saved, and the operation and maintenance cost of the block chain is reduced.
4. In the transmission process, a hidden deep coupling relation based on a specific second private key exists between the ciphertext Z and the ciphertext Y of the digital collection, so that the confidentiality and the security of the transmission in the interaction process of the digital collection providing end and the using end can be ensured.
5. The second public key and the second private key adopted by different using terminals are usually different, and even if a malicious third party breaks the second public key and the second private key of a single using terminal, the authenticity and the authority of the broken information cannot be checked through data theft of other using terminals, so that the operation and the disfigurement of the third party are fundamentally reduced in a space compression mode.
The application will be described in further detail with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
fig. 1 is a schematic flow chart of a blockchain-based digital collection directional sharing method according to an embodiment of the application.
Detailed Description
Embodiments of the application are described in detail below with reference to the attached drawings, but the application can be implemented in a number of different ways, which are defined and covered by the claims.
Example 1
The embodiment discloses a block chain-based digital collection directional sharing method.
As shown in fig. 1, the method of the present embodiment includes the following steps:
step S1, a digital collection providing end determines a target digital collection for directional sharing.
And S2, the digital collection providing end automatically generates a secret key S corresponding to the target digital collection.
In this step, the digital collection provider may automatically generate a key S corresponding to the target digital collection by the SDK (Software Development Kit ).
Step S3, the digital collection providing end encrypts the secret key S by using the first public key of the digital collection providing end to obtain a ciphertext S'; performing hash operation on the target digital stock to obtain a corresponding hash value, and storing the hash value and the ciphertext S' in an intelligent contract of a block chain in a key value pair mode; and after the key-value pair is stored, the local key S is deleted.
In this step, preferably, the method further includes recording, with the SDK, a mapping relationship between the marked digital collection and the first public key and the first private key.
And S4, the digital collection providing end determines at least one using end of the target digital collection and acquires second public keys corresponding to the using ends respectively.
In this step, the digital collection provider may obtain the second public keys corresponding to the respective user ends themselves through an API (Application Programming Interface ).
And S5, the digital stock providing end recalculates the hash value of the target digital stock, and searches and downloads a key value pair with the hash value matched from the intelligent contract of the blockchain to store the ciphertext S'.
In the step, further, after the digital collection providing terminal fails to match from the intelligent contract key value pair according to the hash value of the target digital collection, the digital collection is judged to be updated, and the step S2 is returned to automatically generate a new secret key S again.
And S6, decrypting the ciphertext S' by the digital stock providing end through a first private key of the digital stock providing end to obtain a secret key S, and encrypting the target digital stock through the secret key S to obtain Z.
Step S7, the digital collection providing end obtains a ciphertext Y through a second public key encryption key S corresponding to the using end, and sends the ciphertext Y and a ciphertext Z of the target digital collection to the corresponding using end; the user end uses the second private key to decrypt the secret key S from the ciphertext Y, and then decrypts the target digital collection from the ciphertext Z according to the decrypted secret key S.
And S8, deleting the locally downloaded ciphertext S' and the decrypted secret key S by the digital collection providing terminal after the directional sharing of all the used terminals is finished.
Therefore, the blockchain-based digital collection directional sharing method disclosed by the embodiment has the following beneficial effects:
1. hosting a key of the target digital collection based on a blockchain intelligent contract; the digital collection itself refers to a unique digital certificate generated by using a blockchain technology and corresponding to specific works and artworks, and the hash value obtained by performing hash operation on the ciphertext S' and the target digital collection required in the directional sharing transmission process is managed in an intelligent contract key value pair mode, so that the digital collection can be directly fused in intelligent contracts for digital collection transaction, source and circulation traceability, and special certificate storage contracts are not required to be independently adapted, so that the implementation, centralized management and maintenance are facilitated.
2. The automatically generated and decrypted secret key S can be deleted after the corresponding steps are executed by the digital collection providing end, so that the user does not need to input a password and strengthen memory, the user experience is improved, and the safety risk caused by the fact that the secret key S is stored in the digital collection providing end is avoided.
3. In the key value pair, the hash value obtained by carrying out hash operation on the target digital collection is stored, so that the storage space is greatly saved, and the operation and maintenance cost of the block chain is reduced.
4. In the transmission process, a hidden deep coupling relation based on a specific second private key exists between the ciphertext Z and the ciphertext Y of the digital collection, so that the confidentiality and the security of the transmission in the interaction process of the digital collection providing end and the using end can be ensured.
5. The second public key and the second private key adopted by different using terminals are usually different, and even if a malicious third party breaks the second public key and the second private key of a single using terminal, the authenticity and the authority of the broken information cannot be checked through data theft of other using terminals, so that the operation and the disfigurement of the third party are fundamentally reduced in a space compression mode.
Example 2
Corresponding to the above embodiment, the present embodiment discloses a blockchain-based digital stock orientation sharing system, which includes a digital stock providing end and a using end, where a memory, a processor, and a computer program stored on the memory and capable of running on the processor are disposed, where the two processors of the digital stock providing end and the using end interact with each other to implement a series of steps corresponding to the above method embodiment when executing the corresponding computer program.
Similarly, the blockchain-based digital collection directional sharing system disclosed by the embodiment has at least the following beneficial effects:
1. hosting a key of the target digital collection based on a blockchain intelligent contract; the digital collection itself refers to a unique digital certificate generated by using a blockchain technology and corresponding to specific works and artworks, and the hash value obtained by performing hash operation on the ciphertext S' and the target digital collection required in the directional sharing transmission process is managed in an intelligent contract key value pair mode, so that the digital collection can be directly fused in intelligent contracts for digital collection transaction, source and circulation traceability, and special certificate storage contracts are not required to be independently adapted, so that the implementation, centralized management and maintenance are facilitated.
2. The automatically generated and decrypted secret key S can be deleted after the corresponding steps are executed by the digital collection providing end, so that the user does not need to input a password and strengthen memory, the user experience is improved, and the safety risk caused by the fact that the secret key S is stored in the digital collection providing end is avoided.
3. In the key value pair, the hash value obtained by carrying out hash operation on the target digital collection is stored, so that the storage space is greatly saved, and the operation and maintenance cost of the block chain is reduced.
4. In the transmission process, a hidden deep coupling relation based on a specific second private key exists between the ciphertext Z and the ciphertext Y of the digital collection, so that the confidentiality and the security of the transmission in the interaction process of the digital collection providing end and the using end can be ensured.
5. The second public key and the second private key adopted by different using terminals are usually different, and even if a malicious third party breaks the second public key and the second private key of a single using terminal, the authenticity and the authority of the broken information cannot be checked through data theft of other using terminals, so that the operation and the disfigurement of the third party are fundamentally reduced in a space compression mode.
The above description is only of the preferred embodiments of the present application and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (5)

1. A digital collection directional sharing method based on a blockchain is characterized by comprising the following steps:
step S1, a digital collection providing end determines a target digital collection for directional sharing;
step S2, the digital collection providing end automatically generates a secret key S corresponding to the target digital collection;
step S3, the digital collection providing end encrypts the secret key S by using the first public key of the digital collection providing end to obtain a ciphertext S'; performing hash operation on the target digital stock to obtain a corresponding hash value, and storing the hash value and the ciphertext S' in an intelligent contract of a blockchain in a key value pair mode; after the key value pair is stored, deleting the local key S;
s4, the digital collection providing end determines at least one using end of the target digital collection and acquires second public keys corresponding to the using ends respectively;
s5, the digital collection providing end recalculates the hash value of the target digital collection, and searches and downloads the key value pair matched with the hash value from the intelligent contract of the blockchain to store the ciphertext S';
s6, the digital stock providing end decrypts the ciphertext S' by using a first private key of the digital stock providing end to obtain the secret key S, and encrypts the target digital stock by using the secret key S to obtain Z;
step S7, the digital stock providing end encrypts the secret key S by a second public key corresponding to the using end to obtain a ciphertext Y, and sends the ciphertext Y and a ciphertext Z of the target digital stock to the corresponding using end; the user end decrypts the secret key S from the ciphertext Y by using the second private key of the user end, and then decrypts the target digital collection from the ciphertext Z according to the decrypted secret key S;
and S8, deleting the ciphertext S' downloaded locally and the secret key S obtained by decryption by the digital stock providing terminal after the directional sharing of all the used terminals is finished.
2. The method of claim 1, wherein the digital collection provider automatically generates a key S corresponding to the target digital collection with an SDK, and the SDK records a mapping relationship between the target digital collection and the first public key and the first private key.
3. The method of claim 1, wherein the digital collection provider obtains the second public keys corresponding to the respective consumer themselves via an API.
4. A method according to any one of claims 1 to 3, wherein when the digital collection providing terminal fails to match from the intelligent contract key value pair according to the hash value of the target digital collection, it is determined that the digital collection is updated, and the step S2 is returned to automatically regenerate a new key S.
5. A blockchain-based digital stock orientation sharing system comprising a digital stock providing end and a using end, wherein the digital stock providing end and the using end are provided with a memory, a processor and a computer program stored on the memory and capable of running on the processor, and the method of any one of the claims 1 to 4 is realized when the two processors of the digital stock providing end and the using end interact with each other to execute the corresponding computer program.
CN202310797506.9A 2023-07-03 2023-07-03 Digital collection directional sharing method and system based on block chain Active CN116527404B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310797506.9A CN116527404B (en) 2023-07-03 2023-07-03 Digital collection directional sharing method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310797506.9A CN116527404B (en) 2023-07-03 2023-07-03 Digital collection directional sharing method and system based on block chain

Publications (2)

Publication Number Publication Date
CN116527404A CN116527404A (en) 2023-08-01
CN116527404B true CN116527404B (en) 2023-08-25

Family

ID=87390677

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310797506.9A Active CN116527404B (en) 2023-07-03 2023-07-03 Digital collection directional sharing method and system based on block chain

Country Status (1)

Country Link
CN (1) CN116527404B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109791671A (en) * 2016-07-29 2019-05-21 区块链控股有限公司 Method and system for realizing block chain
CN109933995A (en) * 2019-01-31 2019-06-25 广州中国科学院软件应用技术研究所 A kind of user's protecting sensitive data and system based on cloud service and block chain
KR20220104552A (en) * 2021-01-18 2022-07-26 부경대학교 산학협력단 System and Method for Blockchain-based Data Sharing and Trading for Connected Car
CN114866288A (en) * 2022-04-12 2022-08-05 平安国际智慧城市科技股份有限公司 Private information protection method and device based on block chain and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11354425B2 (en) * 2020-01-20 2022-06-07 International Business Machines Corporation Privacy-preserving document sharing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109791671A (en) * 2016-07-29 2019-05-21 区块链控股有限公司 Method and system for realizing block chain
CN109933995A (en) * 2019-01-31 2019-06-25 广州中国科学院软件应用技术研究所 A kind of user's protecting sensitive data and system based on cloud service and block chain
KR20220104552A (en) * 2021-01-18 2022-07-26 부경대학교 산학협력단 System and Method for Blockchain-based Data Sharing and Trading for Connected Car
CN114866288A (en) * 2022-04-12 2022-08-05 平安国际智慧城市科技股份有限公司 Private information protection method and device based on block chain and storage medium

Also Published As

Publication number Publication date
CN116527404A (en) 2023-08-01

Similar Documents

Publication Publication Date Title
TWI748387B (en) System and method for verifying verifiable claims
CN109144961B (en) Authorization file sharing method and device
CN109074434B (en) Method and system for verifying ownership of digital assets using distributed hash tables and peer-to-peer distributed ledgers
CN101490689B (en) Content control system and method using certificate chains
US11726968B2 (en) Methods, apparatuses, and devices for transferring data assets based on blockchain
CN111143872A (en) System and apparatus for data confidentiality in distributed ledgers
JP5180203B2 (en) System and method for controlling information supplied from a memory device
KR20210040078A (en) Systems and methods for safe storage services
US20160239683A1 (en) System and method for securely storing files
CN102906755A (en) Content control method using certificate revocation lists
EP3867849B1 (en) Secure digital wallet processing system
JP7235668B2 (en) REGISTRATION METHOD, COMPUTER AND PROGRAM
Sun et al. Research on logistics information blockchain data query algorithm based on searchable encryption
JP2009543211A (en) Content management system and method using a generic management structure
JP5178716B2 (en) Content management system and method using certificate revocation list
CN117396869A (en) System and method for secure key management using distributed ledger techniques
Yu et al. Blockchain technology for the 5g-enabled internet of things systems: Principle, applications and challenges
JP2009543208A (en) Content management system and method using certificate chain
US8755521B2 (en) Security method and system for media playback devices
JP4972165B2 (en) Control system and method using identity objects
CN116527404B (en) Digital collection directional sharing method and system based on block chain
TWM585941U (en) Account data processing system
CN111800373A (en) Data access method and device based on attribute-based encryption block chain
Divya et al. A COMBINED DATA STORAGE WITH ENCRYPTION AND KEYWORD BASED DATA RETRIEVAL USING SCDS-TM MODEL IN CLOUD
WO2023223606A1 (en) Data management system and data management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant