CN107634958A - Computer security login method and computer security entering device - Google Patents
Computer security login method and computer security entering device Download PDFInfo
- Publication number
- CN107634958A CN107634958A CN201710918099.7A CN201710918099A CN107634958A CN 107634958 A CN107634958 A CN 107634958A CN 201710918099 A CN201710918099 A CN 201710918099A CN 107634958 A CN107634958 A CN 107634958A
- Authority
- CN
- China
- Prior art keywords
- login
- login account
- logging request
- user
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Alarm Systems (AREA)
Abstract
The invention provides a kind of computer security login method and computer security entering device, wherein computer security login method includes:Receive the login account that user inputs in login interface;When detecting that the login account input is completed, logging request is generated;When receiving the logging request, the station location marker information of the registration terminal when login account logs in is obtained;Regional matching is carried out to the station location marker information of the registration terminal according to safety management information, generates regional matching result, the safety management information includes the regional extent that the login account allows to log in;Confirm whether presently described logging request is abnormal login request according to the regional matching result, to issue the user with strange land login prompt.By technical scheme, the safety verification of the configuration of computer application program and user's different-place login server is realized, the sign-in experience of user is improved, enhances the security that computer logs in.
Description
Technical field
The present invention relates to field of computer technology, in particular to a kind of computer security login method and a kind of meter
Calculation machine lands safely device.
Background technology
With the development in epoch, computer technology is maked rapid progress, and electronic office becomes increasingly popular so that global IT application
As the main trend of human development.Brought at one's leisure enjoying informationization, the security of information is also on the hazard.In order to prevent
Sensitive information, information carrier, the information processes such as classified information, important business datum etc. leak, relating computer or
Preserve important information, the computer of data will take necessary safety prevention measure.With regard to current market apparently, it is almost all of
Security protection class product is all in the data of installation, operation and need for confidentiality, and the data of need for confidentiality are encrypted in itself, made
It must run that the step of checking private data is cumbersome, reduce the convenience used.
The content of the invention
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of new computer security login scheme,
So that preventing the use of non-computer user on computer user logs in, fundamentally computer security and secrecy is being improved
While, reduce the step of browsing private data, improve the convenience used.
In view of this, the present invention proposes a kind of new computer security login method, including:Receive user and log in boundary
The login account of face input;When detecting that the login account input is completed, selection and the fortune of the login account maps mutually
Row system, generate logging request;When receiving the logging request, the registration terminal when login account logs in is obtained
Station location marker information;Regional matching, generation are carried out to the station location marker information of the registration terminal according to safety management information
Regional matching result, the safety management information include the regional extent that the login account allows to log in;According to the area
Matching result confirms whether presently described logging request is abnormal login request, to issue the user with strange land login prompt.
In the technical scheme, the login account that is inputted by detecting the user that receives in login interface is selected and stepped on
Record the runtime of account maps mutually so that different users is merely able to open the runtime corresponding with user itself, prevents
Stop the leakage for the confidential information that different user is occurred using same computer, illustrate only the user for starting computer at that time
The runtime matched, the secrecy that user profile is realized in operation is opened from system, it is therefore prevented that the information of other users is let out
Dew;After generating logging request, the station location marker information of the registration terminal used during login account is obtained, by current station location marker
Information carries out regional matching with safety management information, generates regional matching result, and judge according to current regional matching result
Whether current login account is abnormal login so that computer user can recognize that the login of computer is abnormal in time, side
Just manage.
In the above-mentioned technical solutions, it is preferable that the reception user the login account that login interface inputs the step of it
It is preceding also to include:Prestore the login account;According to login account acquisition and the login account maps mutually
Runtime and the associated logging request;Obtained according to the logging request described in allowing the login account to log in
Regional extent.
In the technical scheme, the mapping relations of login account and runtime have been prestored so that user is inputting
After login account, corresponding runtime can be opened rapidly;Safety management letter according to set by the logging request of generation
Breath so that the entry address of user receives territory restriction, enhances the security of computer login.
In the above-mentioned technical solutions, it is preferable that described obtained according to the logging request allows the login account to log in
The regional extent the step of include:The login account associated with the logging request is obtained according to the logging request;
The regional extent for allowing the login account to log in is set according to the login account, generates secure log information.
In the above-mentioned technical solutions, it is preferable that described that presently described logging request is confirmed according to the regional matching result
Whether it is abnormal login request, is included with issuing the user with the step of the login prompt of strange land:Confirming the position of the registration terminal
Confidence is ceased in the range of the safety management information, is shown as normal logging request, it is allowed to the login account login service
Device, exceed the scope of the safety management information in the positional information for confirming the registration terminal, be shown as abnormal login request,
The positional information of presently described registration terminal is recorded, and sends different-place login prompting.
In the technical scheme, whether the safety management information that user is determined according to regional matching result is that normal log in please
Ask;If normal logging request, it is allowed to computer user's login service device, asked if abnormal login, record current use
The location mark information of the terminal used during the login account at family, and prompt message is sent to the computer user, indicate and work as
Preceding registration is different-place login so that user can recognize that the login of computer is abnormal in time, convenient management.
According to the second aspect of the invention, it is proposed that a kind of computer security entering device, including:First acquisition unit,
The login account inputted for receiving user in login interface;Generation unit is asked, detects that the login account is defeated for working as
When entering to complete, selection and the runtime of the login account maps mutually, logging request is generated;Second acquisition unit, for working as
When receiving the logging request, the station location marker information of the registration terminal when login account logs in is obtained;Matching life
Into unit, regional matching is carried out to the station location marker information of the registration terminal according to safety management information, generates area matching
As a result, the safety management information includes the regional extent that the login account allows to log in;Confirmation unit, for according to
Regional matching result confirms whether presently described logging request is abnormal login request, to issue the user with strange land login prompt.
In the technical scheme, login account that request generation unit is inputted by detecting the user that receives in login interface
Number, runtime of the selection with login account to mapping so that it is corresponding with user itself that different users is merely able to opening
Runtime, it is therefore prevented that the leakage for the confidential information that different user is occurred using same computer, illustrate only and started at that time
The runtime that the user of computer is matched, the secrecy that user profile is realized in operation is opened from system, it is therefore prevented that other
The information leakage of user;After generating logging request, second acquisition unit obtains the position of the registration terminal used during login account
Current station location marker information and safety management information are carried out regional matching, generation area by identification information, matching victory unit
With result, confirmation unit judges whether current login account is abnormal login according to current regional matching result so that meter
Calculation machine user can recognize that the login of computer is abnormal in time, convenient management.
In the above-mentioned technical solutions, it is preferable that the computer security entering device also includes:Memory cell, for pre-
First store the login account;First setting unit, for being set and the login account maps mutually according to the login account
The runtime and the associated logging request;Second setting unit, permit for being set according to the logging request
Perhaps the regional extent that described login account logs in.
In the technical scheme, memory cell has prestored login account, and the first setting unit is provided with login account
With the mapping relations of runtime so that user can open corresponding runtime rapidly after login account is inputted;The
Safety management information of two setting units according to set by the logging request of generation so that the entry address of user receives region
Limitation, enhance the security of computer login.
In the above-mentioned technical solutions, it is preferable that second setting unit includes:3rd acquiring unit, for according to institute
State logging request and obtain the login account associated with the logging request;Information generating unit, for according to the login account
Number the regional extent for allowing the login account to log in is set, generates secure log information.
In the above-mentioned technical solutions, it is preferable that the confirmation unit is specifically used for confirming the position of the registration terminal
Information is shown as normal logging request in the range of the safety management information, it is allowed to the login account login service device,
Exceed the scope of the safety management information in the positional information for confirming the registration terminal, be shown as abnormal login request, note
The positional information of presently described registration terminal is recorded, and sends different-place login prompting.
In the technical scheme, confirmation unit determines whether the safety management information of user is just according to regional matching result
Normal logging request;If normal logging request, it is allowed to computer user's login service device, asked if abnormal login, note
The location mark information of the terminal used during the login account for recording active user, and send prompting letter to the computer user
Breath, it is different-place login to indicate current registration so that user can recognize that the login of computer is abnormal in time, convenient pipe
Reason.
Pass through above technical scheme so that the use of non-computer user is prevented on computer user logs in, from opening
Machine logs on while improve computer security and secrecy, reduces the step of browsing private data, improves the side used
Just property.
Brief description of the drawings
Fig. 1 shows the schematic flow sheet of computer security login method according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of computer security entering device according to an embodiment of the invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention
Mode is applied the present invention is further described in detail.It should be noted that in the case where not conflicting, the implementation of this request
Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also
To be different from other modes described here using other to implement, therefore, protection scope of the present invention is not by described below
Specific embodiment limitation.
Fig. 1 shows the schematic flow sheet of computer security login method according to an embodiment of the invention.
As shown in figure 1, computer security login method according to an embodiment of the invention, including:
Step 101, the login account that user inputs in login interface is received.
Step 102, when detecting that the login account input is completed, selection and the operation of the login account maps mutually
System, generate logging request.
Step 103, when receiving the logging request, the position of the registration terminal when login account logs in is obtained
Put identification information.
Step 104, regional matching, generation are carried out to the station location marker information of the registration terminal according to safety management information
Regional matching result, the safety management information include the regional extent that the login account allows to log in.
Step 105, confirm whether presently described logging request is abnormal login request according to the regional matching result, with
Issue the user with strange land login prompt.
In the technical scheme, the login account that is inputted by detecting the user that receives in login interface is selected and stepped on
Record runtime of the account to mapping so that different users is merely able to open the runtime corresponding with user itself, prevents
Stop the leakage for the confidential information that different user is occurred using same computer, illustrate only the user for starting computer at that time
The runtime matched, the secrecy that user profile is realized in operation is opened from system, it is therefore prevented that the information of other users is let out
Dew;After generating logging request, the station location marker information of the registration terminal used during login account is obtained, by current station location marker
Information carries out regional matching with safety management information, generates regional matching result, and judge according to current regional matching result
Whether current login account is abnormal login so that computer user can recognize that the login of computer is abnormal in time, side
Just manage.
In the above-mentioned technical solutions, it is preferable that the reception user the login account that login interface inputs the step of it
It is preceding also to include:Prestore the login account;According to login account acquisition and the login account maps mutually
Runtime and the associated logging request;Obtained according to the logging request described in allowing the login account to log in
Regional extent.
In the technical scheme, the mapping relations of login account and runtime have been prestored so that user is inputting
After login account, corresponding runtime can be opened rapidly;Safety management letter according to set by the logging request of generation
Breath so that the entry address of user receives territory restriction, enhances the security of computer login.
In the above-mentioned technical solutions, it is preferable that described obtained according to the logging request allows the login account to log in
The regional extent the step of include:The login account associated with the logging request is obtained according to the logging request;
The regional extent for allowing the login account to log in is set according to the login account, generates secure log information.
In the above-mentioned technical solutions, it is preferable that described that presently described logging request is confirmed according to the regional matching result
Whether it is abnormal login request, is included with issuing the user with the step of the login prompt of strange land:Confirming the position of the registration terminal
Confidence is ceased in the range of the safety management information, is shown as normal logging request, it is allowed to the login account login service
Device, exceed the scope of the safety management information in the positional information for confirming the registration terminal, be shown as abnormal login request,
The positional information of presently described registration terminal is recorded, and sends different-place login prompting.
In the technical scheme, whether the safety management information that user is determined according to regional matching result is that normal log in please
Ask;If normal logging request, it is allowed to computer user's login service device, asked if abnormal login, record current use
The location mark information of the terminal used during the login account at family, and prompt message is sent to the computer user, indicate and work as
Preceding registration is different-place login so that user can recognize that the login of computer is abnormal in time, convenient management.
Fig. 2 shows the schematic block diagram of computer security entering device according to an embodiment of the invention.
As shown in Fig. 2 computer security entering device 201 according to an embodiment of the invention, including:First acquisition unit
202, the login account inputted for receiving user in login interface;Generation unit 203 is asked, the login is detected for working as
When account input is completed, selection and the runtime of the login account maps mutually, logging request is generated;Second acquisition unit
204, for when receiving the logging request, obtaining the station location marker letter of the registration terminal when login account logs in
Breath;Generation unit 205 is matched, regional matching is carried out to the station location marker information of the registration terminal according to safety management information,
Regional matching result is generated, the safety management information includes the regional extent that the login account allows to log in;Confirmation unit
206, for confirming whether presently described logging request is abnormal login request according to the regional matching result, to be sent out to user
Go out strange land login prompt.
In the technical scheme, request generation unit 203 is stepped on by detecting the user received what login interface inputted
Record account, runtime of the selection with login account to mapping so that it is relative in itself with user that different users is merely able to opening
The runtime answered, it is therefore prevented that the leakage for the confidential information that different user is occurred using same computer, illustrate only at that time
Start the runtime that the user of computer is matched, the secrecy that user profile is realized in operation opened from system, it is therefore prevented that
The information leakage of other users;After generating logging request, second acquisition unit 204 obtains the registration terminal used during login account
Station location marker information, current station location marker information and safety management information carries out regional matching, generation by matching victory unit
Regional matching result, confirmation unit 206 judge whether current login account is abnormal step on according to current regional matching result
Record so that computer user can recognize that the login of computer is abnormal in time, convenient management.
In the above-mentioned technical solutions, it is preferable that the computer security entering device also includes:Memory cell 207, is used for
Prestore the login account;First setting unit 208, for being set and the login account phase according to the login account
The runtime of mapping and the associated logging request;Second setting unit 209, for according to the logging request
The regional extent for allowing the login account to log in is set.
In the technical scheme, memory cell 207 has prestored login account, and the first setting unit 208 is provided with and stepped on
Record the mapping relations of account and runtime so that user can open corresponding operation rapidly after login account is inputted
System;Safety management information of second setting unit 209 according to set by the logging request of generation so that the entry address of user
Territory restriction is received, enhances the security of computer login.
In the above-mentioned technical solutions, it is preferable that second setting unit 209 includes:3rd acquiring unit 2091, is used for
The login account associated with the logging request is obtained according to the logging request;Information generating unit 2092, for basis
The login account sets the regional extent for allowing the login account to log in, and generates secure log information.
In the above-mentioned technical solutions, it is preferable that the confirmation unit 206 is specifically used for confirming the position of the registration terminal
Confidence is ceased in the range of the safety management information, is shown as normal logging request, it is allowed to the login account login service
Device, exceed the scope of the safety management information in the positional information for confirming the registration terminal, be shown as abnormal login request,
The positional information of presently described registration terminal is recorded, and sends different-place login prompting.
In the technical scheme, confirmation unit 206 according to regional matching result determine user safety management information whether
For normal logging request;If normal logging request, it is allowed to computer user's login service device, please if abnormal login
Ask, the location mark information of the terminal used during the login account for recording active user, and send and carry to the computer user
Show information, it is different-place login to indicate current registration so that user can recognize that the login of computer is abnormal in time, side
Just manage.
Technical scheme is described in detail above in association with accompanying drawing, and technical scheme proposes a kind of new
Computer security login method and device, realize the peace of the configuration of computer application program and user's different-place login server
Full checking, the sign-in experience of user is improved, the security of computer login is enhanced, improves the convenience used.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies
Change, equivalent substitution, improvement etc., should be included in the scope of the protection.
Claims (8)
- A kind of 1. computer security login method, it is characterised in that including:Receive the login account that user inputs in login interface;When detecting that the login account input is completed, selection and the runtime of the login account maps mutually, generation are stepped on Record request;When receiving the logging request, the station location marker information of the registration terminal when login account logs in is obtained;Regional matching is carried out to the station location marker information of the registration terminal according to safety management information, generates area matching knot Fruit, the safety management information include the regional extent that the login account allows to log in;Confirm whether presently described logging request is abnormal login request according to the regional matching result, it is different to issue the user with Ground login prompt.
- 2. computer security login method according to claim 1, it is characterised in that the reception user is in login interface Also include before the step of login account of input:Prestore the login account;The runtime and the associated login with the login account maps mutually are obtained according to the login account Request;The regional extent for allowing the login account to log in is obtained according to the logging request.
- 3. computer security login method according to claim 2, it is characterised in that described to be obtained according to the logging request The step of taking the regional extent for allowing the login account to log in includes:The login account associated with the logging request is obtained according to the logging request;The regional extent for allowing the login account to log in is set according to the login account, generates secure log information.
- 4. computer security login method according to claim 1, it is characterised in that described according to the area matching knot Fruit confirms whether presently described logging request is abnormal login request, is included with issuing the user with the step of the login prompt of strange land:In the positional information for confirming the registration terminal in the range of the safety management information, being shown as normal log in please Ask, it is allowed to the login account login service device, believe in the positional information for confirming the registration terminal beyond the safety management The scope of breath, abnormal login request is shown as, records the positional information of presently described registration terminal, and send different-place login and carry Show.
- A kind of 5. computer security entering device, it is characterised in that including:First acquisition unit, the login account inputted for receiving user in login interface;Generation unit is asked, for when detecting that the login account input is completed, selecting and the login account maps mutually Runtime, generate logging request;Second acquisition unit, for when receiving the logging request, obtaining the login end when login account logs in The station location marker information at end;Generation unit is matched, regional matching is carried out to the station location marker information of the registration terminal according to safety management information, it is raw Into regional matching result, the safety management information includes the regional extent that the login account allows to log in;Confirmation unit, for confirming whether presently described logging request is abnormal login request according to the regional matching result, To issue the user with strange land login prompt.
- 6. computer security entering device according to claim 5, it is characterised in that also include:Memory cell, for prestoring the login account;First setting unit, for according to the login account set with the runtime of the login account maps mutually and The associated logging request;Second setting unit, for setting the regional extent for allowing the login account to log according to the logging request.
- 7. computer security entering device according to claim 6, it is characterised in that second setting unit includes:3rd acquiring unit, for obtaining the login account associated with the logging request according to the logging request;Information generating unit, for setting the regional extent for allowing the login account to log according to the login account, Generate secure log information.
- 8. computer security entering device according to claim 5, it is characterised in that the confirmation unit is specifically used for Confirm that the positional information of the registration terminal in the range of the safety management information, is shown as normal logging request, it is allowed to The login account login service device, exceed the model of the safety management information in the positional information for confirming the registration terminal Enclose, be shown as abnormal login request, record the positional information of presently described registration terminal, and send different-place login prompting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710918099.7A CN107634958A (en) | 2017-09-30 | 2017-09-30 | Computer security login method and computer security entering device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710918099.7A CN107634958A (en) | 2017-09-30 | 2017-09-30 | Computer security login method and computer security entering device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107634958A true CN107634958A (en) | 2018-01-26 |
Family
ID=61103224
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710918099.7A Pending CN107634958A (en) | 2017-09-30 | 2017-09-30 | Computer security login method and computer security entering device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107634958A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981611A (en) * | 2019-03-08 | 2019-07-05 | 北京顺丰同城科技有限公司 | A kind of safety defense method and device of multi-platform account |
CN110874460A (en) * | 2019-11-14 | 2020-03-10 | 江苏税软软件科技有限公司 | App security verification method |
CN113726774A (en) * | 2020-10-13 | 2021-11-30 | 杭州涂鸦信息技术有限公司 | Client login authentication method, system and computer equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217368A (en) * | 2007-12-29 | 2008-07-09 | 亿阳安全技术有限公司 | A network logging on system and the corresponding configuration method and methods for logging on the application system |
CN103745147A (en) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | System mode starting method and application program starting method and device |
CN103945330A (en) * | 2014-05-12 | 2014-07-23 | 重庆邮电大学 | Virtual private cloud platform and virtual private cloud secure access method and system |
CN104301437A (en) * | 2014-11-05 | 2015-01-21 | 成都逸动无限网络科技有限公司 | Private cloud platform based on multipoint transmission |
CN104426835A (en) * | 2013-08-20 | 2015-03-18 | 深圳市腾讯计算机系统有限公司 | Login detection method, login server, and login detection device and system thereof |
-
2017
- 2017-09-30 CN CN201710918099.7A patent/CN107634958A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217368A (en) * | 2007-12-29 | 2008-07-09 | 亿阳安全技术有限公司 | A network logging on system and the corresponding configuration method and methods for logging on the application system |
CN104426835A (en) * | 2013-08-20 | 2015-03-18 | 深圳市腾讯计算机系统有限公司 | Login detection method, login server, and login detection device and system thereof |
CN103745147A (en) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | System mode starting method and application program starting method and device |
CN103945330A (en) * | 2014-05-12 | 2014-07-23 | 重庆邮电大学 | Virtual private cloud platform and virtual private cloud secure access method and system |
CN104301437A (en) * | 2014-11-05 | 2015-01-21 | 成都逸动无限网络科技有限公司 | Private cloud platform based on multipoint transmission |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981611A (en) * | 2019-03-08 | 2019-07-05 | 北京顺丰同城科技有限公司 | A kind of safety defense method and device of multi-platform account |
CN110874460A (en) * | 2019-11-14 | 2020-03-10 | 江苏税软软件科技有限公司 | App security verification method |
CN113726774A (en) * | 2020-10-13 | 2021-11-30 | 杭州涂鸦信息技术有限公司 | Client login authentication method, system and computer equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103975615B (en) | It is logged in the log-on message automatically generated via near-field communication | |
JP4755866B2 (en) | Authentication system, authentication server, authentication method, and authentication program | |
CN106304074B (en) | Auth method and system towards mobile subscriber | |
CN109101795A (en) | A kind of account number safe login method, apparatus and system | |
CN105959287A (en) | Biological feature based safety certification method and device | |
CN109347625B (en) | Password operation method, work key creation method, password service platform and equipment | |
CN103581378A (en) | Smart phone high in safety performance | |
CN104717224B (en) | A kind of login method and device | |
CN103576787A (en) | Panel computer with high safety performance | |
CN107634958A (en) | Computer security login method and computer security entering device | |
US20140259116A1 (en) | Secure user authentication with improved one-time-passcode verification | |
KR20120099782A (en) | User authentication method, user authentication system, and portable communications terminal | |
CN106572082A (en) | Approval signature verifying method, mobile device, terminal device and system | |
CN106911725A (en) | A kind of multiple-factor authentication method and device | |
CN104104650B (en) | data file access method and terminal device | |
CN103582184A (en) | Double-card smart phone high in safety performance | |
KR20120058199A (en) | User authentication method using location information | |
CN101854357B (en) | Method and system for monitoring network authentication | |
JP3966070B2 (en) | Device control system and portable terminal | |
JP2004005149A (en) | Portable information terminal device and maintenance management system | |
CN110995661A (en) | Network card platform | |
CN108322907B (en) | Card opening method and terminal | |
CN109460647A (en) | A kind of method that more equipment safeties log in | |
KR101742105B1 (en) | Phone number security certification apparatus using qr code and system thereof and metrhod thereof | |
JP2004206258A (en) | Multiple authentication system, computer program, and multiple authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180126 |
|
RJ01 | Rejection of invention patent application after publication |