CN1866154A - Method of using super password to decipher - Google Patents
Method of using super password to decipher Download PDFInfo
- Publication number
- CN1866154A CN1866154A CN 200510073653 CN200510073653A CN1866154A CN 1866154 A CN1866154 A CN 1866154A CN 200510073653 CN200510073653 CN 200510073653 CN 200510073653 A CN200510073653 A CN 200510073653A CN 1866154 A CN1866154 A CN 1866154A
- Authority
- CN
- China
- Prior art keywords
- user
- computer
- storage device
- movable storage
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The disclosed method to decipher with a super cipher comprises: the first computer receives user command for cipher and displays self cipher; the provider uses received user cipher and pre-set super cipher to obtain the first super cipher and return to user; the first computer uses received user first super cipher and pre-set algorithm same as the provider to obtain the second super cipher, and decides whether the two ciphers same, yes to decipher the data in mobile device. This invention brings convenience to both user and provider.
Description
Technical field
The present invention relates to the communication technology, particularly relate to a kind of method of using super password to decipher.
Background technology
At present, a lot of movable storage devices all have encryption function such as portable hard drive, USB flash disk and MP3 etc.After the user saves the data in the movable storage device, if this user wishes and can encrypt the data of being preserved, to prevent that other people from usurping, the encryption function that then can utilize movable storage device (herein and the movable storage device that all refers to have encryption function of movable storage device hereinafter described) to provide, a user cipher to movable storage device input oneself setting, after movable storage device obtains this user cipher, this user cipher is preserved, utilized key and cryptographic algorithm in self that the data that the user preserved are encrypted then.Like this, in subsequent process, if a user wishes and the data of encrypting storing in this movable storage device can be recovered out, then must be at first to password of this movable storage device input, the password that movable storage device is judged the current input of user with self in the user cipher preserved whether identical, if it is identical, then movable storage device is decrypted according to the key in self and the decipherment algorithm data to encrypting storing, thereby recover the actual content of data, if inequality, then movable storage device can not be decrypted the enciphered data that is kept in self.
This shows, encryption function by movable storage device, the user can utilize self set, only come the data that are kept in the movable storage device are carried out encryption and decryption by a user cipher known to self, thereby prevent that other user from usurping the data that are kept in the movable storage device, improved the security of data storage.Yet, in actual use, breaking a code in order to prevent other people, the user cipher that the user sets is not only complexity but also do not have rule normally.Like this, though, user cipher is difficult to be decoded, but, also improved the difficulty of user self memory user cipher simultaneously, make the user to tend to forget the user cipher that oneself sets, can't input with movable storage device in the identical password of user cipher preserved, like this, movable storage device then can not be decrypted the data of encrypting storing in self, thus make the user can't recover own in movable storage device the data of encrypting storing.
May forget the user cipher that oneself sets in order to solve above-mentioned user, make the user can't obtain own in movable storage device the shortcoming of encrypting storing data, the solution of prior art comprises:
Method one: supplier sets a super code in advance in movable storage device, and when this movable storage device is provided, provides this super code to the user who buys this movable storage device, preserves this super code by the user.
In the method, after the user forgets the initial user password, can import the super code of self preserving, movable storage device judges that the super code of user's input is identical with the super code of setting in advance in self after, then the data of encrypting storing in self are decrypted, recover the actual content of data.Like this, just guaranteed that the user under the situation of forgetting the user cipher that oneself is set, still can obtain the actual data content that oneself is kept in the movable storage device.
But, in this method one, if being each different movable storage device, supplier sets different super codes, it is the super code difference that each user preserves, can only use own distinctive super code to come enabling decryption of encrypted to be kept at data in the own movable storage device though can guarantee each user, and can not decipher data in other people movable storage device, guaranteed the security of data storage.But, the super code difference that supplier sets, just mean, supplier must dispose different decrypted programs in each different movable storage device, thereby be unfavorable for that supplier produces in batches movable storage device, and can have additional supply of the cost of discussing after-sales service, damaged supplier's interests;
If being each different movable storage device, supplier sets identical super code, the super code that is each user's preservation is identical, mean that then a user can utilize the super code that oneself obtains and preserve to decipher data in other people movable storage device, thereby can't guarantee the security of storage of subscriber data, damage user's interests.
Method two: supplier sets a super code in advance in movable storage device, and preserves this super code by supplier.
In the method, after forgetting the user cipher of oneself setting as the user, the user must deliver to suppliers with the movable storage device of oneself, utilize the super password to decipher data of being preserved by supplier, recover the actual content of data, to guarantee that the user under the situation of forgetting the user cipher that oneself is set, still can obtain the actual data content that oneself is kept in the movable storage device.
But, in this method two, because super code is grasped in supplier's hand, rather than in the own hand of user, therefore have potential safety hazard, and, the user movable storage device must be delivered to supplier so that maintenance, its process is loaded down with trivial details, for the user has brought great inconvenience, has damaged user's interests.
By above description as can be seen, in the prior art, method one and method two all are to have utilized the predefined super code of supplier to decipher when using super code to be decrypted, but no matter the super code of this setting is kept in user's hand still in supplier's hand, all maintenance provider and user both sides' interests simultaneously.
Summary of the invention
In view of this, fundamental purpose of the present invention is to provide a kind of method of using super password to decipher, the user can forgotten under the situation that oneself sets user cipher, be decrypted by obtaining super code by first computer of oneself selecting, improved the security of data storage, and help provider-side movable storage device is produced in batches, thereby maintenance customer and supplier both sides' interests.
In order to achieve the above object, technical scheme of the present invention is achieved in that
A kind of method of using super password to decipher may further comprise the steps:
A, first computer receive after the user obtains the instruction of machine code, and the machine code of self is presented to the user;
After B, provider-side received the machine code of first computer that the user sends here, the super code algorithm that utilizes this machine code and be provided with in provider-side in advance calculated first super code, then this first super code is delivered to the user;
After C, first computer receive first super code of user's input, according to machine code and the super code algorithm that in self, be provided with in advance, identical with provider-side of self, calculate second super code, judge then whether first super code is identical with second super code, if it is identical, execution in step D then, otherwise, current flow process finished;
D, first computer are decrypted the data that encryption is stored in the movable storage device.
Before steps A, this method further may further comprise the steps:
A01, movable storage device is linked to each other with first computer, after first computer receives the instruction of user ID key, in the file that the key backup in this movable storage device encrypted partition is set to first computer self, and this file hidden the user;
A02, movable storage device is linked to each other with employed current computer, current computer receives the order of user's data decryption, and wherein, described current computer is first computer or other computer;
A03, current computer prompting user import user cipher, then behind the password that receives user's input, judge whether the password that the user inputs is identical with the predefined user cipher of user, if it is identical, then utilize key and decipherment algorithm in the movable storage device to be decrypted, and finish current flow process, if inequality, execution in step A04;
A04, current computer are deleted the key in the encrypted partition in the movable storage device, or are rewritten as a forbidden digit string;
Described step D specifically comprises: first computer obtains the key that is backed up from steps A 01 described file, and the key that will back up writes in the encrypted partition of movable storage device, and first computer utilizes the key of this backup and the decipherment algorithm of movable storage device that the data of encrypting storing in movable storage device are decrypted.
After first computer receives the instruction of user ID key, and before the key in the movable storage device encrypted partition was backed up in execution, described steps A 01 further comprised: first computer prompting user imports user cipher; After first computer receives the password of the current input of user, whether the password of judging the current input of user is identical with the user cipher that the user sets in movable storage device in advance, if it is identical, then continue to carry out the described step that key in the movable storage device encrypted partition is backed up, otherwise finish current flow process.
After current computer judges that password that the user inputed and the predefined user cipher of user are inequality, and before execution in step A04, described steps A 03 further comprises: current computer judges that whether received the user inputs the number of times of password greater than predefined frequency threshold value, if, execution in step A04 then, otherwise, return steps A 03.
Judge first super code identical with second super code after, and before execution in step D, described step C further comprises: first computer is rewritten as the password that dispatches from the factory of this movable storage device with the predefined user cipher of the user who preserves in the movable storage device, and points out first user can utilize the password to decipher data of dispatching from the factory;
Carrying out first computer is stored in the step that the data in the movable storage device are decrypted to encryption before, described step D further comprises: first computer receives the password of user's input, whether this password of judging user's input is identical with the password that dispatches from the factory of movable storage device, if, then the continuation execution is described is stored in the step that the data in the movable storage device are decrypted to encryption, otherwise, finish current flow process.
As seen, the method for the present invention's proposition has the following advantages:
1, after the user forgets Password, the present invention can or rewrite the deletion of the key in the movable storage device encrypted partition, so, use the super password to decipher data also can only utilize the selected backup of user oneself that first computer of the required key of deciphering is arranged, and can not be other computer, like this, even other wants that the user who usurps enciphered data has decoded the user cipher that this user sets, because the key in the movable storage device encrypted partition is deleted or rewriting, the user who usurps enciphered data also can't determine to back up first computer of the required key of deciphering, also promptly can't obtain the required key of deciphering, thereby can't be decrypted from first computer.In addition, in the present invention, deciphering required super code is that first computer of selecting according to the user in actual use calculates, rather than predefined by supplier in the prior art, has increased the security of data storage.This shows, the present invention utilizes the process of super password to decipher closely to link to each other with first computer that the user selectes, other user can't determine first computer that this is selected, then can't the data of encrypting storing in the movable storage device be decrypted, thereby improved the security of user storage data greatly, safeguarded user's interests.
2, in the present invention, because the first computer difference of the backup keys that different user is selected, so supplier can be under the different prerequisite of the super code that guarantees to calculate for different user, promptly guarantee under the situation of storage of subscriber data security, be the identical decrypted program of all movable storage device configurations, thereby help supplier movable storage device is carried out batch generation and after-sales service etc., safeguarded supplier's interests.
Therefore, the method for the use super password to decipher that the present invention proposes, maintenance customer and supplier both sides' interests simultaneously.
Description of drawings
Fig. 1 is the process flow diagram of the embodiment of the invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with drawings and the specific embodiments.
Fig. 1 is the process flow diagram of the embodiment of the invention.Referring to Fig. 1, the present invention utilizes super code to the process that the data of encrypting storing in movable storage device are decrypted, and specifically may further comprise the steps:
Step 101: first user links to each other first movable storage device with first computer, and to the instruction of first computer input backup keys.
Step 102: first computer points out first user to import user cipher after receiving the backup keys instruction of first user input.
Step 103: after first user inputed a password, first computer obtained this password, and judged whether the user cipher that the current password that obtains and first user preestablish and be kept in first movable storage device is identical, if, then execution in step 104, otherwise, finish current flow process.
Here, first computer is obtaining correct password, promptly be kept at first movable storage device in the identical password of user cipher after, ability execution in step 104, it is the process of follow-up this first movable storage device key of backup, be in order to guarantee the legitimacy of backup keys process, guarantee that promptly the user of present instruction backup movable storage device key is first user who has this first movable storage device, rather than other disabled user.
Step 104: first computer obtains the key of this first movable storage device from the encrypted partition of first movable storage device, and with in the key backup the obtained file under first computer self set path, and this file is hidden the user.
Here, such as, first computer with key backup in self C: Windows lenovo in the miyao file, and first computer file of backup keys is hidden the user is for fear of first user or other user the key that is backed up to be made amendment, cause the required actual key of key that first computer backed up and the deciphering of first movable storage device different, and the consequence that can't decipher.
To step 104, the present invention carries out the process of backup keys on first computer that first user selects in above-mentioned steps 101.First user can select an own often use and stable computer to be used as first computer of backup keys.And first user backup keys on the first own selected computer is in subsequent process, if first user self has forgotten user cipher, then can only obtain the super code that deciphering is used by this first selected computer.That is to say, because it is selected that first computer of backup keys is first user oneself, other people are difficult to know key backup on first computer, also usurp the data of encrypting storing in first movable storage device with regard to being difficult to by the key of this backup, thereby improve the security of data storage.
Step 105: when first user need decipher data in first movable storage device, first user linked to each other first movable storage device with a computer, and to this computer input decryption instructions.
Computer described in this step can be any computer, promptly can be that first computer also can be other computer except that first computer.In addition, for convenience of description, below the computer described in this step is referred to as current computer.
Step 106: current computer points out first user to import user cipher.
Step 107: first user inputs a password, current computer obtains this password, judge then whether this password that is obtained is identical with the user cipher that first user preestablishes and is kept in first movable storage device, if, then carry out the existing process that the data of encrypting storing in first movable storage device is decrypted according to the key in first movable storage device and decipherment algorithm, and finish current flow process, otherwise, execution in step 108.
Step 108: whether current computer judges number of times that first user inputed password greater than predefined frequency threshold value, if then execution in step 109, otherwise, return step 106.
Step 109: current computer is with the deletion of the key in the first movable storage device encrypted partition or be rewritten as a predefined forbidden digit string, and points out first user to be decrypted enciphered data.
Here, current computer is with deletion of the key in the first movable storage device encrypted partition or rewriting, be since current computer continuous several times obtained be kept at first movable storage device in the different bad password of user cipher, in order to prevent that current other user from usurping the data of encrypting storing in first movable storage device, current computer is with deletion of the key in the first movable storage device encrypted partition or rewriting, thereby make in current and subsequent process, can't utilize the secret key decryption data in first movable storage device, improve the security of data storage.
In addition, described forbidden digit string can be exemplified as complete 0 or complete 1 code.
Step 110: first user imports on first computer and obtains machine code instruction, and first computer is shown to first user with the machine code of self.
Here, described machine code be meant be used for distinguishing with other computer, the distinctive code of first computer self.First computer can obtain the machine code of self by the machine code memory location of setting in advance in self, and presents to first user.The detailed process that first computer obtains self machine code is a prior art, is not described in detail herein.
Step 111: first user delivers to provider-side with the machine code of first computer.
Here, first user mode that the machine code of first computer is delivered to provider-side can be modes such as mail or phone.
Step 112: the super code algorithm that provider-side is utilized the machine code of first computer and set in provider-side in advance, draw first super code, notify first user with first super code of gained then.
Here, described machine code and the predefined super code algorithm that utilizes first computer, the process that draws first super code can be exemplified as: with the first computer machine sign indicating number and a predefined character string carry out with or XOR, to the machine code negate of first computer and other algorithm etc.In addition, to notify first user's mode can be modes such as mail or phone to provider-side.
Step 113: first user links to each other first movable storage device, and imports this first super code to first computer after knowing first super code that supplier provides with first computer.
Step 114: after first computer receives first super code of user's input, at first obtain the machine code of self, utilize machine code of being obtained and the super code algorithm identical that in self, is provided with in advance then with provider-side, draw second super code, judge then whether first super code is identical with second super code, if identical, then execution in step 115, otherwise first computer points out first user can't carry out decrypting process, and finishes current flow process.
Step 115: first computer is from obtaining the key of backup certainly in the file of step 104 set path, and the backup keys of being obtained is write in the encrypted partition of first movable storage device, and the predefined user cipher of preserving in first movable storage device of first user is rewritten as the password that dispatches from the factory of first movable storage device, point out first user can utilize this password to decipher data of dispatching from the factory simultaneously.
Here, first user can find the password that dispatches from the factory in the operation instructions of first movable storage device, such as being " 000000 ".
In addition, because first user has forgotten the user cipher that oneself is set, also promptly first movable storage device need not to preserve this user cipher again, therefore, first computer is rewritten as the password that dispatches from the factory with the user cipher in first movable storage device, makes first user can carry out the setting of user cipher again.And first computer writes the key that backs up in the encrypted partition of first movable storage device, is in order to recover the encryption function of first movable storage device, so that first user can continue to use.
Step 116: first user is to password of first computer input, after first computer receives this password, judge whether received password is identical with the password that dispatches from the factory of movable storage device, if it is identical, then execution in step 117, otherwise, point out first user can't carry out decrypting process, and finish current flow process.
Here, because first user grasps the dispatch from the factory user of password of first movable storage device, therefore, first computer judges whether received password is identical with the password that dispatches from the factory of movable storage device, be to be first user, prevent that further other user from usurping the enciphered data in first movable storage device in order to ensure the active user.
Step 117: first computer utilizes key and the decipherment algorithm in the first movable storage device encrypted partition that the data of encrypting storing in movable storage device are decrypted, and recovers the actual content of data.
So far, first user has realized the process of data decryption by super code after forgetting the user cipher that oneself sets.
Movable storage device of the present invention is meant and can carries out information interaction with PC.
In a word, the above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (5)
1, a kind of method of using super password to decipher is characterized in that, this method may further comprise the steps:
A, first computer receive after the user obtains the instruction of machine code, and the machine code of self is presented to the user;
After B, provider-side received the machine code of first computer that the user sends here, the super code algorithm that utilizes this machine code and be provided with in provider-side in advance calculated first super code, then this first super code is delivered to the user;
After C, first computer receive first super code of user's input, according to machine code and the super code algorithm that in self, be provided with in advance, identical with provider-side of self, calculate second super code, judge then whether first super code is identical with second super code, if it is identical, execution in step D then, otherwise, current flow process finished;
D, first computer are decrypted the data that encryption is stored in the movable storage device.
2, method according to claim 1 is characterized in that, before steps A, this method further may further comprise the steps:
A01, movable storage device is linked to each other with first computer, after first computer receives the instruction of user ID key, in the file that the key backup in this movable storage device encrypted partition is set to first computer self, and this file hidden the user;
A02, movable storage device is linked to each other with employed current computer, current computer receives the order of user's data decryption, and wherein, described current computer is first computer or other computer;
A03, current computer prompting user import user cipher, then behind the password that receives user's input, judge whether the password that the user inputs is identical with the predefined user cipher of user, if it is identical, then current computer utilizes key and the decipherment algorithm in the movable storage device to be decrypted, and finish current flow process, if inequality, execution in step A04 then;
A04, current computer are deleted the key in the encrypted partition in the movable storage device, or are rewritten as a forbidden digit string;
Described step D specifically comprises: first computer obtains the key that is backed up from steps A 01 described file, and the key that will back up writes in the encrypted partition of movable storage device, and first computer utilizes the key of this backup and the decipherment algorithm of movable storage device that the data of encrypting storing in movable storage device are decrypted.
3, method according to claim 2, it is characterized in that, after first computer receives the instruction of user ID key, and before the key in the movable storage device encrypted partition was backed up in execution, described steps A 01 further comprised: first computer prompting user imports user cipher; After first computer receives the password of the current input of user, whether the password of judging the current input of user is identical with the user cipher that the user sets in movable storage device in advance, if it is identical, then continue to carry out the described step that key in the movable storage device encrypted partition is backed up, otherwise finish current flow process.
4, method according to claim 2, it is characterized in that, after current computer judges that password that the user inputed and the predefined user cipher of user are inequality, and before execution in step A04, described steps A 03 further comprises: current computer judges and whether received number of times that the user inputs password greater than predefined frequency threshold value, if, execution in step A04 then, otherwise, return steps A 03.
5, according to each described method in the claim 1 to 4, it is characterized in that, judge first super code identical with second super code after, and before execution in step D, described step C further comprises: first computer is rewritten as the password that dispatches from the factory of this movable storage device with the predefined user cipher of the user who preserves in the movable storage device, and points out first user can utilize the password to decipher data of dispatching from the factory;
Carrying out first computer is stored in the step that the data in the movable storage device are decrypted to encryption before, described step D further comprises: first computer receives the password of user's input, whether this password of judging user's input is identical with the password that dispatches from the factory of movable storage device, if, then the continuation execution is described is stored in the step that the data in the movable storage device are decrypted to encryption, otherwise, finish current flow process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100736533A CN100374973C (en) | 2005-05-20 | 2005-05-20 | Method of using super password to decipher |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100736533A CN100374973C (en) | 2005-05-20 | 2005-05-20 | Method of using super password to decipher |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1866154A true CN1866154A (en) | 2006-11-22 |
CN100374973C CN100374973C (en) | 2008-03-12 |
Family
ID=37425199
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005100736533A Active CN100374973C (en) | 2005-05-20 | 2005-05-20 | Method of using super password to decipher |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100374973C (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101727558B (en) * | 2008-10-28 | 2012-10-10 | 联想(北京)有限公司 | Method for clearing password of computer, computer and server |
CN104217143A (en) * | 2013-05-30 | 2014-12-17 | 英业达科技有限公司 | Unlocking method |
CN106161013A (en) * | 2016-08-30 | 2016-11-23 | 江苏南世桥信息技术有限公司 | A kind of file encrypting method based on computer machine code |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1168185A3 (en) * | 2000-05-08 | 2004-01-02 | Nokia Corporation | Method for protecting a memory card, and a memory card |
FR2838206A1 (en) * | 2002-04-08 | 2003-10-10 | Canal Plus Technologies | METHOD AND DEVICE FOR PROTECTING DIGITAL DATA STORED IN A MEMORY |
CN1512356A (en) * | 2002-12-27 | 2004-07-14 | 江西博纳技术有限公司 | Network self acknowledging mode and device |
-
2005
- 2005-05-20 CN CNB2005100736533A patent/CN100374973C/en active Active
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101727558B (en) * | 2008-10-28 | 2012-10-10 | 联想(北京)有限公司 | Method for clearing password of computer, computer and server |
CN104217143A (en) * | 2013-05-30 | 2014-12-17 | 英业达科技有限公司 | Unlocking method |
CN106161013A (en) * | 2016-08-30 | 2016-11-23 | 江苏南世桥信息技术有限公司 | A kind of file encrypting method based on computer machine code |
Also Published As
Publication number | Publication date |
---|---|
CN100374973C (en) | 2008-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103106372B (en) | For lightweight privacy data encryption method and the system of android system | |
CN100490372C (en) | A method for backup and recovery of encryption key | |
US8621189B2 (en) | System and method for hardware strengthened passwords | |
EP1688858A1 (en) | Systems and methods for managing multiple keys for file encryption and decryption | |
CN101674575B (en) | Method for protecting security of mobile communication terminal data and device thereof | |
CN1745555A (en) | System and method of protecting data on a communication device | |
CN100495421C (en) | Authentication protection method based on USB device | |
CN104834868A (en) | Electronic data protection method, device and terminal equipment | |
CN1273657A (en) | Apparatus for data distribution and terminal for data distribution | |
CA2826837C (en) | System and method for remote reset of password and encrytion key | |
CN1719373A (en) | Finger print encryption and decryption method of electron decument | |
WO2011023051A1 (en) | Data encryption method, data decryption method and mobile terminal | |
KR101625785B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
CN102868826B (en) | Terminal and terminal data protection method | |
WO2011130970A1 (en) | Device and method for protecting data of mobile terminal | |
CN102769525B (en) | The user key backup of a kind of TCM and restoration methods | |
CN1866154A (en) | Method of using super password to decipher | |
CN102053926A (en) | Storage device and data security control method thereof | |
CN109934013A (en) | A kind of data guard method and device | |
CN1266617C (en) | Computer data protective method | |
CN101692266A (en) | Method of intensively encrypting and protecting files by using hidden partition (HPA) and CPU ID | |
EP2469441A1 (en) | System and method for hardware strenghtened passwords | |
CN102883039A (en) | Method for encrypting multimedia private diary of mobile phone | |
CN1889431A (en) | Multifunction intelligent key equipment and safety controlling method thereof | |
CN112395629A (en) | File encryption method and system based on TCM chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |