CN110190971B - 一种基于区块链的jwt令牌认证方法 - Google Patents
一种基于区块链的jwt令牌认证方法 Download PDFInfo
- Publication number
- CN110190971B CN110190971B CN201910564982.XA CN201910564982A CN110190971B CN 110190971 B CN110190971 B CN 110190971B CN 201910564982 A CN201910564982 A CN 201910564982A CN 110190971 B CN110190971 B CN 110190971B
- Authority
- CN
- China
- Prior art keywords
- verification code
- token
- jwt
- verification
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
本发明提供一种基于区块链的JWT令牌认证方法,属于JWT令牌认证技术领域,本发明分为1)验证码获取、2)验证码写链和3)JWT令牌发放三个步骤,使用区块链技术,结合JWT开放标准协议,为区块链用户提供JWT令牌发放和验证,提高令牌认证系统的安全性、可信任性和可追溯性。
Description
技术领域
本发明涉及JWT令牌认证技术,尤其涉及一种基于区块链的JWT令牌认证方法。
背景技术
在一个互联的移动世界中,对用户身份进行保护以免受身份盗窃和欺诈的需求非常强烈。
如今,从可穿戴设备、相机、家用电子产品以及户门,再到汽车和医疗设备等,一切都已互联起来,并且这种互联将会更深入地加速,尤其是随着5G进入市场,我们将看到更多智能的互联设备——所有这些设备都具有相互通信和交换数据的功能。
由此,我们的身边围绕各种互联设备服务于我们的日常生活,这些技术给我们带来了成倍成倍的便利。
但是,往往当新技术得到广泛应用时,恶意攻击的机会也不可避免地会增加,因此我们也需要不断改进网络安全。
在一个迅速变化的数字世界中,方便,往往是用户的最大期待,而不是被视为“锦上添花”。
这意味着用户身份的安全管理,不仅是我们一大担忧,更是一项重大挑战。
JWT(JSON Web Token)是一个基于JSON的开放标准(RFC7519),定义了一种紧凑的、自包含的方式,又因为它是经过数字签名的,所以常作为网络应用中身份提供者和服务提供者之间的用户身份凭据。区块链技术具有不可篡改、可追溯的特性,结合JWT标准协议,搭建一套可信任的令牌认证体系。
发明内容
根据以上的内容,本发明提出了一种基于区块链的JWT令牌认证方法,旨在提高令牌认证系统的安全性、可信任性和可追溯性。
本发明的技术方案是:
一种基于区块链的JWT令牌认证方法,
实现过程分为三步:
1)验证码获取:JWT令牌服务接收验证码获取请求后,查询区块链的当前区块高度,将当前区块高度和当前时间戳作为随机种子,生成不可预测的随机码;
2)验证码写链:用户在区块链客户端签署验证码写链交易,然后提交写链交易到区块链,用于令牌发放时的验证;
3)JWT令牌发放:由JWT令牌服务生成JWT令牌时,将验证码也写入到令牌,由令牌服务发起验证码校验区块链交易,由令牌认证智能合约进行验证码与用户的验证,验证通过,则将验证码与JWT令牌的关系写入区块链,然后由令牌服务将JWT令牌发放给用户,若验证失败,则不写链。
总体分为五个部分,1)搭建区块链网络,2)部署JWT令牌服务,3)JWT令牌申请,4)JWT令牌验证。
进一步的,
1)搭建区块链网络
使用Hyperledger Fabric框架搭建区块链网络,为智能合约提供运行时环境;然后部署令牌认证智能合约,实现验证码校验和写链功能。
进一步的,
2)部署JWT令牌服务
部署JWT令牌服务,实现JWT令牌的发放、以及验证码请求的接收和检查业务。
进一步的,
3)JWT令牌申请
首先,用户向JWT令牌服务发送获取验证码的请求,JWT令牌服务生成随机验证码并返回给用户;
接下来,用户使用区块链客户端签署验证码上链交易,并发送到区块链网络,区块链网络接收到交易请求后,将验证码写入区块链;
验证码写链成功后,用户使用验证码向JWT令牌服务发送令牌获取请求,JWT令牌服务接收到请求后,首先利用JWT的HS256加密类型生成JWT令牌,令牌签名使用统一秘钥,然后将令牌和验证码作为参数调用区块链的令牌认证智能合约发起验证码校验请求;
最后,JWT令牌服务根据验证码校验结果,判断是否将JWT令牌返回给用户。
再进一步的,
所述验证码校验,即智能合约将查询该验证码的写链交易,比较验证码写链交易的签名公钥与验证码校验交易的签名公钥是否一致:若不一致,则验证失败;若一致,则验证通过,并将该JWT令牌和验证码的关联关系进行写链操作。
进一步的,
4)JWT令牌验证
用户发送令牌验证请求到JWT令牌服务,JWT令牌服务使用签名令牌的统一秘钥进行验签操作,并返回验签结果。
本发明的有益效果是
1)可信任
基于区块链技术,每次令牌发放交易均由用户私钥签署上链交易,具有不可否认行。
2)可追溯
基于区块链技术,具有不可篡改特性,令牌发放交易历史不可删除和更改。
附图说明
图1是本发明的JWT令牌发放示意图。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例,基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明的一种基于区块链的JWT令牌认证方,其技术实现方案如下:
1)搭建区块链网络
使用Hyperledger Fabric框架搭建区块链网络,为智能合约提供运行时环境;然后部署令牌认证智能合约,实现验证码校验和写链功能。
2)部署JWT令牌服务
部署JWT令牌服务,实现JWT令牌的发放、以及验证码请求的接收和检查业务。
3)JWT令牌申请
首先,用户向JWT令牌服务发送获取验证码的请求,JWT令牌服务生成随机验证码并返回给用户;
接下来,用户使用区块链客户端签署验证码上链交易,并发送到区块链网络,区块链网络接收到交易请求后,将验证码写入区块链;
验证码写链成功后,用户使用验证码向JWT令牌服务发送令牌获取请求。
JWT令牌服务接收到请求后,首先利用JWT的HS256加密类型生成JWT令牌,令牌签名使用统一秘钥,然后将令牌和验证码作为参数调用区块链的令牌认证智能合约发起验证码校验请求;
智能合约将查询该验证码的写链交易,比较验证码写链交易的签名公钥与验证码校验交易的签名公钥是否一致:
若不一致,则验证失败;若一致,则验证通过,并将该JWT令牌和验证码的关联关系进行写链操作;
最后,JWT令牌服务根据验证码校验结果,判断是否将JWT令牌返回给用户。
4)JWT令牌验证
用户发送令牌验证请求到JWT令牌服务,JWT令牌服务使用签名令牌的统一秘钥进行验签操作,并返回验签结果。
以上所述仅为本发明的较佳实施例,仅用于说明本发明的技术方案,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内所做的任何修改、等同替换、改进等,均包含在本发明的保护范围内。
Claims (6)
1.一种基于区块链的JWT令牌认证方法,其特征在于,
实现过程分为三步:
1)验证码获取:JWT令牌服务接收验证码获取请求后,查询区块链的当前区块高度,将当前区块高度和当前时间戳作为随机种子,生成不可预测的随机码;
2)验证码写链:用户在区块链客户端签署验证码写链交易,然后提交写链交易到区块链,用于令牌发放时的验证;
3)JWT令牌发放:由JWT令牌服务生成JWT令牌时,将验证码也写入到令牌,由令牌服务发起验证码校验区块链交易,由令牌认证智能合约进行验证码与用户的验证,验证通过,则将验证码与JWT令牌的关系写入区块链,然后由令牌服务将JWT令牌发放给用户,若验证失败,则不写链;
具体的,
首先,用户向JWT令牌服务发送获取验证码的请求,JWT令牌服务生成随机验证码并返回给用户;
接下来,用户使用区块链客户端签署验证码上链交易,并发送到区块链网络,区块链网络接收到交易请求后,将验证码写入区块链;
验证码写链成功后,用户使用验证码向JWT令牌服务发送令牌获取请求;
最后,JWT令牌服务根据验证码校验结果,判断是否将JWT令牌返回给用户;
所述验证码校验,即智能合约将查询该验证码的写链交易,比较验证码写链交易的签名公钥与验证码校验交易的签名公钥是否一致:若不一致,则验证失败;若一致,则验证通过,并将该JWT令牌和验证码的关联关系进行写链操作。
2.根据权利要求1所述的方法,其特征在于,
总体分为五个部分,1)搭建区块链网络,2)部署JWT令牌服务,3)JWT令牌申请,4)JWT令牌验证。
3.根据权利要求2所述的方法,其特征在于,
1)搭建区块链网络
使用Hyperledger Fabric框架搭建区块链网络,为智能合约提供运行时环境;然后部署令牌认证智能合约,实现验证码校验和写链功能。
4.根据权利要求2所述的方法,其特征在于,
2)部署JWT令牌服务
部署JWT令牌服务,实现JWT令牌的发放、以及验证码请求的接收和检查业务。
5.根据权利要求1所述的方法,其特征在于,
JWT令牌服务接收到请求后,首先利用JWT的HS256加密类型生成JWT令牌,令牌签名使用统一秘钥,然后将令牌和验证码作为参数调用区块链的令牌认证智能合约发起验证码校验请求。
6.根据权利要求2所述的方法,其特征在于,
4)JWT令牌验证
用户发送令牌验证请求到JWT令牌服务,JWT令牌服务使用签名令牌的统一秘钥进行验签操作,并返回验签结果。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910564982.XA CN110190971B (zh) | 2019-06-27 | 2019-06-27 | 一种基于区块链的jwt令牌认证方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910564982.XA CN110190971B (zh) | 2019-06-27 | 2019-06-27 | 一种基于区块链的jwt令牌认证方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110190971A CN110190971A (zh) | 2019-08-30 |
CN110190971B true CN110190971B (zh) | 2022-03-15 |
Family
ID=67723666
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910564982.XA Active CN110190971B (zh) | 2019-06-27 | 2019-06-27 | 一种基于区块链的jwt令牌认证方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110190971B (zh) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625800A (zh) * | 2020-06-05 | 2020-09-04 | 光载互联(杭州)科技有限公司 | 一种基于活体检测的数字身份认证方法及系统 |
CN112632164B (zh) * | 2020-12-21 | 2022-09-13 | 杭州云象网络技术有限公司 | 一种实现可信权限访问的通用跨链编程接口方法 |
CN112277881B (zh) * | 2020-12-25 | 2021-04-06 | 上海银基信息安全技术股份有限公司 | 一种身份认证方法及装置、车辆、用户设备 |
CN113452677A (zh) * | 2021-05-28 | 2021-09-28 | 济南浪潮数据技术有限公司 | 一种请求处理方法、系统、设备以及介质 |
CN114266574A (zh) * | 2021-09-30 | 2022-04-01 | 西南电子技术研究所(中国电子科技集团公司第十研究所) | 一种基于区块链平台的各业务系统间权限校验方法 |
CN114944947B (zh) * | 2022-05-13 | 2023-07-28 | 平安科技(深圳)有限公司 | 客户端的权限认证方法、装置、设备及存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833081A (zh) * | 2018-06-22 | 2018-11-16 | 中国人民解放军国防科技大学 | 一种基于区块链的设备组网认证方法 |
WO2019013773A1 (en) * | 2017-07-10 | 2019-01-17 | Intuit Inc. | SECURED TOKEN THROUGH BLOCK CHAINS |
AU2019202395A1 (en) * | 2016-09-15 | 2019-05-02 | Accenture Global Solutions Limited | Method and system for secure communication of a token and aggregation of the same |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107306183B (zh) * | 2016-04-22 | 2021-12-21 | 索尼公司 | 客户端、服务端、方法和身份验证系统 |
US10255342B2 (en) * | 2017-04-12 | 2019-04-09 | Vijay K. Madisetti | Method and system for tuning blockchain scalability, decentralization, and security for fast and low-cost payment and transaction processing |
EP3596880B1 (en) * | 2017-04-18 | 2022-06-01 | Samsung Electronics Co., Ltd. | Method and apparatus for access control in distributed blockchain-based internet of things (iot) network |
US10642967B2 (en) * | 2017-11-28 | 2020-05-05 | American Express Travel Related Services Company, Inc. | Single sign-on solution using blockchain |
-
2019
- 2019-06-27 CN CN201910564982.XA patent/CN110190971B/zh active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2019202395A1 (en) * | 2016-09-15 | 2019-05-02 | Accenture Global Solutions Limited | Method and system for secure communication of a token and aggregation of the same |
WO2019013773A1 (en) * | 2017-07-10 | 2019-01-17 | Intuit Inc. | SECURED TOKEN THROUGH BLOCK CHAINS |
CN108833081A (zh) * | 2018-06-22 | 2018-11-16 | 中国人民解放军国防科技大学 | 一种基于区块链的设备组网认证方法 |
Non-Patent Citations (4)
Title |
---|
"Document Certification Through the Blockchain";martin stellnberger;《https://www.martinstellnberger.co/document-certification-through-the-blockchain》;20161205;全文 * |
"JWT令牌:轻量级基于令牌的身份验证";企鹅号-爱码农;《https://cloud.tencent.com/developer/news/406226》;20190608;全文 * |
"Personal cloud interoperability";Jose G. Faisca;《2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)》;20160728;全文 * |
NJaho ."基于token的鉴权机制 — JWT介绍".《https://www.cnblogs.com/Jaho/p/9275986.html》.2018, * |
Also Published As
Publication number | Publication date |
---|---|
CN110190971A (zh) | 2019-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110190971B (zh) | 一种基于区块链的jwt令牌认证方法 | |
CN111429254B (zh) | 一种业务数据处理方法、设备以及可读存储介质 | |
CN112039909B (zh) | 基于统一网关的认证鉴权方法、装置、设备及存储介质 | |
CN108012268B (zh) | 一种保证应用软件在手机终端上安全使用的sim卡 | |
CN113301022B (zh) | 基于区块链和雾计算的物联网设备身份安全认证方法 | |
US20190281028A1 (en) | System and method for decentralized authentication using a distributed transaction-based state machine | |
US8112787B2 (en) | System and method for securing a credential via user and server verification | |
Hammood et al. | A review of user authentication model for online banking system based on mobile IMEI number | |
US6073237A (en) | Tamper resistant method and apparatus | |
CN111027035B (zh) | 一种基于区块链的多重身份认证方法及系统 | |
CN105357186B (zh) | 一种基于带外验证和增强otp机制的二次认证方法 | |
CN1799018A (zh) | 基于接近令牌单元对应用服务的安全访问 | |
CN103269270A (zh) | 一种基于手机号码的实名认证安全登录的方法及系统 | |
JPH10336169A (ja) | 認証方法、認証装置、記憶媒体、認証サーバ及び認証端末装置 | |
CN101257489A (zh) | 一种保护账号安全的方法 | |
CN109039652B (zh) | 一种数字通证的生成及应用方法 | |
CN103747036A (zh) | 一种桌面虚拟化环境下的可信安全增强方法 | |
KR20190114434A (ko) | 블록체인 기반의 권한 인증 방법, 단말 및 이를 이용한 서버 | |
CN104063650B (zh) | 一种密钥存储设备及其使用方法 | |
KR20140098872A (ko) | 모바일 nfc단말기 웹 서비스를 위한 바이오인식과 tsm 기반의 보안 시스템 및 방법 | |
CN112765626A (zh) | 基于托管密钥授权签名方法、装置、系统及存储介质 | |
KR20190114433A (ko) | 블록체인 기반의 권한 인증 방법, 단말 및 이를 이용한 서버 | |
KR20190114432A (ko) | 블록체인 기반의 권한 인증 방법, 단말 및 이를 이용한 서버 | |
CN113595985A (zh) | 一种基于国密算法安全芯片的物联网安全云平台实现方法 | |
CN109525565A (zh) | 一种针对短信拦截攻击的防御方法及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |