CN104010367A - Tracking method and system for stolen mobile terminals - Google Patents

Tracking method and system for stolen mobile terminals Download PDF

Info

Publication number
CN104010367A
CN104010367A CN201410253087.3A CN201410253087A CN104010367A CN 104010367 A CN104010367 A CN 104010367A CN 201410253087 A CN201410253087 A CN 201410253087A CN 104010367 A CN104010367 A CN 104010367A
Authority
CN
China
Prior art keywords
mobile terminal
stolen mobile
stolen
user
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410253087.3A
Other languages
Chinese (zh)
Inventor
陆俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410253087.3A priority Critical patent/CN104010367A/en
Publication of CN104010367A publication Critical patent/CN104010367A/en
Pending legal-status Critical Current

Links

Abstract

The invention belongs to the field of security and discloses a tracking method and system for stolen mobile terminals. In the embodiment of the method and system, a communication operator data server is connected to obtain internet surfing information of all the mobile terminals, whether data connection is established for the stolen mobile terminals is detected after serial numbers of the stolen mobile terminals are obtained, when it is detected that data connection is established for the stolen mobile terminals, position information and data access point information of the stolen mobile terminals are obtained, the stolen mobile terminals can be positioned more precisely and conveniently, original holders are helped to find the stolen mobile terminals in time, and economic losses and privacy leak of users are avoided.

Description

A kind of method for tracing of stolen mobile terminal and system
Technical field
The invention belongs to security fields, relate in particular to a kind of method for tracing and system of stolen mobile terminal.
?
Background technology
Mobile terminal (comprising the equipment such as mobile phone, panel computer) is more and more held by people, and mobile terminal has facilitated people's productive life, and the person to person's that furthered distance, has facilitated communication.
But, the stolen event of mobile terminal also gets more and more in recent years, has recorded a lot of valuable information of user and privacy on mobile terminal, and the price of some mobile terminal is also very expensive, brought economic loss to user after mobile terminal is stolen time, also cause privacy to be divulged a secret.But stolen rear being substantially difficult to of present mobile terminal given for change, perplexing greatly mobile phone users.
?
Summary of the invention
The invention provides a kind of method for tracing of stolen mobile terminal, be intended to solve existing mobile terminal and cannot fetch after stolen, the problem that causes damage and individual privacy is leaked to personal property.
In order to solve the problems of the technologies described above, the present invention is achieved in that a kind of method that stolen mobile terminal is followed the trail of, and said method comprising the steps of:
Setting up inquiry with the data server of common carrier is connected;
Obtain the sequence number of stolen mobile terminal, and detect in real time described stolen mobile terminal and whether set up data connection;
To open architecture and/or the GPS positioning function of described stolen mobile terminal and obtain the position of described stolen mobile terminal, and obtain the data access dot information of described stolen mobile terminal;
No, whether cycle detection stolen mobile terminal sets up data connection.
Further, the step of obtaining the sequence number of stolen mobile terminal described in is specially:
Prompting user inputs the sequence number of described stolen mobile terminal;
Whether the sequence number form that detects user input is correctly or typing tracing system.
Further, described data access dot information comprises wireless network access point information and/or GSM card number.
Further, described in, obtain after the step of data access dot information of described stolen mobile terminal further comprising the steps of:
Described stolen mobile terminal is encrypted to mark, and is uploaded to tracing system after enciphered message is packed;
Described enciphered message is built in the various softwares corresponding with the software platform of described mobile terminal;
The software that sends instruction control built-in described enciphered message carries out sequence numbers match checking to each mobile terminal, detects described mobile terminal and be whether the stolen mobile terminal of tracing system described in typing;
That its mobile terminal of holding of user that described stolen mobile terminal is held in prompting is stolen mobile terminal, and obtains the user's who holds described stolen mobile terminal photo and the movement locus of described stolen mobile terminal;
No, do not carry out any prompting.
Further, the step of obtaining the user's who holds described stolen mobile terminal photo described in is specially:
Control described stolen mobile terminal the user who holds described stolen mobile terminal is carried out to facial characteristics seizure;
After synthesizing, the facial characteristics information of seizure chooses three photos that definition is the highest as user's the photo upload of holding described stolen mobile terminal to described tracing system.
The present invention also aims to provide a kind of stolen mobile terminal tracing system, described system comprises:
Data linkage unit, is connected for setting up inquiry with the data server of common carrier;
The first acquiring unit, for obtaining the sequence number of stolen mobile terminal;
Whether the first detecting unit, set up data connection for detecting in real time described stolen mobile terminal;
Position acquisition unit, for opening the architecture of described stolen mobile terminal and/or the position that GPS positioning function is obtained described stolen mobile terminal;
Second acquisition unit, for obtaining the data access dot information of described stolen mobile terminal; And
Whether loop control unit, set up data for cycle detection stolen mobile terminal and connect.
Further, the first acquiring unit comprises:
Prompting subelement, for pointing out user to input the sequence number of described stolen mobile terminal;
Detection sub-unit, for detection of the sequence number form of user input whether correctly or typing tracing system.
Further, described data access dot information comprises wireless network access point information and/or GSM card number.
Further, described system also comprises:
Indexing unit, is encrypted mark to described stolen mobile terminal;
The first uploading unit is uploaded to tracing system after enciphered message is packed;
Setting unit, for being built in described enciphered message the various softwares corresponding with the software platform of described mobile terminal;
Transmitting element, for sending instruction;
Authentication unit, for carrying out sequence numbers match checking according to the software of the built-in described enciphered message of instruction control of described transmitting element transmission to each mobile terminal;
Whether the second detecting unit is the stolen mobile terminal of tracing system described in typing for detection of described mobile terminal;
Tip element, its mobile terminal of holding of user of holding described stolen mobile terminal for pointing out is stolen mobile terminal;
The 3rd acquiring unit, for obtaining the user's who holds described stolen mobile terminal photo and the movement locus of described stolen mobile terminal.
Further, described the 3rd acquiring unit comprises:
Control subelement, for controlling described stolen mobile terminal, the user who holds described stolen mobile terminal is carried out to facial characteristics seizure;
Synthesis unit, for synthesizing the facial characteristics information of seizure;
The second uploading unit, for choose three photos that the synthetic definition of described synthesis unit is the highest as user's the photo upload of holding this stolen mobile terminal to this tracing system
In the present invention, by being connected with common carrier data server, obtain the internet information of each mobile terminal, obtain after the sequence number of stolen mobile terminal, detect stolen mobile terminal and whether set up data connection, set up when stolen mobile terminal being detected the positional information and the data access dot information that after data connect, obtain this stolen mobile terminal, be convenient to more accurately stolen mobile terminal be positioned, help in time former holder to give stolen mobile terminal for change, avoided user's economic loss and privacy compromise.
?
Brief description of the drawings
Fig. 1 is the first realization flow figure of the method for tracing of the stolen mobile terminal that provides of the embodiment of the present invention;
Fig. 2 is the second realization flow figure of the method for tracing of the stolen mobile terminal that provides of the embodiment of the present invention;
Fig. 3 is the 3rd realization flow figure of the method for tracing of the stolen mobile terminal that provides of the embodiment of the present invention;
Fig. 4 is the 4th realization flow figure of the method for tracing of the stolen mobile terminal that provides of the embodiment of the present invention;
Fig. 5 is the frame construction drawing of the tracing system of the stolen mobile terminal that provides of the embodiment of the present invention.
 
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
Below in conjunction with specific embodiment, specific implementation of the present invention is described in detail:
The embodiment of the present invention provides a kind of method for tracing of stolen mobile terminal, carries out location tracking and obtains thief's facial image information for the mobile terminal to stolen, is convenient to give for change in time stolen mobile terminal, reduces user's loss.
Fig. 1 shows the first realization flow of the stolen mobile terminal method for tracing that the embodiment of the present invention provides, and for convenience of explanation, only lists the part relevant to the embodiment of the present invention, and details are as follows:
As shown in Figure 1, the method that the stolen mobile terminal that the embodiment of the present invention provides is followed the trail of comprises the following steps:
Step S101, sets up data query with the data server of common carrier and is connected;
In embodiments of the present invention, be connected with common carrier data server, to obtain the internet information of each mobile terminal.
Step S102, obtains the sequence number of stolen mobile terminal;
In embodiments of the present invention, can also obtain other information of mobile terminal, include but not limited to the information such as brand, operating system of mobile terminal.
Step S103, detects in real time this stolen mobile terminal and whether sets up data connection;
To perform step S104; No, whether cycle detection stolen mobile terminal sets up data connection;
Step S104, opens the architecture of this stolen mobile terminal and/or the position that GPS positioning function is obtained this stolen mobile terminal;
In embodiments of the present invention, utilization be architecture and/or GPS location, can also use Big Dipper location and other locate modes to position stolen mobile terminal.
Step S105, obtains the data access dot information of this stolen mobile terminal;
As the preferred embodiment of the present invention, this data access dot information comprises wireless network access point information and/or GSM card number.
As shown in Figure 2, as one embodiment of the invention, step S102 is specially:
Step S1021, prompting user inputs the sequence number of this stolen mobile terminal;
Step S1022, whether the sequence number form that detects user input is correctly or typing tracing system.
As shown in Figure 3, further comprising the steps of after step S105:
Step S106, is encrypted mark to this stolen mobile terminal;
Step S107, is uploaded to tracing system after enciphered message is packed;
Step S108, is built in this enciphered message in the various softwares corresponding with the software platform of this mobile terminal;
Step S109, the software that sends built-in this enciphered message of instruction control carries out sequence numbers match checking to each mobile terminal;
Step S110, detects this mobile terminal and is whether the stolen mobile terminal of this tracing system of typing;
To perform step S111; No, perform step S113;
Step S111, its mobile terminal of holding of user that this stolen mobile terminal is held in prompting is stolen mobile terminal;
Step S112, obtains the user's who holds this stolen mobile terminal photo and the movement locus of this stolen mobile terminal;
Step S113, does not carry out any prompting (and closing measuring ability).
In embodiments of the present invention, step S106-step S113 further determines the movement locus of stolen mobile terminal and thief's mug shot, is convenient to searching thief more promptly and accurately.
As shown in Figure 4, as one embodiment of the invention, the step of step S112 is specially:
Step S1121, controls this stolen mobile terminal the user who holds this stolen mobile terminal is carried out to facial characteristics seizure;
Step S1122, synthesizes the facial characteristics information of seizure;
Step S1123, choose three photos that definition is the highest as user's the photo upload of holding this stolen mobile terminal to this tracing system.
In embodiments of the present invention, the photo that the camera of stolen mobile terminal is taken is not necessarily complete or clear, just need to control stolen mobile terminal holder is repeatedly taken to rear synthesizing, select three pictures to be clearly uploaded to stolen mobile terminal tracing system.
In embodiments of the present invention, by being connected with common carrier data server, obtain the internet information of each mobile terminal, obtain after the sequence number of stolen mobile terminal, detect stolen mobile terminal and whether set up data connection, set up when stolen mobile terminal being detected the positional information and the data access dot information that after data connect, obtain this stolen mobile terminal, be convenient to more accurately stolen mobile terminal be positioned, help in time former holder to give stolen mobile terminal for change, avoided user's economic loss and privacy compromise.
 
As shown in Figure 5, the embodiment of the present invention also provides a kind of stolen mobile terminal tracing system 1, and this system 1 comprises:
Data linkage unit 101, is connected for setting up data query with the data server 2 of common carrier;
The first acquiring unit 102, for obtaining the sequence number of stolen mobile terminal;
Whether the first detecting unit 103, set up data connection for detecting in real time this stolen mobile terminal;
Position acquisition unit 104, for opening the architecture of this stolen mobile terminal and/or the position that GPS positioning function is obtained this stolen mobile terminal;
Second acquisition unit 105, for obtaining the data access dot information of this stolen mobile terminal; And
Whether loop control unit 106, set up data for cycle detection stolen mobile terminal and connect.
In embodiments of the present invention, stolen mobile terminal tracing system 1 is the system claim corresponding with the method for tracing of stolen mobile terminal, its method of work with principle with above-mentioned consistent, here and following examples just repeat no more.
As one embodiment of the invention, the first acquiring unit 102 comprises:
Prompting subelement 1021, for pointing out user to input the sequence number of stolen mobile terminal;
Detection sub-unit 1022, for detection of the sequence number form of user input whether correctly or typing tracing system.
As one embodiment of the invention, this data access dot information comprises wireless network access point information and/or GSM card number.
As one embodiment of the invention, this system also comprises:
Indexing unit 107, is encrypted mark to stolen mobile terminal;
The first uploading unit 108 is uploaded to tracing system after enciphered message is packed;
Setting unit 109, for being built in this enciphered message the various softwares corresponding with the software platform of this mobile terminal;
Transmitting element 110, for sending instruction;
Authentication unit 111, carries out sequence numbers match checking for the software of built-in this enciphered message of instruction control that sends according to transmitting element 110 to each mobile terminal;
Whether the second detecting unit 112 is the stolen mobile terminal of typing tracing system for detection of this mobile terminal;
Tip element 113, its mobile terminal of holding of user of holding stolen mobile terminal for pointing out is stolen mobile terminal;
The 3rd acquiring unit 114, for obtaining the user's who holds stolen mobile terminal photo and the movement locus of this stolen mobile terminal.
As one embodiment of the invention, second acquisition unit 114 comprises:
Control subelement 1141, for controlling stolen mobile terminal, the user who holds this stolen mobile terminal is carried out to facial characteristics seizure;
Synthesis unit 1142, for synthesizing the facial characteristics information of seizure;
After choose three photos that definition is the highest;
The second uploading unit 1143, for choose three photos that the synthetic definition of synthesis unit 1142 is the highest as user's the photo upload of holding this stolen mobile terminal to this tracing system.
In embodiments of the present invention, by being connected with common carrier data server, obtain the internet information of each mobile terminal, obtain after the sequence number of stolen mobile terminal, detect stolen mobile terminal and whether set up data connection, set up when stolen mobile terminal being detected the positional information and the data access dot information that after data connect, obtain this stolen mobile terminal, be convenient to more accurately stolen mobile terminal be positioned, help in time former holder to give stolen mobile terminal for change, avoided user's economic loss and privacy compromise.
It will be appreciated by those skilled in the art that the unit that comprises for above-described embodiment is just divided according to function logic, but be not limited to above-mentioned division, as long as can realize corresponding function; In addition, the concrete title of each functional unit also, just for the ease of mutual differentiation, is not limited to protection scope of the present invention.
Those of ordinary skill in the art it is also understood that, the all or part of step realizing in above-described embodiment method is can carry out the hardware that instruction is relevant by program to complete, described program can be being stored in a computer read/write memory medium, described storage medium, comprises ROM/RAM, disk, CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments of doing within the spirit and principles in the present invention, be equal to and replace and improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. a method for tracing for stolen mobile terminal, is characterized in that, said method comprising the steps of:
Setting up data query with the data server of common carrier is connected;
Obtain the sequence number of stolen mobile terminal, and detect in real time described stolen mobile terminal and whether set up data connection;
To open architecture and/or the GPS positioning function of described stolen mobile terminal and obtain the position of described stolen mobile terminal, and obtain the data access dot information of described stolen mobile terminal;
No, whether cycle detection stolen mobile terminal sets up data connection.
2. the method for claim 1, is characterized in that, described in obtain the sequence number of stolen mobile terminal step be specially:
Prompting user inputs the sequence number of described stolen mobile terminal;
Whether the sequence number form that detects user input is correctly or typing tracing system.
3. the method for claim 1, is characterized in that, described data access dot information comprises wireless network access point information and/or GSM card number.
4. the method for claim 1, is characterized in that, described in obtain after the step of data access dot information of described stolen mobile terminal further comprising the steps of:
Described stolen mobile terminal is encrypted to mark, and is uploaded to tracing system after enciphered message is packed;
Described enciphered message is built in the various softwares corresponding with the software platform of described mobile terminal;
The software that sends instruction control built-in described enciphered message carries out sequence numbers match checking to each mobile terminal, detects described mobile terminal and be whether the stolen mobile terminal of tracing system described in typing;
That its mobile terminal of holding of user that described stolen mobile terminal is held in prompting is stolen mobile terminal, and obtains the user's who holds described stolen mobile terminal photo and the movement locus of described stolen mobile terminal;
No, do not carry out any prompting.
5. method as claimed in claim 4, is characterized in that, described in obtain the user's who holds described stolen mobile terminal photo step be specially:
Control described stolen mobile terminal the user who holds described stolen mobile terminal is carried out to facial characteristics seizure;
After synthesizing, the facial characteristics information of seizure chooses three photos that definition is the highest as user's the photo upload of holding described stolen mobile terminal to described tracing system.
6. a stolen mobile terminal tracing system, is characterized in that, described system comprises:
Data linkage unit, is connected for setting up data query with the data server of common carrier;
The first acquiring unit, for obtaining the sequence number of stolen mobile terminal;
Whether the first detecting unit, set up data connection for detecting in real time described stolen mobile terminal;
Position acquisition unit, for opening the architecture of described stolen mobile terminal and/or the position that GPS positioning function is obtained described stolen mobile terminal;
Second acquisition unit, for obtaining the data access dot information of described stolen mobile terminal; And
Whether loop control unit, set up data for cycle detection stolen mobile terminal and connect.
7. system as claimed in claim 6, is characterized in that, the first acquiring unit comprises:
Prompting subelement, for pointing out user to input the sequence number of described stolen mobile terminal;
Detection sub-unit, for detection of the sequence number form of user input whether correctly or typing tracing system.
8. system as claimed in claim 6, is characterized in that, described data access dot information comprises wireless network access point information and/or GSM card number.
9. system as claimed in claim 6, is characterized in that, described system also comprises:
Indexing unit, is encrypted mark to described stolen mobile terminal;
The first uploading unit is uploaded to tracing system after enciphered message is packed;
Setting unit, for being built in described enciphered message the various softwares corresponding with the software platform of described mobile terminal;
Transmitting element, for sending instruction;
Authentication unit, for carrying out sequence numbers match checking according to the software of the built-in described enciphered message of instruction control of described transmitting element transmission to each mobile terminal;
Whether the second detecting unit is the stolen mobile terminal of tracing system described in typing for detection of described mobile terminal;
Tip element, its mobile terminal of holding of user of holding described stolen mobile terminal for pointing out is stolen mobile terminal;
The 3rd acquiring unit, for obtaining the user's who holds described stolen mobile terminal photo and the movement locus of described stolen mobile terminal.
10. system as claimed in claim 9, is characterized in that, described the 3rd acquiring unit comprises:
Control subelement, for controlling described stolen mobile terminal, the user who holds described stolen mobile terminal is carried out to facial characteristics seizure;
Synthesis unit, for synthesizing the facial characteristics information of seizure;
The second uploading unit, for choose three photos that the synthetic definition of described synthesis unit is the highest as user's the photo upload of holding this stolen mobile terminal to this tracing system.
CN201410253087.3A 2014-06-10 2014-06-10 Tracking method and system for stolen mobile terminals Pending CN104010367A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410253087.3A CN104010367A (en) 2014-06-10 2014-06-10 Tracking method and system for stolen mobile terminals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410253087.3A CN104010367A (en) 2014-06-10 2014-06-10 Tracking method and system for stolen mobile terminals

Publications (1)

Publication Number Publication Date
CN104010367A true CN104010367A (en) 2014-08-27

Family

ID=51370821

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410253087.3A Pending CN104010367A (en) 2014-06-10 2014-06-10 Tracking method and system for stolen mobile terminals

Country Status (1)

Country Link
CN (1) CN104010367A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109326103A (en) * 2018-10-08 2019-02-12 宁波大学 A kind of mobile intelligent terminal generation emergency signal method
CN110572886A (en) * 2019-09-12 2019-12-13 河北中晟易通科技有限公司 Novel intelligent terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040063423A1 (en) * 2002-09-26 2004-04-01 Kagay Howard Edward Method and apparatus for operating a lost mobile communication device
CN101414263A (en) * 2007-10-17 2009-04-22 鸿富锦精密工业(深圳)有限公司 Storage medium, software installation method and anti-pirate module
CN101777106A (en) * 2010-01-22 2010-07-14 中兴通讯股份有限公司 Method and device for preventing mobile terminal software from being stolen
CN102665167A (en) * 2012-04-16 2012-09-12 郑祺丰 Service system for getting back lost mobile phone
CN102693381A (en) * 2012-05-08 2012-09-26 张�林 Method, device and system for anti-theft of portable computer equipment
CN102932811A (en) * 2012-09-27 2013-02-13 东莞宇龙通信科技有限公司 Method and system for detecting lost terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040063423A1 (en) * 2002-09-26 2004-04-01 Kagay Howard Edward Method and apparatus for operating a lost mobile communication device
CN101414263A (en) * 2007-10-17 2009-04-22 鸿富锦精密工业(深圳)有限公司 Storage medium, software installation method and anti-pirate module
CN101777106A (en) * 2010-01-22 2010-07-14 中兴通讯股份有限公司 Method and device for preventing mobile terminal software from being stolen
CN102665167A (en) * 2012-04-16 2012-09-12 郑祺丰 Service system for getting back lost mobile phone
CN102693381A (en) * 2012-05-08 2012-09-26 张�林 Method, device and system for anti-theft of portable computer equipment
CN102932811A (en) * 2012-09-27 2013-02-13 东莞宇龙通信科技有限公司 Method and system for detecting lost terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109326103A (en) * 2018-10-08 2019-02-12 宁波大学 A kind of mobile intelligent terminal generation emergency signal method
CN110572886A (en) * 2019-09-12 2019-12-13 河北中晟易通科技有限公司 Novel intelligent terminal

Similar Documents

Publication Publication Date Title
CN104038263B (en) Method and device for establishing Bluetooth connection
CN104993981B (en) Control the method and device of equipment access
CN104239805B (en) A kind of anti-theft method of mobile phone and device
CN105100222A (en) Method and device for providing object retrieving information
KR20170029178A (en) Mobile terminal and method for operating thereof
CN103944870B (en) Communicator and its control method
CN106211033A (en) Data sharing method, device and electronic equipment
CN104298902B (en) A kind of display methods of application program, device and equipment
JP6509331B2 (en) Information transmission method, apparatus and system
KR20170029900A (en) Mobile terminal and method for controlling the same
KR20180095196A (en) Mobile terminal and method for controlling the same
CN108022349A (en) Information input method, equipment, smart lock and storage medium
CN104159194A (en) Terminal password activation method, terminal password activation device and terminal password activation equipment
CN106570365A (en) Application management device, mobile terminal and method
CN104010367A (en) Tracking method and system for stolen mobile terminals
KR101728358B1 (en) Mobile terminal and control method thereof
CN105577521B (en) Good friend's group technology, apparatus and system
KR20160072641A (en) Mobile terminal and method of controlling the same
KR20160005416A (en) Mobile terminal
CN107395760A (en) The method and device of loading configuration file
CN106211281A (en) WLAN starting guide method and device
KR101728758B1 (en) Mobile terminal and method for controlling the same
CN110072226A (en) A kind of card writing method and device
KR101639123B1 (en) Mobile terminal and method for controlling the same
KR20160004164A (en) Mobile terminal and method for controlling the same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140827

RJ01 Rejection of invention patent application after publication