CN115001813B - Information security method, system, equipment and medium - Google Patents
Information security method, system, equipment and medium Download PDFInfo
- Publication number
- CN115001813B CN115001813B CN202210610419.3A CN202210610419A CN115001813B CN 115001813 B CN115001813 B CN 115001813B CN 202210610419 A CN202210610419 A CN 202210610419A CN 115001813 B CN115001813 B CN 115001813B
- Authority
- CN
- China
- Prior art keywords
- encryption
- key
- grade
- user
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000012790 confirmation Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses an information security method, equipment, a system and a medium, wherein the method comprises the following steps: acquiring data to be encrypted and an encryption level corresponding to the data to be encrypted, wherein the data to be encrypted are sent by a target user; determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key; and encrypting and storing the data to be encrypted according to the encryption strategy. According to the information security and confidentiality method, different grade keys are provided for users of different grades, different encryption keys and storage keys are provided for the users of the same grade by setting different grade key parameters, encryption of confidential information is achieved through the encryption keys, encryption of confidential information addresses is achieved through the storage keys, and therefore data security is guaranteed.
Description
Technical Field
The present application relates to the field of information security technologies, and in particular, to an information security method, system, device, and medium.
Background
At present, the existing data is relatively simple in encryption mode, and the key used for decryption is generally set by a user, so that the security is relatively low; in addition, the storage address is generally fixed, and a user can find the storage position of the secret information through a fixed storage path, so that after the corresponding secret information is found by the cloud, the illegal molecule can still decrypt the secret information through illegal decryption processing, the content of the secret information is obtained, and the secret information is easy to steal.
Disclosure of Invention
Aiming at the defects in the prior art, the application provides an information security method, an information security system, information security equipment and an information security medium.
In a first aspect, a method for securing information, the method comprising:
acquiring data to be encrypted and an encryption level corresponding to the data to be encrypted, wherein the data to be encrypted are sent by a target user;
determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key;
and encrypting and storing the data to be encrypted according to the encryption strategy.
Preferably, before the obtaining the data to be encrypted sent by the target user and the encryption level corresponding to the data to be encrypted, the method further includes:
carrying out identity authentication on a target user;
after the identity authentication of the target user is successful, performing level authentication on the target user;
and after the target user grade authentication is successful, determining a grade key and a grade key sequence corresponding to the target user from a user database according to the user grade, wherein the grade key sequence is used for representing a set of grade keys corresponding to the lowest user grade to the user grade of the target user.
Preferably, the authenticating the user identity includes:
acquiring identity information of a target user, and extracting a user identifier from the identity information;
and searching corresponding identity information in a user database according to the user identification, and if the inquiry is successful, successful user identity authentication is achieved.
Preferably, the step of performing the level authentication on the target user includes:
determining the user grade of the target user from a user database according to the user identification;
sending a level authentication request to other users with at least one user level higher than that of the target user;
and returning confirmation information by other users according to the grade authentication request, and successfully authenticating the grade of the user.
Preferably, said determining an encryption policy according to said encryption level comprises:
determining a grade key parameter according to the encryption grade;
and calculating an encryption key and a storage key according to the grade key parameter, the grade key and the grade key sequence.
Preferably, the formula for calculating the encryption key and the storage key according to the rank key parameter, the rank key and the rank key sequence is as follows:
E s =E m E m+1 …(E K ) 2
E f =E 1 E 2 …E m-1 E K
wherein E is s Representing an encryption key, E f Representing the storage key, E K And representing a grade key corresponding to the grade of the target user, and m represents a grade key parameter.
Preferably, encrypting and storing the data to be encrypted according to the encryption policy includes:
encrypting the data to be encrypted by using the encryption key to obtain secret data, and storing the secret data;
and obtaining a storage address of the secret data, encrypting the storage address by using a storage key to obtain a target access code, and realizing access of the secret information by the target access code.
In a second aspect, an information security system comprises:
the acquisition module is used for acquiring data to be encrypted and sent by a target user and an encryption level corresponding to the data to be encrypted;
the determining module is used for determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key;
and the execution module is used for encrypting and storing the data to be encrypted according to the encryption strategy.
In a third aspect, an information security privacy device includes: at least one memory and at least one processor;
the at least one memory for storing a machine readable program;
the at least one processor being configured to invoke the machine readable program to perform the method of any of claims 1-7.
In a fourth aspect, a computer readable medium has stored thereon computer instructions which, when executed by a processor, cause the processor to perform the method described above.
The beneficial effects of the application are as follows: according to the information security and confidentiality method, different grade keys are provided for users of different grades, different encryption keys and storage keys are provided for the users of the same grade by setting different grade key parameters, encryption of confidential information and encryption of confidential information addresses are achieved through the encryption keys, and therefore data security is guaranteed. Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application. The objectives and other advantages of the application will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. Like elements or portions are generally identified by like reference numerals throughout the several figures. In the drawings, elements or portions thereof are not necessarily drawn to scale.
Fig. 1 is a flow chart of an information security method according to embodiment 1 of the present application;
fig. 2 is a schematic structural diagram of an information security system according to embodiment 2 of the present application;
fig. 3 is a schematic structural diagram of an information security device according to embodiment 3 of the present application.
Detailed Description
Embodiments of the technical scheme of the present application will be described in detail below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present application, and thus are merely examples, and are not intended to limit the scope of the present application.
It is noted that unless otherwise indicated, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs.
Example 1
Referring to fig. 1, fig. 1 is a method for securing information according to an embodiment of the present application, where the method includes the following steps:
step one: acquiring data to be encrypted and an encryption level corresponding to the data to be encrypted, wherein the data to be encrypted are sent by a target user;
it should be noted that before the obtaining the data to be encrypted and the encryption level corresponding to the data to be encrypted, the method further includes: carrying out identity authentication on a target user; after the identity authentication of the target user is successful, performing level authentication on the target user; and after the target user grade authentication is successful, determining a grade key and a grade key sequence corresponding to the target user from a user database according to the user grade, wherein the grade key sequence is used for representing a set of grade keys corresponding to the lowest user grade to the user grade of the target user.
The authentication of the user identity includes: acquiring identity information of a target user, and extracting a user identifier from the identity information; and searching corresponding identity information in a user database according to the user identification, and if the inquiry is successful, successful user identity authentication is achieved.
The step of performing the level authentication on the target user includes: determining the user grade of the target user from a user database according to the user identification; sending a level authentication request to other users with at least one user level higher than that of the target user; and returning confirmation information by other users according to the grade authentication request, and successfully authenticating the grade of the user.
By the method, the grade key of the user is bound with the grade of the user and the identity of the user, so that the uniqueness and the safety of the grade key are ensured.
Step two: determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key;
the determining the encryption policy according to the encryption level includes: determining a grade key parameter according to the encryption grade; and calculating an encryption key and a storage key according to the grade key parameter, the grade key and the grade key sequence.
The formula for calculating the encryption key and the storage key according to the grade key parameter, the grade key and the grade key sequence is as follows:
E s =E m E m+1 …(E K ) 2
E f =E 1 E 2 …E m-1 E K
wherein E is s Representing an encryption key, E f Representing the storage key, E K And representing a grade key corresponding to the grade of the target user, and m represents a grade key parameter.
In the embodiment of the application, the grade key parameter is smaller than or equal to the grade of the user, for example, the user is a five-grade user, and the selectable grade key parameter is 1-5, and the grade key sequence can be changed by changing the grade key parameter, so that the combination mode of the storage key and the encryption key is changed, that is, the encryption key and the storage key of the user are difficult to crack by the user with the same grade, and the security of secret information is further improved.
Step three: and encrypting and storing the data to be encrypted according to the encryption strategy.
It should be noted that encrypting and storing the data to be encrypted according to the encryption policy includes: encrypting the data to be encrypted by using the encryption key to obtain secret data, and storing the secret data; and obtaining a storage address of the secret data, encrypting the storage address by using a storage key to obtain a target access code, and realizing access of the secret information by the target access code.
In some embodiments, the user's identification code may be encrypted by an encryption key and a storage key, the data to be encrypted may be encrypted by the identification code encrypted by the encryption key to obtain secret information, the storage address of the secret information may be encrypted by the identification code encrypted by the storage key to obtain a target access code, and the access of the secret information may be achieved by the target access code. Thus, the identity identification code of the user is bound with the encryption key and the storage key, and the security of secret information is further improved.
It should be understood that when accessing the secret information through the target access code, the user's authorization needs to be obtained, and the target access code is decoded through authorization, so that the secret information can be accessed.
Example 2
Referring to fig. 2, fig. 2 is a schematic diagram of an information security system according to an embodiment of the present application, where the system includes: the acquisition module is used for acquiring data to be encrypted and sent by a target user and an encryption level corresponding to the data to be encrypted; the determining module is used for determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key; and the execution module is used for encrypting and storing the data to be encrypted according to the encryption strategy.
The system provided by the embodiment of the present application and the method provided by the foregoing embodiment are the same in the inventive concept, so reference is made to the foregoing embodiment for more specific working principles of each module in this embodiment, and no further description is given here.
Example 3
Referring to fig. 3, fig. 3 is an information security device provided by an embodiment of the present application, where the electronic device includes: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method described above. Also, the electronic device may be implemented in any one or combination of hardware, software, firmware, or solid state logic circuits, and may be implemented in connection with signal processing, control and/or application specific circuits.
Embodiments of the application may be implemented in any one or combination of hardware, software, firmware, or solid state logic circuits, and may be implemented in connection with signal processing, control and/or application specific circuits. Embodiments of the present application provide a device or apparatus that may include one or more processors (e.g., microprocessors, controllers, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs), etc.) which process various computer executable instructions to control the operation of the device or apparatus. An apparatus or device provided by embodiments of the present application may include a system bus or data transmission system that couples the various components together. A system bus may include any of several different bus structures, such as a memory bus or memory controller, a peripheral bus, a universal serial bus, and/or a processor or local bus using any of a variety of bus architectures. The apparatus or device provided by the embodiments of the present application may be provided separately, may be part of a system, or may be part of other apparatus or device.
Particular embodiments provided by embodiments of the present application may include or be combined with a computer-readable storage medium, such as one or more storage devices capable of providing non-transitory data storage. The computer-readable storage medium/storage device may be configured to hold data, programmers and/or instructions that, when executed by a processor of an apparatus or device provided by a particular embodiment of the present application, cause the apparatus or device to perform the relevant operations. The computer-readable storage medium/storage device may include one or more of the following features: volatile, nonvolatile, dynamic, static, readable/writable, read-only, random access, sequential access, location addressability, file addressability, and content addressability. In one or more exemplary embodiments, the computer readable storage medium/storage device may be integrated into a device or apparatus provided by embodiments of the present application or belong to a common system. Computer-readable storage media/memory devices may include optical storage devices, semiconductor storage devices and/or magnetic storage devices, etc., as well as Random Access Memory (RAM), flash memory, read-only memory (ROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), registers, hard disk, a removable disk, a recordable and/or rewriteable Compact Disc (CD), a Digital Versatile Disc (DVD), a mass storage media device, or any other form of suitable storage media.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application, and are intended to be included within the scope of the appended claims and description.
Claims (9)
1. An information security method, characterized in that the method comprises the following steps:
acquiring data to be encrypted and an encryption level corresponding to the data to be encrypted, wherein the data to be encrypted are sent by a target user;
determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key;
encrypting and storing the data to be encrypted according to the encryption strategy;
the step of obtaining the data to be encrypted sent by the target user and the encryption level corresponding to the data to be encrypted includes:
performing identity authentication on the target user, and performing level authentication on the target user after the target user is successfully authenticated, wherein the performing level authentication on the target user comprises the following steps:
determining the user grade of the target user from a user database according to the user identification;
sending a level authentication request to other users with at least one user level higher than that of the target user;
and returning confirmation information by other users according to the grade authentication request, and successfully authenticating the grade of the target user.
2. The method for securing information according to claim 1, wherein before the obtaining the data to be encrypted sent by the target user and the encryption level corresponding to the data to be encrypted, further comprises:
after the target user grade authentication is successful, determining a grade key and a grade key sequence corresponding to the target user from a user database according to the user grade of the target user, wherein the grade key sequence is used for representing a set from the lowest user grade to the grade key corresponding to the user grade of the target user.
3. The method of claim 1, wherein authenticating the user identity comprises:
acquiring identity information of a target user, and extracting a user identifier from the identity information;
and searching corresponding identity information in a user database according to the user identification, and if the inquiry is successful, successful user identity authentication is achieved.
4. The method of claim 2, wherein said determining an encryption policy based on said encryption level comprises:
determining a grade key parameter according to the encryption grade;
and calculating an encryption key and a storage key according to the grade key parameter, the grade key and the grade key sequence.
5. The method of claim 4, wherein the formula for calculating the encryption key and the storage key based on the rank key parameter, the rank key, and the rank key sequence is:
E s =E m E m+1 …(E K ) 2
E f =E 1 E 2 …E m-1 E K
wherein E is s Representing an encryption key, E f Representing the storage key, E K And representing a grade key corresponding to the grade of the target user, and m represents a grade key parameter.
6. The method of claim 5, wherein encrypting and storing the data to be encrypted according to the encryption policy comprises:
encrypting the data to be encrypted by using the encryption key to obtain secret data, and storing the secret data;
and obtaining a storage address of the secret data, encrypting the storage address by using a storage key to obtain a target access code, and realizing access of the secret information by the target access code.
7. An information security system adapted for use in the method of any one of claims 1-6, comprising:
the acquisition module is used for acquiring data to be encrypted and sent by a target user and an encryption level corresponding to the data to be encrypted;
the determining module is used for determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key;
and the execution module is used for encrypting and storing the data to be encrypted according to the encryption strategy.
8. An information security privacy device, comprising: at least one memory and at least one processor;
the at least one memory for storing a machine readable program;
the at least one processor being configured to invoke the machine readable program to perform the method of any of claims 1-6.
9. A computer readable medium having stored thereon computer instructions which, when executed by a processor, cause the processor to perform the method of any of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210610419.3A CN115001813B (en) | 2022-05-31 | 2022-05-31 | Information security method, system, equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210610419.3A CN115001813B (en) | 2022-05-31 | 2022-05-31 | Information security method, system, equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115001813A CN115001813A (en) | 2022-09-02 |
CN115001813B true CN115001813B (en) | 2023-11-10 |
Family
ID=83032082
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210610419.3A Active CN115001813B (en) | 2022-05-31 | 2022-05-31 | Information security method, system, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115001813B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102457377A (en) * | 2011-08-08 | 2012-05-16 | 中标软件有限公司 | Role-Based Web Remote Authentication and Authorization Method and System |
CN104065483A (en) * | 2014-06-06 | 2014-09-24 | 武汉理工大学 | A method for using IBC grades of electronic communication identification |
CN108133155A (en) * | 2017-12-29 | 2018-06-08 | 北京联想核芯科技有限公司 | Data encryption storage method and device |
CN110099048A (en) * | 2019-04-19 | 2019-08-06 | 中共中央办公厅电子科技学院(北京电子科技学院) | A kind of cloud storage method and apparatus |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3374952A4 (en) * | 2015-11-09 | 2019-05-01 | Roger Hanna | A distributed user profile identity verification system for e-commerce transaction security |
CN105915520B (en) * | 2016-04-18 | 2019-02-12 | 深圳大学 | File storage, search method and storage system based on public key searchable encryption |
-
2022
- 2022-05-31 CN CN202210610419.3A patent/CN115001813B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102457377A (en) * | 2011-08-08 | 2012-05-16 | 中标软件有限公司 | Role-Based Web Remote Authentication and Authorization Method and System |
CN104065483A (en) * | 2014-06-06 | 2014-09-24 | 武汉理工大学 | A method for using IBC grades of electronic communication identification |
CN108133155A (en) * | 2017-12-29 | 2018-06-08 | 北京联想核芯科技有限公司 | Data encryption storage method and device |
CN110099048A (en) * | 2019-04-19 | 2019-08-06 | 中共中央办公厅电子科技学院(北京电子科技学院) | A kind of cloud storage method and apparatus |
Non-Patent Citations (2)
Title |
---|
OpenID身份认证系统的认证等级模型研究;夏晔;钱松荣;;微型电脑应用(04);全文 * |
多模多级网络身份认证框架研究;刘贤刚;陈星;刘丽敏;;信息技术与标准化(Z1);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN115001813A (en) | 2022-09-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111723383B (en) | Data storage and verification method and device | |
US8984645B2 (en) | Accessing memory device content using a network | |
US20060232826A1 (en) | Method, device, and system of selectively accessing data | |
EP2151763A1 (en) | Method and apparatus for obfuscating virtual to physical memory mapping | |
KR20140046476A (en) | Authenticator | |
US11423154B2 (en) | Endpoint authentication based on boot-time binding of multiple components | |
CN110661817A (en) | Resource access method and device and service gateway | |
CN111090616B (en) | File management method, corresponding device, equipment and storage medium | |
JP6711042B2 (en) | Decryption program, encryption program, decryption device, encryption device, decryption method, and encryption method | |
JP6199712B2 (en) | Communication terminal device, communication terminal association method, and computer program | |
CN115001813B (en) | Information security method, system, equipment and medium | |
TW202234273A (en) | Server system to control memory devices over computer networks | |
US20220231858A1 (en) | Control of Memory Devices over Computer Networks | |
US20240146525A1 (en) | Batch Transfer of Control of Memory Devices over Computer Networks | |
CN111783115A (en) | Data encryption storage method and device, electronic equipment and storage medium | |
CN112579998A (en) | Webpage access method, management system and electronic equipment in information interaction platform | |
CN114817957B (en) | Encrypted partition access control method, system and computing device based on domain management platform | |
US11362821B2 (en) | Secure selective rules driven token invalidation | |
CN112367302B (en) | Identity authentication method and system suitable for chrome browser | |
CN114218593A (en) | Information security detection method based on office equipment | |
WO2017020449A1 (en) | Fingerprint reading method and user equipment | |
US10318766B2 (en) | Method for the secured recording of data, corresponding device and program | |
US12088581B2 (en) | Track activities of components in endpoints having secure memory devices via identity validation | |
CN116611034A (en) | Firmware starting method and system based on certificate authorization | |
CN105069377A (en) | Security hard disk |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |