CN110995690A - Secure storage method and device based on cloud storage - Google Patents

Secure storage method and device based on cloud storage Download PDF

Info

Publication number
CN110995690A
CN110995690A CN201911189342.1A CN201911189342A CN110995690A CN 110995690 A CN110995690 A CN 110995690A CN 201911189342 A CN201911189342 A CN 201911189342A CN 110995690 A CN110995690 A CN 110995690A
Authority
CN
China
Prior art keywords
data
storage
access
key
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911189342.1A
Other languages
Chinese (zh)
Inventor
冷迪
黄建华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Power Supply Bureau Co Ltd
Original Assignee
Shenzhen Power Supply Bureau Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Power Supply Bureau Co Ltd filed Critical Shenzhen Power Supply Bureau Co Ltd
Priority to CN201911189342.1A priority Critical patent/CN110995690A/en
Publication of CN110995690A publication Critical patent/CN110995690A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Abstract

The invention provides a safe storage method based on cloud storage, which comprises the steps that a safe storage device acquires a user access instruction, initiates data access to a local server, and acquires corresponding access data from the local server; after receiving an operation instruction of a user for storing access data, the safety storage device responds to the operation instruction and encapsulates and stores the access data in an object form to obtain object storage data; the secure storage device encrypts object storage data and generates a key corresponding to the object storage data; and the safety storage equipment sends the encrypted object storage data and the corresponding key thereof to the private cloud server for storage. By implementing the invention, the data to be stored can be encrypted and stored so as to improve the safety of data storage.

Description

Secure storage method and device based on cloud storage
Technical Field
The invention relates to the technical field of cloud computing, in particular to a secure storage method and device based on cloud storage.
Background
With the rapid development of the internet and Web2.0, hundreds of billions of small files are created by Web application; people upload massive photos, videos and music, billions of contents are newly added to a social network every day, and hundreds of billions of e-mails are sent to people every day. Data will grow 44 times in the future 10 years by IDC statistics and global data will increase to 35ZB by 2020, with 80% unstructured data and most inactive data.
In recent years, the explosive development of the cloud computing industry enables enterprises and individuals to conveniently acquire computing, storage and network resources. People are getting higher and higher in acceptance degree of the emerging cloud service, enterprises do not need to spend a large amount of funds to purchase a traditional disk array (SAN storage) at one time, and do not need to manage and maintain the storage equipment by specially-assigned people, infinite seamless capacity expansion is really achieved, charging is carried out according to needs, particularly distributed object storage provided by private cloud characteristics, and due to the characteristics of stability, safety, high efficiency and easiness in use, and a standard Restful API interface is provided, unstructured data in any data and form can be stored, so that the enterprises are more and more popular in the enterprise market.
The use of cloud storage (distributed object storage) means that an enterprise needs to host and store NAS data of an original Storage Area Network (SAN) of an intranet in the enterprise in a private cloud, and due to the cloud property of object storage, the enterprise or a user is seriously worried about selecting and using private cloud object storage, and in addition, the current private cloud storage has hundreds of families to cry over, the quality is uneven, and the user is difficult to select. The security and reliability are poor, security leakage events are layered endlessly, and no matter large manufacturers or small providers, security events such as data and account leakage occur continuously. After the data of the enterprise intranet is hosted in a private cloud storage object, the access quality of the data and the availability of the data are completely dependent on the service capability of the manufacturer, and once a problem occurs, the operation and maintenance of the data and the operation of the service of the enterprise are affected.
Therefore, a secure storage method based on cloud storage is needed, which can encrypt and store data to be stored so as to improve the security of data storage.
Disclosure of Invention
The technical problem to be solved by the embodiments of the present invention is to provide a secure storage method and device based on cloud storage, which can encrypt and store data to be stored, so as to improve the security of data storage.
In order to solve the above technical problem, an embodiment of the present invention provides a secure storage method based on cloud storage, where the method includes the following steps:
the method comprises the steps that a secure storage device obtains a user access instruction, initiates data access to a local server according to the obtained user access instruction, and further obtains corresponding access data from the local server;
after receiving an operation instruction of a user for storing the access data, the secure storage device responds to the operation instruction and encapsulates and stores the access data in an object form to obtain object storage data;
the secure storage device encrypts the object storage data and generates a key corresponding to the object storage data;
and the safety storage equipment sends the encrypted object storage data and the corresponding key thereof to the private cloud server for storage.
Wherein the method further comprises:
and the safety storage equipment receives the encrypted object storage data stored by the private cloud server and the corresponding key thereof, and decrypts the received encrypted object storage data according to the received key.
Wherein the access data comprises picture data, video data or user backup data.
Wherein the access data is packaged and stored in a mode of taking unstructured data abstraction as an object; wherein the object comprises:
a key name for identifying the object storage path;
a key value for storing content data of the object;
an access control list for identifying the object as accessible to a group of users; and
for storing metadata of object properties.
The object storage data is encrypted by adopting a Logistic algorithm, and the method specifically comprises the following steps:
presetting a branch parameter mu 0 and an initial chaotic parameter x 0; wherein, mu 0 is more than 3.569945672 and less than or equal to 4, x0 is more than 0 and less than 1;
obtaining a first sequence containing M chaotic parameters by using a preset branch parameter mu 0 and an initial chaotic parameter x0 in an iterative mode, and converting all chaotic parameters in the first sequence into integers between 0 and 255 to form a second sequence; wherein the size of M is the same as the total number of pixel points of the original image;
performing exclusive-or processing on each component value in the object storage data and the corresponding chaotic parameter in the integer form in the second sequence to obtain each processed component value, and further obtain a key corresponding to the object storage data; wherein, one component value is only corresponding to the chaotic parameter in the form of an integer.
The embodiment of the invention also provides a safe storage device based on cloud storage, which comprises a data access unit, a data storage unit, a data encryption unit and a data sending unit; wherein the content of the first and second substances,
the data access unit is used for acquiring a user access instruction, initiating data access to a local server according to the acquired user access instruction, and further acquiring corresponding access data from the local server;
the data storage unit is used for responding to an operation instruction after receiving the operation instruction of the user for storing the access data, and packaging and storing the access data in an object form to obtain object storage data;
the data encryption unit is used for encrypting the object storage data and generating a key corresponding to the object storage data;
and the data sending unit is used for sending the encrypted object storage data and the corresponding key thereof to the private cloud server for storage.
Wherein, still include:
and the data decryption unit is used for receiving the encrypted object storage data stored by the private cloud server and the corresponding key thereof, and decrypting the received encrypted object storage data according to the received key.
Wherein the access data comprises picture data, video data or user backup data.
Wherein the access data is packaged and stored in a mode of taking unstructured data abstraction as an object; wherein the object comprises:
a key name for identifying the object storage path;
a key value for storing content data of the object;
an access control list for identifying the object as accessible to a group of users; and
for storing metadata of object properties.
The embodiment of the invention has the following beneficial effects:
according to the invention, the access data obtained from the local server is encrypted and stored in the private cloud server side in an object form, so that the security of data storage can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is within the scope of the present invention for those skilled in the art to obtain other drawings based on the drawings without inventive exercise.
Fig. 1 is a flowchart of a secure storage method based on cloud storage according to an embodiment of the present invention;
fig. 2 is an application scenario diagram of a secure storage device based on cloud storage, which is provided in the embodiment of the present invention, communicating with a local server and a private cloud server;
fig. 3 is a schematic system structure diagram of a secure storage device based on cloud storage according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings.
As shown in fig. 1, in an embodiment of the present invention, a secure storage device based on cloud storage is provided, where the method includes the following steps:
step S1, the secure storage device acquires a user access instruction, initiates data access to a local server according to the acquired user access instruction, and further acquires corresponding access data from the local server;
the specific process is that, as shown in fig. 2, the secure storage device communicates with the local server and the private cloud server. Among these, secure storage devices include, but are not limited to, cell phones, tablets, personal computers, and wearable devices.
A user initiates an access instruction to a local server on a secure storage device, the secure storage device converts the access instruction into corresponding operation content, data or an instruction to access data of the local server, and further acquires corresponding access data from the local server; the access data includes, but is not limited to, picture data, video data, user backup data, and the like.
In one embodiment, a user logs on a local server from a web browser on a secure storage device to access page content of the local server, forming a mode for initiating data access to the local server, so as to obtain corresponding access data, such as pictures, videos, or texts, etc., from the local server.
Step S2, after receiving an operation instruction of the user for storing the access data, the secure storage device responds to the operation instruction and encapsulates and stores the access data in an object form to obtain object storage data;
after a user initiates a storage instruction on the access data on the secure storage device, the secure storage device executes the storage operation instruction, and encapsulates and stores the access data in an object form to obtain object storage data; the access data is packaged and stored in the form of an unstructured data abstraction as an object, and the object comprises: a key name for identifying the object storage path; a key value for storing content data of the object; an access control list for identifying the object as accessible to a group of users; and metadata for storing object properties.
It should be noted that the object stores all have a globally unique ID, and a flat structure is adopted to manage all Data, and after the user/application is authenticated by the access code (AccessKey), the container/object and related Data (Data), metadata (metadata) and object Attribute (Attribute) can be accessed only according to the ID.
Meanwhile, the object may be stored as a file or a directory. Typically, each stored object will contain extended attributes, some of which are required by the server of the object store and others of which the client of the object store can define itself in use.
In one embodiment, when browsing pictures on a local server, a user is interested in a certain picture, the picture can be stored through a safe storage device, and then the picture is packaged and stored in an object form to obtain corresponding object storage data; for another example, a user is interested in a certain video on the local server, the video can be stored through the secure storage device, and then the video is packaged and stored in an object form to obtain corresponding object storage data; .
Step S3, the secure storage device encrypts the object storage data and generates a key corresponding to the object storage data;
the specific process is that the object storage data is encrypted by using a Logistic algorithm, and specifically comprises the following steps:
presetting a branch parameter mu 0 and an initial chaotic parameter x 0; wherein, mu 0 is more than 3.569945672 and less than or equal to 4, x0 is more than 0 and less than 1;
obtaining a first sequence containing M chaotic parameters by using a preset branch parameter mu 0 and an initial chaotic parameter x0 in an iterative mode, and converting all chaotic parameters in the first sequence into integers between 0 and 255 to form a second sequence; wherein the size of M is the same as the total number of pixel points of the original image;
performing exclusive-or processing on each component value in the object storage data and the corresponding chaotic parameter in the integer form in the second sequence to obtain each processed component value, and further obtain a key corresponding to the object storage data; wherein, one component value is only corresponding to the chaotic parameter in the form of an integer.
And step S4, the safety storage equipment sends the encrypted object storage data and the corresponding key thereof to a private cloud server for storage.
The specific process is that the encrypted object storage data and the corresponding key are sent to a private cloud server for storage; the encrypted object storage data and the corresponding key thereof can be stored together or separately on the private cloud server.
In an embodiment of the invention, the method further comprises:
and the safety storage equipment receives the encrypted object storage data stored by the private cloud server and the corresponding key thereof, and decrypts the received encrypted object storage data according to the received key.
As shown in fig. 3, in an embodiment of the present invention, a secure storage device based on cloud storage includes a data access unit 10, a data storage unit 20, a data encryption unit 30, and a data sending unit 40; wherein the content of the first and second substances,
the data access unit 10 is configured to acquire a user access instruction, initiate data access to a local server according to the acquired user access instruction, and further acquire corresponding access data from the local server;
the data storage unit 20 is configured to respond to an operation instruction after receiving the operation instruction for storing the access data by the user, and package and store the access data in an object form to obtain object storage data;
the data encryption unit 30 is configured to encrypt the object storage data and generate a key corresponding to the object storage data;
the data sending unit 40 is configured to send the encrypted object storage data and the key corresponding to the encrypted object storage data to the private cloud server for storage.
Wherein, still include:
and a data decryption unit 50, configured to receive the encrypted object storage data stored by the private cloud server and the key corresponding to the encrypted object storage data, and decrypt the received encrypted object storage data according to the received key.
Wherein the access data comprises picture data, video data or user backup data.
Wherein the access data is packaged and stored in a mode of taking unstructured data abstraction as an object; wherein the object comprises:
a key name for identifying the object storage path;
a key value for storing content data of the object;
an access control list for identifying the object as accessible to a group of users; and
for storing metadata of object properties.
The embodiment of the invention has the following beneficial effects:
according to the invention, the access data obtained from the local server is encrypted and stored in the private cloud server side in an object form, so that the security of data storage can be improved.
It should be noted that, in the above device embodiment, the included device units are only divided according to functional logic, but are not limited to the above division as long as the corresponding functions can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.
It will be understood by those skilled in the art that all or part of the steps in the method for implementing the above embodiments may be implemented by relevant hardware instructed by a program, and the program may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc.
While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not to be limited to the disclosed embodiment, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (9)

1. A secure storage method based on cloud storage is characterized by comprising the following steps:
the method comprises the steps that a secure storage device obtains a user access instruction, initiates data access to a local server according to the obtained user access instruction, and further obtains corresponding access data from the local server;
after receiving an operation instruction of a user for storing the access data, the secure storage device responds to the operation instruction and encapsulates and stores the access data in an object form to obtain object storage data;
the secure storage device encrypts the object storage data and generates a key corresponding to the object storage data;
and the safety storage equipment sends the encrypted object storage data and the corresponding key thereof to the private cloud server for storage.
2. The secure cloud storage-based storage method of claim 1, wherein the method further comprises:
and the safety storage equipment receives the encrypted object storage data stored by the private cloud server and the corresponding key thereof, and decrypts the received encrypted object storage data according to the received key.
3. The secure storage method based on cloud storage according to claim 1, wherein said access data comprises picture data, video data, or user backup data.
4. The secure storage method based on cloud storage according to claim 1, wherein the access data is packaged for storage in a form of unstructured data abstraction as an object; wherein the object comprises:
a key name for identifying the object storage path;
a key value for storing content data of the object;
an access control list for identifying the object as accessible to a group of users; and
for storing metadata of object properties.
5. The secure storage method based on cloud storage according to claim 1, wherein the object storage data is encrypted by using a Logistic algorithm, specifically:
presetting a branch parameter mu 0 and an initial chaotic parameter x 0; wherein, mu 0 is more than 3.569945672 and less than or equal to 4, x0 is more than 0 and less than 1;
obtaining a first sequence containing M chaotic parameters by using a preset branch parameter mu 0 and an initial chaotic parameter x0 in an iterative mode, and converting all chaotic parameters in the first sequence into integers between 0 and 255 to form a second sequence; wherein the size of M is the same as the total number of pixel points of the original image;
performing exclusive-or processing on each component value in the object storage data and the corresponding chaotic parameter in the integer form in the second sequence to obtain each processed component value, and further obtain a key corresponding to the object storage data; wherein, one component value is only corresponding to the chaotic parameter in the form of an integer.
6. The safe storage equipment based on cloud storage is characterized by comprising a data access unit, a data storage unit, a data encryption unit and a data sending unit; wherein the content of the first and second substances,
the data access unit is used for acquiring a user access instruction, initiating data access to a local server according to the acquired user access instruction, and further acquiring corresponding access data from the local server;
the data storage unit is used for responding to an operation instruction after receiving the operation instruction of the user for storing the access data, and packaging and storing the access data in an object form to obtain object storage data;
the data encryption unit is used for encrypting the object storage data and generating a key corresponding to the object storage data;
and the data sending unit is used for sending the encrypted object storage data and the corresponding key thereof to the private cloud server for storage.
7. The cloud storage based secure storage device of claim 6, further comprising:
and the data decryption unit is used for receiving the encrypted object storage data stored by the private cloud server and the corresponding key thereof, and decrypting the received encrypted object storage data according to the received key.
8. The cloud storage based secure storage device of claim 6, wherein said access data comprises picture data, video data, or user backup data.
9. The cloud storage based secure storage device of claim 6, wherein said access data encapsulates storage in an unstructured data abstraction as an object form; wherein the object comprises:
a key name for identifying the object storage path;
a key value for storing content data of the object;
an access control list for identifying the object as accessible to a group of users; and
for storing metadata of object properties.
CN201911189342.1A 2019-11-28 2019-11-28 Secure storage method and device based on cloud storage Pending CN110995690A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911189342.1A CN110995690A (en) 2019-11-28 2019-11-28 Secure storage method and device based on cloud storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911189342.1A CN110995690A (en) 2019-11-28 2019-11-28 Secure storage method and device based on cloud storage

Publications (1)

Publication Number Publication Date
CN110995690A true CN110995690A (en) 2020-04-10

Family

ID=70087666

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911189342.1A Pending CN110995690A (en) 2019-11-28 2019-11-28 Secure storage method and device based on cloud storage

Country Status (1)

Country Link
CN (1) CN110995690A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598713A (en) * 2022-03-11 2022-06-07 上海凯翔信息科技有限公司 Data processing system based on cloud NAS

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102946436A (en) * 2012-11-26 2013-02-27 北京奇虎科技有限公司 Download system
CN102970369A (en) * 2012-11-26 2013-03-13 北京奇虎科技有限公司 Downloading browser and method
CN104615700A (en) * 2015-01-27 2015-05-13 北京奇虎科技有限公司 Method for collecting webpage objects in browser, browser client side and system
CN105025086A (en) * 2015-06-11 2015-11-04 江南大学 A cloud safe storing/retrieving method targeted at mobile intelligent terminals
CN107295018A (en) * 2017-08-14 2017-10-24 北京连云决科技有限公司 A kind of safety storage of cloud disc file and sharing method
CN108881664A (en) * 2018-07-10 2018-11-23 深圳市华讯方舟太赫兹科技有限公司 Image storage and deployment method, processing equipment, processing system, storage device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102946436A (en) * 2012-11-26 2013-02-27 北京奇虎科技有限公司 Download system
CN102970369A (en) * 2012-11-26 2013-03-13 北京奇虎科技有限公司 Downloading browser and method
CN104615700A (en) * 2015-01-27 2015-05-13 北京奇虎科技有限公司 Method for collecting webpage objects in browser, browser client side and system
CN105025086A (en) * 2015-06-11 2015-11-04 江南大学 A cloud safe storing/retrieving method targeted at mobile intelligent terminals
CN107295018A (en) * 2017-08-14 2017-10-24 北京连云决科技有限公司 A kind of safety storage of cloud disc file and sharing method
CN108881664A (en) * 2018-07-10 2018-11-23 深圳市华讯方舟太赫兹科技有限公司 Image storage and deployment method, processing equipment, processing system, storage device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598713A (en) * 2022-03-11 2022-06-07 上海凯翔信息科技有限公司 Data processing system based on cloud NAS
CN114598713B (en) * 2022-03-11 2024-01-12 上海凯翔信息科技有限公司 Cloud NAS-based data processing system

Similar Documents

Publication Publication Date Title
US11650955B2 (en) Systems and methods for distributed data storage and delivery using blockchain
US9077541B2 (en) Methods and systems for storage of large data objects
Celesti et al. Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems
US9602283B1 (en) Data encryption in a de-duplicating storage in a multi-tenant environment
US20190087432A1 (en) Secure searchable and shareable remote storage system and method
US10608815B2 (en) Content encryption and decryption using a custom key
EP3716123A1 (en) File packing and file package unpacking method and apparatus, and network device
CN107302706B (en) Image anti-hotlinking method and device and electronic equipment
CN102281141B (en) Document permission management method, apparatus and system
Virvilis et al. Secure cloud storage: Available infrastructures and architectures review and evaluation
US20220209945A1 (en) Method and device for storing encrypted data
CN111460503A (en) Data sharing method, device, equipment and storage medium
CN104992124A (en) Document safety access method for cloud storage environment
WO2023216987A1 (en) Container image construction method and apparatus
CN110995690A (en) Secure storage method and device based on cloud storage
CN111798236B (en) Transaction data encryption and decryption methods, devices and equipment
CN112202555A (en) Information processing method, device and equipment for generating random number based on attribute of information
JP6755539B2 (en) Methods and equipment for publishing copyrighted works on networks
CN110020533B (en) Safety protection method for VR resources and terminal
CN108985109A (en) A kind of date storage method and device
Özmen et al. EDU-DRM: A digital rights management (DRM) system for K-12 education
Jang et al. Cloud backup: an enhanced smartphone app designed with cross-platform approach
CN111460502A (en) Data sharing method, device, equipment and storage medium
Saravanan et al. Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications
CN109660604B (en) Data access method and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200410

RJ01 Rejection of invention patent application after publication