CN113162804B - Binary synchronization method of symbol network under joint influence of spoofing attack and pulse interference - Google Patents
Binary synchronization method of symbol network under joint influence of spoofing attack and pulse interference Download PDFInfo
- Publication number
- CN113162804B CN113162804B CN202110429942.1A CN202110429942A CN113162804B CN 113162804 B CN113162804 B CN 113162804B CN 202110429942 A CN202110429942 A CN 202110429942A CN 113162804 B CN113162804 B CN 113162804B
- Authority
- CN
- China
- Prior art keywords
- symbol
- pulse
- network
- spoofing attack
- symbol network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 239000011159 matrix material Substances 0.000 claims abstract description 21
- 230000001360 synchronised effect Effects 0.000 claims abstract description 8
- 230000003993 interaction Effects 0.000 claims abstract description 5
- 238000010586 diagram Methods 0.000 claims description 14
- 230000008878 coupling Effects 0.000 claims description 5
- 238000010168 coupling process Methods 0.000 claims description 5
- 238000005859 coupling reaction Methods 0.000 claims description 5
- 238000001208 nuclear magnetic resonance pulse sequence Methods 0.000 claims description 5
- 230000003042 antagnostic effect Effects 0.000 claims description 4
- 238000006243 chemical reaction Methods 0.000 claims 1
- 230000001568 sexual effect Effects 0.000 claims 1
- 238000011160 research Methods 0.000 abstract description 11
- 230000009466 transformation Effects 0.000 abstract description 2
- 238000004088 simulation Methods 0.000 description 9
- 239000003795 chemical substances by application Substances 0.000 description 6
- 238000009826 distribution Methods 0.000 description 2
- 230000009191 jumping Effects 0.000 description 2
- 238000012886 linear function Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003902 lesion Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000009827 uniform distribution Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Synchronisation In Digital Transmission Systems (AREA)
Abstract
The invention discloses a dichotomous synchronization method of a symbol network under the joint influence of deception attack and impulse interference, which comprises the following steps: consider having antagonismEstablishing a symbol network model in a coupled complex network under the joint influence of deception attack and pulse interference of interaction and random pulse intensity; then, obtaining a modified symbol network model by utilizing a Laplacian matrix and standard transformation; defining an error signal to obtain a symbol network error system in a form of a kronecker product; obtaining the dichotomy synchronization theorem of the symbol network, and adjusting the average pulse interval when the dichotomy synchronization theorem is not less than T a The error system can be stabilized and the symbol network can be synchronized in two halves. Aiming at the fact that malicious information/physical attacks, deterministic pulses or random pulse interference possibly exist in an actual information/physical network at the same time, the invention researches and provides a binary synchronization method of a symbol network under the common influence of pulse interference and deception attack.
Description
Technical Field
The invention relates to the technical field of complex network synchronization, in particular to a dichotomous synchronization method of a symbol network under the joint influence of deception attack and impulse interference.
Background
In the last two decades, due to the rise of fields such as multi-vehicle coordination control, networking mobile manipulators, network physical micro-grid and the like, the synchronization of complex networks and the consistency problem of multi-agent systems are widely researched. Most of the existing coordination control problem research of the complex network and the multi-agent system is carried out on the basis of the assumption that all adjacent nodes are in cooperative relationship, but in reality, the coordination control problem research is carried out on the basis of the network in which some cooperative and competitive relationships coexist, so that the binary synchronization research of the symbol network is carried out at the same time.
In general, pulses in the real world fall into two categories: deterministic pulses and stochastic pulses, wherein the research on the problem of symbol network binary synchronization (e.g., cooperative control of multi-agent networks) under the influence of deterministic pulses has achieved a great deal of research effort, while the research effort on the problem of symbol network binary synchronization under the influence of stochastic pulses is very small. The multi-agent network is easy to be attacked by adversarial attack because the communication between agents is carried out based on locally exchanged information, and in recent years, the problem of safety synchronization control of the multi-agent network has attracted great research interest. The existing research only aims at the dichotomous synchronization/consistency problem under the influence of a single factor such as a resistance attack or a deterministic pulse, however, malicious information/physical attacks, deterministic pulses or random pulse interference may exist in an actual information/physical network at the same time.
Disclosure of Invention
The purpose of the invention is as follows: in order to solve the problem that malicious information/physical attacks and deterministic pulse or random pulse interference possibly exist in an actual information/physical network at the same time, and the existing research only aims at the current situation of dichotomy synchronization/consistency under the influence of a single factor, the invention provides a dichotomy synchronization method of a symbol network under the joint influence of pulse interference with random pulse intensity and deception attack.
The technical scheme is as follows: a binary synchronization method of a symbol network under the joint influence of spoofing attack and impulse interference comprises the following steps:
(1) Considering a coupling network with antagonistic interactions and spoof attack interference at the pulse time, a nonlinear symbol network model is established,
wherein,for the status variable of the i-th node, <' >> Is a non-linear odd function. />Is a constant matrix. τ (t) is time-varying time lag and satisfies->Wherein->Is a constant. c. C 1 >0 and c 1 >0 is the coupling strength; />Symbol map implied by the symbol network (1)>Of the adjacent matrix. />For a pulse sequence, satisfy 0= t 0 <t 1 <t 2 <…<t k <…,lim k→∞ t k = ∞; presence constant T>1 so that-> Are random pulse intensities. Non-linear odd function->For deceiving the attack signal, the attack signal randomly occurs at each pulse time; beta (t) k ) E {0,1}, and determines whether an impulse interference or a spoofing attack occurs at the impulse time when beta (t) is greater than k ) Pulse interference occurs when =0, i.e. x i (t) at t k Jumping of time; when beta (t) k ) Spoofing attacks occur when = 1;
then make the symbol diagramMiddle Laplacian matrix L s Is->Is expressed as->The symbol network (1) can be expressed as follows,
Finally orderSatisfies b i E {1, -1}, then ∈ +>The symbol network (2) can be represented as follows,
(2) Defining an error signalHas->And let W = (W) ij ) (N-1)×(N-1) In which>A symbol network error system in the form of the kronecker product is obtained, expressed as follows,
(3) Adjusting average pulse interval
If for constants λ > ε >0 and γ >1, a positive definite matrix P >0 exists, constants δ >0 and r >0, such that the following inequality holds,
wherein alpha is satisfied
When the adjusted average pulse interval is not less than T a The error system (4) is stable, i.e. the symbol network (1) is dichotomously synchronized.
Further, the method for dichotomous synchronization of symbol network under the joint influence of spoofing attack and impulse interference is described in the step (1)Is a non-linear odd function, and means for any m e {1,2, \8230;, n x }, non-linear odd function f m (x im (t)) satisfy
Wherein v m >0 is a known constant.
Further, the method for binary synchronization of the symbol network under the joint influence of the spoofing attack and the impulse interference is described in the step (1)Symbol map implied by the symbol network (1)>In which the symbol map +>Is structurally balanced and contains a directed spanning tree.
Further, the method for binary synchronization of the symbol network under the joint influence of the spoofing attack and the impulse interference is described in the step (1)Is a random pulse intensity, meaning that there are S possible pulse intensities @>WhereinAre mutually independent random variable sequences, and Prob { sigma (t) k )=q}=π q ∈(0,1),/>Satisfy->
Further, the nonlinear odd function in the step (1) in the binary synchronization method of the symbol network under the joint influence of the spoofing attack and the impulse interferenceFor spoofing attack signals, satisfy
Where θ >0 is a known constant.
Further, the nonlinear odd function in the step (1) in the binary synchronization method of the symbol network under the joint influence of the spoofing attack and the impulse interferenceThe random occurrence of the attack signals at each pulse time refers to the spoofing attack h (x) i (t)) the probability of occurrence at a pulse instant is random, and the sequence->Indicate, i.e. ->And &>Wherein->Is a known constant.
Has the advantages that: the invention researches a binary synchronization method of a Lipschitz network with antagonistic and time-lag interaction, and considers the common influence of pulse interference with random pulse intensity and deception attack; secondly, by utilizing the standard transformation, the Lyapunov function method and the linear matrix inequality technology, the sufficient condition of the binary synchronization of the symbol network is established, the binary synchronization of the symbol network can be realized only by properly adjusting the average pulse interval, and the realization is convenient.
Drawings
FIG. 1 is a schematic diagram of a binary synchronization method of a symbol network under the joint influence of spoofing attack and impulse interference according to the present invention;
FIG. 2 is a symbolic diagram consisting of 9 nodes in the numerical simulation example 1 of the present invention;
FIG. 3 is a diagram of a pulse instant self-hopping or spoofing attack in the numerical simulation example 1 of the present invention;
FIG. 4 is a state trace diagram in numerical simulation example 1 of the present invention;
FIG. 5 is a symbolic diagram consisting of 7 nodes in numerical simulation example 2 of the present invention;
FIG. 6 is a diagram of a pulse instant self-hopping or spoofing attack in the numerical simulation example 2 of the present invention;
FIG. 7 is a state diagram of the numerical simulation example 2 of the present invention.
Detailed Description
Considering a coupling network with antagonistic interaction and spoof attack interference at the pulse time, a nonlinear symbol network model is established,
wherein,is the ith sectionThe state variable of the point is changed to, is a non-linear odd function. />Is a constant matrix. τ (t) is a time-varying time lag and satisfies >>Wherein->Is a constant. c. C 1 >0 and c 1 >0 is the coupling strength. />Symbol map implied by the symbol network (1)>Of the adjacent matrix. />For a pulse sequence, satisfy 0= t 0 <t 1 <t 2 <…<t k <…,lim k→∞ t k = ∞. Existence constant T>1 so that-> For random pulse intensities, there are S possible pulse intensities->Wherein->Are mutually independent random variable sequences, and Prob { sigma (t) k )=q}=π q ∈(0,1),/>Satisfy the requirements ofNon-linear odd function->For spoofing attack signals, which occur randomly at each pulse instant, a Bernoulli distribution sequence is used>Is represented by beta (t) k )∈{0,1},/>Andwherein->Determining whether impulse interference or spoofing attack occurs at the impulse time, when beta (t) is a known constant k ) A pulse disturbance occurs when =0, i.e. x i (t) at t k Jumping of time; when beta (t) k ) A spoofing attack occurs when = 1.
Then make the symbol diagramMiddle Laplacian matrix L s Is->Is expressed as->The symbol network (1) can be expressed as follows,
Suppose 1 for any m e {1,2, \8230;, n x }, non-linear odd function f m (x im (t)) satisfy
Wherein v m >0 is a known constant.
Where θ >0 is a known constant.
Wherein,representing mathematical expectations, the symbol network is said to be dichotomously synchronous.
Order toSatisfies b i E {1, -1}, then ∈ +>Can be obtained from hypothesis 1>Also by assuming that 2 is available>The above-described symbolic network model can be expressed as follows,
Then there is
Definition 2 (average pulse interval) if there is a positive integer N 0 And a positive number T a So that the following holds:
wherein, N (t) 0 And t) indicates that the pulse sequence is in the interval (t) 0 T) is called a pulse sequenceAverage pulse interval of not less than T a 。
Wherein γ >0 is an equation
γ-α+βe γτ =0
Is determined.
Based on the above description, the final goal is to adjust the average pulse interval such that the average pulse interval satisfies the following theorem to achieve binary synchronization of the symbol network:
wherein alpha is satisfied
When the adjusted average pulse interval is not less than T a The error system (15) is stable, i.e. the symbol network (12) is dichotomously synchronized.
And (3) proving that: from hypothesis 1
The Lyapunov function is constructed as follows
V(t)=e T (t)Pe(t) (22)
When t ∈ [ t ] k-1 ,t k ) When V (t) is derived along the trajectory of the system (15), and the positive numbers delta and lambda can be arbitrarily determined by the formula (21)>Epsilon, has
From the formula (17), Ω <0. And further obtained from the formula (23)
Derived from introduction 3
When t = t k Then, from (15)
From hypothesis 2
Wherein λ is max (P) represents the maximum eigenvalue of matrix P. And due to
So that there are
Obtainable from the formulae (16) and (18)
Then the compounds represented by the formulae (29) and (30) can be obtained
Thus, when t ∈ [ t ] k-1 ,t k ) When the temperature of the water is higher than the set temperature,
using definition 2, we can obtain the time t ∈ [ t ] k-1 ,t k ) When the temperature of the water is higher than the set temperature,
this means that
Is represented by the formula (19)
As can be seen from definitions 1 and 2, the symbol network (12) is binary synchronized.
Example 1 was numerically simulated.
Consider a network (12) of 9 Chua's circuits, in which the parameter matrices A, B and the non-linear function f (x) i (t)) are shown below, respectively,
The topology of the network (12) is shown in FIG. 2, the adjacency matrixIs represented as follows, with the additional symbol diagram structure being balanced, whereinN 1 ={1,2,3,8,9},N 2 = 4,5,6,7, and contains a directed spanning tree,
let λ =1, ∈ =0.5,then α =0.3424 is the equation £ r>The root of (2). Let h (x) i (t))=[0.3x i1 (t),-0.3sin(x i2 (t)),tanh(0.3x i3 (t))] T Then>Where θ =0.3. Let c 1 =8,c 2 =1,/>σ(t k )∈{1,2},Prob{σ(t k )=1}=0.4,Prob{σ(t k ) =1} =0.6. And assume a random variable ρ 1 Obey a uniform distribution U (0.1, 0.3), random variable ρ 2 The probability distribution for e {0.2,0.15,0.1} is as follows: prob { ρ 2 =0.2}=0.3,Prob{ρ 2 =0.15}=0.2,Prob{ρ 2 =0.1} =0.5. Let gamma = e 0.9α =1.3610,T a =1, then have->Solving the linear matrix inequalities (16) - (18) in theorem 1 can obtain feasible solutions thereof, and as can be seen from theorem 1, when the adjusted average pulse interval is not less than T a The symbol network is dichotomously synchronized. Taking t in the simulation k -t k-1 And =1s (the strength of the pulse time when the self-hopping or the spoofing attack occurs is shown in fig. 3), fig. 4 shows that the symbol network can achieve binary synchronization.
Numerical simulation example 2.
Consider a network (12) of 7 Chua's circuits, where the parameter matrices A, B and the non-linear function f (x) i (t)) are shown below, respectively,
the topology of the network (12) is shown in FIG. 5, the adjacency matrixIs represented as follows, with the additional symbol diagram structure being balanced, whereinN 1 ={1,2,3},N 2 = 4,5,6,7, and contains a directed spanning tree,
let λ =2, ε =1,then α =0.7483 is the equation £ r>The root of (2). h (x) i (t)),/>And &>The same as in example 1. Let c 1 =7,c 2 =0.8,γ=1.35,T a =0.45 satisfies =>Solving the linear matrix inequalities (16) - (18) in theorem 1 can obtain feasible solutions thereof, and as can be seen from theorem 1, when the adjusted average pulse interval is not less than T a The symbol network is dichotomously synchronized. Taking t in the simulation k -t k-1 =0.45s (the strength of the pulse instant at which the self-hopping or spoofing attack occurs is shown in fig. 6), and fig. 7 shows that the symbol network can achieve binary synchronization. />
Claims (6)
1. A dichotomous synchronization method of a symbol network under the joint influence of spoofing attack and impulse interference is characterized by comprising the following steps:
1) Considering a coupled complex network under the joint influence of spoofing attack and pulse interference with antagonistic interaction and random pulse intensity, a nonlinear symbol network model is established,
wherein,is a state variable of the ith node, is a non-linear odd function>Is a constant matrix, τ (t) is a time-varying time lag, and satisfies->Wherein +>Is a constant number c 1 >0 and c 1 >0 is the coupling strength, is greater than or equal to>For a symbol diagram implied by a symbol network (1)>Is adjacent to the matrix, < >>For a pulse sequence, satisfy 0= t 0 <t 1 <t 2 <…<t k <…,lim k→∞ t k = ∞ existence of constant T>1 is such that device for selecting or keeping> For random pulse intensity, a non-linear odd function->For spoofing attack signals, randomly occurring at each pulse instant, beta (t) k ) E.g. 0,1, determining the pulseWhether impulse interference or spoofing attack occurs at the moment when beta (t) k ) Pulse interference occurs when =0, x i (t) at t k Time of day is changed when beta (t) k ) A spoofing attack occurs when the value is =1,
then make the symbol diagramMiddle Laplacian matrix L s Is->Is expressed as->The symbol network (1) can be expressed as follows,
Finally, standard conversion is carried out to ensure thatSatisfies b i E {1, -1}, then ∈ +>The symbol network (2) can be represented as follows,
2) Defining an error signalIs provided withLet W = (W) ij ) (N-1)×(N-1) Wherein->A sign network error system in the form of a kronecker product is obtained, expressed as follows,
3) Adjusting average pulse interval
If a positive definite matrix P >0, constants delta >0 and r >0 exist for constants lambda > epsilon >0 and gamma >1, such that the following inequality holds,
wherein alpha is satisfied
When the adjusted average pulse interval is not less than T a The error system (4) is stable and the symbol network (1) is dichotomously synchronized.
2. The binary synchronization method for the symbol network under the joint influence of the spoofing attack and the impulse interference as claimed in claim 1, wherein: the method described in step (1)Is a non-linear odd function, and refers to the function for any m e {1,2, \8230;, n x }, non-linear odd function f m (x im (t)) satisfy
Wherein v m >0 is a known constant.
3. A spoofing attack and pulse stem as recited in claim 1The binary synchronization method of the symbol network under the influence of interference is characterized in that: described in step (1)Symbol map implied by the symbol network (1)>In which the symbol map->Is structurally balanced and contains directed spanning trees.
4. The binary synchronization method for symbol networks under the joint influence of spoofing attack and impulse interference according to claim 1, characterized in that: the method described in step (1)To be random pulse intensity means that there are S possible pulse intensitiesWherein->Are mutually independent random variable sequences, and Prob { sigma (t) k )=q}=π q ∈(0,1),/>Satisfy->
6. The binary synchronization method for the symbol network under the joint influence of the spoofing attack and the impulse interference as claimed in claim 1, wherein: the non-linear odd function in the step (1)The random occurrence of the attack signals at each pulse time refers to the spoofing attack h (x) i (t)) the probability of occurrence at a pulse instant is random, and the sequence->Means for>And &>Wherein->Is a known constant. />
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110429942.1A CN113162804B (en) | 2021-04-21 | 2021-04-21 | Binary synchronization method of symbol network under joint influence of spoofing attack and pulse interference |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110429942.1A CN113162804B (en) | 2021-04-21 | 2021-04-21 | Binary synchronization method of symbol network under joint influence of spoofing attack and pulse interference |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113162804A CN113162804A (en) | 2021-07-23 |
CN113162804B true CN113162804B (en) | 2023-04-07 |
Family
ID=76867752
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110429942.1A Active CN113162804B (en) | 2021-04-21 | 2021-04-21 | Binary synchronization method of symbol network under joint influence of spoofing attack and pulse interference |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113162804B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116224867B (en) * | 2022-11-14 | 2024-03-08 | 江苏工程职业技术学院 | Binary inclusion control method of multi-agent system |
CN115913704A (en) * | 2022-11-14 | 2023-04-04 | 重庆邮电大学 | Intelligent unmanned cluster system time-lag pulse control method for resisting spoofing attack |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106157154B (en) * | 2016-07-21 | 2021-07-30 | 重庆大学 | Complex network community discovery method under adaptive evolution bat algorithm for self-media network data |
CN110213115B (en) * | 2019-06-25 | 2022-04-22 | 南京财经大学 | Security control method of event-driven network control system under multi-network attack |
-
2021
- 2021-04-21 CN CN202110429942.1A patent/CN113162804B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN113162804A (en) | 2021-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113162804B (en) | Binary synchronization method of symbol network under joint influence of spoofing attack and pulse interference | |
Yuan et al. | Resilient strategy design for cyber-physical system under DoS attack over a multi-channel framework | |
CN110044356B (en) | Distributed cooperative target tracking method under communication topology switching | |
CN109375514B (en) | Design method of optimal tracking controller in presence of false data injection attack | |
Zhou et al. | Terminal-time synchronization of multiple vehicles under discrete-time communication networks with directed switching topologies | |
CN114531273B (en) | Method for defending distributed denial of service attack of industrial network system | |
CN109657268B (en) | Immune strategy design method in uncertain network based on characteristic value | |
Dolk et al. | Event-triggered consensus seeking under non-uniform time-varying delays | |
Lu et al. | Stability of phase difference trajectories of networks of Kuramoto oscillators with time-varying couplings and intrinsic frequencies | |
Alanwar et al. | Distributed secure state estimation using diffusion Kalman filters and reachability analysis | |
CN115022031A (en) | Security consistency control method for solving influence of FDI attack on multi-agent system | |
CN111638648A (en) | Distributed pulse quasi-synchronization method with proportional delay complex dynamic network | |
CN105515017B (en) | Meter and the Wide Area Measurement System PMU Optimal Configuration Methods of information security constraint | |
CN115793717B (en) | Group collaborative decision-making method, device, electronic equipment and storage medium | |
Zha et al. | Resilient Recursive Filter Design for Complex Networks With Event-Triggering Random Access Scheme and Random Coupling Strengths | |
CN113411312B (en) | State estimation method of nonlinear complex network system based on random communication protocol | |
Wang et al. | Leader-following consensus of multiple euler-lagrange systems under deception attacks | |
Shi et al. | Flocking control for Cucker–Smale model under denial‐of‐service attacks | |
Song et al. | Multi-channel transmission scheduling with hopping scheme under uncertain channel states | |
CN114912108A (en) | Method for realizing leaderless consistency of multi-Euler-Lagrange system under deception attack | |
CN107544472B (en) | Optimal switching dummy data injection method | |
Ning et al. | Nash equilibrium of time-delay interaction complex networks subject to persistent disturbances | |
Chacón et al. | Drastic disorder-induced reduction of signal amplification in scale-free networks | |
CN118151543B (en) | Unmanned vehicle cooperative control method and device | |
CN114326481B (en) | Safety control method for multi-mode aircraft system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |