CN1457168A - A method for automatically updating a network system key code - Google Patents
A method for automatically updating a network system key code Download PDFInfo
- Publication number
- CN1457168A CN1457168A CN 02119331 CN02119331A CN1457168A CN 1457168 A CN1457168 A CN 1457168A CN 02119331 CN02119331 CN 02119331 CN 02119331 A CN02119331 A CN 02119331A CN 1457168 A CN1457168 A CN 1457168A
- Authority
- CN
- China
- Prior art keywords
- data
- pins
- terminating machine
- control station
- network system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 230000004044 response Effects 0.000 claims description 24
- 230000005540 biological transmission Effects 0.000 description 24
- 238000010586 diagram Methods 0.000 description 4
- 101150005267 Add1 gene Proteins 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Landscapes
- Small-Scale Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a method for automatically updating a key code of a network system, wherein the network system comprises a server; a control station connected to the server; a terminal connected to the control station; and a timing module for recording time. The control station and the terminal include a first key code for encrypting and decrypting the transmitted data. The method comprises the following steps: triggering the timing module to start recording time; when the time recorded by the timing module accords with a preset time, a second key code is generated in a random mode; and transmitting the second key code to the terminal machine so as to update the first key code in the terminal machine into the second key code.
Description
Technical field
The present invention relates to a kind of method of upgrading no net network system pins, relate in particular to a kind of can be automatically and dynamically update the method for Radio Network System pins.
Background technology
Prosperity day by day along with network technology, the user can conveniently reach and see through the transmission interchange that network system is made data fast, and do not need as traditional mode must be earlier data storing in rigid magnetic disc or soft magnetic disc, and then be carried on the device that will store and stored.Utilize network system that data are transmitted fast, and the corrupted data that is taken place can avoid carrying data with rigid or soft magnetic disc the time.Especially now the development of radio network technique more allows the user can not be subjected to the restriction of grid line, and can carry out the transmission of data anywhere or anytime.
Though utilize wireless network transmissions can reach the purpose of convenient and quick Data transmission, and can transmit data whenever and wherever possible, the confidentiality that is transmitted data is tested.The data of utilizing wireless network transmissions are transmitted in the mode of radio wave, because data exposed in the air, therefore is easy to be stolen by the third party in the way of transmission.In order to prevent that data from being stolen in the way of transmission, so data must carry out suitable encryption acts with wireless network transmissions the time, so that data can be transmitted safely.
Please refer to Fig. 1, Fig. 1 is the configuration diagram of known wireless network system 10.Radio Network System 10 includes a server 12, at least one control station 14 and a plurality of terminating machine T1, T2 and T3.Each terminating machine T1, T2 and T3 all can transmit data to control station 14 by wireless mode, and reception control station 14 is with the data of wireless mode emission, similarly, control station 14 can also transfer data to each terminating machine T1 by wireless mode, T2 and T3, and receiving terminal machine T1, T2 and T3 are with the data of wireless mode emission, and the transmission of its data all meets the regulation (as the agreement of 802.11 wireless networks) of a network convention (protocol).Can wired or wireless mode connect between control station 14 and the server 12, therefore equally also can wired or wireless mode between control station 14 and the server 12 do the transmission of data, in the present embodiment, suppose between control station 14 and the server 12 it is the transmission of making data in wired mode.And each terminating machine T1, the transmission and the exchange of data carried out in the service that also can utilize control station 14 and server 12 to provide between T2 and the T3; Suppose that terminating machine T1 tendency to develop transmission of data is to terminating machine T2, terminating machine T1 can transfer to control station 14 with data earlier wirelessly so, again by control station 14 with transfer of data to terminating machine T2, so, the data of terminating machine T1 just can successfully see through control station 14 and transfer to terminating machine T2.Similarly, terminating machine T1 also can see through control station 14 with transfer of data to terminating machine T3, other are as the same.
Though server 12, control station 14 and terminating machine T1 in the Radio Network System 10, all can make things convenient for and carry out fast the transmission and the exchange of data between T2 and the T3, because data are with the Wireless transmission mode transmission, data are easy to be stolen by the third party in the way of transmitting, therefore data must be encrypted (encrypt) processing when transmitting, to prevent stealing of the third party.For the processing that will encrypt data, so the devices in the Radio Network System 10 all store identical pins (key) K, so that the data that are transmitted are encrypted and deciphered.Device in the same Radio Network System can have identical pins, control station 14 and each terminating machine T1 in the Radio Network System 10 as shown in Figure 1, T2 and T3 all store an identical pins K, and data are carried out encryption and decryption according to pins K, so data just can transmission Radio Network System 10 in safely.The transport process of data can be described below.When terminating machine T1 tendency to develop transmission of data to control station 14, terminating machine T1 can encrypt the defeated data of tendency to develop with pins K earlier so, and then data encrypted is sent to control station 14 wirelessly.After control station 14 receives the enciphered data that sends from terminating machine T1, can be decrypted ciphered data, transport to the authentic data of control station 14 to obtain terminating machine T tendency to develop with identical pins K.Similarly, when control station 14 tendency to develop transmission of data to terminating machine T1, control station 14 also can be encrypted data with pins K, and then data are sent to terminating machine T1, further to be decrypted and to obtain data.So, what data just can be suitable in the process that transmits is maintained secrecy, to avoid stealing of the third party.
In addition, each the terminating machine T1 in the Radio Network System 10, T2 and T3 all include other recognition data D1, a D2 and D3, include recognition data D1 as terminating machine T1, and terminating machine T2 and T3 then include recognition data D2 and D3 respectively.Recognition data D1 includes data such as user identification code ID1, user cipher PW1 and terminating machine address Add1, and recognition data D2 and D3 are as the same.In addition, also have in the server 12 and recognition data D1, D2 and the corresponding logon data D of D3, store each terminating machine T1 in the logon data D, the data of T2 and T3.Terminating machine T1, T2 and T3 can utilize recognition data D1, D2 and D3 to login in the Radio Network System 10, and server can utilize logon data D to confirm terminating machine T1, the identity of T2 and T3, with each terminating machine T1 of further control, the access of T2 and T3 is as access right control and access address control etc.
As previously mentioned, terminating machine in the same Radio Network System and the shared identical pins of control station meeting, and in known network managing mode, this pins K will input to each terminating machine T1 in manual mode (as utilizing the keyboard input) one by one by the network work personnel, in T2 and T3 and the control station 14.Thus, except the staff, the user of each terminating machine can't know the content of this pins K, is leaked to avoid pins K, further protects the data content that is transmitted.Yet, if any one terminating machine T1 in the Radio Network System 10, T2 and T3 will withdraw from this Radio Network System 10, (for instance, Radio Network System 10 is a paying network, and the user of terminating machine no longer pays and withdraw from the service that the paying network provides), so because this terminating machine T1, still store the pins K identical in T2 and the T3 with Radio Network System 10, so terminating machine T1, T2 and T3 still can pins K access wireless network system data in 10, so the data in the Radio Network System 10 will be leaked.Therefore, in known technology, for the data that will make transmission in the Radio Network System 10 can be certain maintained secrecy, the staff just must be in any one terminating machine T1, after T2 and T3 withdraw from Radio Network System 10, again in manual mode one by one to the terminating machine T1 in the Radio Network System 10, the pins that 14 inputs one of T2 and T3 and control station are new can not leaked with the data of guaranteeing transmission in the Radio Network System 10.Because whenever terminating machine T1 is arranged, T2 and T3 will withdraw from Radio Network System 10, the staff just the pins that more renews one by one, so with spended time and manpower.And owing to be responsible for to change the content that the staff of pins K knows pins K, so pins K also might be leaked, and what it was inreal is maintained secrecy.
Therefore, but main purpose of the present invention is to provide a kind of self-timing to upgrade the method for the pins of a Radio Network System, makes the Radio Network System can be automatically and upgrade shared pins in it dynamically, to guarantee the confidentiality of pins and transmission data.
Description of drawings
Fig. 1 is the configuration diagram of known wireless network system.
Fig. 2 is the configuration diagram of Radio Network System of the present invention.
Fig. 3 upgrades the flow chart of the pins of Radio Network System automatically for the present invention.
Embodiment
Please refer to Fig. 2, Fig. 2 is the configuration diagram of Radio Network System 30 of the present invention.Radio Network System 30 of the present invention includes a server 32, at least one control station 34 and a plurality of terminating machine P1, P2 and P3, all stores first an identical pins K1 in control station 34 and terminating machine P1, P2 and the P3.All include other recognition data I1, an I2 and I3 in each terminating machine P1, P2 and the P3, then include in the server 32 and recognition data I1, I2 and the corresponding logon data I of I3, with the access of control terminal machine P1, P2 and P3.Radio Network System 30 of the present invention and known wireless network system 10 differences are that the server 32 of Radio Network System 30 of the present invention includes a timing module 36 in addition, and control station 34 then includes a random code generating routine 38 in addition.Timing module 36 is used for calculating an actual time (RealTime), the time of being calculated when timing module 36 meets a scheduled time, timing module 36 just can send a signal to control station 34 so, produce second a new pins K2 to touch random code generating routine 38, then server 32 just can control terminal machine P1, P2 and P3 and control station 34 so that the first pins K1 is updated to the second pins K2, the narration as for method for updating below visible.
Please refer to Fig. 3, Fig. 3 upgrades the flow chart of the pins of Radio Network System 30 automatically for the present invention.The present invention upgrades the step following (is example with terminating machine P1) of the pins of Radio Network System 30 automatically:
Step 100: the timing module 36 in the starting server 32 is started the clock timing module 36.
Step 105: if timing module 36 time of being calculated meets a preset time, timing module 36 just can send a signal to control station 34 so, produces the second pins K2 with the random code generating routine 38 that touches in the control station 34 at random mode.
Step 110: after random code generating routine 38 produced the second pins K2, control station 34 can be interrogated data (challenge text) with one and be transferred to terminating machine P1 wirelessly, and purpose is for confirming whether terminating machine P1 has the first pins K1.Owing to do not determine whether terminating machine P1 has the first pins K1 this moment yet, so the interrogation data of the control station 34 terminating machine P1 that transfers to are not encrypted with the first pins K1.
Step 120: after terminating machine P1 received and interrogates data, just can will interrogate data encryption with the first pins K1 in it was a response data, then response data is transmitted back to control station 34.
Step 130: it is a standard response data that control station 34 also can will be interrogated data encryption with first pins, when control station 34 receives after the response data of terminating machine P1 transmission, control station 34 just can compare response data and standard response data, if response data is identical with the standard response data, represent that so terminating machine P1 stores the first pins K1, and proceed step 140; But if response data is different with the standard response data, represents that so terminating machine P1 does not store the first pins K1, and do not belong to Radio Network System 30, therefore carry out step 135, promptly stop terminating machine P1 is upgraded pins.
Step 140: require terminating machine P1 to transmit recognition data, purpose is for confirming whether terminating machine P1 belongs to Radio Network System 30; Because determined that terminating machine P1 stores the first pins K1 this moment, so from then on step begins, the transfer of data between terminating machine P1 and the control station 34 can further be encrypted with the first pins K1, so that the data of being transmitted are maintained secrecy.
Step 150: after the requirement of reception control station 34 transmitted the message of recognition data, terminating machine P1 just can encrypt its recognition data with the first pins K1, and then is sent to control station 34.
Step 160: control station 34 receives the recognition data that transmits from terminating machine P1, and is decrypted with the first pins K1, then the recognition data after the deciphering is sent to server 32.
Step 170: after server 32 receives the recognition data that sends from control station 34, just can do one to recognition data I1 and the logon data I in it relatively, if recognition data I1 meets logon data I, so just can confirm further that terminating machine P1 belongs to Radio Network System 30, proceeds step 180; Otherwise represent that just terminating machine P1 does not belong to Radio Network System 30, stop to upgrade pins for terminating machine P1.
Step 180: after server 32 confirmed that terminating machine P1 belong to Radio Network System 30, control station 34 just can send a message and whether agree the pins that more renews to terminating machine P1 with the user of inquiry terminal machine P1.
Step 190: after the user of terminating machine P1 receives the inquiry notice of sending from control station 34, just can send the message of agreement and give control station 34.
Step 200: after receiving the agree to notify that sends from terminating machine P1 when control station 34, control station 34 just can be encrypted the second pins K2 with the first pins K1, and the second pins K2 after encrypting is sent to terminating machine P1.
Step 210: after terminating machine P1 receives the second pins K2 after the encryption that sends from control station 34, just can be decrypted it with the first pins K1, obtaining the second real pins K2, and terminating machine P1 can upgrade the first pins K1 with the second pins K2 simultaneously.
Step 220: for determine terminating machine P1 successful be updated to the first pins K1 with the second pins K2, control station 34 can transmit one and confirm to interrogate data to terminating machine P1, this confirms to interrogate data and does not encrypt with the first pins K1 or the second pins K2.
Step 230: terminating machine P1 receives after the affirmation that sends from control station 34 interrogates data, and just can will confirm to interrogate data encryption with the second pins K2 is one to respond and confirm data, then this is responded affirmation data and is sent to control station 34.
Step 240: control station 34 also can be encrypted as a standard with the second pins K2 and respond the affirmation data, after data are confirmed in the response that control station 34 receptions send from terminating machine P1, control station 34 just can relatively be responded and confirm data and standard response affirmation data, if responding, the response data conformance with standard confirms data, represent so terminating machine P1 successful the first pins K1 is updated to the second pins K2, so the transfer of data between following control station 34 and the terminating machine P1 just can be encrypted and decipher with the second pins K2, carry out step 250; If response data not conformance with standard is responded the affirmation data, represent that so terminating machine P1 is not updated to the second pins K2 to the first pins K1, therefore must carry out the more new element of pins from step 110 beginning again.
Step 250: finish the action that the first pins K1 is updated to the second pins K2, and wait for that timing module 36 touches random code generating routine 38 next time, so that random code generating routine 38 produces the 3rd pins K3, then just repeat above step, so that the second pins K2 is updated to the 3rd pins K3, so constantly upgrade the common pins in the Radio Network System 30 always, make the pins in the Radio Network System 30 and the data transmitted all can be carried out suitable maintaining secrecy.
Timing module 36 among the above embodiment is arranged in the server 32, random code generating routine 38 then is stored in the control station 34, yet the present invention is not limited to this, timing module 36 among the present invention also can be arranged in the control station 34, and random code generating routine 38 also can be stored in the server 32 certainly, as long as when timing module 36 meets a scheduled time, can touch random code generating routine 38 and produce a new pins, all belong to the scope that the present invention is contained.In addition, this scheduled time can be a regular time, also can be the revocable time, be that Radio Network System 30 can upgrade its interior pins according to a regular time, or upgrade pins in it according at random time, but, can reach the purpose that the present invention dynamically updates the pins of Radio Network System 30 equally no matter be that is a kind of.
Include a memory 40 in the control station 34 in addition, be used for storing up-to-date pins and the pins of being had been friends in the past, the up-to-date pins of supposing present Radio Network System 30 is the 3rd pins K3, memory 40 can be stored the 3rd pins K3 and the second pins K2 and the first pins K1 so, so can avoid when Radio Network System 30 when upgrading pins, terminating machine P1 is because some reason (for example terminating machine P1 is shut down) and renewal pins that can't be synchronous with control station 34 causes being withdrawed from Radio Network System 30.For example when random code generating routine 38 produces the 3rd pins K3, terminating machine P1 is owing to being shut down or other factors make it the first pins K1 is not updated to the second pins K2, at this time owing to still store the second pins K2 in the control station 34, so terminating machine P1 just still can change to the second pins K2 with the first pins K1, change to the 3rd pins K3 again, or directly the first pins K1 is changed to the 3rd pins, do not withdrawed from Radio Network System 30 to avoid because store the second pins K2 in the terminating machine P1.
Pins update method compared to known wireless network system 10, the pins update method of Radio Network System 30 of the present invention is when timing module 36 meets a scheduled time, random code generating routine 38 just can produce a new pins, and the control station 34 in the Radio Network System 30 and each terminating machine P1, P2 and the stored old pins of P3 are updated to new pins.So can save by the staff and be updated to new pins institute's time spent and manpower with manual mode pins one by one old, and owing to pins is produced by the random code generating routine, staff and terminating machine user also do not know the content of new pins, therefore can make real being maintained secrecy of pins.In addition, because Radio Network System 30 can be at random or changed pins continually, therefore can avoid network hacker's invasion.So the user utilizes the pins update method of Radio Network System 30 of the present invention not only can enjoy the convenience of wirelessly transmitting data, more can make real being maintained secrecy of data of transmission.
The above only is preferred embodiment of the present invention, and all equalizations of being done according to the present patent application claim change and modify, and all should belong to the covering scope of patent of the present invention.
Claims (9)
1. the method for an automatic ally updating network system pins, this network system includes:
One server;
One control station is connected in this server, is used for the data that this server transmits are sent wirelessly, or receives wireless data and data are sent to this server; Wherein the data that will transfer to this terminating machine are encrypted by this control station system with first pins;
One terminating machine is used for receiving the data that this control station transmits with wireless mode, and with wireless mode data is sent to this control station; Store this first pins in this terminating machine, be used for encrypting the data that will transfer to this control station; And
One timing module is installed in this server, this control station or this terminating machine, is used for writing time;
This method includes:
Trigger this timing module opening entry time;
When the time of this timing module record meets a ticket reserving time, produce second pins at random mode;
With this control station this second pins is transferred to this terminating machine, be updated to this second pins with first pins that will store in this terminating machine; And
Encrypt the data of transmitting mutually between this control station and this terminating machine with this second pins.
2. the method for claim 1 is characterized in that, this terminating machine has a recognition data in addition, and stores a pair of logon data that should recognition data in this server in addition; And this method includes in addition:
Before control station transfers to this terminating machine with this second pins, interrogate data with this control station with one and transfer to this terminating machine wirelessly;
Should interrogate data encryption with first pins in this terminating machine is a response data, and this response data is transferred to this control station wirelessly;
Compare this response data and a standard response data with this control station;
If this response data meets this standard response data, then the recognition data of this terminating machine is transferred to this control station wirelessly with this terminating machine;
With this control station this recognition data is transferred to this server; And
If the recognition data of this terminating machine meets the logon data of this server, then this control station can transfer to this terminating machine with this second pins.
3. method as claimed in claim 2 is characterized in that, this standard response data is to be encrypted and get with this first pins by these interrogation data.
4. the method for claim 1 is characterized in that, other includes: before first pins with this terminating machine is updated to this second pins, and the agreement of inquiring this terminating machine user.
5. the method for claim 1 is characterized in that, after this terminating machine was updated to this second pins with this first pins, this terminating machine was the data decryption that this control station is transmitted with this second pins.
6. the method for claim 1 is characterized in that, this network system has a plurality of terminating machines, and each terminating machine all stores this first pins, and each terminating machine stores its corresponding recognition data respectively.
7. the method for claim 1 is characterized in that, this second pins is to produce at random with a random code generating routine.
8. the method for claim 1 is characterized in that, other includes:
After this second pins is transferred to this terminating machine, confirm to interrogate data with this control station with one and transfer to this terminating machine wirelessly;
Should confirm to interrogate data encryption with second pins in this terminating machine is that data are confirmed in a response, and should respond and confirm that data transfer to this control station wirelessly;
Compare this response with this control station and confirm data and standard response affirmation data.
9. the method for claim 1 is characterized in that, this timing module be one actual time timer, be used for writing down actual time.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN021193312A CN100407616C (en) | 2002-05-08 | 2002-05-08 | Method for automatically updating key code of network system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN021193312A CN100407616C (en) | 2002-05-08 | 2002-05-08 | Method for automatically updating key code of network system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN1457168A true CN1457168A (en) | 2003-11-19 |
| CN100407616C CN100407616C (en) | 2008-07-30 |
Family
ID=29410410
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN021193312A Expired - Fee Related CN100407616C (en) | 2002-05-08 | 2002-05-08 | Method for automatically updating key code of network system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN100407616C (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100433161C (en) * | 2005-02-05 | 2008-11-12 | 北京凯诚高清电子技术有限公司 | Digital content intelligent playing device and its controllable playing method |
| CN1976278B (en) * | 2005-11-29 | 2010-05-12 | 台湾积体电路制造股份有限公司 | Password updating system and method |
| CN102110003A (en) * | 2009-12-29 | 2011-06-29 | 宏碁股份有限公司 | Automatic updating and checking system and automatic updating and checking method thereof |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH11346214A (en) * | 1998-06-02 | 1999-12-14 | Nec Corp | Multi-address distribution system |
-
2002
- 2002-05-08 CN CN021193312A patent/CN100407616C/en not_active Expired - Fee Related
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100433161C (en) * | 2005-02-05 | 2008-11-12 | 北京凯诚高清电子技术有限公司 | Digital content intelligent playing device and its controllable playing method |
| CN1976278B (en) * | 2005-11-29 | 2010-05-12 | 台湾积体电路制造股份有限公司 | Password updating system and method |
| CN102110003A (en) * | 2009-12-29 | 2011-06-29 | 宏碁股份有限公司 | Automatic updating and checking system and automatic updating and checking method thereof |
Also Published As
| Publication number | Publication date |
|---|---|
| CN100407616C (en) | 2008-07-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US6920559B1 (en) | Using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed | |
| US7108177B2 (en) | Proximity validation system and method | |
| CN101667240B (en) | Intelligent card and card writing method, equipment and system thereof | |
| US8793784B2 (en) | Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone | |
| CN1323538C (en) | A method and system for dynamic identity authentication | |
| CN100420227C (en) | Information providing method, information providing system, and relay device | |
| US9258281B2 (en) | Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption | |
| US20040177248A1 (en) | Network connection system | |
| JP2007528179A (en) | Security device and method for portable device | |
| US20160323100A1 (en) | Key generation device, terminal device, and data signature and encryption method | |
| CN106504391A (en) | A control method, device and system for intelligent access control | |
| JP2017514390A (en) | Method and system for protecting electronic data exchange between industrial programmable devices and portable programmable devices | |
| JPH10145354A (en) | Function remote change method | |
| CN111444496B (en) | Application control method, device, equipment and storage medium | |
| US20030221098A1 (en) | Method for automatically updating a network ciphering key | |
| CN107409043B (en) | Distributed processing of products based on centrally encrypted storage data | |
| CN112564901B (en) | Method and system for generating secret key, storage medium and electronic device | |
| CN1457168A (en) | A method for automatically updating a network system key code | |
| EP3358515A1 (en) | Method for cryptographically signing a transaction | |
| CN111914270A (en) | Programmable authentication service method and system based on block chain technology | |
| KR101213472B1 (en) | Method and system for authenticating RFID tag | |
| JP3919519B2 (en) | Client server system | |
| CN101625727B (en) | Radio Frequency Identification Tag and Method of Operation | |
| JP2005151004A (en) | Wireless tag privacy protection method, wireless tag device, security server device, wireless tag device program, and security server device program | |
| JP3625658B2 (en) | Encryption method and recording medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080730 Termination date: 20190508 |