CN110135179A - A kind of accounting voucher encryption method and decryption method - Google Patents
A kind of accounting voucher encryption method and decryption method Download PDFInfo
- Publication number
- CN110135179A CN110135179A CN201910395031.4A CN201910395031A CN110135179A CN 110135179 A CN110135179 A CN 110135179A CN 201910395031 A CN201910395031 A CN 201910395031A CN 110135179 A CN110135179 A CN 110135179A
- Authority
- CN
- China
- Prior art keywords
- original document
- document image
- image file
- user
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of accounting voucher encryption method and decryption methods, it is related to a kind of accounting voucher technical field, it solves existing original document image file to be generally stored directly in computer, once having stranger using the computer or invading the problem of computer can obtain the original document information or even destroy original document image file comprising following steps: S100: scanning original document forms original document image file;S200: original document image file is encrypted;S300: the original document image file for completing encryption is stored.One aspect of the present invention can facilitate encrypted personnel to carry out effective convenient encryption of original document image file, obtain a possibility that original document information even destroys original document image file when being on the other hand greatly reduced stranger using the computer or invasion computer.
Description
Technical field
The present invention relates to a kind of accounting voucher technical fields, more particularly, to a kind of accounting voucher encryption method and decryption
Method.
Background technique
Accounting voucher is to record economic work, clear financial responsibility, the registration book of accounts accordingly worked out by certain format
Written document.The legitimacy and reasonability for recording economic work, ensure that the authenticity of accounting record, strengthen financial responsibility
System.The difference that accounting voucher programs by it with purposes, is divided into original certificate and bookkeeping voucher, the former be also known as original document or
Person's document is the original written document filled and presented at once when economic work initially occurs, such as invoice for sale, fund receipt, difference
Trip's invoice etc..The latter's also known as book keeping operation voucher, is to audit errorless original document as foundation, according in the item of economic work
Appearance is sorted out, and determines the accounting voucher filled and presented after accounting classification accordingly.
Accounting voucher should periodically bind into book form, prevent from scattering and disappearing.Accounting voucher cover should indicate organization, voucher type,
Relevant issues, accountant in charge and the Bao such as voucher number, start-stop number, year, month, accountant in charge, bookbinding personnel
Pipe personnel should on cover stamped signature.Accounting voucher takes care of the time limit: original certificate, accounting voucher 30 years.Wherein: being related to external and right
The accounting voucher of private transformation is permanent, and bank account balance is adjusted table 10 years.
Currently, financial management software and office automation software are gradually universal in enterprise.Enterprise generally in expense reimbursement,
General to fill in expenses claim sheer by office automation software, expenses claim sheer passes through after the approval, by expense reimbursement singles
It prints off to give financial staff with original document and keep accounts, pay the bill.Currently, financial management software and office automation software are not
It can be in communication with each other, be unable to data sharing.Financial staff is to be audited using manpower in audit expenses expense report, financial staff's work
Work amount is big.Financial staff not only needs to audit each original document one by one, but also need to be kept accounts according to original document,
Classification, production bookkeeping voucher, printing bookkeeping voucher cover, and bookkeeping voucher is bound.Currently, due to heavy workload, wealth
Business personnel will not generally inquire the original document true and false, cause very big security risk.
A kind of existing publication No. is the patent of invention of 106815924A and a kind of entitled accounting voucher processing system,
Including financial management system and original document storage cabinet, financial management system includes reimbursement module, checks module, papers knowledge
Other module;Be equipped in original document storage cabinet paper-bill conveying device, Code of Account printer, scanning machine, printer,
Electronic accounting voucher storage device, papery accounting voucher storage device.
Foregoing invention patent can be automatically finished expense reimbursement, expense reimbursement audit, original document check, papers
Identification, original document coding, original document scanning, the storage of original document image file, the automatic classified storage of accounting voucher, accounting
The functions such as voucher inquiry, alleviate financial staff's labor intensity, improve economic benefit, but existing original document image file
Generally it is stored directly in computer, once the original document information can be obtained even by having stranger to use the computer or invade the computer
Original document image file is destroyed, there is room for improvement.
Summary of the invention
The purpose of the present invention one is to provide a kind of accounting voucher encryption method, and encrypted personnel can be facilitated to carry out original document
Effective encryption of image file.
Foregoing invention purpose of the invention has the technical scheme that
A kind of accounting voucher encryption method, comprising the following steps:
A100: scanning original document forms original document image file;
A200: original document image file is encrypted;
A300: the original document image file for completing encryption is stored.
By using above-mentioned technical proposal, by step A100, step A200, step A300 setting can be by original ticket
Original document image file mode stores accordingly, and by effectively avoiding before storage to the encryption of original document image file
Original document is checked or broken words by stranger, ensure that the privacy of original document information.
The present invention is further arranged to: A200 the following steps are included:
A210: selection institute original document image file to be encrypted simultaneously triggers cryptographic operation;
A220: the Crypted password of user's input is received;
A230: an original document image file to be encrypted is encrypted according to Crypted password.
By using above-mentioned technical proposal, tool is effectively disclosed by the setting of step A210, step A220, step A220
In the ciphering process of body original document image file, the corresponding cryptographic operation of user's input is under the premise of triggering cryptographic operation
The encryption to original document image file can be achieved.
The present invention is further arranged to: wherein step A210 is specifically included:
A211: judge whether the number of user's adopting consecutive click chemical reaction original document image reaches preset number;
A212: if the number of user's adopting consecutive click chemical reaction original document image reaches preset number, further judge that user connects herein
Whether the time that continuous point hits last time long click reaches the preset time;
A213: it if the time of user's last time long click in this adopting consecutive click chemical reaction reaches the preset time, transfers out several
Specific amount of money picture involved in original document image is selected for user, chooses original document image to be encrypted and if only if user
Involved specific amount of money picture triggers cryptographic operation.
It is effectively open by the combination setting of step A211, step A212, step A213 by using above-mentioned technical proposal
The actual conditions for how triggering decryption effectively avoid stranger from also capable of arbitrarily carrying out to original document file in unwitting situation
Encryption.
The present invention is further arranged to: wherein step A220 is specifically included:
A221: while presenting several for encryption condition options set by user and to each encryption condition options progress title mark
Note;
A222: the information that user is inputted in each encryption condition options is received, and carries out real-time storage;
A223: the information that each encryption condition options are input into before user is emptied;
A224: receiving user in each information for inputting again of encryption condition options, and with each encryption condition for storing before
The information that option is inserted is compared, and completes to encrypt if comparison is completely the same.
By using above-mentioned technical proposal, set by the combination of step A221, step A222, step A223, step A224
It is set effective and discloses the input password for specifically how receiving user and sufficiently confirm the password that user is inputted, user is avoided to input
The case where password malfunctions.
The present invention is further arranged to: the encryption condition options that A221 is previously mentioned in sequence successively include numerical ciphers,
The exact date that birthday date, the current original document image file of encryption user is encrypted.
By using above-mentioned technical proposal, the encryption condition options that above-mentioned steps A221 is previously mentioned be followed successively by numerical ciphers,
It at the exact date that birthday date, the current original document image file of encryption user is encrypted, is made of different data, into
One step increases the difficulty of stranger's decryption.
The purpose of the present invention two is to provide a kind of accounting voucher decryption method, can greatly reduce stranger and use the computer
Or a possibility that original document information even destroys original document image file is obtained when invasion computer.
The present invention is further arranged to: a kind of accounting voucher decryption method, comprising the following steps:
B100: the position that the original bill image file of decryption is stored needed for searching out;
B200: input clear crytpographic key completes the decryption of original document image file;
B300: original document image file is opened.
It is effectively open by the combination setting of step B100, step B200, step B300 by using above-mentioned technical proposal
Specifically how to complete the specific works of original document image file decryption.
The present invention is further arranged to: step B200 specifically includes the following steps:
B210: determining all passwords needed for completing to decrypt, wherein all passwords needed for decrypting include the date for decrypting the same day, encryption
The age at the age of personnel, numerical ciphers, encrypted personnel is determined by the birthday of understood encrypted personnel;
B220: using in the date for decrypt the same day the sum of all numbers as the first data and, with all numbers of numerical ciphers
With as the second data and, using the data at encrypted personnel age and as third data and, sort with data and from large to small by
A high position is successively ranked up as completely new password date, numerical ciphers, the encrypted personnel age on the decryption same day to low level;
B230: decryption system is limited with the highest digit of completely new password provides a long number, every number of long number at random
Word corresponds to the specific digit of completely new password;
B240: decryption is completed using specific number corresponding to completely new password each specific digit as actually required Password Input.
By using above-mentioned technical proposal, it is provided with by step B210, step B220, step B230, step B240
Effect discloses the process specifically how being decrypted, and determines completely new password, Er Qieyou with the case where the sum of each group of data sequence
In addition the long number that system provides at random, the user for facilitating understanding clear crytpographic key mode is decrypted in time, and can be effective
It avoids stranger from invading computer and arbitrarily cracks acquisition original document image file.
The present invention is further arranged to: if there is the case where not decrypting three times in step B240, being there is step B250, is walked
Rapid B250 is specifically included: all numbers of completely new password are added obtain overall datas and, using overall data and as dividend,
Determine that specific number corresponding to each specific digit successively as divisor, obtains corresponding quotient and the remainder using B240, with
The sum of quotient and the remainder are as specific number corresponding to each specific digit, and using corresponding specific number as actually required
Password Input.
By using above-mentioned technical proposal, can exist three times not in there is step B240 by the setting of step B250
When the case where decryption, using completely new decryption method, stranger is avoided to obtain specific decryption method by way of test.
In conclusion advantageous effects of the invention are as follows: pass through step A100, step A200 and step A300
Setting facilitates user and carries out effectively easily encryption as needed, guarantees the privacy of original document image file.
Detailed description of the invention
Fig. 1 is the specific steps schematic diagram of accounting voucher encryption method of the present invention.
Fig. 2 is the specific steps schematic diagram of A200 in Fig. 1.
Fig. 3 is the specific steps schematic diagram of A210 in Fig. 2.
Fig. 4 is the specific steps schematic diagram of A220 in Fig. 2.
Fig. 5 is the specific steps schematic diagram of accounting voucher decryption method.
Fig. 6 is the specific steps schematic diagram of step B200 in Fig. 5.
Specific embodiment
Below in conjunction with attached drawing, invention is further described in detail.
Referring to Fig.1, be a kind of accounting voucher encryption method disclosed by the invention, comprising the following steps: A100: scanning is original
Bill forms original document image file;A200: original document image file is encrypted;A300: to the original for completing encryption
Beginning bill image file is stored, and original document formation original document image file is scanned in step A100 and mainly passes through scanning
Machine is completed.
As shown in Fig. 2, further contemplating the privacy in specific ciphering process, stranger is avoided to open encryption easily,
Based on considerations above, the specific encrypting step of step A200 is as follows: A210: selection institute original document image file to be encrypted is simultaneously
Trigger cryptographic operation;A220: the Crypted password of user's input is received;A230: according to Crypted password to an original ticket to be encrypted
It is encrypted according to image file.
As shown in figure 3, in addition the movement for triggering cryptographic operation has uniqueness, rather than stranger can obtain easily
Take, be based on above-mentioned consideration, step A210 specifically includes: A211: judge user's adopting consecutive click chemical reaction original document image number whether
Reach preset number;A212: if the number of user's adopting consecutive click chemical reaction original document image reaches preset number, further judge
Whether the time of user's last time long click in this adopting consecutive click chemical reaction reaches the preset time;A213: if user is continuous herein
The time that point hits last time long click reaches the preset time, then transfers out specific involved in several original document images
Amount of money picture is selected for user, chooses specific amount of money picture involved by original document image to be encrypted and if only if user,
Trigger cryptographic operation.
As shown in figure 4, can guarantee certain complexity when further contemplating user encryption and user is avoided to forget
In summary encryption information considers that step A220 is specifically included: A221: while presenting several for encryption condition set by user
Option simultaneously carries out title mark to each encryption condition options;A222: receive what user was inputted in each encryption condition options
Information, and carry out real-time storage;A223: the information that each encryption condition options are input into before user is emptied;A224: it connects
The information that user inputs again in each encryption condition options is received, and inserted with each encryption condition options stored before
Information is compared, and completes to encrypt if comparison is completely the same, the encryption condition options that wherein step A221 is previously mentioned are according to suitable
Sequence successively includes numerical ciphers, encrypts the exact date that birthday date, the current original document image file of user are encrypted.
The above are the specific introductions of accounting voucher encryption method, carry out below for accounting voucher decryption method specific public
It opens.
As shown in figure 5, a kind of accounting voucher decryption method is the following steps are included: B100: the original ticket of decryption needed for searching out
The position stored according to image file;B200: input clear crytpographic key completes the decryption of original document image file;B300: it opens
Original document image file.
As shown in fig. 6, further considering that user decrypts the privacy of original bill image file processes, step B200 is specific
The following steps are included: B210: all passwords needed for completing to decrypt are determined, wherein all passwords needed for decrypting include the decryption same day
The age on date, the age of encrypted personnel, numerical ciphers, encrypted personnel is determined by the birthday of understood encrypted personnel;B220: with
The sum of all numbers in the date on the same day are decrypted to be used as the first data and count using the sum of all numbers of numerical ciphers as second
According to, using the data at encrypted personnel age and as third data and, sort with data and from large to small by a high position to low level according to
Secondary date, numerical ciphers, the encrypted personnel age to the decryption same day is ranked up as completely new password;B230: decryption system
It is limited with the highest digit of completely new password and provides a long number at random, the tool of the corresponding completely new password of each of long number number
Position number;B240: solution is completed using specific number corresponding to completely new password each specific digit as actually required Password Input
It is close.
Furthermore consider the case where souning out password there are nonnative personnel, i.e., there are the feelings that do not decrypt three times in step B240
Condition then has step B250, step B250 to specifically include: B251: by completely new password it is all number be added obtain overall datas and,
Using overall data and as dividend, determine specific number corresponding to each specific digit successively as removing using B240
Number, obtains corresponding quotient and the remainder, using the sum of quotient and the remainder as each specifically specific number corresponding to digit, and with pair
The specific number answered is as actually required Password Input.
The embodiment of present embodiment is presently preferred embodiments of the present invention, not limits protection of the invention according to this
Range, therefore: the equivalence changes that all structures under this invention, shape, principle are done, should all be covered by protection scope of the present invention it
It is interior.
Claims (8)
1. a kind of accounting voucher encryption method, which comprises the following steps:
A100: scanning original document forms original document image file;
A200: original document image file is encrypted;
A300: the original document image file for completing encryption is stored.
2. a kind of accounting voucher encryption method according to claim 1, which is characterized in that A200 the following steps are included:
A210: selection institute original document image file to be encrypted simultaneously triggers cryptographic operation;
A220: the Crypted password of user's input is received;
A230: an original document image file to be encrypted is encrypted according to Crypted password.
3. a kind of accounting voucher encryption method according to claim 2, it is characterised in that: wherein step A210 is specifically wrapped
It includes:
A211: judge whether the number of user's adopting consecutive click chemical reaction original document image reaches preset number;
A212: if the number of user's adopting consecutive click chemical reaction original document image reaches preset number, further judge that user connects herein
Whether the time that continuous point hits last time long click reaches the preset time;
A213: it if the time of user's last time long click in this adopting consecutive click chemical reaction reaches the preset time, transfers out several
Specific amount of money picture involved in original document image is selected for user, chooses original document image to be encrypted and if only if user
Involved specific amount of money picture triggers cryptographic operation.
4. a kind of accounting voucher encryption method according to claim 2, it is characterised in that: wherein step A220 is specifically wrapped
It includes:
A221: while presenting several for encryption condition options set by user and to each encryption condition options progress title mark
Note;
A222: the information that user is inputted in each encryption condition options is received, and carries out real-time storage;
A223: the information that each encryption condition options are input into before user is emptied;
A224: receiving user in each information for inputting again of encryption condition options, and with each encryption condition for storing before
The information that option is inserted is compared, and completes to encrypt if comparison is completely the same.
5. a kind of accounting voucher encryption method according to claim 4, it is characterised in that: the encryption condition that A221 is previously mentioned
Birthday date, current original document image file of the option in sequence successively including numerical ciphers, encryption user encrypt
Exact date.
6. a kind of accounting voucher decryption method, which comprises the following steps:
B100: the position that the original bill image file of decryption is stored needed for searching out;
B200: input clear crytpographic key completes the decryption of original document image file;
B300: original document image file is opened.
7. a kind of accounting voucher processing method according to claim 6, which is characterized in that step B200 specifically includes following
Step:
B210: determining all passwords needed for completing to decrypt, wherein all passwords needed for decrypting include the date for decrypting the same day, encryption
The age at the age of personnel, numerical ciphers, encrypted personnel is determined by the birthday of understood encrypted personnel;
B220: using in the date for decrypt the same day the sum of all numbers as the first data and, with all numbers of numerical ciphers
With as the second data and, using the data at encrypted personnel age and as third data and, sort with data and from large to small by
A high position is successively ranked up as completely new password date, numerical ciphers, the encrypted personnel age on the decryption same day to low level;
B230: decryption system is limited with the highest digit of completely new password provides a long number, every number of long number at random
Word corresponds to the specific digit of completely new password;
B240: decryption is completed using specific number corresponding to completely new password each specific digit as actually required Password Input.
8. a kind of accounting voucher processing method according to claim 7, it is characterised in that if there are three in step B240
Secondary the case where not decrypting, then has step B250, step B250 to specifically include: all numbers of completely new password being added and obtain entirety
Data and, using overall data and as dividend, specific number corresponding to each specific digit is determined successively with B240
As divisor, corresponding quotient and the remainder are obtained, using the sum of quotient and the remainder as specific number corresponding to each specific digit, and
Using corresponding specific number as actually required Password Input.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910395031.4A CN110135179A (en) | 2019-05-13 | 2019-05-13 | A kind of accounting voucher encryption method and decryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910395031.4A CN110135179A (en) | 2019-05-13 | 2019-05-13 | A kind of accounting voucher encryption method and decryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110135179A true CN110135179A (en) | 2019-08-16 |
Family
ID=67573615
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910395031.4A Pending CN110135179A (en) | 2019-05-13 | 2019-05-13 | A kind of accounting voucher encryption method and decryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110135179A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555740A (en) * | 2019-08-29 | 2019-12-10 | 国网浙江省电力有限公司宁波供电公司 | Data processing method and system for ETC toll |
CN110717187A (en) * | 2019-09-19 | 2020-01-21 | 秦滢珺 | Accounting document encryption method and decryption method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160117518A1 (en) * | 2013-06-07 | 2016-04-28 | Beijing Qihoo Technology Company Limited | File Encryption/Decryption Device And File Encryption/Decryption Method |
CN106815924A (en) * | 2016-12-22 | 2017-06-09 | 河南职业技术学院 | A kind of accounting voucher processing system |
CN108390867A (en) * | 2018-02-06 | 2018-08-10 | 杭州政信金服互联网科技有限公司 | Card file enciphering method and decryption method are deposited in the administration of justice |
-
2019
- 2019-05-13 CN CN201910395031.4A patent/CN110135179A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160117518A1 (en) * | 2013-06-07 | 2016-04-28 | Beijing Qihoo Technology Company Limited | File Encryption/Decryption Device And File Encryption/Decryption Method |
CN106815924A (en) * | 2016-12-22 | 2017-06-09 | 河南职业技术学院 | A kind of accounting voucher processing system |
CN108390867A (en) * | 2018-02-06 | 2018-08-10 | 杭州政信金服互联网科技有限公司 | Card file enciphering method and decryption method are deposited in the administration of justice |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555740A (en) * | 2019-08-29 | 2019-12-10 | 国网浙江省电力有限公司宁波供电公司 | Data processing method and system for ETC toll |
CN110717187A (en) * | 2019-09-19 | 2020-01-21 | 秦滢珺 | Accounting document encryption method and decryption method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100334830C (en) | Automated transaction machine digital signature system and method | |
RU2494455C2 (en) | Electronic certification, identification and transmission of information using coded graphic images | |
US8281145B2 (en) | Doing business without SSN, EIN, and charge card numbers | |
EP1734472B1 (en) | Issuing machine and issuing system | |
US9147189B2 (en) | Secure reports for electronic payment systems | |
CN108763463A (en) | A kind of Digital Archives System based on block chain | |
CN1271449A (en) | Electronic payment system | |
AU701005B2 (en) | Charging system and method | |
CN110689415B (en) | Public resource transaction platform management system | |
JPH08101867A (en) | Software use permission system | |
US20130001302A1 (en) | Automated Banking Machine that Operates Responsive to Data Bearing Records | |
CN101727650A (en) | Comparing method and comparing system of electronic invoice | |
EP2905739A1 (en) | Electronic bills management system and electronic bills management method | |
CN102231200A (en) | Method for transacting bankcard application through mobile intelligent terminal | |
US20060083214A1 (en) | Information vault, data format conversion services system and method | |
CN110135179A (en) | A kind of accounting voucher encryption method and decryption method | |
US9552181B1 (en) | Method and apparatus for authorizing a print device to perform a service | |
CN115841370A (en) | Electronic bidding insurance letter full-flow public service system | |
US20150043025A1 (en) | Method for transmitting documents and/or information with permanent authentication | |
US20070300067A1 (en) | Notice of Revocation System for Revocable or Modifiable Documents | |
JP2008513858A (en) | Method and equipment for postage payment | |
CN1916985A (en) | Automated transaction machine digital signature system and method | |
KR20220048880A (en) | The safe and convenient method to transfer trade account receivable | |
TW202040396A (en) | Online bidding method and online bidding system using the encrypted block chain technology to provide a secured and reliable bidding system | |
US20070192589A1 (en) | System and method for encrypting webpage logs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |