CN107634958A - Computer security login method and computer security entering device - Google Patents

Computer security login method and computer security entering device Download PDF

Info

Publication number
CN107634958A
CN107634958A CN201710918099.7A CN201710918099A CN107634958A CN 107634958 A CN107634958 A CN 107634958A CN 201710918099 A CN201710918099 A CN 201710918099A CN 107634958 A CN107634958 A CN 107634958A
Authority
CN
China
Prior art keywords
login
login account
logging request
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710918099.7A
Other languages
Chinese (zh)
Inventor
翟慧
石慧
李娜
韩敏
赵大鹏
张璞
丁玉涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Polytechnic Institute
Original Assignee
Henan Polytechnic Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Polytechnic Institute filed Critical Henan Polytechnic Institute
Priority to CN201710918099.7A priority Critical patent/CN107634958A/en
Publication of CN107634958A publication Critical patent/CN107634958A/en
Pending legal-status Critical Current

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention provides a kind of computer security login method and computer security entering device, wherein computer security login method includes:Receive the login account that user inputs in login interface;When detecting that the login account input is completed, logging request is generated;When receiving the logging request, the station location marker information of the registration terminal when login account logs in is obtained;Regional matching is carried out to the station location marker information of the registration terminal according to safety management information, generates regional matching result, the safety management information includes the regional extent that the login account allows to log in;Confirm whether presently described logging request is abnormal login request according to the regional matching result, to issue the user with strange land login prompt.By technical scheme, the safety verification of the configuration of computer application program and user's different-place login server is realized, the sign-in experience of user is improved, enhances the security that computer logs in.

Description

Computer security login method and computer security entering device
Technical field
The present invention relates to field of computer technology, in particular to a kind of computer security login method and a kind of meter Calculation machine lands safely device.
Background technology
With the development in epoch, computer technology is maked rapid progress, and electronic office becomes increasingly popular so that global IT application As the main trend of human development.Brought at one's leisure enjoying informationization, the security of information is also on the hazard.In order to prevent Sensitive information, information carrier, the information processes such as classified information, important business datum etc. leak, relating computer or Preserve important information, the computer of data will take necessary safety prevention measure.With regard to current market apparently, it is almost all of Security protection class product is all in the data of installation, operation and need for confidentiality, and the data of need for confidentiality are encrypted in itself, made It must run that the step of checking private data is cumbersome, reduce the convenience used.
The content of the invention
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of new computer security login scheme, So that preventing the use of non-computer user on computer user logs in, fundamentally computer security and secrecy is being improved While, reduce the step of browsing private data, improve the convenience used.
In view of this, the present invention proposes a kind of new computer security login method, including:Receive user and log in boundary The login account of face input;When detecting that the login account input is completed, selection and the fortune of the login account maps mutually Row system, generate logging request;When receiving the logging request, the registration terminal when login account logs in is obtained Station location marker information;Regional matching, generation are carried out to the station location marker information of the registration terminal according to safety management information Regional matching result, the safety management information include the regional extent that the login account allows to log in;According to the area Matching result confirms whether presently described logging request is abnormal login request, to issue the user with strange land login prompt.
In the technical scheme, the login account that is inputted by detecting the user that receives in login interface is selected and stepped on Record the runtime of account maps mutually so that different users is merely able to open the runtime corresponding with user itself, prevents Stop the leakage for the confidential information that different user is occurred using same computer, illustrate only the user for starting computer at that time The runtime matched, the secrecy that user profile is realized in operation is opened from system, it is therefore prevented that the information of other users is let out Dew;After generating logging request, the station location marker information of the registration terminal used during login account is obtained, by current station location marker Information carries out regional matching with safety management information, generates regional matching result, and judge according to current regional matching result Whether current login account is abnormal login so that computer user can recognize that the login of computer is abnormal in time, side Just manage.
In the above-mentioned technical solutions, it is preferable that the reception user the login account that login interface inputs the step of it It is preceding also to include:Prestore the login account;According to login account acquisition and the login account maps mutually Runtime and the associated logging request;Obtained according to the logging request described in allowing the login account to log in Regional extent.
In the technical scheme, the mapping relations of login account and runtime have been prestored so that user is inputting After login account, corresponding runtime can be opened rapidly;Safety management letter according to set by the logging request of generation Breath so that the entry address of user receives territory restriction, enhances the security of computer login.
In the above-mentioned technical solutions, it is preferable that described obtained according to the logging request allows the login account to log in The regional extent the step of include:The login account associated with the logging request is obtained according to the logging request; The regional extent for allowing the login account to log in is set according to the login account, generates secure log information.
In the above-mentioned technical solutions, it is preferable that described that presently described logging request is confirmed according to the regional matching result Whether it is abnormal login request, is included with issuing the user with the step of the login prompt of strange land:Confirming the position of the registration terminal Confidence is ceased in the range of the safety management information, is shown as normal logging request, it is allowed to the login account login service Device, exceed the scope of the safety management information in the positional information for confirming the registration terminal, be shown as abnormal login request, The positional information of presently described registration terminal is recorded, and sends different-place login prompting.
In the technical scheme, whether the safety management information that user is determined according to regional matching result is that normal log in please Ask;If normal logging request, it is allowed to computer user's login service device, asked if abnormal login, record current use The location mark information of the terminal used during the login account at family, and prompt message is sent to the computer user, indicate and work as Preceding registration is different-place login so that user can recognize that the login of computer is abnormal in time, convenient management.
According to the second aspect of the invention, it is proposed that a kind of computer security entering device, including:First acquisition unit, The login account inputted for receiving user in login interface;Generation unit is asked, detects that the login account is defeated for working as When entering to complete, selection and the runtime of the login account maps mutually, logging request is generated;Second acquisition unit, for working as When receiving the logging request, the station location marker information of the registration terminal when login account logs in is obtained;Matching life Into unit, regional matching is carried out to the station location marker information of the registration terminal according to safety management information, generates area matching As a result, the safety management information includes the regional extent that the login account allows to log in;Confirmation unit, for according to Regional matching result confirms whether presently described logging request is abnormal login request, to issue the user with strange land login prompt.
In the technical scheme, login account that request generation unit is inputted by detecting the user that receives in login interface Number, runtime of the selection with login account to mapping so that it is corresponding with user itself that different users is merely able to opening Runtime, it is therefore prevented that the leakage for the confidential information that different user is occurred using same computer, illustrate only and started at that time The runtime that the user of computer is matched, the secrecy that user profile is realized in operation is opened from system, it is therefore prevented that other The information leakage of user;After generating logging request, second acquisition unit obtains the position of the registration terminal used during login account Current station location marker information and safety management information are carried out regional matching, generation area by identification information, matching victory unit With result, confirmation unit judges whether current login account is abnormal login according to current regional matching result so that meter Calculation machine user can recognize that the login of computer is abnormal in time, convenient management.
In the above-mentioned technical solutions, it is preferable that the computer security entering device also includes:Memory cell, for pre- First store the login account;First setting unit, for being set and the login account maps mutually according to the login account The runtime and the associated logging request;Second setting unit, permit for being set according to the logging request Perhaps the regional extent that described login account logs in.
In the technical scheme, memory cell has prestored login account, and the first setting unit is provided with login account With the mapping relations of runtime so that user can open corresponding runtime rapidly after login account is inputted;The Safety management information of two setting units according to set by the logging request of generation so that the entry address of user receives region Limitation, enhance the security of computer login.
In the above-mentioned technical solutions, it is preferable that second setting unit includes:3rd acquiring unit, for according to institute State logging request and obtain the login account associated with the logging request;Information generating unit, for according to the login account Number the regional extent for allowing the login account to log in is set, generates secure log information.
In the above-mentioned technical solutions, it is preferable that the confirmation unit is specifically used for confirming the position of the registration terminal Information is shown as normal logging request in the range of the safety management information, it is allowed to the login account login service device, Exceed the scope of the safety management information in the positional information for confirming the registration terminal, be shown as abnormal login request, note The positional information of presently described registration terminal is recorded, and sends different-place login prompting.
In the technical scheme, confirmation unit determines whether the safety management information of user is just according to regional matching result Normal logging request;If normal logging request, it is allowed to computer user's login service device, asked if abnormal login, note The location mark information of the terminal used during the login account for recording active user, and send prompting letter to the computer user Breath, it is different-place login to indicate current registration so that user can recognize that the login of computer is abnormal in time, convenient pipe Reason.
Pass through above technical scheme so that the use of non-computer user is prevented on computer user logs in, from opening Machine logs on while improve computer security and secrecy, reduces the step of browsing private data, improves the side used Just property.
Brief description of the drawings
Fig. 1 shows the schematic flow sheet of computer security login method according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of computer security entering device according to an embodiment of the invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Mode is applied the present invention is further described in detail.It should be noted that in the case where not conflicting, the implementation of this request Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also To be different from other modes described here using other to implement, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
Fig. 1 shows the schematic flow sheet of computer security login method according to an embodiment of the invention.
As shown in figure 1, computer security login method according to an embodiment of the invention, including:
Step 101, the login account that user inputs in login interface is received.
Step 102, when detecting that the login account input is completed, selection and the operation of the login account maps mutually System, generate logging request.
Step 103, when receiving the logging request, the position of the registration terminal when login account logs in is obtained Put identification information.
Step 104, regional matching, generation are carried out to the station location marker information of the registration terminal according to safety management information Regional matching result, the safety management information include the regional extent that the login account allows to log in.
Step 105, confirm whether presently described logging request is abnormal login request according to the regional matching result, with Issue the user with strange land login prompt.
In the technical scheme, the login account that is inputted by detecting the user that receives in login interface is selected and stepped on Record runtime of the account to mapping so that different users is merely able to open the runtime corresponding with user itself, prevents Stop the leakage for the confidential information that different user is occurred using same computer, illustrate only the user for starting computer at that time The runtime matched, the secrecy that user profile is realized in operation is opened from system, it is therefore prevented that the information of other users is let out Dew;After generating logging request, the station location marker information of the registration terminal used during login account is obtained, by current station location marker Information carries out regional matching with safety management information, generates regional matching result, and judge according to current regional matching result Whether current login account is abnormal login so that computer user can recognize that the login of computer is abnormal in time, side Just manage.
In the above-mentioned technical solutions, it is preferable that the reception user the login account that login interface inputs the step of it It is preceding also to include:Prestore the login account;According to login account acquisition and the login account maps mutually Runtime and the associated logging request;Obtained according to the logging request described in allowing the login account to log in Regional extent.
In the technical scheme, the mapping relations of login account and runtime have been prestored so that user is inputting After login account, corresponding runtime can be opened rapidly;Safety management letter according to set by the logging request of generation Breath so that the entry address of user receives territory restriction, enhances the security of computer login.
In the above-mentioned technical solutions, it is preferable that described obtained according to the logging request allows the login account to log in The regional extent the step of include:The login account associated with the logging request is obtained according to the logging request; The regional extent for allowing the login account to log in is set according to the login account, generates secure log information.
In the above-mentioned technical solutions, it is preferable that described that presently described logging request is confirmed according to the regional matching result Whether it is abnormal login request, is included with issuing the user with the step of the login prompt of strange land:Confirming the position of the registration terminal Confidence is ceased in the range of the safety management information, is shown as normal logging request, it is allowed to the login account login service Device, exceed the scope of the safety management information in the positional information for confirming the registration terminal, be shown as abnormal login request, The positional information of presently described registration terminal is recorded, and sends different-place login prompting.
In the technical scheme, whether the safety management information that user is determined according to regional matching result is that normal log in please Ask;If normal logging request, it is allowed to computer user's login service device, asked if abnormal login, record current use The location mark information of the terminal used during the login account at family, and prompt message is sent to the computer user, indicate and work as Preceding registration is different-place login so that user can recognize that the login of computer is abnormal in time, convenient management.
Fig. 2 shows the schematic block diagram of computer security entering device according to an embodiment of the invention.
As shown in Fig. 2 computer security entering device 201 according to an embodiment of the invention, including:First acquisition unit 202, the login account inputted for receiving user in login interface;Generation unit 203 is asked, the login is detected for working as When account input is completed, selection and the runtime of the login account maps mutually, logging request is generated;Second acquisition unit 204, for when receiving the logging request, obtaining the station location marker letter of the registration terminal when login account logs in Breath;Generation unit 205 is matched, regional matching is carried out to the station location marker information of the registration terminal according to safety management information, Regional matching result is generated, the safety management information includes the regional extent that the login account allows to log in;Confirmation unit 206, for confirming whether presently described logging request is abnormal login request according to the regional matching result, to be sent out to user Go out strange land login prompt.
In the technical scheme, request generation unit 203 is stepped on by detecting the user received what login interface inputted Record account, runtime of the selection with login account to mapping so that it is relative in itself with user that different users is merely able to opening The runtime answered, it is therefore prevented that the leakage for the confidential information that different user is occurred using same computer, illustrate only at that time Start the runtime that the user of computer is matched, the secrecy that user profile is realized in operation opened from system, it is therefore prevented that The information leakage of other users;After generating logging request, second acquisition unit 204 obtains the registration terminal used during login account Station location marker information, current station location marker information and safety management information carries out regional matching, generation by matching victory unit Regional matching result, confirmation unit 206 judge whether current login account is abnormal step on according to current regional matching result Record so that computer user can recognize that the login of computer is abnormal in time, convenient management.
In the above-mentioned technical solutions, it is preferable that the computer security entering device also includes:Memory cell 207, is used for Prestore the login account;First setting unit 208, for being set and the login account phase according to the login account The runtime of mapping and the associated logging request;Second setting unit 209, for according to the logging request The regional extent for allowing the login account to log in is set.
In the technical scheme, memory cell 207 has prestored login account, and the first setting unit 208 is provided with and stepped on Record the mapping relations of account and runtime so that user can open corresponding operation rapidly after login account is inputted System;Safety management information of second setting unit 209 according to set by the logging request of generation so that the entry address of user Territory restriction is received, enhances the security of computer login.
In the above-mentioned technical solutions, it is preferable that second setting unit 209 includes:3rd acquiring unit 2091, is used for The login account associated with the logging request is obtained according to the logging request;Information generating unit 2092, for basis The login account sets the regional extent for allowing the login account to log in, and generates secure log information.
In the above-mentioned technical solutions, it is preferable that the confirmation unit 206 is specifically used for confirming the position of the registration terminal Confidence is ceased in the range of the safety management information, is shown as normal logging request, it is allowed to the login account login service Device, exceed the scope of the safety management information in the positional information for confirming the registration terminal, be shown as abnormal login request, The positional information of presently described registration terminal is recorded, and sends different-place login prompting.
In the technical scheme, confirmation unit 206 according to regional matching result determine user safety management information whether For normal logging request;If normal logging request, it is allowed to computer user's login service device, please if abnormal login Ask, the location mark information of the terminal used during the login account for recording active user, and send and carry to the computer user Show information, it is different-place login to indicate current registration so that user can recognize that the login of computer is abnormal in time, side Just manage.
Technical scheme is described in detail above in association with accompanying drawing, and technical scheme proposes a kind of new Computer security login method and device, realize the peace of the configuration of computer application program and user's different-place login server Full checking, the sign-in experience of user is improved, the security of computer login is enhanced, improves the convenience used.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the scope of the protection.

Claims (8)

  1. A kind of 1. computer security login method, it is characterised in that including:
    Receive the login account that user inputs in login interface;
    When detecting that the login account input is completed, selection and the runtime of the login account maps mutually, generation are stepped on Record request;
    When receiving the logging request, the station location marker information of the registration terminal when login account logs in is obtained;
    Regional matching is carried out to the station location marker information of the registration terminal according to safety management information, generates area matching knot Fruit, the safety management information include the regional extent that the login account allows to log in;
    Confirm whether presently described logging request is abnormal login request according to the regional matching result, it is different to issue the user with Ground login prompt.
  2. 2. computer security login method according to claim 1, it is characterised in that the reception user is in login interface Also include before the step of login account of input:
    Prestore the login account;
    The runtime and the associated login with the login account maps mutually are obtained according to the login account Request;
    The regional extent for allowing the login account to log in is obtained according to the logging request.
  3. 3. computer security login method according to claim 2, it is characterised in that described to be obtained according to the logging request The step of taking the regional extent for allowing the login account to log in includes:
    The login account associated with the logging request is obtained according to the logging request;
    The regional extent for allowing the login account to log in is set according to the login account, generates secure log information.
  4. 4. computer security login method according to claim 1, it is characterised in that described according to the area matching knot Fruit confirms whether presently described logging request is abnormal login request, is included with issuing the user with the step of the login prompt of strange land:
    In the positional information for confirming the registration terminal in the range of the safety management information, being shown as normal log in please Ask, it is allowed to the login account login service device, believe in the positional information for confirming the registration terminal beyond the safety management The scope of breath, abnormal login request is shown as, records the positional information of presently described registration terminal, and send different-place login and carry Show.
  5. A kind of 5. computer security entering device, it is characterised in that including:
    First acquisition unit, the login account inputted for receiving user in login interface;
    Generation unit is asked, for when detecting that the login account input is completed, selecting and the login account maps mutually Runtime, generate logging request;
    Second acquisition unit, for when receiving the logging request, obtaining the login end when login account logs in The station location marker information at end;
    Generation unit is matched, regional matching is carried out to the station location marker information of the registration terminal according to safety management information, it is raw Into regional matching result, the safety management information includes the regional extent that the login account allows to log in;
    Confirmation unit, for confirming whether presently described logging request is abnormal login request according to the regional matching result, To issue the user with strange land login prompt.
  6. 6. computer security entering device according to claim 5, it is characterised in that also include:
    Memory cell, for prestoring the login account;
    First setting unit, for according to the login account set with the runtime of the login account maps mutually and The associated logging request;
    Second setting unit, for setting the regional extent for allowing the login account to log according to the logging request.
  7. 7. computer security entering device according to claim 6, it is characterised in that second setting unit includes:
    3rd acquiring unit, for obtaining the login account associated with the logging request according to the logging request;
    Information generating unit, for setting the regional extent for allowing the login account to log according to the login account, Generate secure log information.
  8. 8. computer security entering device according to claim 5, it is characterised in that the confirmation unit is specifically used for Confirm that the positional information of the registration terminal in the range of the safety management information, is shown as normal logging request, it is allowed to The login account login service device, exceed the model of the safety management information in the positional information for confirming the registration terminal Enclose, be shown as abnormal login request, record the positional information of presently described registration terminal, and send different-place login prompting.
CN201710918099.7A 2017-09-30 2017-09-30 Computer security login method and computer security entering device Pending CN107634958A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710918099.7A CN107634958A (en) 2017-09-30 2017-09-30 Computer security login method and computer security entering device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710918099.7A CN107634958A (en) 2017-09-30 2017-09-30 Computer security login method and computer security entering device

Publications (1)

Publication Number Publication Date
CN107634958A true CN107634958A (en) 2018-01-26

Family

ID=61103224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710918099.7A Pending CN107634958A (en) 2017-09-30 2017-09-30 Computer security login method and computer security entering device

Country Status (1)

Country Link
CN (1) CN107634958A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981611A (en) * 2019-03-08 2019-07-05 北京顺丰同城科技有限公司 A kind of safety defense method and device of multi-platform account
CN110874460A (en) * 2019-11-14 2020-03-10 江苏税软软件科技有限公司 App security verification method
CN113726774A (en) * 2020-10-13 2021-11-30 杭州涂鸦信息技术有限公司 Client login authentication method, system and computer equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217368A (en) * 2007-12-29 2008-07-09 亿阳安全技术有限公司 A network logging on system and the corresponding configuration method and methods for logging on the application system
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN103945330A (en) * 2014-05-12 2014-07-23 重庆邮电大学 Virtual private cloud platform and virtual private cloud secure access method and system
CN104301437A (en) * 2014-11-05 2015-01-21 成都逸动无限网络科技有限公司 Private cloud platform based on multipoint transmission
CN104426835A (en) * 2013-08-20 2015-03-18 深圳市腾讯计算机系统有限公司 Login detection method, login server, and login detection device and system thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217368A (en) * 2007-12-29 2008-07-09 亿阳安全技术有限公司 A network logging on system and the corresponding configuration method and methods for logging on the application system
CN104426835A (en) * 2013-08-20 2015-03-18 深圳市腾讯计算机系统有限公司 Login detection method, login server, and login detection device and system thereof
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN103945330A (en) * 2014-05-12 2014-07-23 重庆邮电大学 Virtual private cloud platform and virtual private cloud secure access method and system
CN104301437A (en) * 2014-11-05 2015-01-21 成都逸动无限网络科技有限公司 Private cloud platform based on multipoint transmission

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981611A (en) * 2019-03-08 2019-07-05 北京顺丰同城科技有限公司 A kind of safety defense method and device of multi-platform account
CN110874460A (en) * 2019-11-14 2020-03-10 江苏税软软件科技有限公司 App security verification method
CN113726774A (en) * 2020-10-13 2021-11-30 杭州涂鸦信息技术有限公司 Client login authentication method, system and computer equipment

Similar Documents

Publication Publication Date Title
CN103975615B (en) It is logged in the log-on message automatically generated via near-field communication
JP4755866B2 (en) Authentication system, authentication server, authentication method, and authentication program
CN106304074B (en) Auth method and system towards mobile subscriber
CN109101795A (en) A kind of account number safe login method, apparatus and system
CN105959287A (en) Biological feature based safety certification method and device
CN109347625B (en) Password operation method, work key creation method, password service platform and equipment
CN103581378A (en) Smart phone high in safety performance
CN104717224B (en) A kind of login method and device
CN103576787A (en) Panel computer with high safety performance
CN107634958A (en) Computer security login method and computer security entering device
US20140259116A1 (en) Secure user authentication with improved one-time-passcode verification
KR20120099782A (en) User authentication method, user authentication system, and portable communications terminal
CN106572082A (en) Approval signature verifying method, mobile device, terminal device and system
CN106911725A (en) A kind of multiple-factor authentication method and device
CN104104650B (en) data file access method and terminal device
CN103582184A (en) Double-card smart phone high in safety performance
KR20120058199A (en) User authentication method using location information
CN101854357B (en) Method and system for monitoring network authentication
JP3966070B2 (en) Device control system and portable terminal
JP2004005149A (en) Portable information terminal device and maintenance management system
CN110995661A (en) Network card platform
CN108322907B (en) Card opening method and terminal
CN109460647A (en) A kind of method that more equipment safeties log in
KR101742105B1 (en) Phone number security certification apparatus using qr code and system thereof and metrhod thereof
JP2004206258A (en) Multiple authentication system, computer program, and multiple authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180126

RJ01 Rejection of invention patent application after publication