CN1328671C - Method of activating virtual hard disc in computer and its portable key - Google Patents
Method of activating virtual hard disc in computer and its portable key Download PDFInfo
- Publication number
- CN1328671C CN1328671C CNB021557594A CN02155759A CN1328671C CN 1328671 C CN1328671 C CN 1328671C CN B021557594 A CNB021557594 A CN B021557594A CN 02155759 A CN02155759 A CN 02155759A CN 1328671 C CN1328671 C CN 1328671C
- Authority
- CN
- China
- Prior art keywords
- hard disk
- password
- management module
- virtual hard
- portable key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to a method for activating a virtual hard disc in a computer and a portable key thereof. The computer comprises a computer platform comprising a hard disc management module and the portable key loaded with a cipher, wherein the portable key can be connected with the computer platform in a separated mode. The hard disc management module can plan part of sector in the hard disc of the computer into the virtual hard disc according to the cipher, and the hard disc management module displays or hides the virtual hard disc according to whether the portable key is detected.
Description
[technical field]
The present invention relates to a kind of method and portable key thereof that virtual hard disk in the computer platform is activated, particularly relate to and a kind ofly need not memory cipher and can be easy to use and method and the portable key thereof that virtual hard disk activates in the computer platform that make that high security is provided.
[background technology]
In recent years computing machine with its powerful computing ability and with user-friendly operating system design, become the indispensable instrument of modern offices and family.And from computer and network online after, the inquiry of data, see list, news and weather, tourism, seminar is to transmitting Email, more none is not dependent on it.Yet along with people increase day by day to the dependence of computing machine, there be security and the confidentiality on the computing machine in important data file, but forms a secret worry.
Because computing machine is positioned in usually for the individual and uses, the design of operating system just requires simple and easy as far as possible and is convenient, also sacrifices the Consideration of many secure contexts synchronously.So, the people who is sitting in before the computing machine promptly is assumed to be it is the supvr (Administrator) of total system, can instruct any work easily, comprise read, write, change, deletion etc.Even the small routine that can put into " Te Luoyi wooden horse " (Trojan Horse) in computing machine steals confidential data, or puts into some Viruses and destroy total systems.And the dismounting of computer hardware and install and all to make every effort to convenient, also simple than general work station computing machine on the hardware setting, unauthorised broken person directly steals the hard disk that calculator memory is put confidential data probably, installs to other computing machine and reads.Put important more data at calculator memory, the problem of safety becomes irritating thing.
Along with computing machine is popularized, the safety problem of aforementioned calculation machine increases gradually.For instance, in the general office environment, because operational needs, often there are the personnel of different departments to use computing machine or copy archives,, just can worry to be stolen and get or expose if the secret of a guy or company leaves in the computing machine.In University Affairs Office or breadboard environment, share or to use the situation of computing machine mutually more general.On the other hand; frequent computed user; one permanently has many data that belong to individual privacy; as letter, paper studies, person-to-person communication book, telephone directory, management of personal money information, program etc.; leave in the computing machine; for preventing to be seen by other people or change, just need suitable method and protect these data.In addition, for example in business application, also can keep in many clients' basic document in the employed computing machine of bank clerk, similarly be deposit account, deposit number, fiscard or credit card number, and security password etc.These data will cause company and client's heavy losses if being had the inclination the personage steals.Also, also often be stored in staff's oneself computing machine just like the secret official document of doctor's medical history information, teacher's exam question and list of results, government bodies and affairs of household registration's data or the like.More than all, suffering to invade when distorting or revealing, all can cause suitable puzzlement of litigant and risk, make the protection data security become the problem that must especially note.
In view of computing machine may store data important in a large number and that need maintain secrecy, and operating system does not have very strong safety guard mechanism at present.Therefore, there is the method for many protection to be suggested successively, for example the access control of pass code, collapse directories or archives, encryption technology or the like.The access control of pass code is meant that client will key in correct password (password) earlier and just be entered system or watch archives.Yet this defence measure but is easy to be invaded by the people under the open environment of computing machine, and for example illegal invasion person can skip the boot program (for example using the disk start) of having set pass code very much, or tries every possible means to remove performed protection software.Collapse directories or archives are the attributes that utilize setting file or catalogue, and archives or catalogue are stashed, and other user can't be seen.In addition, when many archives or catalogue are all used concealed storage, user oneself may forget title and the position that hides archives or catalogue, causes the puzzlement in the user management.Encryption technology is important archives to be converted to ciphertext by cryptographic encryption technology deposit in the hard disc of computer; illegal user is not because of there being user " secret key "; just can't be from the plaintext of deciphering originally; though the security of this kind mode is high; but because of " secret key " generally also is stored in the hard disc of computer; still have by the possibility that other people steal, cause some technology more applied cryptography protect secret key, to improve security.
Recently a kind of virtual hard disk technology that proposes is to integrate the notion of aforementioned pass code and hiding archives, and the part sector in the planning computer hard disk becomes a virtual hard disk, for storing archives and the program that need maintain secrecy.This virtual hard disk is concealed format at ordinary times, and other people can't be from the directly existence of this virtual hard disk of discovery on the computing machine.When desire is used, then need input " password " and after checking is errorless, just allow virtual hard disk interior archives or program display.All be stored in the virtual hard disk because hide archives and program, any user can't utilize and skip the pass code mode and carry out virtual hard disk, effectively solves the problem when pass code and hiding archives were distinctly used in the past.Yet, this virtual hard disk is that the application software mode is reached, as long as anyone key in, and proper password just is regarded as legal user, and the content that can carry out or check virtual hard disk, so the user need set the password that is difficult to guess (for example with individual's birthday, identification card number, irrelevant character string or the numeral of name) and mode such as new password more regularly, prevent that other people from knowing password easily.But set tediously long or difficult password or new password more constantly, not only become illegal invasion person's obstruction, and can improve security, sometimes also form a kind of white elephant for user itself, in case forget tediously long and insignificant password, will be refused to use virtual hard disk by the setting of oneself in outdoors, if password is written on the paper, can cause safety to go up leak on the contrary for remembering conveniently.
Though the safeguard procedures of correct applying virtual hard disk can be brought safe and file administration advantage easily, the memory of password causes burden and inconvenience to the user.Therefore, the inventor thinks to reach if the activation energy of virtual hard disk utilizes key operated door as people, then people need not memory cipher and can directly utilize the external hardware that has password in one directly to activate virtual hard disk, to solve the difficult shortcoming of cipher memory in the past, and can carry because of the external hardware that is loaded with password, also can avoid unworthy personage take advantage of the user not the time steal archives.
[summary of the invention]
A purpose of the present invention is to provide a kind of method and portable key thereof that virtual hard disk activates in the computer platform that make, to reach effect easy to use.
Another object of the present invention is to provide a kind of method and portable key thereof that virtual hard disk activates in the computer platform that make, to reach the effect of high security.
So, a kind of method that virtual hard disk activates in the computer platform that makes of the present invention, this computer platform cooperates a portable key to use, this computer platform has a hard disk, one first transmission interface and a hard disk management module, this portable key has a microcontroller and second transmission interface that matches with this first transmission interface, this microcontroller stores one group of read-only password and controls this second transmission interface, so that this password can be imported this computer platform through this second and first transmission interface, this hard disk management module is can carry out and comply with this password in this computer platform to plan that the part sector in the hard disk of this computing machine is a virtual hard disk, and the method includes the steps of:
A) when this hard disk management module when this first transmission interface detects this portable key, then this hard disk management module reads the password of this portable key;
B) this hard disk management module shows and this password corresponding virtual hard disk, for carrying out data access at this virtual hard disk; And
C) when this hard disk management module detects this portable key and do not existed, then end the demonstration of this virtual hard disk.
[description of drawings]
The present invention is described in detail below in conjunction with drawings and Examples, in the accompanying drawing:
Fig. 1 is the synoptic diagram of preferred embodiment of the present invention.
Fig. 2 is the process flow diagram of hard disk management module in the preferred embodiment of Fig. 1.
Fig. 3 is the file administration process flow diagram of the hard disk management module of preferred embodiment among Fig. 1.
[embodiment]
As Fig. 1, the embodiment of the method that virtual hard disk activates in the computer platform that makes of the present invention realizes in a computer platform.This embodiment comprises a computer platform 1 and a portable key 2.
This computer platform 1 is general computing machine, and has a casing 10 at least, the power supply (figure does not show) that 1 work of one supply computer platform is required, one is placed in the hard disk 11 in the casing, the microprocessor of one control computer work (figure does not show), one for the be interconnected motherboard (scheming not show) of usefulness of microprocessor and other member, one internal memory (figure does not show) for temporal data, one in order to and external device between transmit or receive the transmission interface set (figure does not show) of data, one display 12 by transmission interface set connection motherboard, one gives the input media 13 of computing machine 1 (as keyboard by transmission interface set for user's input control order, mouse).It [is the connecting hole that expose at casing 10 back sides that the transmission interface set has a plurality of transmission interfaces, claim transmit port (Port) again], these transmission interfaces can be respectively the transmission interface of different transmission standards, as USB (universal serial bus) (Universal Serial Bus, USB) 14, parallel port, serial port or the like, for the device that connects different transmission standards, be to be used as first transmission interface in this example, to connect portable key 2 with USB (universal serial bus) 14.In addition, store in the hard disk of computer platform 1 11 operating systems (Operating System, OS), for example Windowns system, Linux or the like.Those skilled in the art should be appreciated that the computer platform 1 of present embodiment also can comprise other and be common in member or software in the previous calculation machine, and such as modulator-demodular unit, floppy disk or the like, it is described should not to be subject to present embodiment.It should be noted that, the computer platform 1 of present embodiment is to be loaded with in the computer platform 1 a hard disk management module 16 with previous calculation machine platform difference, this hard disk management module 16 be the part sector in a program and the hard disk 11 with planning computer 1 be a virtual hard disk 15, in good time show or hide virtual hard disk 15, read-write archives in virtual hard disk 15, with managing virtual hard disk 15 in the function of archives or the like.When hard disk management module 16 detects password from portable key 2, then show archives and program in the virtual hard disk 15, and when not detecting password, then make virtual hard disk 15 hide and can't show, with the secret data that are stored in the virtual hard disk 15, and then avoid checking and stealing of illegal user.
Portable key 2 has the housing 23 of a microcontroller 21, second transmission interface 22 that matches with first transmission interface 14 and a ccontaining microcontroller 21 and second transmission interface 22.Microcontroller 21 is an integrated circuit (Integrated Circuit, IC, claim chip again) and required program and the one group of read-only password of storage work, this program is used so that the password that is stored in the microcontroller 21 can be via 22 outputs of second transmission interface, and program and password are to record in microcontroller 21 by the burning chip machine burning.In this example, second transmission interface 22 is the USB (universal serial bus) with first transmission interface, 14 correspondences, and program is password to be converted to the data that meet universal serial bus standard, with in second, first transmission interface, 22,14 input computer platforms 1.The password of each portable key 2 is the tediously long character string of 16 bytes (each byte has 8) data and because it may change and has 2128 kinds in this example, can not use up at short notice, so each group password all is exclusive and unique, and hard disk management module 16 is to form virtual hard disk 15 according to password.So, the portable key 2 that hard disk management module 16 can corresponding be loaded with different passwords forms each other virtual hard disk 15, so that can form exclusive virtual hard disk 15 respectively for the different users in the same computer platform 1, and because of the password difference in the portable key 2, even if having the different users of portable key 2 equally, it can only read and write the virtual hard disk 15 of corresponding its portable key that has 2, can't read other people's virtual hard disk 15, to reach the high advantage of security and confidentiality.In addition, first, second transmission interface 14,22 can be the transmission interface of other standard, and for example IEEE 1394, infrared ray, blue bud or the like should not be subject to the explanation of present embodiment.
According to aforesaid member and function, be easier to understand for making present embodiment, hereinafter cooperate Fig. 2 and Fig. 3 that the operating process of present embodiment is explained.
At first, step 31 is the software of hard disk management module 16 to be installed in computer platform 1 and can be set at resident program, to continue carry out step 32.In the step 32, hard disk management module 16 can detect first transmission interface 14 and whether be inserted with portable key 2.If sometimes, then skip to step 33, to read the password in the portable key 2.If when no, then keep step 32, continue to detect portable key 2 and whether insert first transmission interface 14.
In step 33, hard disk management module 16 can make microcontroller 12 that password is translated into the form that meets USB (universal serial bus), and reads password through first, second transmission interface 14,22.In addition, microcontroller 21 also can store some relevant informations, as identification symbol, supplier number etc., to be sent to computer platform 1 in the lump together with password, makes hard disk management module 16 can obtain these relevant informations.Secondly, in step 34, hard disk management module 16 can be temporary in password in the internal memory, uses for program execution subsequently.
And then, in step 35, if first the activation, then hard disk management module 16 can be encoded and forms an image (Image) file according to being temporary in the internal memory password, and corresponding sector with image file is a virtual hard disk 15 in the planning hard disk 11.And if when activating once more, then hard disk management module 16 can the footpath self-activations with by the image file corresponding virtual hard disk 15 of Cryptographic when first activation (this virtual hard disk 15 in formed).Then, in step 36, the read-write (repeating after the appearance) of hard disk management module 16 archives good at managing or program with show the inventory be stored in archives in the virtual hard disk 15 or program, to reach when portable key 2 is plugged in first transmission interface 14, the effect that makes virtual hard disk 15 contents show.
Secondly, in step 37, hard disk management module 16 still can continue regularly (for example per 3~5 minutes) detection portable key 2 and whether still be plugged in first transmission interface 14.If exist, rebound step 36 then, hard disk management module 16 continues managing virtual hard disks 15.During if do not existed, then skip to step 38,, and export a forced termination order, make the 16 end virtual hard disks management of hard disk management module and hide virtual hard disk 15, virtual hard disk 15 is no longer shown by the password in the hard disk management module 16 removing scratch-pad memories.Because of whether hard disk management module 16 can exist with portable key 2, the show or hide virtual hard disk 15 voluntarily, the user is as long as insert portable key 2, do not need the password of 128 of hypermnesias can activate virtual hard disk, and when leaving or do not use, pull away portable key 2, just hide virtual hard disk 15 in real time, reach effect easy to use really.
In addition, cooperate Fig. 3 to come the archives read-write management of hard disk management module 16 is explained.Hard disk management module 16 is after portable key 2 inserts, and begins to carry out management (being abovementioned steps 36).At first in step 41, hard disk management module 16 can detect the user and whether import write command for writing data to virtual hard disk 15.If have, then enter step 42, hard disk management module 16 after writing digital coding, in virtual hard disk 15, and enters step 43 to the data storing of coding encrypting according to password.If when no, then jump directly to step 43.
In the step 43, hard disk management module 16 can detect whether users import reading order and reading of data in the self-virtualizing hard disk 15, if have, just execution in step 44, hard disk management module 16 can according to password the data decoding in the acquisition self-virtualizing hard disk 15 (i.e. deciphering) after, export computer platform to and handle, and be shown on the display 12 and watch for the user.If do not have, then skip to step 45.
In step 45, whether hard disk management module 16 can detect forced termination order input (for example portable key 2 is pulled away) at last.If have, then finish and carry out abovementioned steps 38.If do not have, then rebound step 41 continues the read-write management.So, hard disk management module 16 is further encrypted before data write virtual hard disk 15 in advance, even the data in the virtual hard disk 15 are stolen, if the password in the no key cooperates deciphering, still is mess code, fully reaches the effect that security of data storage is provided.Moreover, it will be recognized by those skilled in the art that the input whether judgement order of step 41,43,45 write command, reading order and forced termination order, the adjustment that can need according to design or judge synchronously.
Conclude above-mentionedly, the present invention is with the software and hardware collocation mode, and burning read-only password and cooperate the management of hard disk management module in portable key 2 is different from pure software way to manage in the past.So, the user need not to input password, only needs to utilize plug portable key 2 in the simple motion of first transmission interface 14, can make virtual hard disk 15 show or hides, and reach the effect of being convenient to operate.Than prior art and since password be burning in portable key 2, the user need not remember redundant cipher or new password more constantly, and then can reach effect easy to use.In addition, because the user is when using virtual hard disk 15, burning has the portable key 2 of password to be removed, and no longer includes any code data in the computing machine, reduces the probability that password is stolen by unworthy personage.Particularly, data are to be stored in the virtual hard disk 15 after encoded again, even if illegal user directly steals hard disk, because data without decoding, can only obtain the mess code data and can't use, and then can improve the confidentiality of data.
Claims (9)
1. one kind makes the method that virtual hard disk activates in the computer platform, this computer platform cooperates portable key to use, and this computer platform has a hard disk, one first transmission interface and a hard disk management module, second transmission interface that this portable key has a microcontroller and matches with this first transmission interface, this microcontroller stores one group of read-only password and controls this second transmission interface so that this password can be imported this computer platform through this second and first transmission interface, this hard disk management module is can carry out and comply with this password in this computer platform to plan that the part sector in the hard disk of this computing machine is a virtual hard disk, it is characterized in that the method includes the steps of:
A) when this hard disk management module when this first transmission interface detects this portable key, then this hard disk management module reads the password of this portable key;
B) this hard disk management module shows and this password corresponding virtual hard disk, for carrying out data access at this virtual hard disk; And
C) when this hard disk management module detects this portable key and do not existed, then end the demonstration of this virtual hard disk.
2. the method that makes virtual hard disk activation in the computing machine as claimed in claim 1 is characterized in that:
This step C) whether this hard disk management module is regularly to detect this portable key to exist in.
3. the method that virtual hard disk in the computing machine is activated as claimed in claim 1 is characterized in that this step B) in after this virtual hard disk shows, have a following substep:
B-1) if this hard disk management module receives that one writes the write command that selected data is used, then be stored in this virtual hard disk according to behind this selected data of this cryptography; And
B-2), then decipher this selected data beginning and be sent to this computer platform according to this password if this hard disk management module receives one when reading the reading order of selected data in this virtual hard disk.
4. the method that makes virtual hard disk activation in the computing machine as claimed in claim 1 is characterized in that:
In this steps A) in, this computer platform can be kept in this password in this computer platform after this portable key reads this password, until this hard disk management module in this step C) in no longer detect this portable key.
5. the method that makes virtual hard disk activation in the computing machine as claimed in claim 1 is characterized in that:
This first and second transmission interface is a USB (universal serial bus).
6. the described method that virtual hard disk activates in the computing machine that makes as claimed in claim 1 is characterized in that:
This password is one 16 byte data.
7. one kind makes the portable key that virtual hard disk activates in the computing machine, it arrange in pairs or groups that a computing machine uses and this computing machine in have one first transmission interface, a hard disk and a hard disk management module, this hard disk management module is a virtual hard disk in order to the part sector in the hard disk of planning this computing machine and detects this portable key and whether exist that this portable key comprises:
One microcontroller, its prestore one group of read-only password and control is stored in the output of the password in this microcontroller;
One second transmission interface, be conform to this first transmission interface and the control that is subjected to this microcontroller so that this password is sent to this computing machine through this second transmission interface; And
One housing is in order to ccontaining this microcontroller and this transmission interface;
Thus, when the hard disk management module of this computing machine is received this password of this portable key by described transmission interface, then show this virtual hard disk, and when not detecting this password, hide this virtual hard disk in real time.
8. the portable key that makes virtual hard disk activation in the computing machine as claimed in claim 7 is characterized in that:
Described second transmission interface is a USB (universal serial bus).
9. the portable key that makes virtual hard disk activation in the computing machine as claimed in claim 7 is characterized in that:
This password is one 16 byte data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB021557594A CN1328671C (en) | 2002-12-06 | 2002-12-06 | Method of activating virtual hard disc in computer and its portable key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB021557594A CN1328671C (en) | 2002-12-06 | 2002-12-06 | Method of activating virtual hard disc in computer and its portable key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1506854A CN1506854A (en) | 2004-06-23 |
CN1328671C true CN1328671C (en) | 2007-07-25 |
Family
ID=34236056
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB021557594A Expired - Fee Related CN1328671C (en) | 2002-12-06 | 2002-12-06 | Method of activating virtual hard disc in computer and its portable key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1328671C (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101464934B (en) * | 2007-12-18 | 2010-12-22 | 中国长城计算机深圳股份有限公司 | Mutual binding and authenticating method for computer platform and storage device, and computer thereof |
US8615544B2 (en) * | 2011-02-25 | 2013-12-24 | Wyse Technology Inc. | System and method for unlocking a device remotely from a server |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2676291B1 (en) * | 1991-05-06 | 1995-02-24 | Bull Sa | |
CN1292528A (en) * | 1999-10-11 | 2001-04-25 | 三星电子株式会社 | Portable integrated circuit memory equipment for universal serial bus |
US6351813B1 (en) * | 1996-02-09 | 2002-02-26 | Digital Privacy, Inc. | Access control/crypto system |
CN1381787A (en) * | 2001-04-20 | 2002-11-27 | 宏碁股份有限公司 | Method and system for protecting hard disk of computer |
-
2002
- 2002-12-06 CN CNB021557594A patent/CN1328671C/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2676291B1 (en) * | 1991-05-06 | 1995-02-24 | Bull Sa | |
US6351813B1 (en) * | 1996-02-09 | 2002-02-26 | Digital Privacy, Inc. | Access control/crypto system |
CN1292528A (en) * | 1999-10-11 | 2001-04-25 | 三星电子株式会社 | Portable integrated circuit memory equipment for universal serial bus |
CN1381787A (en) * | 2001-04-20 | 2002-11-27 | 宏碁股份有限公司 | Method and system for protecting hard disk of computer |
Also Published As
Publication number | Publication date |
---|---|
CN1506854A (en) | 2004-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7257717B2 (en) | Method with the functions of virtual space and data encryption and invisibility | |
US7747797B2 (en) | Mass storage device with near field communications | |
US8296585B2 (en) | Method of encrypting/decrypting the document and a safety management storage device and system method of its safety management | |
CN100583036C (en) | Computer safety control method based on USB flash memory disc | |
US8615666B2 (en) | Preventing unauthorized access to information on an information processing apparatus | |
US20030074566A1 (en) | Computer security method and apparatus | |
JP2009518702A (en) | Devices that use virtual interfaces to provide a safe working environment | |
CN104733008A (en) | Mobile storage equipment capable of realizing cloud storage based on fingerprint identification | |
CN101008974A (en) | Protection method and system of electronic document | |
JP2002318788A (en) | Network terminal | |
CN110402440B (en) | Segmented key authentication system | |
US7412603B2 (en) | Methods and systems for enabling secure storage of sensitive data | |
JP2007094879A (en) | Authentication system for basic program of operating system, computer used for the same, and computer program | |
CN100428108C (en) | Data encryption storage method | |
CN1328671C (en) | Method of activating virtual hard disc in computer and its portable key | |
CN101165697A (en) | Individual information fingerprint protection and management system | |
CN101968773A (en) | Data storage system with biometric protection and method thereof | |
JP3935712B2 (en) | Client device, PIN lock release device, and PIN lock release method | |
TW200513086A (en) | Internet passing security authentication system and method, and IC card authentication hardware | |
TW200513087A (en) | Mail server login security authentication system and method, and IC card authentication hardware | |
CN204613946U (en) | A kind of safe USBHUB and SD/TF card reader equipment complex | |
Denning | The Science of Computing: Passwords | |
JP2003150559A (en) | Key system for preventing illicit use and keeping secrecy | |
JPS63131169A (en) | Code data decoding system | |
CN102156837A (en) | Integrated computer with fingerprint identification function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20070725 Termination date: 20141206 |
|
EXPY | Termination of patent right or utility model |