CN110474870A - Network active defensive method, system and computer readable storage medium based on block chain - Google Patents

Network active defensive method, system and computer readable storage medium based on block chain Download PDF

Info

Publication number
CN110474870A
CN110474870A CN201910598895.6A CN201910598895A CN110474870A CN 110474870 A CN110474870 A CN 110474870A CN 201910598895 A CN201910598895 A CN 201910598895A CN 110474870 A CN110474870 A CN 110474870A
Authority
CN
China
Prior art keywords
contract
block chain
network active
chain
attacker
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910598895.6A
Other languages
Chinese (zh)
Other versions
CN110474870B (en
Inventor
吴啸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Pure White Matrix Technology Co Ltd
Original Assignee
Nanjing Pure White Matrix Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Pure White Matrix Technology Co Ltd filed Critical Nanjing Pure White Matrix Technology Co Ltd
Priority to CN201910598895.6A priority Critical patent/CN110474870B/en
Publication of CN110474870A publication Critical patent/CN110474870A/en
Application granted granted Critical
Publication of CN110474870B publication Critical patent/CN110474870B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to block chain processing technique application fields, provide a kind of Network active defensive method, system and computer readable storage medium based on block chain, and storage medium is stored with computer program, the above method is realized when computer program is executed by a controller.The intelligent contract that record has screening criteria is had in client, for inquiring the analysis node of background control end and carrying out covering perception to its intelligent contract, thus the behaviors such as the abnormal intelligent calling of monitoring, across contract attack, flooding automatically.Once having found abnormal behavior, system calls analysis node to obtain the crawler logic in storage contract automatically immediately, the abnormal calling node of recurrence crawl, the data of attacker are collected to trace to the source attacker's information, and call the matching defence contract prestored to realize Initiative Defense according to attacker's information of acquisition.Due to establishing on block chain in the Network active defensive method, higher stability is possessed in the case where easily updated.

Description

Network active defensive method, system and computer-readable storage based on block chain Medium
Technical field
The present invention relates to block chain processing technique application field, in particular to a kind of computer readable storage medium and it is System, computer-readable recording medium storage have computer program, realize when computer program is executed by a controller and are based on block chain Network active defensive method.
Background technique
Initiative type safeguard technology is proactive property defence, based on early excise defensive measure, attacker is allowed to be unable to reach attack Target, it is understood that in the case where artificially need not passively cope with, system can be prevented well, avoid threatening and pacify The case where all computer database, occurs.In computer today that is widely available and deeply applying, the application of initiative type safeguard technology So that network safety prevention enters a completely new stage and the important means of future maintenance network security becomes with development Gesture.It is more and more to make for the inverse compiling technique for cracking cyber-defence system but with the development of cyber-defence system Cyber-attack techniques are more various, to cope with complicated and diversified network attack, network safety system often same bulky complex, and And need often to update, the stability of itself is difficult to ensure, brings hidden danger to network security.
Summary of the invention
Inventor expects that block chain technology is due to the peace by realizing transaction based on the information exchange between node and node The guarantee of full property, reduces and trusts cost and be used widely.If network peace can be constructed on the basis of block chain technology Full system of defense can increase the stability of network safety system.
It is an object of the invention to: it avoids above-mentioned shortcoming in the prior art and a kind of net based on block chain is provided Network active defense method can be improved the stability of cyber-defence.
The purpose of the present invention is achieved through the following technical solutions:
The Network active defensive method based on block chain of offer, includes the following steps:
Situation Awareness intelligence contract construction step, the analysis section of background control end is inquired based on Situation Awareness intelligence contract The dynamic of point, to judge that these analysis nodes are existing analysis node to judging result with the presence or absence of perception trigger condition On node intelligent contract carry out covering perception;
Perception data recording step records the data that above-mentioned covering perceives;
Abnormal behaviour processing step judges that the data with the presence or absence of abnormal behaviour, are if the determination result is YES then called pre- The storage contract crawl abnormal data deposited, reads the source-information and attack sentence in abnormal data;
Prevention-Security step calls the matching defence contract prestored according to the attack information of acquisition.
Preferably, in the Situation Awareness intelligence contract construction step, the perception trigger condition refers to that the intelligence is closed It is about at active state.
Preferably, in the Situation Awareness intelligence contract construction step, the covering sensed activation is not by capped The protection agreement of the node intelligent contract of analysis node is limited and is enforced.
Preferably, in the abnormal behaviour step, the abnormal behaviour includes assisting beyond the analysis node intelligence contract The intelligence calling of view and/or across contract attack and/or flooding behavior.
Preferably, in the abnormal behaviour step, attacker's information trace to the source referring to: by pre- in storage contract If crawler logic carry out the abnormal server for calling node and behind of recurrence crawl, collect the data of attacker.
Preferably, the defence contract prestored in the Prevention-Security step is placed on the different main chains across chain.
Preferably, it is respectively equipped with across chain wake-up contract on each main chain, for activating the defence on each main chain to close About code or restart self-defense contract.
Preferably, the abnormal behaviour processing step further includes counterattack step, by tracing to the source after obtaining attacker's information Investigation, depth crawler, across contract blocking communication one of or a variety of defense mechanisms come prevent attacker persistently to the network into The illegal calling of row and/or injection attacks.
A kind of network active defense system based on block chain is also provided, the processor of system can be realized above-mentioned based on area The Network active defensive method of block chain.
A kind of computer readable storage medium is also provided, which is stored with executable computer program, computer It can be realized the above-mentioned Network active defensive method based on block chain when program is executed by a controller.
Beneficial effects of the present invention: being somebody's turn to do the Network active defensive method based on block chain, in client for connecting block The port of chain has the intelligent contract that record has screening criteria, for inquiring the analysis node of background control end and intelligently closing to it Covering perception is about carried out, thus the behaviors such as the abnormal intelligent calling of monitoring, across contract attack, flooding automatically.Once it was found that Abnormal behavior, system call analysis node automatically immediately to obtain the crawler logic in storage contract, and recurrence crawl is abnormal Calling node, collect the data of attacker to trace to the source attacker's information, and according to attacker's information tune of acquisition Initiative Defense is realized with the matching defence contract prestored.Since the covering in the Network active defensive method perceives row Be to establish on block chain, can not distort logic and it is credible can verify that implementation capacity is guaranteed by intelligent contract, it is specific to analyze The algorithm and crawler algorithm of node are undertaken by centralization/decentralization, guarantee that Network active defensive method is whole easily updated In the case where possess higher stability.
Detailed description of the invention
The present invention will be further described with reference to the accompanying drawings, but the embodiment in attached drawing is not constituted to any limit of the invention System, for those of ordinary skill in the art, without creative efforts, can also obtain according to the following drawings Other attached drawings.
Fig. 1 is the architecture diagram of the network active defense system based on block chain.
Specific embodiment
The invention will be further described with the following Examples.
As shown in Figure 1, should Active Defending System Against based on block chain have background control end (Voyager Server) and more A client (Game Server1,2 ...), payment passes through client using (Wallet), game application (Player) etc. respectively It is connected to Genesis platform (Genesis Interface), thus by multiple block chains (such as ETH, TRON, NAS) are come from The management of intelligent contract (Smart Contract).The system mainly includes block chain Situation Awareness module, multichain Initiative Defense Module, storage contract module, across chain interaction and the communication system of auto upgrading, external monitoring contract module, forever continue backup and Across chain wake-up module.
Block chain Situation Awareness module works respectively in background control end and client, in client for connecting block chain Port have record and have the intelligent contract of screening criteria, for inquiring the analysis node of background control end, so that confirmation is to which The intelligent contract of a little analysis node addresses carries out covering perception.And it is possible to not by the intelligence of capped analysis node address The protection agreement of contract limits and enforces sensed activation.Client collects what statistics was obtained in background control end covering perception Data are simultaneously recorded.Wherein, the specific means for covering perception includes transferring storage by the analysis node on different blocks chain The algorithm of contract, and the behaviors such as the abnormal intelligent calling of monitoring, across contract attack, flooding automatically.Once having found exception Behavior, system calls analysis node automatically immediately to obtain the crawler logic in storage contract, the abnormal calling of recurrence crawl Node and the server of behind, collect the data of attacker.
Since covering perception behavior is established on block chain, whole system can not distort logic and credible can verify that Implementation capacity is guaranteed that the algorithm and crawler algorithm of specific analysis node are undertaken by centralization/decentralization by intelligent contract.In this way Can be in the case where guaranteeing that algorithm and crawler are easily updated, while guaranteeing the logic that the automation of a full set of system is enforced, To realize more preferable Situation Awareness effect and three-dimensional monitoring.
Wherein, multichain Initiative Defense module is mainly based upon different main chains and places intelligent contract respectively, to guarantee actively Defense system executes automatically.The server of background control end is regular (Periodic Synchronization) using cycle synchronisation Processing periodically is interacted to the defence contract on different blocks chain main chain, in conjunction with above-mentioned block chain Situation Awareness module, once The server locks contract of attacker, the intelligent contract on different main chains can be mobilized automatically, arrange different sub-services Device carries out coordinated defense, and is unfolded actively to strike back.Contained in the module of counterattack based on storage contract can auto upgrading not Persistently the system is intelligently closed to prevent attacker such as surveillance, depth crawler, across contract blocking communication with counterattack method It is about illegally called with rear end and injection attacks.
Wherein, the storage contract of auto upgrading be it is a whole set of can permanently survive, the decentralization database of auto upgrading.Institute There are algorithm data in Initiative Defense, crawler data, anti-injection data, across chain agreement, Initiative Defense scheme all by storage contract It permanently stores, and realizes auto upgrading.Auto upgrading refers to once server/contract is by injection Data attack or by across permission Attack, attacking sentence and similar sentence can automatically be inserted into intelligent contract, use in the library data as patrolling to next time When collecting, which is used for Initiative Defense, that is, has been automatically performed the escalation process of storage contract.Because whole process is by intelligence Can contract guarantee, storage contract be integrally it is irreversible, the data of the database of Active Defending System Against can transport for a long time with system Battalion is more and more comprehensive, and defence logic is also more and more complete.
Wherein, the intelligent contract between different main chains, by realize on different chains intelligent contract synchronizing information and It keeps coordinating, the degree of the decentralization of system entirety is higher, and whole defense system is more firm.Should across chain interaction with communicate System passes through across the chain Middleware implementation for not depending on centralized server storage, specifically, constructing node in background control end Cluster, the node cluster are equipped with Program Interfaces and multiple public links for corresponding to different blocks chain towards each client Mouthful, node cluster uses expansion aggregated structure, and time percentile is ranked up to distribute visitor according to response between each cluster Family end load.Also, in bottom common recognition contract of the node cluster building for formatted data, pass through Program Interfaces and client End dialogue, is written as preset number with the data that the language of the affiliated block chain of the public affairs chain transmits needs on the public chain of client According to format.It constructs in node cluster for realizing across the chain information synchronization framework across chain interaction, is write to through bottom common recognition contract Data afterwards are grouped to obtain multiple user groups according to its corresponding block chain, and intelligence is executed in each user group and is closed Point-to-point information transmission about, is connected to different block chains as carrier using user group.Specifically, respectively right according to block chain The language answered is grouped data using UUID packet mode, by the uniqueness of UUID the detailed of the data of client transmissions Thin information is stored in the inquiry table for being randomly assigned by UUID and submits data to server with Form list out, is indexing UUID and critical field are stored in table for user group interaction.As the server of addition is more, stability and letter across chain The interactive speed of breath can be faster, in multichain Active Defending System Against, can more easily realize information sharing, to reach joint The purpose of defence.
In addition, when by user group to carry across chain function, the function that can be controlled by grouping and permission, Across the chain bearing function for forming alliance's chain, to reach the adjusting of the performance and stability of data.Also, when mass data by with When family group carries out across chain, by constructing new intelligent contract come across the chain task of segment assignments to different sections of user, or across Paging result carrying (paginated results) link can be used in the case of single point user carries excessive in chain information To mitigate the load of single cluster, the combined debugging method of the more public chains of optimization.
Wherein, although intelligent contract can be enforced, the timeliness of stability and communication between different main chains Property be different, the main chain of more decentralization executes slower.Therefore, which is additionally provided with external detection area The monitoring contract of block chain state, for checking attacker, whether there is or not the blocking attacks carried out for block chain defence contract itself, section Point attack and the trend for closing block chain.
The Active Defending System Against is additionally provided with continues backup and across chain wake-up module forever, and providing can be former contract code weight The scheme newly activated can have defensive position to continue to activate when system single-stranded is broken.Specifically, being similar to the standby of decentralization Calamity contract, this continues backup forever and across chain wake-up module issues multiple contracts on chain, or the function restarted is added in contract Can, to have the function that restarting.It in conjunction with above-mentioned across chain technology, can accomplish across chain wake-up, considerably increase defence system The stability and persistence of system.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than the present invention is protected The limitation of range is protected, although explaining in detail referring to preferred embodiment to the present invention, those skilled in the art are answered Work as understanding, it can be with modification or equivalent replacement of the technical solution of the present invention are made, without departing from the reality of technical solution of the present invention Matter and range.

Claims (10)

1. the Network active defensive method based on block chain, which comprises the steps of:
Situation Awareness intelligence contract construction step, the analysis node of background control end is inquired based on Situation Awareness intelligence contract Dynamically, to judge that these analysis nodes are on existing analysis node to judging result with the presence or absence of perception trigger condition Node intelligent contract carries out covering perception;
Perception data recording step records the data that above-mentioned covering perceives;
Abnormal behaviour processing step judges the data with the presence or absence of abnormal behaviour, if the determination result is YES then calls and prestores It stores contract and grabs abnormal data, read source-information and attack sentence in abnormal data;
Prevention-Security step calls the matching defence contract prestored according to the attack information of acquisition.
2. as described in claim 1 based on the Network active defensive method of block chain, which is characterized in that in the Situation Awareness In intelligent contract construction step, the perception trigger condition refers to that the intelligence contract is in active state.
3. as described in claim 1 based on the Network active defensive method of block chain, which is characterized in that in the Situation Awareness In intelligent contract construction step, the covering sensed activation is not assisted by the protection of the node intelligent contract of capped analysis node View is limited and is enforced.
4. as described in claim 1 based on the Network active defensive method of block chain, which is characterized in that in the abnormal behaviour In step, the abnormal behaviour include beyond the analysis node intelligence contractual agreement intelligence call and/or across contract attack with/ Or flooding behavior.
5. as claimed in claim 4 based on the Network active defensive method of block chain, which is characterized in that in the abnormal behaviour In step, attacker's information trace to the source referring to: abnormal come recurrence crawl by preset crawler logic in storage contract The server for calling node and behind, collects the data of attacker.
6. as described in claim 1 based on the Network active defensive method of block chain, which is characterized in that the Prevention-Security step The defence contract prestored in rapid is placed on the different main chains across chain.
7. as claimed in claim 6 based on the Network active defensive method of block chain, which is characterized in that on each main chain It is respectively equipped with across chain wake-up contract, for activating the defence contract code on each main chain or restarting self-defense contract.
8. as described in claim 1 based on the Network active defensive method of block chain, which is characterized in that at the abnormal behaviour Reason step further includes counterattack step, by surveillance, depth crawler, across contract blocking communication after obtaining attacker's information One or more defense mechanisms persistently the network is illegally called preventing attacker and/or injection attacks.
9. the network active defense system based on block chain, which is characterized in that the system comprises processor, the processor energy Method described in any one of enough perform claim requirements 1~9.
10. computer readable storage medium is stored with computer program, which is characterized in that the computer program is controlled Device can be realized method according to any one of claims 1 to 9 when executing.
CN201910598895.6A 2019-07-04 2019-07-04 Block chain-based network active defense method and system and computer readable storage medium Active CN110474870B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910598895.6A CN110474870B (en) 2019-07-04 2019-07-04 Block chain-based network active defense method and system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910598895.6A CN110474870B (en) 2019-07-04 2019-07-04 Block chain-based network active defense method and system and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110474870A true CN110474870A (en) 2019-11-19
CN110474870B CN110474870B (en) 2022-02-25

Family

ID=68506855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910598895.6A Active CN110474870B (en) 2019-07-04 2019-07-04 Block chain-based network active defense method and system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110474870B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111310191A (en) * 2020-02-12 2020-06-19 广州大学 Block chain intelligent contract vulnerability detection method based on deep learning
WO2021197760A1 (en) * 2020-03-30 2021-10-07 British Telecommunications Public Limited Company Method of analysing anomalous network traffic
CN113783901A (en) * 2021-11-15 2021-12-10 湖南宸瀚信息科技有限责任公司 Multi-communication-node cooperative anti-attack network system based on block chain
CN115065562A (en) * 2022-08-17 2022-09-16 湖南红普创新科技发展有限公司 Block chain-based injection determination method, device, equipment and storage medium
CN116506104A (en) * 2023-06-25 2023-07-28 天津市城市规划设计研究总院有限公司 Method and system for information security interaction of different departments based on cross-chain blockchain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172085A (en) * 2017-06-30 2017-09-15 江苏华信区块链产业研究院有限公司 Active defense method and node based on the intelligent contract of block chain
CN108616534A (en) * 2018-04-28 2018-10-02 中国科学院信息工程研究所 A kind of method and system for protecting internet of things equipment ddos attack based on block chain
WO2019032864A1 (en) * 2017-08-10 2019-02-14 Patroness, LLC System and methods for sensor integration in support of situational awareness for a motorized mobile system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172085A (en) * 2017-06-30 2017-09-15 江苏华信区块链产业研究院有限公司 Active defense method and node based on the intelligent contract of block chain
WO2019032864A1 (en) * 2017-08-10 2019-02-14 Patroness, LLC System and methods for sensor integration in support of situational awareness for a motorized mobile system
CN108616534A (en) * 2018-04-28 2018-10-02 中国科学院信息工程研究所 A kind of method and system for protecting internet of things equipment ddos attack based on block chain

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111310191A (en) * 2020-02-12 2020-06-19 广州大学 Block chain intelligent contract vulnerability detection method based on deep learning
CN111310191B (en) * 2020-02-12 2022-12-23 广州大学 Block chain intelligent contract vulnerability detection method based on deep learning
WO2021197760A1 (en) * 2020-03-30 2021-10-07 British Telecommunications Public Limited Company Method of analysing anomalous network traffic
CN113783901A (en) * 2021-11-15 2021-12-10 湖南宸瀚信息科技有限责任公司 Multi-communication-node cooperative anti-attack network system based on block chain
CN115065562A (en) * 2022-08-17 2022-09-16 湖南红普创新科技发展有限公司 Block chain-based injection determination method, device, equipment and storage medium
CN116506104A (en) * 2023-06-25 2023-07-28 天津市城市规划设计研究总院有限公司 Method and system for information security interaction of different departments based on cross-chain blockchain
CN116506104B (en) * 2023-06-25 2023-08-29 天津市城市规划设计研究总院有限公司 Method and system for information security interaction of different departments based on cross-chain blockchain

Also Published As

Publication number Publication date
CN110474870B (en) 2022-02-25

Similar Documents

Publication Publication Date Title
CN110474870A (en) Network active defensive method, system and computer readable storage medium based on block chain
CN109274524B (en) Equipment management and sharing system based on alliance block chain
EP3837627B1 (en) Transaction system and method of operation thereof
Lee et al. Botnet detection: countering the largest security threat
CN101958897B (en) Correlation analysis method of security incident and system
Wang et al. Capacity of blockchain based Internet-of-Things: Testbed and analysis
KR102232641B1 (en) Method for searching using data structure supporting multiple search in blockchain based IoT environment, and apparatus thereof
Jayalaxmi et al. DeBot: A deep learning-based model for bot detection in industrial internet-of-things
CN110929229A (en) Block chain-based office document credibility verification method and system
De Santo et al. Exploiting the MIL-STD-1553 avionic data bus with an active cyber device
CN104871171A (en) Distributed pattern discovery
US20190222585A1 (en) Artificial intelligence system and method for threat anticipation
CN106302404A (en) A kind of collection network is traced to the source the method and system of information
CN114499982A (en) Honey net dynamic configuration strategy generating method, configuration method and storage medium
De Faveri et al. Designing adaptive deception strategies
Feng et al. Predicting the intrusion intentions by observing system call sequences
CN111028077A (en) Intelligent contract protection method and system based on input filter
CN112398857B (en) Firewall testing method, device, computer equipment and storage medium
Arul Deep nonlinear regression least squares polynomial fit to detect malicious attack on IoT devices
Hu et al. An adaptive smartphone anomaly detection model based on data mining
Wang et al. Internet of things
Al Kindi et al. Analysis of malware propagation behavior in Social Internet of Things
CN109241783A (en) Mobile terminal manages implementation of strategies method and device
Sikora et al. Swarm virus, evolution, behavior and networking
CN113364766B (en) APT attack detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant