CN108270549A - The key encryption of remote control gate inhibition a kind of and decryption method - Google Patents
The key encryption of remote control gate inhibition a kind of and decryption method Download PDFInfo
- Publication number
- CN108270549A CN108270549A CN201711463858.1A CN201711463858A CN108270549A CN 108270549 A CN108270549 A CN 108270549A CN 201711463858 A CN201711463858 A CN 201711463858A CN 108270549 A CN108270549 A CN 108270549A
- Authority
- CN
- China
- Prior art keywords
- ciphertext
- group
- array
- plaintext
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
Abstract
A kind of key encryption method of remote control gate inhibition, including:S1., clear text key is split as to the binary system plaintext array of N equal portions M;S2. it carries out XOR operation with initialization vector table and first group of plaintext array and obtains the intermediate ciphertext of M;S3. intermediate ciphertext is subjected to XOR operation with next group of plaintext array and obtains intermediate ciphertext;S4. loop iteration step S3, until intermediate ciphertext and N group plaintexts array, which carry out XOR operation, obtains N group ciphertexts.Since encryption and decryption processes can carry out in client or gate inhibition end, comparison carries out stream cipher encrypting mode using network, has the advantage independent of external network, can the need protection data generated is encrypted and be stored in real time.The present invention also provides a kind of key decrypting methods of remote control gate inhibition.
Description
Technical field
This application involves gate inhibition's technologies, and in particular to the key encryption of remote control gate inhibition a kind of and decryption method.
Background technology
The information age is had been enter into now, house security is gradually valued by the people, and under this opportunity, access control system is got over
Come more universal.Wherein, user's recognition mode form is more, there is fingerprint, vocal print, specific card etc..But according to cost and technology into
For ripe, by specific card, more popularized as IC, ID card carry out user identity identification.But traditional access control system is only limited to
In unlocking of locally swiping the card, function is more single, and it is not good enough to form simple and safe property.Meanwhile all user informations in local side because
It will not be in into encryption excessively and easily be exposed among the hazardous situation of criminal.It can be easier to without encrypted information
IC, ID card information are obtained by the external mode of infection, to cause access control equipment that cannot play original so as to be duplicated into illegal card
Effect.With the rise that intelligence community is built, interconnect as the trend of development, remote door access monitoring system is gradually substituting
Traditional access control system.At the same time, as what second-generation resident identification card used popularizes, user has technically been supported to use for two generations
The problem of resident identification card carries out user identity identification, but the thing followed is also information privacy is badly in need of solving.
There are many common data encryption algorithm, cuts both ways.And it is more common for stream cipher form at present, that is, pass through net
Network obtains the mode that key carries out two-way encryption and decryption in real time, and encryption performance is preferable, but it is extremely strong to mesh dependence, needs to occupy
More Internet resources.But in access control system, because existing simultaneously real-time video and voice signal, network available resources itself is
It is less, network blockage can be easy to cause, when network delay or mistake, the failure of decryption can be caused, while system fortune can be increased
Row load and network overhead are easy to cause the unstable of system, this is to cause for the access control system for being related to public safety
Life.At the same time, when Local Area Network disconnects, storage can not be encrypted to the characteristic that need to be protected in local access control system,
Easily obtained by force by outside.
Invention content
Present invention aims at providing a kind of key encryption method of remote control gate inhibition, can realize to remotely sending
Key information is protected, and is prevented from being cracked by criminal in transmission process, is eliminated the risk of information leakage.
The application also provides a kind of key decrypting method of remote control gate inhibition, to realize to using above-mentioned encrypted information
It is decrypted.
According in a first aspect, a kind of key encryption method of remote control gate inhibition, including:S1. clear text key is split as N
The binary system plaintext array of equal portions M;S2. it carries out XOR operation with initialization vector table and first group of plaintext array and obtains M
Intermediate ciphertext;S3. intermediate ciphertext is subjected to XOR operation with next group of plaintext array and obtains intermediate ciphertext;S4. loop iteration
Step S3, until intermediate ciphertext and N group plaintexts array, which carry out XOR operation, obtains N group ciphertexts.
Preferably, it further includes and independent encryption is carried out to intermediate ciphertext and N groups ciphertext, ciphertext is is divided by independent encryption
The left and right two halves ciphertext of equity, using expand conversion table wherein half ciphertext is carried out expansion handle to obtain it is close more than M/2
Text, the XOR operation that the data after expansion are carried out with cyclic shift table are reduced to the ciphertext of M/2;Left and right two halves ciphertext is closed again
And restore the intermediate ciphertext after obtaining independent encryption and the N group ciphertexts after independent encryption.
Preferably, the ciphertext for being reduced to M/2 is exchanged into left and right sequence with the other half ciphertext, then remerges left and right two halves
Ciphertext restores to obtain the ciphertext of each group M.
Preferably, in S1, if clear text key cannot be split as the binary system plaintext array of N equal portions M, with the two of setting
System number polishing clear text key allows the binary number of polishing to be split as the M positions plaintext array of N equal portions.
According to second aspect, a kind of key decrypting method of remote control gate inhibition, including:A1, by N groups ciphertext with it is previous
Group ciphertext carries out inverse exclusive or and handles, and obtains N group plaintext arrays;A2, the ciphertext of previous group ciphertext and previous group again is carried out it is inverse
Exclusive or processing, obtains previous group plaintext array;A3, loop iteration step A2, until by first group of ciphertext and initialization vector table
Inverse exclusive or is carried out to handle, obtain first group of plaintext array A4, obtained each group plaintext array is combined to obtain in order it is close in plain text
Key.
Preferably, A1, inverse exclusive or will be carried out with previous group ciphertext after N group ciphertext independent decryptions handle, it is bright to obtain N groups
Literary array;A2, inverse exclusive or processing will be carried out after previous group ciphertext independent decryption with the ciphertext of previous group again, it is bright obtains previous group
Literary array;A3, loop iteration step A2 are carried out with initialization vector table at inverse exclusive or after by first group of ciphertext independent decryption
Reason, obtains first group of plaintext array;A4, obtained each group plaintext array is combined to obtain clear text key in order;Wherein, it is independent
The left and right two halves ciphertext for ciphertext to be divided into equity is decrypted, the half ciphertext wherein arranged is opened up using cyclic shift table
Exhibition handles to obtain the ciphertext more than M/2, and carrying out shifting processing with expansion conversion table to the data after expansion is reduced to M/2
Ciphertext;Left and right two halves ciphertext is merged into reduction again and obtains one group of M intermediate ciphertext.
Preferably, during independent decryption, ciphertext is divided into the left and right two halves ciphertext of equity, by left and right two halves ciphertext
Left and right sequence is exchanged, expansion is then carried out to the half ciphertext wherein arranged using cyclic shift table and handles to obtain more than M/2
Ciphertext, the ciphertext that shifting processing is reduced to M/2 is carried out with conversion table is expanded to the data after expansion;It is again that left and right two halves are close
Text merges reduction and obtains one group of M intermediate ciphertext.
The key encryption of remote control gate inhibition according to above-described embodiment and decryption method, due to encryption and decryption processes all
It can be carried out in client or gate inhibition end, comparison carries out stream cipher encrypting mode using network, has independent of extranets
The advantage of network can be encrypted and store to the need protection data generated in real time.The point is for being detached from the still normal work of network
It is particularly important for the access control system of work.Since there is no the dependence to network, system can be greatly decreased for Internet resources
Demand, system performance and stability will be enhanced.Meanwhile in the present invention, because there is series connection coupling between different ciphertext blocks
There is mistake, it will subsequent ciphertext is caused to malfunction, receiving terminal will be discovered different at this time when one of them is under attack in conjunction relationship
Often.This method can efficiently and safely identify that risk and guarantee can only be decrypted partly after data are intercepted.Further, this hair
It is bright in ciphering process, other than using initialization vector table to data encryption, also using expanding conversion table and cyclic shift table
To data encryption, the safety of data can be improved.
Description of the drawings
Fig. 1 is one embodiment of the invention encryption flow block diagram;
Fig. 2 is independent encryption flow diagram in encryption method.
Specific embodiment
The present invention is described in further detail below by specific embodiment combination attached drawing.Wherein different embodiments
Middle similar component employs associated similar element numbers.In the following embodiments, many datail descriptions be in order to
The application is better understood.However, those skilled in the art can be without lifting an eyebrow recognize, which part feature
It is dispensed or can be substituted by other elements, material, method in varied situations.In some cases, this Shen
Please it is relevant some operation there is no in the description show or describe, this is the core in order to avoid the application by mistake
More descriptions are flooded, and to those skilled in the art, these relevant operations, which are described in detail, not to be necessary, they
The general technology knowledge of description and this field in specification can completely understand relevant operation.
It is herein component institute serialization number itself, such as " first ", " second " etc., is only used for distinguishing described object,
Without any sequence or art-recognized meanings.And " connection ", " connection " described in the application, unless otherwise instructed, include directly and
It is indirectly connected with (connection).
The present invention is based on the multiple-enciphered table matrixes of both sides' agreement, including weight cipher table matrix initialisation vector table, expand
Conversion table, cyclic shift table carry out real-time encrypted and decryption using the thought of block cipher to that need to transmit data.
- 2 are please referred to Fig.1, a kind of key encryption method of remote control gate inhibition of the present invention includes:
S1. clear text key is converted into binary number, and binary number is divided into N equal portions plaintexts array difference in client
Storage, every group of plaintext array has 8 character, 64 bit, if clear text key is not enough to be split as the two of N equal portions 64
System plaintext array, with the content polishing of setting, the content of the setting, which will not generate key information, to be obscured.For example, by using not having
The ^ of meaning ,/, etc. the corresponding binary number of characters.
S2. it carries out XOR operation with initialization vector table and first group of plaintext array and obtains the intermediate ciphertext of 64;
S3., 64 intermediate ciphertexts are divided into 32 ciphertexts of left and right two halves of equity, using expansion conversion table to wherein one
Half ciphertext carries out expansion and handles to obtain the ciphertext of 48, and then the XOR operation of the cyclic shift table of the data after expansion is restored
For the ciphertext of 32;Left and right two halves ciphertext is exchanged into left and right sequence, then left and right two halves ciphertext is merged reduction and is obtained in 64
Between ciphertext;It is close that the intermediate ciphertext restored above and next group of plaintext array progress XOR operation are obtained into next centre
Text;
S4. loop iteration step S3, until to obtain N groups close for intermediate ciphertext and N group plaintexts array progress XOR operation
Text.
S5. 32 ciphertexts of left and right two halves of equity are divided into N group ciphertexts, conversion table is close to wherein half using expanding
Text carries out expansion and handles to obtain the ciphertext of 48, is then reduced to 32 with the XOR operation of cyclic shift table to the data after expansion
The ciphertext of position;Left and right two halves ciphertext is exchanged into left and right sequence, then left and right two halves ciphertext is merged reduction and obtains the ciphertext of 64, i.e.,
Obtain the N group ciphertexts after independent encryption.
In other embodiments of the invention, clear text key can also be divided into N equal portions plaintext arrays to store respectively, every group
Plaintext array has 4 character, 32 bit, and during subsequent partition, each 16 close around is divided by 32
Text.The realization of the present invention is not influenced.
In other embodiments of the invention, can be without independent encryption process, ciphering process is simpler, available for pair
The not high place of security requirements.
The present invention also provides a kind of key decrypting methods of remote control gate inhibition, are encrypted vice versa.
The method comprising the steps of:
A1, N groups ciphertext and previous group ciphertext are subjected to inverse exclusive or processing, obtain N group plaintext arrays;
A2, the ciphertext of previous group ciphertext and previous group again is subjected to inverse exclusive or processing, obtains previous group plaintext array;
A3, loop iteration step A2 are handled until first group of ciphertext and initialization vector table are carried out inverse exclusive or, obtain the
One group of plaintext array;
A4, obtained each group plaintext array is combined to obtain clear text key in order.
As the preferred embodiment of decryption method of the present invention, inverse exclusive or before processing is carried out with previous group ciphertext, to current
Ciphertext carries out independent decryption, specifically includes following steps:
A1, inverse exclusive or processing will be carried out after N group ciphertext independent decryptions with previous group ciphertext, and will obtain N group plaintext arrays;
A2, inverse exclusive or processing will be carried out after previous group ciphertext independent decryption with the ciphertext of previous group again, and will obtain previous group
Plaintext array;
A3, loop iteration step A2 carry out inverse exclusive or after by first group of ciphertext independent decryption with initialization vector table
Processing, obtains first group of plaintext array;
A4, obtained each group plaintext array is combined to obtain clear text key in order;
Wherein, independent decryption is the left and right two halves ciphertext that ciphertext is divided into equity, using cyclic shift table to wherein about
Fixed half ciphertext carries out expansion and handles to obtain the ciphertext of 48, and shifting processing is carried out with conversion table is expanded to the data after expansion
It is reduced to the ciphertext of 32;Left and right two halves ciphertext is merged into reduction again and obtains one group of 64 intermediate ciphertext.In addition, the half of agreement
Ciphertext is corresponding with the half ciphertext expanded in ciphering process.
As the preferred embodiment of the present invention, for the exchange left and right ciphertext in corresponding ciphering process sequentially, in independent solution
During close, ciphertext is divided into the left and right two halves ciphertext of equity, left and right two halves ciphertext is exchanged into left and right sequence, then using following
Ring displacement table carries out expansion to the half ciphertext wherein arranged and handles to obtain the ciphertext of 48, and the expansion of the data after expansion is changed
Position table carries out the ciphertext that shifting processing is reduced to 32;It is close that two halves ciphertext merging reduction in left and right is obtained into one group of 64 centre again
Text.
The half ciphertext of agreement is corresponding with the half ciphertext expanded in ciphering process.
Use above specific case is illustrated the present invention, is merely used to help understand the present invention, not limiting
The system present invention.For those skilled in the art, thought according to the present invention can also be made several simple
It deduces, deform or replaces.
Claims (7)
1. a kind of key encryption method of remote control gate inhibition, it is characterised in that including:
S1., clear text key is split as to the binary system plaintext array of N equal portions M;
S2. it carries out XOR operation with initialization vector table and first group of plaintext array and obtains the intermediate ciphertext of M;
S3. intermediate ciphertext is subjected to XOR operation with next group of plaintext array and obtains intermediate ciphertext;
S4. loop iteration step S3, until intermediate ciphertext and N group plaintexts array, which carry out XOR operation, obtains N group ciphertexts.
2. the key encryption method of remote control gate inhibition as described in claim 1, it is characterised in that:It further includes to intermediate ciphertext
Independent encryption is carried out with N groups ciphertext, independent encryption is that ciphertext is divided into the left and right two halves ciphertext of equity, is replaced using expanding
Table carries out wherein half ciphertext expansion and handles to obtain the ciphertext more than M/2, and cyclic shift table is carried out to the data after expansion
XOR operation be reduced to the ciphertext of M/2;Left and right two halves ciphertext is merged into the intermediate ciphertext after reduction obtains independent encryption again
With the N group ciphertexts after independent encryption.
3. the key encryption method of remote control gate inhibition as claimed in claim 2, it is characterised in that:It will be reduced to M/2
Ciphertext exchanges left and right sequence with the other half ciphertext, then remerges left and right two halves ciphertext and restores to obtain the ciphertext of each group M.
4. the key decrypting method of remote control gate inhibition as described in claim 1, it is characterised in that:In S1, if close in plain text
Key cannot be split as the binary system plaintext array of N equal portions M, with the binary number polishing clear text key of setting, make the two of polishing
System number can be split as the M positions plaintext array of N equal portions.
5. a kind of key decrypting method of remote control gate inhibition, it is characterised in that including:
A1, N groups ciphertext and previous group ciphertext are subjected to inverse exclusive or processing, obtain N group plaintext arrays;
A2, the ciphertext of previous group ciphertext and previous group again is subjected to inverse exclusive or processing, obtains previous group plaintext array;
A3, loop iteration step A2 handle until first group of ciphertext and initialization vector table are carried out inverse exclusive or, obtain first group
Plaintext array;
A4, obtained each group plaintext array is combined to obtain clear text key in order.
6. the key decrypting method of remote control gate inhibition as claimed in claim 5, it is characterised in that:
A1, inverse exclusive or processing will be carried out after N group ciphertext independent decryptions with previous group ciphertext, and will obtain N group plaintext arrays;
A2, inverse exclusive or processing will be carried out after previous group ciphertext independent decryption with the ciphertext of previous group again, and will obtain previous group in plain text
Array;
A3, loop iteration step A2 carry out inverse exclusive or processing after by first group of ciphertext independent decryption with initialization vector table,
Obtain first group of plaintext array;
A4, obtained each group plaintext array is combined to obtain clear text key in order;
Wherein, independent decryption is the left and right two halves ciphertext that ciphertext is divided into equity, using cyclic shift table to wherein arranging
Half ciphertext carries out expansion and handles to obtain the ciphertext more than M/2, and the data after expansion are carried out with expansion conversion table at displacement
Reason is reduced to the ciphertext of M/2;Left and right two halves ciphertext is merged into reduction again and obtains one group of M intermediate ciphertext.
7. the key decrypting method of remote control gate inhibition as claimed in claim 6, it is characterised in that:In independent decryption process
In, ciphertext is divided into the left and right two halves ciphertext of equity, left and right two halves ciphertext is exchanged into left and right sequence, then using cyclic shift
Table carries out the half ciphertext wherein arranged expansion and handles to obtain the ciphertext more than M/2, and the expansion of the data after expansion is changed
Position table carries out the ciphertext that shifting processing is reduced to M/2;Two halves ciphertext merging reduction in left and right is obtained again close among one group M
Text.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711463858.1A CN108270549A (en) | 2017-12-28 | 2017-12-28 | The key encryption of remote control gate inhibition a kind of and decryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711463858.1A CN108270549A (en) | 2017-12-28 | 2017-12-28 | The key encryption of remote control gate inhibition a kind of and decryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108270549A true CN108270549A (en) | 2018-07-10 |
Family
ID=62772701
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711463858.1A Pending CN108270549A (en) | 2017-12-28 | 2017-12-28 | The key encryption of remote control gate inhibition a kind of and decryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108270549A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109784076A (en) * | 2019-01-10 | 2019-05-21 | 八维通科技有限公司 | A kind of encrypting and decrypting method of 8583 agreement |
CN110798455A (en) * | 2019-10-18 | 2020-02-14 | 深圳市高德信通信股份有限公司 | Encrypted communication transmission system for preventing information leakage |
CN116720537A (en) * | 2023-08-10 | 2023-09-08 | 天津环球磁卡科技有限公司 | Bus card data reading method and reading system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7167856B2 (en) * | 2001-05-15 | 2007-01-23 | Jonathan Keir Lawder | Method of storing and retrieving multi-dimensional data using the hilbert curve |
CN103634101A (en) * | 2013-12-03 | 2014-03-12 | 中国电子器材总公司 | Encryption processing method and encryption processing equipment |
CN106656472A (en) * | 2016-12-27 | 2017-05-10 | 广州智慧城市发展研究院 | Transaction data encryption method and system |
-
2017
- 2017-12-28 CN CN201711463858.1A patent/CN108270549A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7167856B2 (en) * | 2001-05-15 | 2007-01-23 | Jonathan Keir Lawder | Method of storing and retrieving multi-dimensional data using the hilbert curve |
CN103634101A (en) * | 2013-12-03 | 2014-03-12 | 中国电子器材总公司 | Encryption processing method and encryption processing equipment |
CN106656472A (en) * | 2016-12-27 | 2017-05-10 | 广州智慧城市发展研究院 | Transaction data encryption method and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109784076A (en) * | 2019-01-10 | 2019-05-21 | 八维通科技有限公司 | A kind of encrypting and decrypting method of 8583 agreement |
CN109784076B (en) * | 2019-01-10 | 2021-07-06 | 八维通科技有限公司 | Encryption and decryption method of 8583 protocol |
CN110798455A (en) * | 2019-10-18 | 2020-02-14 | 深圳市高德信通信股份有限公司 | Encrypted communication transmission system for preventing information leakage |
CN110798455B (en) * | 2019-10-18 | 2021-05-18 | 深圳市高德信通信股份有限公司 | Encrypted communication transmission system for preventing information leakage |
CN116720537A (en) * | 2023-08-10 | 2023-09-08 | 天津环球磁卡科技有限公司 | Bus card data reading method and reading system |
CN116720537B (en) * | 2023-08-10 | 2023-10-10 | 天津环球磁卡科技有限公司 | Bus card data reading method and reading system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107682141A (en) | Data ciphering method and system for data transfer | |
CN108055235A (en) | A kind of control method of smart lock, relevant device and system | |
CN108270549A (en) | The key encryption of remote control gate inhibition a kind of and decryption method | |
CN112101531B (en) | Neural network model training method, device and system based on privacy protection | |
Bringer et al. | Faster secure computation for biometric identification using filtering | |
US7779272B2 (en) | Hardware cryptographic engine and encryption method | |
Morawiecki | Practical attacks on the round‐reduced PRINCE | |
Rajput et al. | An improved cryptographic technique to encrypt text using double encryption | |
Dongare et al. | An efficient technique for image encryption and decryption for secured multimedia application | |
CN111698252B (en) | Cloud platform data encryption transmission method and system | |
CN106022158A (en) | A takeout management system for file datas | |
WO2021176242A1 (en) | Scrambler apparatus and method in particular for cryptographic applications, and descrambler apparatus and method therefor | |
CN105959106B (en) | A kind of low-complexity digital encryption method | |
Wu et al. | Cryptanalysis of Rijmen-Preneel trapdoor ciphers | |
Forhad et al. | An improvement of advanced encryption standard | |
AlRababah | Digital image encryption implementations based on AES algorithm | |
Kumar et al. | Invo-substitute: Three layer encryption for enhanced e-commerce website security using substitution cipher and involution function | |
Krishnagopal et al. | Image encryption and steganography using chaotic maps with a double key protection | |
Habibi et al. | Security and privacy analysis of Song–Mitchell RFID authentication protocol | |
EP3883178A1 (en) | Encryption system and method employing permutation group-based encryption technology | |
Kiryukhin | Related-key attack on 5-round Kuznyechik | |
Quenaya et al. | Image encryption using an image pattern based on advanced encryption standard | |
JP2001257673A (en) | Communicating method and communicating system device | |
JP2002108205A (en) | Block ciphering method and decoding method | |
Liu et al. | Legitimate-reader-only attack on MIFARE Classic |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180710 |
|
RJ01 | Rejection of invention patent application after publication |