CN109409127B - Method and device for generating network data security policy and storage medium - Google Patents
Method and device for generating network data security policy and storage medium Download PDFInfo
- Publication number
- CN109409127B CN109409127B CN201811275572.5A CN201811275572A CN109409127B CN 109409127 B CN109409127 B CN 109409127B CN 201811275572 A CN201811275572 A CN 201811275572A CN 109409127 B CN109409127 B CN 109409127B
- Authority
- CN
- China
- Prior art keywords
- document
- documents
- security policy
- entropy
- importance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention discloses a method, a device and a storage medium for generating a network data security policy, wherein the method comprises the following steps: analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles; calculating the probability of each participle in the total participle by using a maximum likelihood estimation algorithm to obtain the probability of each participle; according to the obtained word segmentation probability, respectively calculating each document by adopting an information entropy algorithm to obtain an entropy value of each document; determining an importance metric of each document according to the entropy of each document; and generating a security policy according to the importance degree metric of each document. The importance of the documents in the database is measured by calculating the importance measurement value of each document, so that management personnel can clearly display data, a basis is provided for judging the importance of the documents, and the updating of the document security policy is promoted.
Description
Technical Field
The present invention relates to the field of data leakage prevention technologies, and in particular, to a method and an apparatus for generating a network data security policy, and a storage medium.
Background
Data security is more and more concerned by enterprises, the enterprises have a lot of important data to be protected, the value of the data can be reflected only in use, and how to fully use the data on the premise of effectively protecting the data becomes urgent needs of the enterprises. The data leakage prevention system is a data safety product, and data can be fully used under the condition that a data user does not sense the data leakage prevention system. Data anti-leakage system generally needs to be matched with corresponding security policy, and how to make effective security policy is an important problem in the current field.
The existing security policy scheme for preventing data leakage uses predefined security policies, such as setting keywords of important data, regular expressions of sensitive information, even data fingerprints, machine learning methods based on classification, and the like, and these rules need to be pre-built into a system when the data leakage prevention system is deployed and implemented.
However, since the security policy needs to be pre-established, in most cases, the enterprise cannot clearly know all important and sensitive data, and therefore, most pre-established policies are incomplete; even if a relatively sufficient prefabricated security policy is adopted, new data can be generated every day along with the business development of an enterprise, and the security policy cannot completely cover the newly generated data, so that the security policy is not updated timely.
Disclosure of Invention
The embodiment of the invention provides a method and a device for generating a network data security policy and a storage medium, which are used for solving the problem that the security policy in the prior art cannot be updated in time.
In a first aspect, an embodiment of the present invention provides a method for generating a network data security policy, where the method includes:
analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles;
calculating the probability of each participle in the total participle by using a maximum likelihood estimation algorithm to obtain the probability of each participle;
according to the obtained word segmentation probability, respectively calculating each document by adopting an information entropy algorithm to obtain an entropy value of each document;
determining an importance metric of each document according to the entropy of each document;
and generating a security policy according to the importance degree metric of each document.
Optionally, before analyzing the document contents of all the documents, the method further includes: and extracting the content of all the documents in the database to obtain the document content of all the documents.
Optionally, the analyzing the document contents of all the documents to obtain a plurality of word segments specifically includes:
and performing lexical analysis and syntactic analysis on the document contents of all the documents to obtain a plurality of participles.
Optionally, the determining the importance metric of each document according to the entropy of each document specifically includes:
carrying out normalization processing on entropy values of all documents;
and taking the entropy value after the normalization processing as an importance degree metric value of each document.
Optionally, the generating a security policy according to the importance metric of each document specifically includes: comparing the importance metric value with a preset value, and if the importance metric value is larger than the preset value, determining that the document is a sensitive document; and constructing a fingerprint security policy for the sensitive document, or extracting important keywords from the sensitive document to serve as the security policy.
In a second aspect, an embodiment of the present invention provides an apparatus for generating a network data security policy, including:
the analysis module is used for analyzing the document contents of all the documents to obtain a plurality of participles and removing stop words in the participles to obtain total participles;
the first calculation module is used for calculating the probability of each participle in the total participle by utilizing a maximum likelihood estimation algorithm to obtain the probability of each participle;
the second calculation module is used for calculating each document by adopting an information entropy algorithm according to the obtained word segmentation probability to obtain an entropy value of each document;
the determining module is used for determining the importance metric of each document according to the entropy value of each document;
and the generating module is used for generating the security policy according to the importance degree metric of each document.
Optionally, the system further comprises an extraction module, wherein the extraction module is configured to extract content of all documents in the database to obtain document content of all documents before the analysis module analyzes the document content of all documents.
Optionally, the analysis module is specifically configured to perform lexical analysis and syntactic analysis on the document contents of all the documents to obtain a plurality of segmented words.
Optionally, the determining module is specifically configured to:
carrying out normalization processing on entropy values of all documents;
and taking the entropy value after the normalization processing as an importance degree metric value of each document.
Optionally, the generating module is specifically configured to: comparing the importance metric value with a preset value, and if the importance metric value is larger than the preset value, determining that the document is a sensitive document; constructing a fingerprint security policy for the sensitive document; or extracting important keywords from the sensitive documents as security policies.
In a third aspect, an embodiment of the present invention provides a storage medium, where a computer program is stored on the storage medium, and when being executed by a processor, the computer program implements the following method steps:
analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles;
calculating the probability of each participle in the total participle by using a maximum likelihood estimation algorithm to obtain the probability of each participle;
according to the obtained word segmentation probability, respectively calculating each document by adopting an information entropy algorithm to obtain an entropy value of each document;
determining an importance metric of each document according to the entropy of each document;
and generating a security policy according to the importance degree metric of each document.
The importance of the documents in the database is measured by calculating the importance measurement value of each document, so that management personnel can clearly display data, powerful basis is provided for judging the importance of the documents, and the updating of the document security policy is promoted.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flowchart of a method for generating a security policy for network data according to a first embodiment;
FIG. 2 is a flowchart of a method for generating a security policy for network data according to a second embodiment;
fig. 3 is a block diagram of a network data security policy generation apparatus according to a third embodiment.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
A first embodiment of the present invention provides a method for generating a network data security policy, as shown in fig. 1, including the following specific steps:
step S11, analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles;
in this step, when analyzing the document content, the document may be analyzed specifically by lexical analysis and syntactic analysis, for example, lexical analysis by using HMM (hidden markov model) and syntactic analysis by using dependency tree analysis. The removal of stop words specifically means that the words such as "and" having "are removed.
Step S12, calculating the probability of each participle in the total participle by utilizing a maximum likelihood estimation algorithm to obtain the probability of each participle;
step S13, according to the obtained word segmentation probability, calculating each document by using an information entropy algorithm to obtain an entropy value of each document;
step S14, determining the importance degree metric of each document according to the entropy of each document;
and step S15, generating a security policy according to the importance degree metric of each document.
In this embodiment, before step S11, content extraction is further performed on all documents in the database, so as to obtain document contents of all documents.
The method and the device measure the importance of the documents in the database by calculating the importance metric of each document, clearly display data for management personnel, provide a powerful judgment basis for judging the importance of the documents, and promote the updating of the document security policy.
A second embodiment of the present invention provides a method for generating a network data security policy, as shown in fig. 2, including the following specific steps:
step S21, analyzing the document content of all documents to obtain several participles, and removing stop words in the participles to obtain total participles
Step S22, calculating the probability of each participle in the total participle by utilizing a maximum likelihood estimation algorithm to obtain the probability of each participle; for example, there are 100 documents, and after the 100 documents are subjected to content extraction and lexical analysis, 2000 participles are obtained, where the number of occurrences of the word "information" is 200, and the probability of the word "information" is 200/2000-10%.
Step S23, according to the obtained word segmentation probability, calculating each document by using an information entropy algorithm to obtain an entropy value of each document; in this step, for example, 20 segmented words are obtained from a certain document through content extraction and analysis, and the information entropy of the document is calculated by using the probability of the 20 segmented words (for example, the probability of "information" obtained by calculation in step S22 is 10%).
Step S24, carrying out normalization processing on the entropy values of all documents; the normalization in this step specifically refers to the percentage of the entropy value of each document to the entropy values of all documents.
Step S25, taking the entropy value after normalization as the importance degree measurement value of each document;
step S26, comparing the importance degree metric value with a preset value, and if the importance degree metric value is larger than the preset value, determining that the document is a sensitive document; constructing a fingerprint security policy for the sensitive document; or extracting important keywords from the sensitive documents to serve as security policies.
The embodiment of the invention establishes a unified document importance measurement method by constructing an importance (also called sensitivity) measurement model of the document to obtain the importance measurement value of each document, thereby measuring the importance of the document passing through the network data leakage-proof system, displaying clear data for managers and promoting the updating of security policies.
According to the embodiment of the invention, the corresponding security policy is generated for the document according to the importance of the document, so that the problem that a perfect security policy can be constructed only under the condition of fully knowing the distribution of data when security personnel construct the security policy is solved. Meanwhile, the embodiment of the invention solves the problem that the work of security personnel is heavier as some data can not be used basically and some data can be used frequently and the security personnel can not know which data should be protected in a key way.
In addition, the embodiment of the invention also solves the problem that the data can be misjudged (non-important data is judged as important data) in the practical application process due to the prefabricated security strategy, thereby increasing the difficulty of data leakage prevention work; if the security policy is adjusted, the problem of missed judgment can be caused.
A third embodiment of the present invention provides a device for generating a network data security policy, as shown in fig. 3, including:
the analysis module 1 is used for analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles;
in a specific implementation process, the analysis module 1 is specifically configured to perform lexical analysis and syntactic analysis on document contents of all documents to obtain a plurality of segmented words.
And the first calculating module 2 is used for calculating the probability of each participle in the total participle by using a maximum likelihood estimation algorithm to obtain the probability of each participle.
And the second calculating module 3 is used for calculating each document by adopting an information entropy algorithm according to the obtained word segmentation probability to obtain an entropy value of each document.
The determining module 4 is used for determining the importance metric of each document according to the entropy of each document;
in a specific implementation process, the determining module 4 is specifically configured to: carrying out normalization processing on entropy values of all documents; and taking the entropy value after the normalization processing as an importance degree metric value of each document.
And the generating module 5 is used for generating the security policy according to the importance degree metric of each document.
In an implementation process, the generating module is specifically configured to: comparing the importance metric value with a preset value, and if the importance metric value is larger than the preset value, determining that the document is a sensitive document; constructing a fingerprint security policy for the sensitive document; or extracting important key words from the sensitive documents as security policies
In the embodiment of the present invention, the system specifically further includes an extraction module, where the extraction module is configured to extract contents of all documents in the database before the analysis module analyzes the document contents of all documents, so as to obtain the document contents of all documents.
According to the embodiment of the invention, the importance degree metric value of each document is determined by using the determining module to measure the importance degree of the document in the database, so that a judgment basis is provided for judging the importance degree of the document, and the document security policy is updated in time.
A fourth embodiment of the invention provides a storage medium having a computer program stored thereon, which computer program, when being executed by a processor, carries out the method steps of:
analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles;
calculating the probability of each participle in the total participle by using a maximum likelihood estimation algorithm to obtain the probability of each participle;
thirdly, calculating each document by adopting an information entropy algorithm according to the obtained word segmentation probability to obtain an entropy value of each document;
fourthly, determining the importance metric of each document according to the entropy of each document;
and step five, generating a security policy according to the importance degree metric of each document.
The method and the device measure the importance of the documents in the database by calculating the importance metric value of each document, clearly display data for management personnel, provide a powerful judgment basis for judging the importance of the documents, and promote the updating of the document security policy
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (8)
1. A method for generating a network data security policy, the method comprising:
analyzing the document contents of all documents to obtain a plurality of participles, and removing stop words in the participles to obtain total participles;
calculating the probability of each participle in the total participle by using a maximum likelihood estimation algorithm to obtain the probability of each participle;
according to the obtained word segmentation probability, respectively calculating each document by adopting an information entropy algorithm to obtain an entropy value of each document;
determining an importance metric of each document according to the entropy of each document;
comparing the importance metric value with a preset value, and if the importance metric value is larger than the preset value, determining that the document is a sensitive document; and constructing a fingerprint security policy for the sensitive document, or extracting important keywords from the sensitive document to serve as the security policy.
2. The method for generating a network data security policy of claim 1, wherein before analyzing the document contents of all documents, the method further comprises: and extracting the content of all the documents in the database to obtain the document content of all the documents.
3. The method for generating a network data security policy according to claim 1, wherein the analyzing the document contents of all documents to obtain a plurality of segments specifically comprises:
and performing lexical analysis and syntactic analysis on the document contents of all the documents to obtain a plurality of participles.
4. The method for generating a network data security policy according to claim 1, wherein the determining the importance metric of each document according to the entropy of each document specifically includes:
carrying out normalization processing on entropy values of all documents;
and taking the entropy value after the normalization processing as an importance degree metric value of each document.
5. An apparatus for generating a network data security policy, comprising:
the analysis module is used for analyzing the document contents of all the documents to obtain a plurality of participles and removing stop words in the participles to obtain total participles;
the first calculation module is used for calculating the probability of each participle in the total participle by utilizing a maximum likelihood estimation algorithm to obtain the probability of each participle;
the second calculation module is used for calculating each document by adopting an information entropy algorithm according to the obtained word segmentation probability to obtain an entropy value of each document;
the determining module is used for determining the importance metric of each document according to the entropy value of each document;
the generating module is used for comparing the importance metric value with a preset value, and if the importance metric value is larger than the preset value, determining that the document is a sensitive document; constructing a fingerprint security policy for the sensitive document; or extracting important keywords from the sensitive documents as security policies.
6. The apparatus for generating a network data security policy according to claim 5, further comprising an extraction module, where the extraction module is configured to extract contents of all documents in the database to obtain document contents of all documents before the analysis module analyzes the document contents of all documents.
7. The apparatus for generating a network data security policy according to claim 5, wherein the determining module is specifically configured to:
carrying out normalization processing on entropy values of all documents;
and taking the entropy value after the normalization processing as an importance degree metric value of each document.
8. A storage medium, characterized in that the storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the method according to any one of claims 1-4.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201811275572.5A CN109409127B (en) | 2018-10-30 | 2018-10-30 | Method and device for generating network data security policy and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201811275572.5A CN109409127B (en) | 2018-10-30 | 2018-10-30 | Method and device for generating network data security policy and storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN109409127A CN109409127A (en) | 2019-03-01 |
| CN109409127B true CN109409127B (en) | 2022-04-26 |
Family
ID=65469794
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201811275572.5A Active CN109409127B (en) | 2018-10-30 | 2018-10-30 | Method and device for generating network data security policy and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN109409127B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112583414B (en) * | 2020-12-11 | 2024-12-03 | 北京百度网讯科技有限公司 | Scene processing method, device, equipment, storage medium and product |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102012985A (en) * | 2010-11-19 | 2011-04-13 | 国网电力科学研究院 | Sensitive data dynamic identification method based on data mining |
| CN105224695A (en) * | 2015-11-12 | 2016-01-06 | 中南大学 | A kind of text feature quantization method based on information entropy and device and file classification method and device |
| CN105844118A (en) * | 2016-04-15 | 2016-08-10 | 宝利九章(北京)数据技术有限公司 | Methods and system for preventing data leakage |
| CN105956482A (en) * | 2016-04-15 | 2016-09-21 | 宝利九章(北京)数据技术有限公司 | Method and system for data leakage protection |
| CN107292193A (en) * | 2017-05-25 | 2017-10-24 | 北京北信源软件股份有限公司 | A kind of method and system for realizing leakage prevention |
| CN107958068A (en) * | 2017-12-05 | 2018-04-24 | 华中科技大学 | A kind of language model smoothing method based on entity knowledge base |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9336381B1 (en) * | 2013-04-08 | 2016-05-10 | Amazon Technologies, Inc. | Entropy-based detection of sensitive information in code |
| CN106897459A (en) * | 2016-12-14 | 2017-06-27 | 中国电子科技集团公司第三十研究所 | A kind of text sensitive information recognition methods based on semi-supervised learning |
| CN107679138B (en) * | 2017-09-22 | 2021-08-27 | 陕西师范大学 | Spectral feature selection method based on local scale parameters, entropy and cosine similarity |
-
2018
- 2018-10-30 CN CN201811275572.5A patent/CN109409127B/en active Active
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102012985A (en) * | 2010-11-19 | 2011-04-13 | 国网电力科学研究院 | Sensitive data dynamic identification method based on data mining |
| CN105224695A (en) * | 2015-11-12 | 2016-01-06 | 中南大学 | A kind of text feature quantization method based on information entropy and device and file classification method and device |
| CN105844118A (en) * | 2016-04-15 | 2016-08-10 | 宝利九章(北京)数据技术有限公司 | Methods and system for preventing data leakage |
| CN105956482A (en) * | 2016-04-15 | 2016-09-21 | 宝利九章(北京)数据技术有限公司 | Method and system for data leakage protection |
| CN107292193A (en) * | 2017-05-25 | 2017-10-24 | 北京北信源软件股份有限公司 | A kind of method and system for realizing leakage prevention |
| CN107958068A (en) * | 2017-12-05 | 2018-04-24 | 华中科技大学 | A kind of language model smoothing method based on entity knowledge base |
Non-Patent Citations (1)
| Title |
|---|
| "一种利用近邻和信息熵的主动文本标注方法";朱岩等;《计算机研究与发展》;20120615;第49卷(第6期);第1306-1312页,正文节1.2、表1 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN109409127A (en) | 2019-03-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9398034B2 (en) | Matrix factorization for automated malware detection | |
| US20120136812A1 (en) | Method and system for machine-learning based optimization and customization of document similarities calculation | |
| CN111767716B (en) | Method, device and computer equipment for determining multi-level industry information of an enterprise | |
| JPWO2017065070A1 (en) | Suspicious behavior detection system, information processing apparatus, method and program | |
| CN109495479B (en) | User abnormal behavior identification method and device | |
| CN111079186B (en) | Data analysis method, device, equipment and storage medium | |
| CN110309251B (en) | Text data processing method, device and computer-readable storage medium | |
| CN112765003B (en) | Risk prediction method based on APP behavior log | |
| CN112131249A (en) | Attack intention identification method and device | |
| CN108509561B (en) | Post recruitment data screening method and system based on machine learning and storage medium | |
| CN113343699B (en) | Log security risk monitoring method and device, electronic equipment and medium | |
| CN111988327B (en) | Threat behavior detection and model establishment method and device, electronic equipment and storage medium | |
| CN110598397A (en) | Deep learning-based Unix system user malicious operation detection method | |
| CN113688240A (en) | Threat element extraction method, device, equipment and storage medium | |
| US20240126918A1 (en) | Techniques for data classification and for protecting cloud environments from cybersecurity threats using data classification | |
| CN109409127B (en) | Method and device for generating network data security policy and storage medium | |
| CN115730064B (en) | Keyword processing method and device, electronic equipment and storage medium | |
| CN119444232B (en) | Digital economic risk management evaluation method and system based on cloud computing | |
| CN114003577A (en) | User auditing method, system, electronic device and storage medium | |
| CN120030552A (en) | Model safety detection method, electronic device, storage medium and program product | |
| CN117408652A (en) | An archive data analysis and management method and system | |
| CN110059480A (en) | Attack monitoring method, device, computer equipment and storage medium | |
| JP5694989B2 (en) | Document classification apparatus and program | |
| CN113127640A (en) | Malicious spam comment attack identification method based on natural language processing | |
| CN115221857B (en) | Data similarity detection method and device containing numerical value types |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |