CN104135358B - A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature - Google Patents

A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature Download PDF

Info

Publication number
CN104135358B
CN104135358B CN201410258127.3A CN201410258127A CN104135358B CN 104135358 B CN104135358 B CN 104135358B CN 201410258127 A CN201410258127 A CN 201410258127A CN 104135358 B CN104135358 B CN 104135358B
Authority
CN
China
Prior art keywords
clock
digital signature
distribution terminal
message
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410258127.3A
Other languages
Chinese (zh)
Other versions
CN104135358A (en
Inventor
张志华
吴�琳
张子仲
周捷
刘润苗
周俊
夏燕东
刘明祥
孙淑云
王俊仁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Nari Technology Co Ltd
Original Assignee
State Grid Corp of China SGCC
Nari Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Nari Technology Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201410258127.3A priority Critical patent/CN104135358B/en
Publication of CN104135358A publication Critical patent/CN104135358A/en
Application granted granted Critical
Publication of CN104135358B publication Critical patent/CN104135358B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Synchronisation In Digital Transmission Systems (AREA)

Abstract

The invention discloses a method for executing SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature, which belongs to the field of power system automation. The method includes the following steps: on the basis of a power distribution terminal complying with a requirement of a power distribution network, adding an SNTP protocol to execute clock calibration, and protecting a security of calibration of a system clock with an SM2 asymmetric digital signature algorithm. Therefore, the power distribution terminal is assured to realize clock calibration with high accuracy and high security, which has a very important practical engineering significance.

Description

Based on the distribution terminal SNTP setting means that asymmetrical digital is signed
Technical field
The present invention relates to it is a kind of based on asymmetrical digital sign distribution terminal SNTP setting means, belong to power system and Its automatic field.
Background technology
With the propulsion of Distribution Automation Construction, restore electricity to carry out fast failure isolation and non-faulting region, contract It is short to hinder the power off time for causing for some reason, the stability and reliability of power supply are ensured, power supply quality is improved, more and more such as intelligence The more intelligentized functions such as the distributed FA of energy just carry out promotion and application in electrical power distribution automatization system, and this requires that distribution is automatic Need to be cooperated and linked between each equipment of change system so that being in communication with each other between power distribution automation equipment and exchange It is more and more closer.And the intelligent functions that cooperating between each equipment of system completes correlation must be set up in each participation device On the basis of being respectively provided with unified, accurate timing system, all devices response and action scheme must be with accurate reliable markers Based on, therefore, the electrical power distribution automatization system such as tradition IEC60870-5-104, IEC60870-5-101 commonly uses stipulations institute It is intelligent that the clock check method of definition cannot meet electrical power distribution automatization system on time service precision and the security of time service Requirement.Therefore, the safe time dissemination system security protection side of time service can be ensured using the time service agreement and research of time service precision Method is just particularly important in the process of construction of power distribution automation from now on.
The content of the invention
It is an object of the invention to solve the problems, such as time service precision and its security protection of distribution power automation terminal.
To achieve these goals, the technical solution adopted in the present invention is:
Based on the distribution terminal SNTP setting means that asymmetrical digital is signed, comprise the following steps:
1) exploitation of SNTP agreements is carried out in distribution terminal, makes distribution terminal possess SNTP client functionalitys, the SNTP The exploitation of agreement to be referred to and configure control module when clock server request pair and to clock server message in distribution terminal The parsing module for being parsed, and digital signature authentication module is configured, the digital signature authentication module configuration is adjusted for client Digital signature authentication interface;
2) Digital Signature module is configured on clock server, the Digital Signature module configuration is called for clock server Digital signature interface;
3) private key that asymmetrical digital is signed is installed on into clock server, public key is installed on the local clock of distribution terminal Client;
4) the local clock client of distribution terminal arranges first heading, then obtains local moment Orig_T, assembling Into message, then by control module to request message during clock server transmission pair;
5) clock server is received after local clock client request message, and Orig_T is parsed first, and obtains clock The clock Recv_T of server local;Then according to local state arranges heading, the message to be signed that Tran_T is 0 is formed, Again by message to be signed, the private key and clock server of clock server describe ID, as the input of digital signature interface, by when Clock server calls digital signature interface, digitally signed module produces digital signature according to SM2 Digital Signature Algorithms;
6) Tran_T in message to be signed, then the digital signature data that will be formed are filled with clock server current time index After being attached to message to be signed, composite message is formed, and sent to local clock client;
7) local clock client is received after the composite message of clock server, and the local clock of distribution terminal is obtained first Dest_T, parses Orig_T, Recv_T and Tran_T in composite message and preserves by parsing module, then will be former compound Tran_T sets to 0 in message, obtains new message;
8) local clock client is using the step 7) the nonnumeric signed data of new message that obtains is used as to be verified Signature, adds public key and clock server on distribution terminal server and describes ID together as the defeated of digital signature authentication interface Enter, by local clock client call digital signature authentication interface, digitally signed authentication module carries out Boolean calculation, makes numeral Signature verification interface will return the Boolean of a success or not:1 or 0, so as to verify the step 7) receive it is compound The security of message, the authentication failed if returning 0, client refuses this clock and checks instruction;The certification success if returning 1, Client calculates the deviation of local clock and clock server clock, and local clock system is modified.
Aforementioned step 1) digital signature authentication module be used to carry out Boolean calculation, whether checking composite message is by true Real reliable clock server sends.
Aforementioned step 2) Digital Signature module using SM2 Digital Signature Algorithms calculate digital signature.
Aforementioned step 8) computational methods of clock jitter t are:
T=((Recv_T-Orig_T)+(Tran_T-Dest_T))/2.
Aforesaid Intelligent power distribution terminal CPU hardware is realized using the DSP based on linux, vxworks operating system.
The length of aforesaid digital signature data is 64 bytes.
When the present invention realizes that distribution terminal has the high accuracy pair of asymmetrical digital signature security protection, process is simple, right When high precision, the verification process amount of calculation of digital signature is little, and fast operation, security is good;And the present invention is to CPU hardware Disposal ability requirement is low, and the CPU hardware platform that can adopt low cost, reduction process ability is realized, based in operating system platform Applied;Simultaneously the present invention using SM2 asymmetrical digitals signature technology the additional character label behind message at traditional SNTP pair Name has ensured electrical power distribution automatization system time service safety for verifying to the reliability of time service server.
Description of the drawings
Process schematic when Fig. 1 is distribution terminal SNTP pair of the present invention;
Agreement unilateral authentication schematic diagram when Fig. 2 is SNTP pair of the present invention;
Fig. 3 is the SNTP composite message structures with digital signature of the invention;
Fig. 4 is that distribution terminal clock of the present invention checks flow chart.
Specific embodiment
The present invention is described in further detail in conjunction with the drawings and specific embodiments.
The present invention by using agreement during SNTP simple networks pair as distribution power automation terminal high accuracy pair when agreement, The amendment to distribution terminal local clock is realized according to the algorithm of this agreement regulation so as to keep one with clock server clock Cause, while the security in order to ensure time service, prevents distribution terminal clock to be maliciously tampered, affect the peace of electrical power distribution automatization system Row for the national games, using based on the SM2 algorithms of asymmetrical digital signature technology security protection is carried out to time service message, and distribution terminal is being received Extract digital signature first to after system clock synch command and verify the identity reliability of instruction sender, authentication success The amendment of local clock can be carried out.
As shown in figure 4, the distribution terminal SNTP setting means signed based on asymmetrical digital, are comprised the following steps:
Carry out the exploitation of SNTP agreements in distribution terminal first, make distribution terminal possess SNTP client functionalitys, that is, matching somebody with somebody Electric terminals configure the parsing module parsed to the control module of clock server request clock and to clock server message, And configure digital signature authentication module, digital signature authentication module is used to carrying out Boolean calculation, checking composite message be whether by True and reliable clock server sends, and the configuration of digital signature authentication module connects for the digital signature authentication of client call Mouthful.
Then Digital Signature module is configured on clock server, Digital Signature module adopts SM2 Digital Signature Algorithm meters Calculate digital signature, and the digital signature interface that Digital Signature module configuration is called for clock server.
The private key that asymmetrical digital is signed is installed on into clock server, public key is installed on the local clock visitor of distribution terminal Family end.
As shown in figure 1, the local clock client of distribution terminal arranges first heading, the local moment is then obtained Orig_T, is assembled into message, then by control module to request message during clock server transmission pair;
Clock server is received after local clock client request message, and Orig_T is parsed first, and obtains clock clothes The local clock Recv_T of business device;Then according to local state arranges heading, the message to be signed that Tran_T is 0 is formed, then By message to be signed, the private key and clock server of clock server describe ID as the input of digital signature interface, by clock Server calls digital signature interface, Digital Signature module produces digital signature according to SM2 Digital Signature Algorithms;
Tran_T in message to be signed is filled with clock server current time index, then the digital signature data for being formed is attached After being added in message to be signed, composite message is formed, and sent to local clock client;
Local clock client receives the composite message of clock server, and the local clock Dest_ of client is obtained first T, parses Orig_T, Recv_T and Tran_T in composite message and preserves and then by former composite message by parsing module Tran_T sets to 0, and obtains new message;
The nonnumeric signed data of the new message that local clock client obtains upper step is to be tested as signature to be verified Signed certificate name describes ID and connects together as digital signature authentication plus the public key and clock server on distribution terminal home server The input of mouth, by local clock client call digital signature authentication interface, digitally signed authentication module carries out Boolean calculation, Digital signature authentication interface will return the Boolean of a success or not:1 or 0, so as to verify the composite message for receiving Security, the possibly authentication failed if returning 0, someone emit charging system time service server and attempt illegally to distort clock Or other are attacked, local client should refuse this clock and check instruction;The certification success if returning 1, illustrates that clock is checked Instruction secure reliability, client is repaiied by calculating the deviation of local clock and server clock to local clock system Just, the purpose synchronous to reach clock.
Local clock client is received after clock server composite message, can simply calculate transmission delay d and when Clock deviation t, its computational methods is:
D=(Dest_T-Orig_T)-(Recv_T-Tran_T)
T=((Recv_T-Orig_T)+(Tran_T-Dest_T))/2
Calculate more than and understand, the time deviation of local clock client and clock server is only and Recv_T, Orig_ T differences and Tran_T, Dest_T difference are relevant, and with clock server processing data the time required to or response time delay Recv_ The difference of the two times of T, Tran_T is unrelated, therefore local clock client custom end is only needed on the basis of local clock The calibration for being capable of achieving local clock is modified to local clock according to deviation t.
For the compatibility and versatility of guarantee agreement version, the present invention is awarded using SM2 asymmetrical digitals signature to SNTP Protocol massages form and transmission mode when original pair is still adopted when Shi Xieyi is protected, only by original according to symmetric cryptography The safety certification data field that algorithm is produced is substituted for SM2 digital signature datas, and only considers by clock server to distribution terminal Unidirectional authentication, security protection is not carried out to the clock request message of local clock client to clock server end.Such as Shown in Fig. 2.
Fig. 3 is that the SNTP clocks for possessing asymmetrical digital signature check composite message schematic diagram, according to the SNTP of V3 versions Pair when agreement, when its original pair protocol massages form as shown in table 1,
Protocol massages form during 1 original pair, table
Leap second, version number and server mode liVnMode 1 byte length
The rank of server work Stratum 1 byte length
The maximum time interval of packet Poll 1 byte length
The accuracy of system clock precision 1 byte length
The total round-trip delay of primary timing reference source rootDelay 4 byte lengths
The error of primary timing reference source rootDispersion 4 byte lengths
The mark of timing reference input referenceID 4 byte lengths
System clock last time prover time Refe_T 8 byte lengths
Objective user orientation server initiates request time Orig_T 8 byte lengths
Server receives client's request time Recv_T 8 byte lengths
Server to client sends out the timestamp time Tran_T 8 byte lengths
Digital signature data Authenticator 64 byte lengths
Wherein Authenticator is digital signature data, and the present invention is prevented using the digital signature of 256 bit lengths Shield, i.e., the length of whole digital signature data is 64 bytes, eventually forms the compound reports of the SNTP with digital signature as shown in Figure 3 Text.
The process of the inventive method is illustrated below by specific embodiment.
Relevant parameter required for security protection is as follows:
Clock server describes ID:SNTP Server
Signature private key data (hexadecimal):717374510A39B816C89DA53C5B674A13F98AF03D35F6C2 3F F4DB3147EEFE9F03
Sign test public key data (hexadecimal):BCE1191B83A08F8A9F94C974D5E8ED080613CC54C85CC5 5A20030C86CC9803867B24525D67DC59F25B885282CBDDDD70DE82575A1F6136D44339E83F5DE AD063
1) local clock client arranges first heading, that is, it is 0x1B to arrange LiVnMod positions, and wherein leap second mark Li sets 0 is set to, version number Vn arranges position 3, and mode of operation Mod is set to 3, remaining byte is 0, then obtains local moment Orig_T, Message is assembled into, then by control module to request message (hexadecimal) during clock server transmission pair:
1B000000000000000000000000000000000000000000000000000000000000000000000000000 000D6F608BA00000000
2) clock server answering example
Clock server parses first Orig_T after above-mentioned client request message is received, and obtains clock service The local clock Recv_T of device, then according to local state arranges heading, that is, it is 0x1C, wherein leap second to arrange LiVnMod positions Mark Li is set to 0, and version number Vn arranges position 3, and mode of operation Mod is set to 4;The rank Stratum byte of server work According to actual setting;The maximum time interval PollInterval of packet is set to 244;Then fill out client and send the time Orig_T and server receive the time Recv_T of request, form the message to be signed (i.e. raw requests message) that Tran_T is 0 It is as follows:
1C0300F400000000000000004C434F4C D6F608BA088601C0D6F608BA00000000D6F6 08BA088601C00000000000000000 (hexadecimal)
Again by message to be signed, the private key and clock server of clock server describe ID, used as digital signature interface Input, by clock server call number signature interface, digitally signed module produces numeral and signs according to SM2 Digital Signature Algorithms Name is as follows:
7a45857015d66e71f454a310f324cd26fb8da7803c23dcb54e2c3a93a9850ca5b1299cbcc134f 8609b403aea17706d023d84e986d1d2ea54f33b089df6aec7ab (hexadecimal)
The last Tran_T filled with clock server current time index in raw requests message, then the digital signature that will be formed Data are attached to after raw requests message that to form composite message as follows, and are sent to local clock client:
1c0300f400000000000000004c434f4c d6f608ba088601C0d6f608ba00000000d6f6 08ba088601c0d6f608ba088601c07a45857015d66e71f454a310f324cd26fb8da7803c23dcb54 e2c3a93a9850ca5b1299cbcc134f8609b403aea17706d023d84e986d1d2ea54f33b089df6aec7 Ab (hexadecimal)
3) client process example
Local clock client is received after the composite message of clock server answer, and the local clock of client is obtained first Dest_T, parses Orig_T, Recv_T and Tran_T in composite message and preserves by parsing module, then will be former compound Tran_T sets to 0 in message, obtains new message:
1c0300f400000000000000004c434f4c d6f608ba088601C0d6f608ba00000000d6f6 08ba088601c0d6f608ba088601c0000000000000000007a45857015d66e71f454a310f324cd26 fb8da7803c23dcb54e2c3a93a9850ca5b1299cbcc134f8609b403aea17706d023d84e986d1d2e A54f33b089df6aec7ab (hexadecimal)
Then by nonnumeric signature section in message:1c0300f400000000000000004c434f4cd6f608ba08 8601C0d6f608ba00000000d6f608ba088601c0d6f608ba088601c000 000000000000000 is used as treating Sign test name, adds public key data and clock server describes inputs of the ID together as digital signature authentication interface, by it is local when Clock client call digital signature authentication interface, digitally signed authentication module carries out Boolean calculation, connects digital signature authentication Mouth will return the Boolean of a success or not:1 or 0, verify whether the composite message for receiving is by true and reliable.If Certification success, then calculate clock jitter, and local clock system is modified.

Claims (6)

1. the distribution terminal SNTP setting means signed based on asymmetrical digital, it is characterised in that comprise the following steps:
1) exploitation of SNTP agreements is carried out in distribution terminal, makes distribution terminal possess SNTP client functionalitys, the SNTP agreements Exploitation to refer to and configure control module when clock server request pair in distribution terminal and clock server message carried out The parsing module of parsing, and digital signature authentication module is configured, the digital signature authentication module configuration is for client call Digital signature authentication interface;
2) Digital Signature module, the number that the Digital Signature module configuration is called for clock server are configured on clock server Word signature interface;
3) private key that asymmetrical digital is signed is installed on into clock server, public key is installed on the local clock client of distribution terminal End;
4) the local clock client of distribution terminal arranges first heading, then obtains local moment Orig_T, is assembled into report Text, then by control module to request message during clock server transmission pair;
5) clock server is received after local clock client request message, and Orig_T is parsed first, and obtains clock service The local clock Recv_T of device;Then according to local state arranges heading, the message to be signed that Tran_T is 0, Tran_ are formed T is that clock server sends out the timestamp time to local clock client, then by message to be signed, the private key of clock server is timely Clock server describes ID, digitally signed by clock server call number signature interface as the input of digital signature interface Module produces digital signature according to SM2 Digital Signature Algorithms;
6) Tran_T in message to be signed is filled with clock server current time index, then the digital signature data of formation is added After message to be signed, composite message is formed, and sent to local clock client;
7) local clock client is received after the composite message of clock server, and the local clock of distribution terminal is obtained first Dest_T, parses Orig_T, Recv_T and Tran_T in composite message and preserves by parsing module, then will be former compound Tran_T sets to 0 in message, obtains new message;
8) local clock client is using the step 7) the nonnumeric signed data of new message that obtains as signature to be verified, Inputs of the ID together as digital signature authentication interface is described plus the public key and clock server on distribution terminal server, by Local clock client call digital signature authentication interface, digitally signed authentication module carries out Boolean calculation, makes digital signature Checking interface will return the Boolean of a success or not:1 or 0, so as to verify the step 7) composite message that receives Security, the authentication failed if returning 0, client refuses this clock and checks instruction;The certification success if returning 1, client End calculates the deviation of local clock and clock server clock, and local clock system is modified.
2. it is according to claim 1 based on asymmetrical digital sign distribution terminal SNTP setting means, it is characterised in that The step 1) digital signature authentication module be used to carry out Boolean calculation, checking composite message be whether by it is true and reliable when Clock server sends.
3. it is according to claim 1 based on asymmetrical digital sign distribution terminal SNTP setting means, it is characterised in that The step 2) Digital Signature module using SM2 Digital Signature Algorithms calculate digital signature.
4. it is according to claim 1 based on asymmetrical digital sign distribution terminal SNTP setting means, it is characterised in that The step 8) computational methods of clock jitter t are:
T=((Recv_T-Orig_T)+(Tran_T-Dest_T))/2.
5. it is according to claim 1 based on asymmetrical digital sign distribution terminal SNTP setting means, it is characterised in that The distribution terminal CPU hardware is realized using the DSP based on linux, vxworks operating system.
6. it is according to claim 1 based on asymmetrical digital sign distribution terminal SNTP setting means, it is characterised in that The length of the digital signature data is 64 bytes.
CN201410258127.3A 2014-06-11 2014-06-11 A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature Active CN104135358B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410258127.3A CN104135358B (en) 2014-06-11 2014-06-11 A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410258127.3A CN104135358B (en) 2014-06-11 2014-06-11 A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature

Publications (2)

Publication Number Publication Date
CN104135358A CN104135358A (en) 2014-11-05
CN104135358B true CN104135358B (en) 2017-04-12

Family

ID=51807893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410258127.3A Active CN104135358B (en) 2014-06-11 2014-06-11 A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature

Country Status (1)

Country Link
CN (1) CN104135358B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618109B (en) * 2014-12-31 2018-04-27 国家电网公司 A kind of electric power terminal data safe transmission method based on digital signature
CN105467827B (en) * 2015-12-08 2018-01-19 广西电网有限责任公司电力科学研究院 A kind of bearing calibration of asymmetric clock based on concentrator and system
CN111107169B (en) * 2020-02-10 2020-10-02 中国人民解放军32021部队 Time management method based on WEB browser

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368742A (en) * 2013-07-02 2013-10-23 国电南瑞科技股份有限公司 Intelligent distribution terminal security protection method based on asymmetric digital signature authentication
CN103684733A (en) * 2013-09-28 2014-03-26 国家电网公司 Automatic verification method and special-purpose equipment for clock synchronization

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368742A (en) * 2013-07-02 2013-10-23 国电南瑞科技股份有限公司 Intelligent distribution terminal security protection method based on asymmetric digital signature authentication
CN103684733A (en) * 2013-09-28 2014-03-26 国家电网公司 Automatic verification method and special-purpose equipment for clock synchronization

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《非对称数字签名技术在配电自动化***的应用》;张志华,周捷,丁可;《计算机技术及其应用》;20120331;全文 *

Also Published As

Publication number Publication date
CN104135358A (en) 2014-11-05

Similar Documents

Publication Publication Date Title
CN107395312B (en) A kind of secure network method for synchronizing time and device
US10972284B2 (en) Method of providing a hash value for a piece of data, electronic device and computer program
CN110267270B (en) Identity authentication method for sensor terminal access edge gateway in transformer substation
EP2590356A1 (en) Method, device and system for authenticating gateway, node and server
US11849052B2 (en) Certificate in blockchain network, storage medium, and computer device
US20120260088A1 (en) Method and device for securely transmitting data
CN103621126A (en) Method and apparatus for providing machine-to-machine service
CN113079215B (en) Block chain-based wireless security access method for power distribution Internet of things
CN103259768A (en) Method, system and device of message authentication
CN106576043A (en) Virally distributable trusted messaging
CN104135358B (en) A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature
CN102724211A (en) Key agreement method
WO2023236551A1 (en) Decentralized trusted access method for cellular base station
Sani et al. A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet
CN108270572B (en) Key exchange protocol based on position and password
CN113254972A (en) Information security management method based on block chain
CN102891850A (en) Method for preventing parameter resetting in IPSec (IP Security) channel updating
CN104079408A (en) Method for enhancing communication safety in industrial control system
CN103327020A (en) Security access method and system based on region dividing
CN102970134B (en) Method and system for encapsulating PKCS#7 (public-key cryptography standard #7) data by algorithm of hardware password equipment
CN108924161A (en) A kind of encrypted transaction data communication means and system
CN112422223B (en) TCP/IP-based time synchronization device, time synchronization method and time mark monitoring system
CN109039841A (en) The method, apparatus and girff of cascade network is added
CN112564919A (en) Identity authentication method, identity authentication equipment and computer readable storage medium
CN101814987A (en) Method and system for establishing key between nodes

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant