[go: up one dir, main page]

CN106961411A - A kind of data transmission method and system - Google Patents

A kind of data transmission method and system Download PDF

Info

Publication number
CN106961411A
CN106961411A CN201610012590.9A CN201610012590A CN106961411A CN 106961411 A CN106961411 A CN 106961411A CN 201610012590 A CN201610012590 A CN 201610012590A CN 106961411 A CN106961411 A CN 106961411A
Authority
CN
China
Prior art keywords
data
terminal
encryption
encrypted
data terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610012590.9A
Other languages
Chinese (zh)
Other versions
CN106961411B (en
Inventor
李爽
杨轶
郭宇鹏
李伟敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wooden Chicken Network Technology Co Ltd
Original Assignee
Shanghai Wooden Chicken Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wooden Chicken Network Technology Co Ltd filed Critical Shanghai Wooden Chicken Network Technology Co Ltd
Priority to CN201610012590.9A priority Critical patent/CN106961411B/en
Publication of CN106961411A publication Critical patent/CN106961411A/en
Application granted granted Critical
Publication of CN106961411B publication Critical patent/CN106961411B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

A kind of data transmission method and system, methods described include:AES is compiled into fictitious order by the first data terminal, sends the packet comprising the fictitious order to the second data terminal;Be-encrypted data is encrypted using the fictitious order for second data terminal, to obtain encryption data;The encryption data is delivered to the first data terminal by second data terminal;The encryption data is decrypted first data terminal, to judge the validity of the encryption data.Methods described and system can lift the security of data transfer.

Description

A kind of data transmission method and system
Technical field
The present invention relates to the communications field, more particularly to a kind of data transmission method and system.
Background technology
With the development of network technology, the data transfer carried out by network is more and more.Network data is passed Defeated to be related to that face is very wide, the industry that application network carries out data transmission is also more and more, more and more Requirement of the network data transmission to Information Security is higher.
But, the Information Security of existing network data transmission method has much room for improvement.
The content of the invention
Present invention solves the technical problem that being the security for improving data transmission method.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of data transmission method, including:
AES is compiled into fictitious order by the first data terminal, sends the data for including the fictitious order Wrap to the second data terminal;
Be-encrypted data is encrypted using the fictitious order for second data terminal, to be encrypted Data;
The encryption data is delivered to the first data terminal by second data terminal;
The encryption data is decrypted first data terminal, to judge the effective of the encryption data Property.
Optionally, also include in the packet:It is able to carry out the virtual environment or right of the fictitious order The selection of the virtual environment is answered to identify.
Optionally, the instruction system that first data terminal is updated using dynamic is carried out to the AES Compiling.
Optionally, first data terminal is further adapted for being updated the AES.
Optionally, signing messages is also included in the packet;It is encrypted to the be-encrypted data Before, also include:Second data terminal is signed using the signing messages to the be-encrypted data Name;
The encryption data is decrypted first data terminal, to judge the effective of the encryption data Property includes:The be-encrypted data that the encryption data is decrypted to be signed for first data terminal; First data terminal is verified by the be-encrypted data to the signature, to judge the encryption number According to validity.
Optionally, the be-encrypted data includes payment information.
Optionally, when the encryption data is valid data, also include:First data terminal initiates to pay Application.
The embodiment of the present invention also provides a kind of data transmission system, including:
First data terminal, suitable for AES is compiled into fictitious order, sends and includes the fictitious order Packet be decrypted to the second data terminal, and to the encryption data from second data terminal, with Judge the validity of the encryption data;
Second data terminal, suitable for be-encrypted data is encrypted using the fictitious order, with The first data terminal is delivered to encryption data, and by the encryption data.
Optionally, also include in the packet:It is able to carry out the virtual environment or right of the fictitious order The selection of the virtual environment is answered to identify.
Optionally, the instruction system that first data terminal is updated using dynamic is carried out to the AES Compiling.
Optionally, first data terminal is further adapted for being updated the AES.
Optionally, signing messages is also included in the packet;
Second data terminal is further adapted for, before the be-encrypted data is encrypted, using described Signing messages is signed to the be-encrypted data;
First data terminal includes:Decryption unit, suitable for being decrypted the encryption data to obtain The be-encrypted data of signature;Authentication unit, is verified suitable for the be-encrypted data to the signature, with Judge the validity of the encryption data.
Optionally, the be-encrypted data includes payment information.
Optionally, first data terminal also includes:Pay application and initiate unit, suitable for when the encryption When data are valid data, initiate to pay application.
Compared with prior art, the technical scheme of the embodiment of the present invention has the advantages that:
By the way that AES is compiled into fictitious order so that AES exists no longer in the form of plaintext, And then make it that illegal third party is difficult to know AES, so as to add the confidentiality of AES.The Be-encrypted data is encrypted using the fictitious order for two data terminals, obtains encryption data, Ke Yizeng Plus the Information Security of be-encrypted data.Second data terminal sends encryption data to the first data terminal, the Data can be decrypted for one data terminal, and completing whole data so as to the higher mode of security passes Defeated communication process.
Brief description of the drawings
Fig. 1 is a kind of flow chart of data transmission method in the embodiment of the present invention;
Fig. 2 is a kind of structural representation of data transmission system in the embodiment of the present invention;
Fig. 3 is a kind of structural representation of first data terminal in the embodiment of the present invention.
Embodiment
With the development of network technology, the data transfer carried out by network is more and more.Network data is passed Defeated to be related to that face is very wide, the industry that application network carries out data transmission is also more and more, more and more Requirement of the network data transmission to Information Security is higher.
But, the Information Security of existing network data transmission method has much room for improvement.
The present invention by AES by being compiled into fictitious order so that AES is no longer with the shape of plaintext Formula is present, and then make it that illegal third party is difficult to know AES, so as to add the guarantor of AES Close property.Be-encrypted data is encrypted using the fictitious order for second data terminal, obtains encryption data, The Information Security of be-encrypted data can be increased.Second data terminal sends encryption data to the first data End, the first data terminal can be decrypted to data, be completed entirely so as to the higher mode of security The communication process of data transfer.
It is understandable to enable above-mentioned purpose, feature and beneficial effect of the invention to become apparent, with reference to Accompanying drawing is described in detail to the specific embodiment of the present invention.
Fig. 1 is a kind of flow chart of data transmission method in the embodiment of the present invention.
In step s 11, AES is compiled into fictitious order by the first data terminal.
First data terminal can be server or server cluster or other possess data processing The equipment of ability.Fictitious order can be custom instruction or can also be various appropriate universal commands, It can be run in the virtual environment of matching.
In the prior art, AES be often exposed in a variety of manners it is third-party, such as with visitor The form of family end program code or scripted code, is present in user terminal, and the program code or script Code is typically the possibility for thus providing data falsification disclosed in plain code to third party.
In embodiments of the present invention, it will be sent after the AES compiling of source code form to the second data terminal Used, thus, malicious third parties will be unable to obtain the particular content of the AES after compiling easily, Also just it is difficult to the forgery of data.Furthermore, AES is compiled as void by the embodiment of the present invention Pseudoinstruction, because fictitious order can be customized instruction, in undocumented state, the illegal 3rd Side is difficult to the instruction system for obtaining the fictitious order, so as to greatly enhance the confidentiality of AES.
In specific implementation, first data terminal is further adapted for being updated the AES.Pair plus The renewal of close algorithm can be regularly updated, and each data transfer can also be calculated using different encryptions Method.
AES is updated, can make it that AES has ageing, even if data transfer mistake Packet in journey is trapped, and illegal third party has also cracked the AES of intercepted data, but by Have in AES ageing so that this, which is cracked, makes a futile effort, so as to further increase data transfer The security of method.
In step s 12, the packet comprising the fictitious order is sent to the second data terminal.
Second data terminal can be that computer, server, mobile phone, panel computer etc. possess certain computing energy The equipment of power.
The void for being able to carry out the fictitious order can also be included in one is embodied, in the packet Near-ring border.I.e. it is capable to which the second data can be loaded in by performing the virtual environment of the fictitious order Comprising selection mark in end, the packet that the first data terminal is sent to the second data terminal, to choose or swash The virtual environment loaded in second data terminal living;Or, virtual environment can also be from the first data terminal to What the second data terminal was sent, that is, the second data terminal and unloaded virtual environment, virtual environment it is complete File is sent to the second data terminal by the first data terminal.Wherein, fictitious order system and virtual environment are phases Mutually match, if fictitious order is customized, then virtual environment be exactly and this it is self-defined it is virtual refer to The virtual environment of matching is made, virtual environment can be explained or be performed the fictitious order by the way of appropriate. For example, the virtual environment can be virtual machine.
In another specific implementation, the instruction system that first data terminal is updated using dynamic adds to described Close algorithm is compiled.First data terminal can regularly update instruction system, can also need to carry out every time Instruction system is updated before data transfer.
Accordingly, the second data terminal should prepare the virtual environment for supporting the first data-side instructions system, should Virtual environment can be sent or from the first data terminal to the second data terminal in step s 11 The environment of a variety of instruction systems is supported in the configuration of two data terminals, when needing data transfer every time, by the first data The instruction system of its application is informed in step s 11 in end.
It is updated similar to AES, the instruction system updated using dynamic can make call instruction system Uniting, it is ageing to have, even if the packet in data transmission procedure is trapped, and illegal third party also breaks Instruction system has been solved, but because instruction system has ageing, the corresponding data biography for having cracked instruction system Defeated process has been completed, and next data transmission procedure employs different instruction systems, so as to further Add the security of data transmission method.
In step s 13, second data terminal is added using the fictitious order to be-encrypted data It is close, to obtain encryption data.
In specific implementation, the be-encrypted data includes payment information.Payment information can be and network Related information is paid, for example, pays key, payment, beneficiary mark etc..
Payment process is higher to data security requirement, in payment process, and the second of the embodiment of the present invention Data terminal can be used by the client with the demand of payment, and the first data terminal can be in validation of payment information After legitimacy, initiate to pay application.For example, after checking legitimacy, the first data terminal is by the branch of user Pay information and be forwarded to corresponding paying server, to complete to pay.
Payment process needs to prevent that illegal third party from disguising oneself as the second data terminal transmission data to forge transaction. In embodiments of the present invention, because illegal third party is difficult to know AES, so as to be difficult to disguise oneself as Two data terminals forge transaction, and then improve the security of payment process.
In step S14, the encryption data is delivered to the first data terminal by second data terminal.
In step S15, the encryption data is decrypted first data terminal, described to judge The validity of encryption data.
Judgement to encryption data validity, can be carried out by the following method:First data terminal use with Encryption data is decrypted encryption method corresponding decryption method, judges whether the data that decryption is obtained are complete It is whole, if complete data, then it is considered that encryption data is effective.Whether it is that complete data can To be carried out by default verification rule.
In one is embodied, signing messages can also be included in the packet;To described to be encrypted Before data are encrypted, it can also include:Second data terminal is using the signing messages to described Be-encrypted data is signed;
The encryption data is decrypted first data terminal, to judge the effective of the encryption data Property can include:It is to be encrypted that the encryption data is decrypted to be signed for first data terminal Data;First data terminal is verified by the be-encrypted data to the signature, described to judge The validity of encryption data.
In specific implementation, when the be-encrypted data includes payment information, step S15 mode is utilized To judge the validity of payment information, payment safety can be improved.
In electronic payment process, the process of subscription authentication can be included, this process need to reflect truly User pay and be intended to, rather than the unction figure forged by rogue program.Subscription authentication is generally close using inputting The form of code or dynamic verification code.Because password or identifying code are to pay indispensable in request data Information, and this information only user oneself knows, therefore this process is more difficult by illegal third party (ratio Such as malicious program code) forge.But this form of payment needs the process manually participated in more, not enough It is convenient.
In similar SMS in payment transaction, use can directly be known by user access point in operator Family identity (i.e. phone number), therefore subscription authentication process is eliminated, without inputting password, improve just Victory.But, in this way, server is more difficult to differentiate whether received packet is legal, because The malicious code being likely to be for sender, disguise oneself as user, sends a false payment request.
Malicious code disguises oneself as user's needs premised on knowing AES, and in the embodiment of the present invention AES is difficult to be obtained, so that illegal third party is difficult to dispose malicious code, so as to protect Hinder the fund security of user.
The embodiment of the present invention also provides a kind of data transmission system, and its structural representation is referring to Fig. 2.
Data transmission system, can include:
First data terminal 21, suitable for AES is compiled into fictitious order, sends comprising the virtual finger The packet of order is solved to the second data terminal 22, and to the encryption data from second data terminal 22 It is close, to judge the validity of the encryption data;
Second data terminal 22, suitable for be-encrypted data is encrypted using the fictitious order, with Encryption data is obtained, and the encryption data is delivered into the first data terminal 21.
In specific implementation, it can also include in the packet:It is able to carry out the void of the fictitious order Near-ring border or the selection mark of the correspondence virtual environment.
In specific implementation, the instruction system that first data terminal 21 can be updated using dynamic is to described AES is compiled.
In specific implementation, first data terminal 21 is further adapted for being updated the AES.
In specific implementation, signing messages can also be included in the packet;
Second data terminal 22 is further adapted for, before the be-encrypted data is encrypted, and uses institute Signing messages is stated to sign to the be-encrypted data;
First data terminal 21 can include:Decryption unit 31 (referring to Fig. 3, is entered below in conjunction with Fig. 3 Row explanation), suitable for the encryption data being decrypted the be-encrypted data to be signed;Authentication unit 32, verified suitable for the be-encrypted data to the signature, to judge the validity of the encryption data.
In specific implementation, the be-encrypted data can include payment information.
In specific implementation, first data terminal can also include:Pay application and initiate unit 33, fit In when the encryption data is valid data, initiate to pay application.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment Rapid to can be by program to instruct the hardware of correlation to complete, the program can be stored in a computer can Read in storage medium, storage medium can include:ROM, RAM, disk or CD etc..
Although present disclosure is as above, the present invention is not limited to this.Any those skilled in the art, Without departing from the spirit and scope of the present invention, it can make various changes or modifications, therefore the guarantor of the present invention Shield scope should be defined by claim limited range.

Claims (14)

1. a kind of data transmission method, it is characterised in that including:
AES is compiled into fictitious order by the first data terminal, sends the packet for including the fictitious order To the second data terminal;
Be-encrypted data is encrypted using the fictitious order for second data terminal, to obtain encrypting number According to;
The encryption data is delivered to the first data terminal by second data terminal;
The encryption data is decrypted first data terminal, to judge the validity of the encryption data.
2. data transmission method according to claim 1, it is characterised in that also include in the packet: It is able to carry out the virtual environment of the fictitious order or the selection mark of the correspondence virtual environment.
3. data transmission method according to claim 2, it is characterised in that first data terminal is used The instruction system that dynamic updates is compiled to the AES.
4. data transmission method according to claim 1, it is characterised in that first data terminal is also fitted It is updated in the AES.
5. data transmission method according to claim 1, it is characterised in that also include in the packet Signing messages;Before the be-encrypted data is encrypted, also include:Second data terminal The be-encrypted data is signed using the signing messages;
The encryption data is decrypted first data terminal, to judge the validity of the encryption data Including:The be-encrypted data that the encryption data is decrypted to be signed for first data terminal; First data terminal is verified by the be-encrypted data to the signature, to judge the encryption The validity of data.
6. the data transmission method according to any one of claim 1 to 5, it is characterised in that described to be added Ciphertext data includes payment information.
7. data transmission method according to claim 6, it is characterised in that when the encryption data is to have When imitating data, also include:First data terminal initiates to pay application.
8. a kind of data transmission system, it is characterised in that including:
First data terminal, suitable for AES is compiled into fictitious order, sends comprising the fictitious order Packet is decrypted to the second data terminal, and to the encryption data from second data terminal, with Judge the validity of the encryption data;
Second data terminal, suitable for be-encrypted data is encrypted using the fictitious order, to obtain Encryption data, and the encryption data is delivered into the first data terminal.
9. data transmission system according to claim 8, it is characterised in that also include in the packet: It is able to carry out the virtual environment of the fictitious order or the selection mark of the correspondence virtual environment.
10. data transmission system according to claim 9, it is characterised in that first data terminal is used The instruction system that dynamic updates is compiled to the AES.
11. data transmission system according to claim 8, it is characterised in that first data terminal is also fitted It is updated in the AES.
12. data transmission system according to claim 8, it is characterised in that also include in the packet Signing messages;
Second data terminal is further adapted for, before the be-encrypted data is encrypted, and uses the label Name information is signed to the be-encrypted data;
First data terminal includes:Decryption unit, suitable for being decrypted the encryption data to be signed The be-encrypted data of name;Authentication unit, is verified suitable for the be-encrypted data to the signature, with Judge the validity of the encryption data.
13. the data transmission system according to any one of claim 8 to 12, it is characterised in that described to treat Encryption data includes payment information.
14. data transmission system according to claim 13, it is characterised in that first data terminal is also wrapped Include:Pay application and initiate unit, suitable for when the encryption data is valid data, initiating to pay Shen Please.
CN201610012590.9A 2016-01-08 2016-01-08 Data transmission method and system Expired - Fee Related CN106961411B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610012590.9A CN106961411B (en) 2016-01-08 2016-01-08 Data transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610012590.9A CN106961411B (en) 2016-01-08 2016-01-08 Data transmission method and system

Publications (2)

Publication Number Publication Date
CN106961411A true CN106961411A (en) 2017-07-18
CN106961411B CN106961411B (en) 2020-11-27

Family

ID=59480602

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610012590.9A Expired - Fee Related CN106961411B (en) 2016-01-08 2016-01-08 Data transmission method and system

Country Status (1)

Country Link
CN (1) CN106961411B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7134141B2 (en) * 2000-06-12 2006-11-07 Hewlett-Packard Development Company, L.P. System and method for host and network based intrusion detection and response
CN101216775A (en) * 2008-01-03 2008-07-09 北京深思洛克数据保护中心 Software program protection method, device and system
CN101587524A (en) * 2009-06-23 2009-11-25 上海北大方正科技电脑系统有限公司 Method for encrypting data memory apparatus based on virtual system
CN101668022A (en) * 2009-09-14 2010-03-10 陈博东 Virtual network isolation system established on virtual machine and implementation method thereof
CN101976317A (en) * 2010-11-05 2011-02-16 北京世纪互联工程技术服务有限公司 Virtual machine image safety method in private cloud computing application
CN104598799A (en) * 2015-02-15 2015-05-06 张贵宝 Read-write terminal, system and method of storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7134141B2 (en) * 2000-06-12 2006-11-07 Hewlett-Packard Development Company, L.P. System and method for host and network based intrusion detection and response
CN101216775A (en) * 2008-01-03 2008-07-09 北京深思洛克数据保护中心 Software program protection method, device and system
CN101587524A (en) * 2009-06-23 2009-11-25 上海北大方正科技电脑系统有限公司 Method for encrypting data memory apparatus based on virtual system
CN101668022A (en) * 2009-09-14 2010-03-10 陈博东 Virtual network isolation system established on virtual machine and implementation method thereof
CN101976317A (en) * 2010-11-05 2011-02-16 北京世纪互联工程技术服务有限公司 Virtual machine image safety method in private cloud computing application
CN104598799A (en) * 2015-02-15 2015-05-06 张贵宝 Read-write terminal, system and method of storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
田涛: ""良好隐私"PGP5.0i加密软件与网络安全", 《INTERNET信息世界》 *

Also Published As

Publication number Publication date
CN106961411B (en) 2020-11-27

Similar Documents

Publication Publication Date Title
CN110519309B (en) Data transmission method, device, terminal, server and storage medium
CA2748481C (en) System and method for initiating transactions on a mobile device
KR101904177B1 (en) Data processing method and apparatus
EP3321837B1 (en) Method, apparatus and system for deviceidentification
US9184913B2 (en) Authenticating a telecommunication terminal in a telecommunication network
CN103067402B (en) The generation method and system of digital certificate
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
US20120150748A1 (en) System and method for authenticating transactions through a mobile device
US20090055642A1 (en) Method, system and computer program for protecting user credentials against security attacks
CN101221641B (en) On-line trading method and its safety affirmation equipment
RU2012122806A (en) CHECKING THE AUTHENTICITY OF PORTABLE HOUSEHOLD DEVICES FOR IMPLEMENTING PRINCIPLES OF THREE-DOMAIN PROTECTION OF SERVICES
CN111130799B (en) Method and system for HTTPS protocol transmission based on TEE
JP2013514556A (en) Method and system for securely processing transactions
US20210241270A1 (en) System and method of blockchain transaction verification
CN105407467B (en) Method for encrypting short message, device and system
CN110677261B (en) Trusted two-dimensional code generation method and device, electronic equipment and storage medium
CN110677382A (en) Data security processing method, device, computer system and storage medium
CN109272314B (en) A secure communication method and system based on two-party collaborative signature calculation
CN106027501A (en) System and method for performing transaction security authentication in mobile device
CN111130798A (en) Request authentication method and related equipment
CN111105235B (en) Supply chain transaction privacy protection system, method and related equipment based on blockchain
EP1142194A1 (en) Method and system for implementing a digital signature
Karnouskos et al. Security, trust and privacy in the secure mobile payment service
CN113612852A (en) Communication method, device, equipment and storage medium based on vehicle-mounted terminal
CN118074919A (en) Method, system and medium for establishing encrypted communication based on trusted hardware remote authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201127

CF01 Termination of patent right due to non-payment of annual fee