CN1151438C - System and method for protection of data in rewriteable memory media - Google Patents
System and method for protection of data in rewriteable memory media Download PDFInfo
- Publication number
- CN1151438C CN1151438C CNB991194373A CN99119437A CN1151438C CN 1151438 C CN1151438 C CN 1151438C CN B991194373 A CNB991194373 A CN B991194373A CN 99119437 A CN99119437 A CN 99119437A CN 1151438 C CN1151438 C CN 1151438C
- Authority
- CN
- China
- Prior art keywords
- write
- write command
- memory media
- hard disk
- storage area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 16
- 230000004224 protection Effects 0.000 title claims description 39
- 230000000694 effects Effects 0.000 claims description 10
- 238000012544 monitoring process Methods 0.000 claims description 4
- 230000009471 action Effects 0.000 description 9
- 241000700605 Viruses Species 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000001066 destructive effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- PWPJGUXAGUPAHP-UHFFFAOYSA-N lufenuron Chemical compound C1=C(Cl)C(OC(F)(F)C(C(F)(F)F)F)=CC(Cl)=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F PWPJGUXAGUPAHP-UHFFFAOYSA-N 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
A method and system for protecting data on a rewritable storage medium, such as a hard disk. A predefined table identifies protected storage sectors in the hard disk. A software driver receives a write command for a specific storage sector of the hard disk and checks whether the specific storage sector corresponds to the protected storage sector defined by the table. If there is a correspondence, this write command is processed by a monitor program module. The monitor program module checks whether the write command is legal according to the status of the coupled operational system. When the monitor program module verifies the legality of the write command, the software driver performs the normal write operation, and writes data to the specific storage sector.
Description
Technical field
The present invention relates to a kind of to being stored in for example system and method protected of the data on the hard disk of rewriteable memory media (rewritable storagemedia), to avoid these data by computer-virus program or other destructive program illegal modifications.
Background technology
At present, most of personal computer is as a large amount of Storage Medias with hard disk.For instance, hard disk can be used for the code of deposit operation system (OS) file and subscriber data file.
Fig. 1 (known technology) is the block diagram that is illustrated in access data action in the hard disk of computer system.As shown in Figure 1, user's 1 executive utility 2 or Command Programs of Operating System (Operating System shell) are to finish required work.For instance, in disc operating system (DOS) (DOS), command interpreter is COMMAND.COM; And in the Microsoft's Window 3.11, command interpreter then is manager of programming PROGRAM.EXE.When user 1 attempts to carry out one when needing the work of access hard disk, application program 2 can exhalation Application Program Interfaces (API) 3 with the access command of sending access hard disk 7 to operating system kernel 4.3 of Application Program Interfaces utilize the consolidator platform that various application are provided, and carry out preset program thus in operating system.
Behind the intact access command that is received to be analyzed, operating system kernel 4 can send write or reading order to the driver (driver) 5 of certain specific device, write and read action in order to control hardware controller 6 with what reality was carried out hard disk 7.Operating system can pick out its source under normal circumstances for any harddisk access requirement significantly.
As mentioned above, hard disk is usually preserved a lot of important data, as operating system file and file description block (file descriptor block, FDB).Most computers is in when start, exists the operating system file of hard disk at first can be loaded into the primary memory of computing machine, so as to setting up operating platform.If the file relevant with operating system can't correctly find or complete reading, then computer system just can't start and work.In addition, each file also has a file description block in the hard disk, in order to the store files relevant information.If the file description block receives damage or changes, then respective file also may be lost or can't normally read.Therefore, data just become problem quite crucial in the system operation in the protection hard disk.
Unfortunately, there is a lot of computer viruses in PC World, and these viruses attempt to destroy and destroy computer system with various technology.Rewriting or revised file description block or other system file are one of these technology.But,, do not have effective way to prevent the generation of the ruined thing of this class safety for traditional computer system.
Summary of the invention
The invention provides the system and method for the data on a kind of protection rewriteable memory media (for example hard disk), to avoid, so as to improving the stability of computer system by the illegal modifications of computer-virus program or other destructive programs.
Be stored in the data on the rewriteable memory media, controlled by hardware control.The table that is defined in advance then is to define one or more write protections storage area in rewriteable memory media, and it is preferably also deposited in the rewriteable memory media.This expression, any data that will the write protection storage area all are can detect with controllable.Software driver (softwaredriver) then chains operating system, can rewrite the write command in specific storage district in the medium and check whether the specific storage district of write command is arranged in the write protection storage area in order to receive.When having corresponding relation between write command and this table, write command at first is by handling with the supervisory programme module of operating system link.The supervisory programme module can be checked the legitimacy of write command according to the state of operating system.If the supervisory programme module is confirmed the legitimacy of write command, then software driver just can be carried out normal write activity and data are inserted specific storage district in the write protection storage area.
Technical scheme of the present invention is achieved in that
A kind of system that is used for protecting data in the rewriteable memory media, this rewriteable memory media is controlled by a controller, and is set in the computing machine of carrying out an operating system, and this system comprises:
The access list device is used in this rewriteable memory media definition write protection storage area;
The software driver device is linked in this operating system, can rewrite the write command in a specific storage district in the medium and check that whether corresponding this specific storage district is corresponding to this write protection storage area in this write command in order to receive corresponding to this; And
One monitoring arrangement; be linked in this software driver device and this operating system; when this software driver device is confirmed this specific storage district corresponding to this write protection storage area; check whether this write command is legal; when this monitoring arrangement is confirmed the legitimacy of this write command; this software driver device drives this controller, thus data is write this specific storage district.
The present invention also provides a kind of data has been write the method for a rewriteable memory media, and this rewriteable memory media is controlled by a controller, and is set in the computing machine of carrying out an operating system, and this method may further comprise the steps:
Define an access list, so as to definition write protection storage area in this rewriteable memory media;
Utilize a software driver to receive and can rewrite the write command in a specific storage district in the medium corresponding to this, wherein this software driver can be used for driving this controller, so as to carry out write activity in this rewriteable memory media;
Whether at least a portion of checking this specific storage district is corresponding to defined this write protection storage area of this access list;
At least a portion of confirming this specific storage district when this software driver is during corresponding to this write protection storage area, and a monitor module that is linked in this operating system is delivered in this write command that this software-driven module is received.
According to the state of this operating system, check with this monitor module whether this write command is legal;
Drive this controller with this software driver,, data are write this specific storage district so as to when this monitor module is confirmed the legitimacy of this write command.
For above-mentioned and other purposes of the present invention, feature and advantage can be become apparent, a preferred embodiment cited below particularly, and conjunction with figs. are described in detail below.
Description of drawings
Fig. 1 (known technology) is the processing synoptic diagram of the access data stored in the known computer hard disk;
Fig. 2 is the system chart of the embodiment of the invention, and its hard disc data in order to the protection computer system avoids being illegally modified;
Fig. 3 is in the embodiments of the invention, the corresponding relation figure of access list data and hard disk sector;
Fig. 4 is in the embodiments of the invention, the detailed action flow chart of software driver;
Fig. 5 is in the embodiments of the invention, the detailed action flow chart of supervisory programme module;
Fig. 6 is in the embodiments of the invention, data is write the flow chart of steps of the write protection storage area of rewriteable memory media.
Embodiment
Present embodiment discloses particularly storer method and system of important data (as the file description block) in the hard disk for example of a kind of protected data, is illegally modified so as to avoiding.Under normal condition, operating system can be sent the device driver of an access command (read or write) to storage data according to the requirement of primary application program.Therefore, operating system kernel can pick out the source of the normal access command relevant with hard disk.If this access command is sent by the application program of operating system, then this access command does not just belong to the valid application program of operating system.Whether and the present invention utilizes this characteristic, legal so as to telling any device driver received access command, particularly write command.
In addition, in hard disk, define write protection storage area (or storing the sector) with a table.The position, storage area that this table (access list) definition needs protection is as the file description block information.Before changing or revising the hard disk position that belongs in the access list to be defined, device driver can be delivered to this write command the supervisory programme module, so as to checking its legitimacy.After the legitimacy of write command to be confirmed, device driver just can be with data write protection district.
Fig. 2 is the system chart of the embodiment of the invention, and its hard disc data in order to the protection computer system avoids being illegally modified.In Fig. 2, the structure of computer system is different from situation shown in Figure 1.Wherein, the device driver 20 of document control is in order to replace the specific device driver 5 shown in Fig. 1.The device driver 20 of document control increases by a function than known driver, that is can go the access section of checking that all write commands are specified, and this point can describe in detail after a while.Document control access transmitter in the controller 6 only can be responded the valid memory access request that device driver 20 is sent.According to present embodiment, access list 40 is arranged in the hard disk 7, and the storage sector that needs protection in order to identification or placement.Device driver 20 and operating system 10 that supervisory programme module 30 links to file and controls are in order to check any legitimacy of wanting to change the write command of protecting the sector content.
The functional similarity of file control device driver 20 and known devices driver, it receives the read or write command of specific storage sector in the relevant hard disk 7, and driving governor 6 and document control access transmitter wherein are so as to carrying out corresponding access action.Document control access transmitter can guarantee that the access command that has only file control device driver 20 to be sent can be performed.Usually, the read or write command of reception is required to send according to the application program of carrying out on it by operating system 10.But, when computing machine was poisoned, the read or write command of reception also may be sent by unknown program such as computer virus.Another function of file control device driver 20 is whether to check the storage sector of write command by access list 40 definition, and its definition has the storage sector of important information (as operating system shelves and file description block).40 defined protections store the sector if the storage sector of desiring to write belongs to access list, and then write command must be handled by supervisory programme module 30.Supervisory programme module 30 couples (clasp joint) in operating system 10, in order to the state of monitor operating system.That is to say that supervisory programme module 30 checks that the write command whether operating system 10 is sent is correctly received by file control device driver 20.Because any normal write command of valid application program all can be confirmed by this way, the write command of computer virus just can be caught.Document control access transmitter is one to one corresponding to file control device drive unit 20, so as to avoiding the illegal access to access list 40.Therefore, this write command be accepted or be refused to file control device driver 20 can according to the check result of supervisory programme module 30.Therefore, above-described computer system can prevent that just the significant data of hard disk from suffering computer virus change or modification.
Next describe access list 40, file control device driver 20 in detail, reach 30 3 unit of supervisory programme module.
As above-mentioned, the storage sector of access list 40 definition important informations is as operating system file and file description block.In this example, a protection with the file description block is an example.But, for the operator of this area, any storage sector associated with the file all can adopt the method for access list 40 definition to be protected.
Fig. 3 is the corresponding relation figure of sector in access list 40 in the embodiment of the invention and the hard disk 7.Access list 40 can leave in the hard disk 7, and this helps the access of access list 40 to handle.Usually, hard disk is to be the unit storage data with the byte, and each byte has 8 bits.According to present embodiment, each byte of access list 40 is used to define four storage sectors of hard disk drive 7, and therefore, available two bits are represented a state that stores the sector.Following table expression state is first arranged example.
Table 1
| Mode bit | Meaning |
| 00 | Open |
| 01 | Pin |
| 10 | Only write once |
| 11 | The file description block |
As shown in table 1, if corresponding two of storing the sector are 00 o'clock, the storage sector not protected (opening) that expression is corresponding; If corresponding two of storing the sector are 11 o'clock, represent that corresponding storage sector is protected and before access, should confirm (file description block) earlier.Access is forbidden in the storage sector of " pinning " state representation correspondence, and " writing once " state represents that then corresponding storage sector is only to be written into once.
The access list 40 of four byte lengths of expression in Fig. 3, and the storage sector 7a part of hard disk 7.Four bytes of access list 40 are expressed as B in regular turn
n, B
N+1, B
N+2, B
N+3, store sector S in order to store 16
m~S
M+15User mode.For instance, byte Bn represents to store sector S
m, S
M+1, S
M+2, S
M+3User mode.In this example, these sectors all are normal data.Byte Bn+1 represents to store sector S
M+4, S
M+5, S
M+6, S
M+7User mode, wherein preceding two sector S
M+4, S
M+5Include normal data, latter two sector S
M+6, S
M+7The file description block that then has the desire protection.Byte B
N+2Expression stores sector S
M+8, S
M+9, S
M+10, S
M+11User mode.First three sector S
M+8, S
M+9, S
M+10File description block with desire protection, sector S
M+11, S
M+7It then is normal data.Byte B
N+3Expression stores sector S
M+12, S
M+13, S
M+14, S
M+15User mode.These sectors also all comprise normal data.
When file control device driver 20 receives write commands, prepare to change sector with protected data (sector S for example
M+7) during content, write command at first will be sent to supervisory programme module 30 to check its legitimacy.If write command is legal, then file control device driver 20 meeting driving governors 6 are to carry out necessary write activity.In addition, when the received write command of file control device driver 20, be to change the sector that stores normal data (sector S for example
M+12) during content, write command can directly be handled by file control device driver 20, carries out necessary write activity so as to start-up control device 6.Any illegal access requires all can be kept off by document control access transmitter.
Fig. 4 is in the embodiment of the invention, the detailed action flow chart of file control device driver 20.What note is that the file control device driver 20 of present embodiment also can carry out every function of known devices driver.As shown in Figure 4, file control device driver 20 at first receives the order of operating system (S1) or unknown program.Basically, the file control device driver can not be told the program of sending present order 20 this moments.Then, the action of file control device driver 20 these orders of identification is reading order or write command (S2).When this order is reading order (irrelevant with the present invention), file control device driver 20 directly driving governor 6 reads action (S3) normally to carry out.
When this order when the write command, following two steps of 20 execution of file control device driver, that is check the legitimacy whether the storage sector of wanting access is protected and checks this write command.Whether as shown in Figure 4, file control device driver 20 at first sees through the access list 40 that document control access transmitter reads hard disk 7, be that the access of approving requires (S4) so as to checking.According to access list 40, file control device driver 20 checks whether the sector that will be written into the order access belongs to the sector that is subjected to access protection (S5) of definition in the access list 40.If this relation is false, then this write command does not need further inspection, and file control device driver 20 directly driving governor 6 to carry out normal write activity (S6).If this relation is set up, then must confirm the legitimacy of write command.
The legitimacy of confirming write command is performed by supervisory programme module 30.Therefore, file control device driver 20 can be sent into write command supervisory programme module 30, and await a response (S7).After the legitimacy of write command to be confirmed, supervisory programme module 30 can be sent the result back to file control device driver 20.If write command is legal (S8), file control device driver 20 driving governors 6 are to carry out normal write activity (S6).If write command is illegal (S8), then file control device control program 20 is just delivered to operating system with error message, and refusal is carried out write activity (S9).
Fig. 5 is in the embodiment of the invention, the detailed action flow chart of supervisory programme module 30.As above-mentioned, supervisory programme module 30 is checked the legitimacy of the write command that is sent to file control device driver 20, and sends check result back to file control device driver 20.In Fig. 5, supervisory programme module 30 at first receives the relevant information (S11) that is sent to the write command of file control device driver 20.In the present embodiment, supervisory programme module 30 with " clasp joint " (hook) mode be coupled to operating system, so as to obtaining the state of operating system.For instance, in Microsoft's Window operating system, supervisory programme module 30 can the virtual bench driver (Virtual Device Driver VeD) reaches.Therefore, but whether supervisory programme module 30 checked operation systems are sent (S12) by valid application or routine to obtain write command.Usually, the harddisk access requirement of any execution application all can be by the identification of operating system institute.That is to say that by clasp joint operating system, supervisory programme module 30 can determine the legitimacy or the correctness of write command.At last, supervisory programme module 30 can be sent the correctness of write command back to file control device driver 20 (S13).Therefore, file control device driver 20 just can be judged write command whether legal (S8 of Fig. 4), and suitably carries out this order (S6 of Fig. 4 or S9).
The front has illustrated the function of file control device driver 20 and supervisory programme module 30 respectively.Fig. 6 is in the embodiment of the invention, data is write the flow chart of steps that writes access list 40 defined protection storage areas of rewriteable memory media.At first, computer system (or stocking system) can be set up in hard disk 7 and define an access list 40, so as to pointing out the storage sector (S21) of vital document or data (as the file description block).Access list 40 can the motor-driven variation along with the content of hard disk 7.Then, the write command of operating system or Virus can be delivered to file control device driver 20 (S22).At this moment, the source that file control device driver 20 can not the identification write command.
Then, file control device driver 20 can utilize document control access transmitter, checks and desires to concern between defined protection storage area in access sector and the access list 40 (S23).What note is to have only the adjustable whole access list 40 of document control access transmitter.If the protection storage area of access access list 40 definition is wanted in write command, driver 20 can be delivered to supervisory programme module 30 (S24) with write command.Supervisory programme module 30 can check whether write command is sent (S25) by the valid application program according to the state of operating system.At last, if write command is legal, file control device driver 20 just can driving governor 6, with to protecting the storage area to carry out normal write activity (S26).But, if write command is illegal, then file control device driver 20 can not carried out any write activity, and operating system is delivered in error message.
According to above-mentioned narration, what protective device of the present invention and method can successfully leach unknown program such as computer virus illegally writes requirement, and avoids therefore changing the important information in the hard disk.In addition, file control device driver 20 and document control access transmitter can be carried out the access of access list 40.This feature can be guaranteed the integrality of access list.
Though the present invention is with preferred embodiment openly as above, so it is not in order to qualification the present invention, any those skilled in the art, and improvement of being done and replacement without departing from the spirit and scope of the present invention should be regarded as belonging to the present invention.
Claims (10)
1. system that is used for protecting data in the rewriteable memory media, this rewriteable memory media is controlled by a controller, and is set in the computing machine of carrying out an operating system, and this system comprises:
The access list device is used in this rewriteable memory media definition write protection storage area;
The software driver device is linked in this operating system, can rewrite the write command in a specific storage district in the medium and check that whether corresponding this specific storage district is corresponding to this write protection storage area in this write command in order to receive corresponding to this; And
One monitoring arrangement; be linked in this software driver device and this operating system; when this software driver device is confirmed this specific storage district corresponding to this write protection storage area; check whether this write command is legal; when this monitoring arrangement is confirmed the legitimacy of this write command; this software driver device drives this controller, thus data is write this specific storage district.
2. the system as claimed in claim 1 is characterized in that, this access list device is deposited in this rewriteable memory media.
3. the system as claimed in claim 1 is characterized in that, this rewriteable memory media is a hard disk.
4. system as claimed in claim 3 is characterized in that, this write protection storage area comprises one or more sectors of this hard disk.
5. system as claimed in claim 3 is characterized in that, this write protection storage area is a file description block of this hard disk.
6. one kind writes the method for a rewriteable memory media with data, and this rewriteable memory media is controlled by a controller, and is set in the computing machine of carrying out an operating system, and this method may further comprise the steps:
Define an access list, so as to definition write protection storage area in this rewriteable memory media;
Utilize a software driver to receive and can rewrite the write command in a specific storage district in the medium corresponding to this, wherein this software driver can be used for driving this controller, so as to carry out write activity in this rewriteable memory media;
Whether at least a portion of checking this specific storage district is corresponding to defined this write protection storage area of this access list;
At least a portion of confirming this specific storage district when this software driver is during corresponding to this write protection storage area, and a monitor module that is linked in this operating system is delivered in this write command that this software-driven module is received.
According to the state of this operating system, check with this monitor module whether this write command is legal;
Drive this controller with this software driver,, data are write this specific storage district so as to when this monitor module is confirmed the legitimacy of this write command.
7. method as claimed in claim 6 is characterized in that this access list is deposited in this rewriteable memory media.
8. method as claimed in claim 6 is characterized in that, this rewriteable memory media is a hard disk.
9. method as claimed in claim 8 is characterized in that, but is somebody's turn to do one or more sectors that the write protection storage area comprises this hard disk.
10. method as claimed in claim 8 is characterized in that, but this write protection storage area is the file description block in this hard disk.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16242998A | 1998-09-28 | 1998-09-28 | |
| US09/162429 | 1998-09-28 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN1250911A CN1250911A (en) | 2000-04-19 |
| CN1151438C true CN1151438C (en) | 2004-05-26 |
Family
ID=22585583
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNB991194373A Expired - Fee Related CN1151438C (en) | 1998-09-28 | 1999-09-24 | System and method for protection of data in rewriteable memory media |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN1151438C (en) |
| TW (1) | TW497029B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100465912C (en) * | 2005-11-16 | 2009-03-04 | 国际商业机器公司 | Apparatus and method for controlling data copy services |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101373452B (en) * | 2007-08-24 | 2010-06-16 | 英业达股份有限公司 | Method for testing hard disk read-write operation |
-
1999
- 1999-07-22 TW TW88112464A patent/TW497029B/en not_active IP Right Cessation
- 1999-09-24 CN CNB991194373A patent/CN1151438C/en not_active Expired - Fee Related
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100465912C (en) * | 2005-11-16 | 2009-03-04 | 国际商业机器公司 | Apparatus and method for controlling data copy services |
Also Published As
| Publication number | Publication date |
|---|---|
| CN1250911A (en) | 2000-04-19 |
| TW497029B (en) | 2002-08-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7665123B1 (en) | Method and apparatus for detecting hidden rootkits | |
| US7831791B2 (en) | Method of address space layout randomization for windows operating systems | |
| US6243789B1 (en) | Method and apparatus for executing a program stored in nonvolatile memory | |
| CA2140165C (en) | Method and system for providing protected mode device drivers | |
| US6363487B1 (en) | Apparatus and method of creating a firewall data protection | |
| CN1248110C (en) | Method for monitoring execution of software programmes as prescribed | |
| US8627020B2 (en) | Security erase of a delete file and of sectors not currently assigned to a file | |
| US7257842B2 (en) | Pre-approval of computer files during a malware detection | |
| CN1506813A (en) | Reliably and securely update and restore firmware from mass storage devices | |
| US20050081053A1 (en) | Systems and methods for efficient computer virus detection | |
| PL180841B1 (en) | Method of controlling operation of a computer system | |
| CN1627274A (en) | Backup system and backup method | |
| US20040148478A1 (en) | Method and apparatus for protecting data in computer system in the event of unauthorized data modification | |
| US20070113291A1 (en) | Method for administrating the function access | |
| WO2001033357A1 (en) | Apparatus and method of creating a firewall data protection | |
| US4709367A (en) | Method and apparatus for distinguishing between diskettes in a diskette drive | |
| US7739462B2 (en) | Policy based data shredding for storage controller | |
| US20040107357A1 (en) | Apparatus and method for protecting data on computer hard disk and computer readable recording medium having computer readable programs stored therein | |
| CN1151438C (en) | System and method for protection of data in rewriteable memory media | |
| US6591366B1 (en) | Method and configuration for loading data for basic system routines of a data processing system | |
| US20090055683A1 (en) | Method of restoring previous computer configuration | |
| CN100514305C (en) | System and method for implementing safety control of operation system | |
| CN1081363C (en) | Safety tech. for computer | |
| JPH09138733A (en) | Protective system for magnetic disk device | |
| CA2300626C (en) | Method and system for providing protected mode device drivers |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C06 | Publication | ||
| PB01 | Publication | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| C19 | Lapse of patent right due to non-payment of the annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |