CN110474870A - Network active defensive method, system and computer readable storage medium based on block chain - Google Patents
Network active defensive method, system and computer readable storage medium based on block chain Download PDFInfo
- Publication number
- CN110474870A CN110474870A CN201910598895.6A CN201910598895A CN110474870A CN 110474870 A CN110474870 A CN 110474870A CN 201910598895 A CN201910598895 A CN 201910598895A CN 110474870 A CN110474870 A CN 110474870A
- Authority
- CN
- China
- Prior art keywords
- contract
- block chain
- network active
- chain
- attacker
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention relates to block chain processing technique application fields, provide a kind of Network active defensive method, system and computer readable storage medium based on block chain, and storage medium is stored with computer program, the above method is realized when computer program is executed by a controller.The intelligent contract that record has screening criteria is had in client, for inquiring the analysis node of background control end and carrying out covering perception to its intelligent contract, thus the behaviors such as the abnormal intelligent calling of monitoring, across contract attack, flooding automatically.Once having found abnormal behavior, system calls analysis node to obtain the crawler logic in storage contract automatically immediately, the abnormal calling node of recurrence crawl, the data of attacker are collected to trace to the source attacker's information, and call the matching defence contract prestored to realize Initiative Defense according to attacker's information of acquisition.Due to establishing on block chain in the Network active defensive method, higher stability is possessed in the case where easily updated.
Description
Technical field
The present invention relates to block chain processing technique application field, in particular to a kind of computer readable storage medium and it is
System, computer-readable recording medium storage have computer program, realize when computer program is executed by a controller and are based on block chain
Network active defensive method.
Background technique
Initiative type safeguard technology is proactive property defence, based on early excise defensive measure, attacker is allowed to be unable to reach attack
Target, it is understood that in the case where artificially need not passively cope with, system can be prevented well, avoid threatening and pacify
The case where all computer database, occurs.In computer today that is widely available and deeply applying, the application of initiative type safeguard technology
So that network safety prevention enters a completely new stage and the important means of future maintenance network security becomes with development
Gesture.It is more and more to make for the inverse compiling technique for cracking cyber-defence system but with the development of cyber-defence system
Cyber-attack techniques are more various, to cope with complicated and diversified network attack, network safety system often same bulky complex, and
And need often to update, the stability of itself is difficult to ensure, brings hidden danger to network security.
Summary of the invention
Inventor expects that block chain technology is due to the peace by realizing transaction based on the information exchange between node and node
The guarantee of full property, reduces and trusts cost and be used widely.If network peace can be constructed on the basis of block chain technology
Full system of defense can increase the stability of network safety system.
It is an object of the invention to: it avoids above-mentioned shortcoming in the prior art and a kind of net based on block chain is provided
Network active defense method can be improved the stability of cyber-defence.
The purpose of the present invention is achieved through the following technical solutions:
The Network active defensive method based on block chain of offer, includes the following steps:
Situation Awareness intelligence contract construction step, the analysis section of background control end is inquired based on Situation Awareness intelligence contract
The dynamic of point, to judge that these analysis nodes are existing analysis node to judging result with the presence or absence of perception trigger condition
On node intelligent contract carry out covering perception;
Perception data recording step records the data that above-mentioned covering perceives;
Abnormal behaviour processing step judges that the data with the presence or absence of abnormal behaviour, are if the determination result is YES then called pre-
The storage contract crawl abnormal data deposited, reads the source-information and attack sentence in abnormal data;
Prevention-Security step calls the matching defence contract prestored according to the attack information of acquisition.
Preferably, in the Situation Awareness intelligence contract construction step, the perception trigger condition refers to that the intelligence is closed
It is about at active state.
Preferably, in the Situation Awareness intelligence contract construction step, the covering sensed activation is not by capped
The protection agreement of the node intelligent contract of analysis node is limited and is enforced.
Preferably, in the abnormal behaviour step, the abnormal behaviour includes assisting beyond the analysis node intelligence contract
The intelligence calling of view and/or across contract attack and/or flooding behavior.
Preferably, in the abnormal behaviour step, attacker's information trace to the source referring to: by pre- in storage contract
If crawler logic carry out the abnormal server for calling node and behind of recurrence crawl, collect the data of attacker.
Preferably, the defence contract prestored in the Prevention-Security step is placed on the different main chains across chain.
Preferably, it is respectively equipped with across chain wake-up contract on each main chain, for activating the defence on each main chain to close
About code or restart self-defense contract.
Preferably, the abnormal behaviour processing step further includes counterattack step, by tracing to the source after obtaining attacker's information
Investigation, depth crawler, across contract blocking communication one of or a variety of defense mechanisms come prevent attacker persistently to the network into
The illegal calling of row and/or injection attacks.
A kind of network active defense system based on block chain is also provided, the processor of system can be realized above-mentioned based on area
The Network active defensive method of block chain.
A kind of computer readable storage medium is also provided, which is stored with executable computer program, computer
It can be realized the above-mentioned Network active defensive method based on block chain when program is executed by a controller.
Beneficial effects of the present invention: being somebody's turn to do the Network active defensive method based on block chain, in client for connecting block
The port of chain has the intelligent contract that record has screening criteria, for inquiring the analysis node of background control end and intelligently closing to it
Covering perception is about carried out, thus the behaviors such as the abnormal intelligent calling of monitoring, across contract attack, flooding automatically.Once it was found that
Abnormal behavior, system call analysis node automatically immediately to obtain the crawler logic in storage contract, and recurrence crawl is abnormal
Calling node, collect the data of attacker to trace to the source attacker's information, and according to attacker's information tune of acquisition
Initiative Defense is realized with the matching defence contract prestored.Since the covering in the Network active defensive method perceives row
Be to establish on block chain, can not distort logic and it is credible can verify that implementation capacity is guaranteed by intelligent contract, it is specific to analyze
The algorithm and crawler algorithm of node are undertaken by centralization/decentralization, guarantee that Network active defensive method is whole easily updated
In the case where possess higher stability.
Detailed description of the invention
The present invention will be further described with reference to the accompanying drawings, but the embodiment in attached drawing is not constituted to any limit of the invention
System, for those of ordinary skill in the art, without creative efforts, can also obtain according to the following drawings
Other attached drawings.
Fig. 1 is the architecture diagram of the network active defense system based on block chain.
Specific embodiment
The invention will be further described with the following Examples.
As shown in Figure 1, should Active Defending System Against based on block chain have background control end (Voyager Server) and more
A client (Game Server1,2 ...), payment passes through client using (Wallet), game application (Player) etc. respectively
It is connected to Genesis platform (Genesis Interface), thus by multiple block chains (such as ETH, TRON, NAS) are come from
The management of intelligent contract (Smart Contract).The system mainly includes block chain Situation Awareness module, multichain Initiative Defense
Module, storage contract module, across chain interaction and the communication system of auto upgrading, external monitoring contract module, forever continue backup and
Across chain wake-up module.
Block chain Situation Awareness module works respectively in background control end and client, in client for connecting block chain
Port have record and have the intelligent contract of screening criteria, for inquiring the analysis node of background control end, so that confirmation is to which
The intelligent contract of a little analysis node addresses carries out covering perception.And it is possible to not by the intelligence of capped analysis node address
The protection agreement of contract limits and enforces sensed activation.Client collects what statistics was obtained in background control end covering perception
Data are simultaneously recorded.Wherein, the specific means for covering perception includes transferring storage by the analysis node on different blocks chain
The algorithm of contract, and the behaviors such as the abnormal intelligent calling of monitoring, across contract attack, flooding automatically.Once having found exception
Behavior, system calls analysis node automatically immediately to obtain the crawler logic in storage contract, the abnormal calling of recurrence crawl
Node and the server of behind, collect the data of attacker.
Since covering perception behavior is established on block chain, whole system can not distort logic and credible can verify that
Implementation capacity is guaranteed that the algorithm and crawler algorithm of specific analysis node are undertaken by centralization/decentralization by intelligent contract.In this way
Can be in the case where guaranteeing that algorithm and crawler are easily updated, while guaranteeing the logic that the automation of a full set of system is enforced,
To realize more preferable Situation Awareness effect and three-dimensional monitoring.
Wherein, multichain Initiative Defense module is mainly based upon different main chains and places intelligent contract respectively, to guarantee actively
Defense system executes automatically.The server of background control end is regular (Periodic Synchronization) using cycle synchronisation
Processing periodically is interacted to the defence contract on different blocks chain main chain, in conjunction with above-mentioned block chain Situation Awareness module, once
The server locks contract of attacker, the intelligent contract on different main chains can be mobilized automatically, arrange different sub-services
Device carries out coordinated defense, and is unfolded actively to strike back.Contained in the module of counterattack based on storage contract can auto upgrading not
Persistently the system is intelligently closed to prevent attacker such as surveillance, depth crawler, across contract blocking communication with counterattack method
It is about illegally called with rear end and injection attacks.
Wherein, the storage contract of auto upgrading be it is a whole set of can permanently survive, the decentralization database of auto upgrading.Institute
There are algorithm data in Initiative Defense, crawler data, anti-injection data, across chain agreement, Initiative Defense scheme all by storage contract
It permanently stores, and realizes auto upgrading.Auto upgrading refers to once server/contract is by injection Data attack or by across permission
Attack, attacking sentence and similar sentence can automatically be inserted into intelligent contract, use in the library data as patrolling to next time
When collecting, which is used for Initiative Defense, that is, has been automatically performed the escalation process of storage contract.Because whole process is by intelligence
Can contract guarantee, storage contract be integrally it is irreversible, the data of the database of Active Defending System Against can transport for a long time with system
Battalion is more and more comprehensive, and defence logic is also more and more complete.
Wherein, the intelligent contract between different main chains, by realize on different chains intelligent contract synchronizing information and
It keeps coordinating, the degree of the decentralization of system entirety is higher, and whole defense system is more firm.Should across chain interaction with communicate
System passes through across the chain Middleware implementation for not depending on centralized server storage, specifically, constructing node in background control end
Cluster, the node cluster are equipped with Program Interfaces and multiple public links for corresponding to different blocks chain towards each client
Mouthful, node cluster uses expansion aggregated structure, and time percentile is ranked up to distribute visitor according to response between each cluster
Family end load.Also, in bottom common recognition contract of the node cluster building for formatted data, pass through Program Interfaces and client
End dialogue, is written as preset number with the data that the language of the affiliated block chain of the public affairs chain transmits needs on the public chain of client
According to format.It constructs in node cluster for realizing across the chain information synchronization framework across chain interaction, is write to through bottom common recognition contract
Data afterwards are grouped to obtain multiple user groups according to its corresponding block chain, and intelligence is executed in each user group and is closed
Point-to-point information transmission about, is connected to different block chains as carrier using user group.Specifically, respectively right according to block chain
The language answered is grouped data using UUID packet mode, by the uniqueness of UUID the detailed of the data of client transmissions
Thin information is stored in the inquiry table for being randomly assigned by UUID and submits data to server with Form list out, is indexing
UUID and critical field are stored in table for user group interaction.As the server of addition is more, stability and letter across chain
The interactive speed of breath can be faster, in multichain Active Defending System Against, can more easily realize information sharing, to reach joint
The purpose of defence.
In addition, when by user group to carry across chain function, the function that can be controlled by grouping and permission,
Across the chain bearing function for forming alliance's chain, to reach the adjusting of the performance and stability of data.Also, when mass data by with
When family group carries out across chain, by constructing new intelligent contract come across the chain task of segment assignments to different sections of user, or across
Paging result carrying (paginated results) link can be used in the case of single point user carries excessive in chain information
To mitigate the load of single cluster, the combined debugging method of the more public chains of optimization.
Wherein, although intelligent contract can be enforced, the timeliness of stability and communication between different main chains
Property be different, the main chain of more decentralization executes slower.Therefore, which is additionally provided with external detection area
The monitoring contract of block chain state, for checking attacker, whether there is or not the blocking attacks carried out for block chain defence contract itself, section
Point attack and the trend for closing block chain.
The Active Defending System Against is additionally provided with continues backup and across chain wake-up module forever, and providing can be former contract code weight
The scheme newly activated can have defensive position to continue to activate when system single-stranded is broken.Specifically, being similar to the standby of decentralization
Calamity contract, this continues backup forever and across chain wake-up module issues multiple contracts on chain, or the function restarted is added in contract
Can, to have the function that restarting.It in conjunction with above-mentioned across chain technology, can accomplish across chain wake-up, considerably increase defence system
The stability and persistence of system.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than the present invention is protected
The limitation of range is protected, although explaining in detail referring to preferred embodiment to the present invention, those skilled in the art are answered
Work as understanding, it can be with modification or equivalent replacement of the technical solution of the present invention are made, without departing from the reality of technical solution of the present invention
Matter and range.
Claims (10)
1. the Network active defensive method based on block chain, which comprises the steps of:
Situation Awareness intelligence contract construction step, the analysis node of background control end is inquired based on Situation Awareness intelligence contract
Dynamically, to judge that these analysis nodes are on existing analysis node to judging result with the presence or absence of perception trigger condition
Node intelligent contract carries out covering perception;
Perception data recording step records the data that above-mentioned covering perceives;
Abnormal behaviour processing step judges the data with the presence or absence of abnormal behaviour, if the determination result is YES then calls and prestores
It stores contract and grabs abnormal data, read source-information and attack sentence in abnormal data;
Prevention-Security step calls the matching defence contract prestored according to the attack information of acquisition.
2. as described in claim 1 based on the Network active defensive method of block chain, which is characterized in that in the Situation Awareness
In intelligent contract construction step, the perception trigger condition refers to that the intelligence contract is in active state.
3. as described in claim 1 based on the Network active defensive method of block chain, which is characterized in that in the Situation Awareness
In intelligent contract construction step, the covering sensed activation is not assisted by the protection of the node intelligent contract of capped analysis node
View is limited and is enforced.
4. as described in claim 1 based on the Network active defensive method of block chain, which is characterized in that in the abnormal behaviour
In step, the abnormal behaviour include beyond the analysis node intelligence contractual agreement intelligence call and/or across contract attack with/
Or flooding behavior.
5. as claimed in claim 4 based on the Network active defensive method of block chain, which is characterized in that in the abnormal behaviour
In step, attacker's information trace to the source referring to: abnormal come recurrence crawl by preset crawler logic in storage contract
The server for calling node and behind, collects the data of attacker.
6. as described in claim 1 based on the Network active defensive method of block chain, which is characterized in that the Prevention-Security step
The defence contract prestored in rapid is placed on the different main chains across chain.
7. as claimed in claim 6 based on the Network active defensive method of block chain, which is characterized in that on each main chain
It is respectively equipped with across chain wake-up contract, for activating the defence contract code on each main chain or restarting self-defense contract.
8. as described in claim 1 based on the Network active defensive method of block chain, which is characterized in that at the abnormal behaviour
Reason step further includes counterattack step, by surveillance, depth crawler, across contract blocking communication after obtaining attacker's information
One or more defense mechanisms persistently the network is illegally called preventing attacker and/or injection attacks.
9. the network active defense system based on block chain, which is characterized in that the system comprises processor, the processor energy
Method described in any one of enough perform claim requirements 1~9.
10. computer readable storage medium is stored with computer program, which is characterized in that the computer program is controlled
Device can be realized method according to any one of claims 1 to 9 when executing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910598895.6A CN110474870B (en) | 2019-07-04 | 2019-07-04 | Block chain-based network active defense method and system and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910598895.6A CN110474870B (en) | 2019-07-04 | 2019-07-04 | Block chain-based network active defense method and system and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110474870A true CN110474870A (en) | 2019-11-19 |
CN110474870B CN110474870B (en) | 2022-02-25 |
Family
ID=68506855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910598895.6A Active CN110474870B (en) | 2019-07-04 | 2019-07-04 | Block chain-based network active defense method and system and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110474870B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111310191A (en) * | 2020-02-12 | 2020-06-19 | 广州大学 | Block chain intelligent contract vulnerability detection method based on deep learning |
WO2021197760A1 (en) * | 2020-03-30 | 2021-10-07 | British Telecommunications Public Limited Company | Method of analysing anomalous network traffic |
CN113783901A (en) * | 2021-11-15 | 2021-12-10 | 湖南宸瀚信息科技有限责任公司 | Multi-communication-node cooperative anti-attack network system based on block chain |
CN115065562A (en) * | 2022-08-17 | 2022-09-16 | 湖南红普创新科技发展有限公司 | Block chain-based injection determination method, device, equipment and storage medium |
CN116506104A (en) * | 2023-06-25 | 2023-07-28 | 天津市城市规划设计研究总院有限公司 | Method and system for information security interaction of different departments based on cross-chain blockchain |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107172085A (en) * | 2017-06-30 | 2017-09-15 | 江苏华信区块链产业研究院有限公司 | Active defense method and node based on the intelligent contract of block chain |
CN108616534A (en) * | 2018-04-28 | 2018-10-02 | 中国科学院信息工程研究所 | A kind of method and system for protecting internet of things equipment ddos attack based on block chain |
WO2019032864A1 (en) * | 2017-08-10 | 2019-02-14 | Patroness, LLC | System and methods for sensor integration in support of situational awareness for a motorized mobile system |
-
2019
- 2019-07-04 CN CN201910598895.6A patent/CN110474870B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107172085A (en) * | 2017-06-30 | 2017-09-15 | 江苏华信区块链产业研究院有限公司 | Active defense method and node based on the intelligent contract of block chain |
WO2019032864A1 (en) * | 2017-08-10 | 2019-02-14 | Patroness, LLC | System and methods for sensor integration in support of situational awareness for a motorized mobile system |
CN108616534A (en) * | 2018-04-28 | 2018-10-02 | 中国科学院信息工程研究所 | A kind of method and system for protecting internet of things equipment ddos attack based on block chain |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111310191A (en) * | 2020-02-12 | 2020-06-19 | 广州大学 | Block chain intelligent contract vulnerability detection method based on deep learning |
CN111310191B (en) * | 2020-02-12 | 2022-12-23 | 广州大学 | Block chain intelligent contract vulnerability detection method based on deep learning |
WO2021197760A1 (en) * | 2020-03-30 | 2021-10-07 | British Telecommunications Public Limited Company | Method of analysing anomalous network traffic |
CN113783901A (en) * | 2021-11-15 | 2021-12-10 | 湖南宸瀚信息科技有限责任公司 | Multi-communication-node cooperative anti-attack network system based on block chain |
CN115065562A (en) * | 2022-08-17 | 2022-09-16 | 湖南红普创新科技发展有限公司 | Block chain-based injection determination method, device, equipment and storage medium |
CN116506104A (en) * | 2023-06-25 | 2023-07-28 | 天津市城市规划设计研究总院有限公司 | Method and system for information security interaction of different departments based on cross-chain blockchain |
CN116506104B (en) * | 2023-06-25 | 2023-08-29 | 天津市城市规划设计研究总院有限公司 | Method and system for information security interaction of different departments based on cross-chain blockchain |
Also Published As
Publication number | Publication date |
---|---|
CN110474870B (en) | 2022-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110474870A (en) | Network active defensive method, system and computer readable storage medium based on block chain | |
CN109274524B (en) | Equipment management and sharing system based on alliance block chain | |
EP3837627B1 (en) | Transaction system and method of operation thereof | |
Lee et al. | Botnet detection: countering the largest security threat | |
CN101958897B (en) | Correlation analysis method of security incident and system | |
Wang et al. | Capacity of blockchain based Internet-of-Things: Testbed and analysis | |
KR102232641B1 (en) | Method for searching using data structure supporting multiple search in blockchain based IoT environment, and apparatus thereof | |
Jayalaxmi et al. | DeBot: A deep learning-based model for bot detection in industrial internet-of-things | |
CN110929229A (en) | Block chain-based office document credibility verification method and system | |
De Santo et al. | Exploiting the MIL-STD-1553 avionic data bus with an active cyber device | |
CN104871171A (en) | Distributed pattern discovery | |
US20190222585A1 (en) | Artificial intelligence system and method for threat anticipation | |
CN106302404A (en) | A kind of collection network is traced to the source the method and system of information | |
CN114499982A (en) | Honey net dynamic configuration strategy generating method, configuration method and storage medium | |
De Faveri et al. | Designing adaptive deception strategies | |
Feng et al. | Predicting the intrusion intentions by observing system call sequences | |
CN111028077A (en) | Intelligent contract protection method and system based on input filter | |
CN112398857B (en) | Firewall testing method, device, computer equipment and storage medium | |
Arul | Deep nonlinear regression least squares polynomial fit to detect malicious attack on IoT devices | |
Hu et al. | An adaptive smartphone anomaly detection model based on data mining | |
Wang et al. | Internet of things | |
Al Kindi et al. | Analysis of malware propagation behavior in Social Internet of Things | |
CN109241783A (en) | Mobile terminal manages implementation of strategies method and device | |
Sikora et al. | Swarm virus, evolution, behavior and networking | |
CN113364766B (en) | APT attack detection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |