CN113329013A - Power dispatching data network security encryption method and system based on digital certificate - Google Patents
Power dispatching data network security encryption method and system based on digital certificate Download PDFInfo
- Publication number
- CN113329013A CN113329013A CN202110588605.7A CN202110588605A CN113329013A CN 113329013 A CN113329013 A CN 113329013A CN 202110588605 A CN202110588605 A CN 202110588605A CN 113329013 A CN113329013 A CN 113329013A
- Authority
- CN
- China
- Prior art keywords
- information
- voice
- verification
- module
- dispatching
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000012795 verification Methods 0.000 claims abstract description 103
- 230000001815 facial effect Effects 0.000 claims description 47
- 230000005540 biological transmission Effects 0.000 claims description 7
- 239000012634 fragment Substances 0.000 claims description 6
- 230000009977 dual effect Effects 0.000 abstract description 2
- 238000013524 data verification Methods 0.000 description 6
- 230000001276 controlling effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Abstract
The invention relates to the field of power dispatching, and particularly discloses a power dispatching data network security encryption method and system based on a digital certificate, wherein an operator edits personal information files of power dispatching personnel in a terminal database, and uploads collected face information to the terminal database to correspond to the power dispatching personnel; after the electric power dispatching personnel are filed, the computer generates voice verification information special for the current dispatching personnel, so that a system which needs to perform face feature verification and dual-key verification of voice information verification is formed, and after a user passes the dual verification of voice and face recognition information, a first key and a second key are obtained, so that data communication with a dispatching data center can be realized, and whether external personnel can use dispatching equipment of the dispatching personnel for operation is avoided.
Description
Technical Field
The invention relates to the field of power dispatching, in particular to a power dispatching data network security encryption method and system based on a digital certificate.
Background
At present, with the increasing scale of power grids, the current work traffic of power grid dispatching is also increased sharply, and the amount of the channels required by regulating and controlling personnel and various professionals including power transformation operators and power transmission managers through dispatching telephones is also increased greatly.
Because the number of substations managed by each level of current dispatching is hundreds, and the number of professionals involved is large, each dispatching needs to receive a large number of outgoing calls.
Disclosure of Invention
The invention aims to provide a power dispatching data network security encryption method and system based on a digital certificate, and aims to solve the technical problems that in the prior art, a telephone outgoing call of a current power dispatching station is not encrypted, any external person can make the telephone outgoing call, and if the external person pretends to be a regulator to use the telephone to make the telephone outgoing call, an unpredictable result is caused.
In order to achieve the above object, the present invention provides a power dispatching data network security encryption method based on digital certificate, which comprises the following steps:
inputting face information and voice verification information of power dispatching personnel into a terminal database;
acquiring facial feature information of a user through telephone scheduling equipment, and comparing the facial feature information with input information of a terminal database;
acquiring voice information of a user through a telephone scheduling device, and comparing the voice information with voice verification information recorded in a terminal database;
and after the facial feature information and the voice verification information of the user are authenticated, the power dispatching telephone is accessed to the data network.
Wherein, in the step of inputting the face information and the voice verification information of the power dispatching personnel into the terminal database, the method also comprises the steps of,
establishing a dispatcher information file;
shooting facial feature images of dispatching personnel by using a face recognition camera;
uploading facial feature images of dispatching personnel to a terminal database;
and generating special voice verification information of the current scheduling personnel.
Wherein, in the step of acquiring the facial feature information of the user through the telephone dispatching equipment and comparing the facial feature information with the input information of the terminal database, the method also comprises the steps of,
installing a face recognition device on the power dispatching telephone;
the face recognition equipment acquires face information of a user and transmits the face information to a terminal database through a network;
the terminal database verifies the comparison of the face information of the current user with the entered information.
Wherein, in the comparison of the face information of the current user with the input information verified by the terminal database, the method further comprises,
if the face information of the current user passes the obtaining, obtaining a first key, and performing voice information verification;
if the face information of the current user is not obtained, the call dispatching equipment cuts off the call.
Wherein, in the step of acquiring the voice information of the user through the telephone dispatching equipment and comparing the voice information with the voice verification information recorded in the terminal database, the method also comprises the steps of,
the telephone dispatching equipment intercepts the voice message segment of the user;
the telephone dispatching equipment sends the intercepted voice information fragments to a terminal database;
and the terminal database identifies the intercepted voice information fragment and compares the identified voice information with the voice verification information recorded by the scheduling personnel.
Wherein, in the step that the terminal database identifies the intercepted voice information segment and compares the identified voice information with the voice verification information recorded by the dispatcher, the method also comprises the steps of,
if the voice verification information of the current user passes, acquiring a second key;
if the voice verification information of the current user is not passed, the call dispatching equipment cuts off the call.
A power dispatching data network security encryption system based on a digital certificate comprises a telephone dispatching module, a face information verification module, a voice information verification module and a terminal data module, wherein the telephone dispatching module is connected with the face information verification module and the voice information verification module, and the terminal data module is connected with the face information verification module and the voice information verification module;
the telephone scheduling module is used for acquiring the facial information and the voice information of a user and respectively sending the facial information and the voice information to the facial information verification module and the voice information verification module;
the face information verification module is used for verifying the face information of the user and realizing data transmission with the terminal data module;
the voice information verification module is used for verifying the voice information of the user and realizing data transmission with the terminal data module;
and the terminal data module is used for storing the face and the voice information of the dispatcher.
The telephone scheduling module comprises a facial information acquisition sub-module and a voice information acquisition sub-module, the facial information acquisition sub-module is connected with the facial information verification module, and the voice information acquisition sub-module is connected with the voice information verification module;
the facial information acquisition submodule is used for acquiring facial feature information of a user and transmitting the information to the facial information verification module;
the voice information acquisition submodule is used for acquiring voice characteristic information of a user and transmitting the information to the voice information verification module.
According to the method and the system for safely encrypting the power dispatching data network based on the digital certificate, an operator edits the personal information file of the power dispatching personnel in the terminal database at first, and uploads the collected face information to the terminal database to correspond to the power dispatching personnel; after the electric power dispatching personnel are filed, the computer generates voice verification information special for the current dispatching personnel, so that a system which needs to perform face feature verification and dual-key verification of voice information verification is formed, and after a user passes the dual verification of voice and face recognition information, a first key and a second key are obtained, so that data communication with a dispatching data center can be realized, and whether external personnel can use dispatching equipment of the dispatching personnel for operation is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flow chart of the digital certificate-based power dispatching data network security encryption method of the invention.
Fig. 2 is a flowchart of inputting face information and voice verification information of a power dispatching person according to the present invention.
Fig. 3 is a flow chart of the present invention for verifying facial feature information of a user.
FIG. 4 is a flow chart of the present invention for verifying the voice message of the user.
Fig. 5 is a system diagram of the digital certificate based power dispatching data network security encryption system of the present invention.
In the figure: the system comprises a 1-telephone scheduling module, a 2-face information verification module, a 3-voice information verification module, a 4-terminal data module, an 11-face information acquisition sub-module and a 12-voice information acquisition sub-module.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
In the description of the present invention, it is to be understood that the terms "length", "width", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on the orientations or positional relationships illustrated in the drawings, and are used merely for convenience in describing the present invention and for simplicity in description, and do not indicate or imply that the devices or elements referred to must have a particular orientation, be constructed in a particular orientation, and be operated, and thus, are not to be construed as limiting the present invention. Further, in the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
Referring to fig. 1 to 4, the present invention provides a power dispatching data network security encryption method based on digital certificates, which includes the following steps:
s101: inputting face information and voice verification information of power dispatching personnel into a terminal database;
s1011: establishing a dispatcher information file;
s1012: shooting facial feature images of dispatching personnel by using a face recognition camera;
s1013: uploading facial feature images of dispatching personnel to a terminal database;
s1014: generating special voice verification information of current scheduling personnel;
in the embodiment, the face information acquisition equipment is used for acquiring face data of the power dispatching personnel, the face information acquisition equipment in the scheme adopts a face acquisition instrument with a model number of XP2020-7, the face acquisition instrument can realize information communication with a terminal database through WIFI signals, an operator firstly edits personal information files of the power dispatching personnel in the terminal database, and uploads the acquired face information to the terminal database to correspond to the power dispatching personnel; after the power dispatching personnel are filed, the computer generates voice verification information special for the current dispatching personnel, so that a system needing face feature verification and voice information verification and double-key verification is formed, and whether external personnel can use dispatching equipment of the dispatching personnel for operation is avoided.
S102: acquiring facial feature information of a user through telephone scheduling equipment, and comparing the facial feature information with input information of a terminal database;
s1021: installing a face recognition device on the power dispatching telephone;
s1022: the face recognition equipment acquires face information of a user and transmits the face information to a terminal database through a network;
s1023: the terminal database verifies the comparison between the face information of the current user and the input information, if the face information of the current user passes, a first key is obtained, voice information verification is carried out, and if the face information of the current user does not pass, the telephone dispatching equipment cuts off the call;
in the embodiment, a face acquisition device with the model number of XP2020-7 is installed on the power dispatching telephone and is used for acquiring the face information of a user, and in the process of acquiring the face information, the user is required to look at an acquisition port of the face acquisition device and keep a distance of 50cm, so that the face acquisition device can acquire the face information of the user completely; the face acquisition equipment transmits data to a face data verification module located at the front end of a terminal database through a wireless network for recognition, meanwhile, the face data verification module sends request information, so that face data searching is conducted in the terminal database to search face information matched with a user, if the face information matched with the user is found, face recognition is passed, and therefore a first key is obtained, and the telephone dispatching equipment conducts voice information verification.
S103: acquiring voice information of a user through a telephone scheduling device, and comparing the voice information with voice verification information recorded in a terminal database;
s1031: the telephone dispatching equipment intercepts the voice message segment of the user;
s1032: the telephone dispatching equipment sends the intercepted voice information fragments to a terminal database;
s1033: and the terminal database identifies the intercepted voice information fragment, compares the identified voice information with the voice verification information recorded by the dispatching personnel, acquires a second key if the voice verification information of the current user passes, and cuts off the call by the telephone dispatching equipment if the voice verification information of the current user does not pass.
In this embodiment, the telephone dispatching device can communicate with the voice information verification module located at the front end of the terminal database, intercept and store the voice of the user when the telephone dispatching device is switched on, transmit the voice information to the voice information verification module located at the front end of the terminal database through a WIFI signal to perform voice information verification, and obtain a second key if the voice verification information of the current user passes, wherein multiple setting can be performed on the verification information to improve the information security level.
S104: and after the facial feature information and the voice verification information of the user are authenticated, the power dispatching telephone is accessed to the data network.
In the embodiment, after the user passes the double verification of the voice and face recognition information, the first key and the second key are obtained, and the data communication with the dispatching data center can be realized; if the verification fails in the voice information verification or the face recognition verification, the telephone dispatching equipment terminates the current verification, and the user can hang up the telephone and then conduct the verification again.
Further, please refer to fig. 1, a power dispatching data network security encryption system based on a digital certificate includes a phone dispatching module, a face information verification module, a voice information verification module and a terminal data module, wherein the phone dispatching module is connected with the face information verification module and the voice information verification module, and the terminal data module is connected with the face information verification module and the voice information verification module;
the telephone scheduling module is used for acquiring the facial information and the voice information of a user and respectively sending the facial information and the voice information to the facial information verification module and the voice information verification module;
the face information verification module is used for verifying the face information of the user and realizing data transmission with the terminal data module;
the voice information verification module is used for verifying the voice information of the user and realizing data transmission with the terminal data module;
and the terminal data module is used for storing the face and the voice information of the dispatcher.
Further, please refer to fig. 5, the phone scheduling module includes a facial information collecting sub-module and a voice information collecting sub-module, the facial information collecting sub-module is connected to the facial information verifying module, and the voice information collecting sub-module is connected to the voice information verifying module;
the facial information acquisition submodule is used for acquiring facial feature information of a user and transmitting the information to the facial information verification module;
the voice information acquisition submodule is used for acquiring voice characteristic information of a user and transmitting the information to the voice information verification module.
In the embodiment, the face acquisition equipment transmits data to a face data verification module at the front end of a terminal database through a wireless network for identification, and the face data verification module sends request information, so that face data searching is performed in the terminal database to search face information matched with a user; the face acquisition equipment transmits data to a face data verification module at the front end of a terminal database through a wireless network for recognition, and meanwhile, the face data verification module sends request information, so that face data is searched in the terminal database to search face information matched with a user; after the user passes the double verification of the voice and face recognition information, a first key and a second key are obtained, and then the data communication with the dispatching data center can be realized; if the verification fails in the voice information verification or the face recognition verification, the telephone dispatching equipment terminates the current verification, and the user can hang up the telephone and then conduct the verification again.
While the invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (8)
1. A power dispatching data network security encryption method based on a digital certificate is characterized by comprising the following steps:
inputting face information and voice verification information of power dispatching personnel into a terminal database;
acquiring facial feature information of a user through telephone scheduling equipment, and comparing the facial feature information with input information of a terminal database;
acquiring voice information of a user through a telephone scheduling device, and comparing the voice information with voice verification information recorded in a terminal database;
and after the facial feature information and the voice verification information of the user are authenticated, the power dispatching telephone is accessed to the data network.
2. The digital certificate-based power dispatching data network security encryption method of claim 1, wherein in the step of inputting face information and voice verification information of power dispatching personnel into a terminal database, the method further comprises,
establishing a dispatcher information file;
shooting facial feature images of dispatching personnel by using a face recognition camera;
uploading facial feature images of dispatching personnel to a terminal database;
and generating special voice verification information of the current scheduling personnel.
3. The digital certificate-based power dispatching data network security encryption method of claim 1, wherein in the step of acquiring facial feature information of a user through a telephone dispatching device and comparing the facial feature information with the entry information of a terminal database, the method further comprises,
installing a face recognition device on the power dispatching telephone;
the face recognition equipment acquires face information of a user and transmits the face information to a terminal database through a network;
the terminal database verifies the comparison of the face information of the current user with the entered information.
4. The digital certificate-based power dispatching data network security encryption method according to claim 3, wherein in the comparison of the face information of the current user with the entered information verified by the terminal database, the method further comprises,
if the face information of the current user passes the obtaining, obtaining a first key, and performing voice information verification;
if the face information of the current user is not obtained, the call dispatching equipment cuts off the call.
5. The digital certificate-based power dispatching data network security encryption method of claim 1, wherein in the step of obtaining the voice information of the user through the telephone dispatching equipment and comparing the voice information with the voice verification information recorded in the terminal database, the method further comprises,
the telephone dispatching equipment intercepts the voice message segment of the user;
the telephone dispatching equipment sends the intercepted voice information fragments to a terminal database;
and the terminal database identifies the intercepted voice information fragment and compares the identified voice information with the voice verification information recorded by the scheduling personnel.
6. The power dispatching data network security encryption method based on the digital certificate as claimed in claim 5, wherein in the step of recognizing the intercepted voice information segment by the terminal database and comparing the recognized voice information with the voice verification information entered by the dispatcher, the method further comprises,
if the voice verification information of the current user passes, acquiring a second key;
if the voice verification information of the current user is not passed, the call dispatching equipment cuts off the call.
7. A power dispatching data network security encryption system based on a digital certificate is characterized by comprising a telephone dispatching module, a face information verification module, a voice information verification module and a terminal data module, wherein the telephone dispatching module is connected with the face information verification module and the voice information verification module;
the telephone scheduling module is used for acquiring the facial information and the voice information of a user and respectively sending the facial information and the voice information to the facial information verification module and the voice information verification module;
the face information verification module is used for verifying the face information of the user and realizing data transmission with the terminal data module;
the voice information verification module is used for verifying the voice information of the user and realizing data transmission with the terminal data module;
and the terminal data module is used for storing the face and the voice information of the dispatcher.
8. The power dispatch data network security encryption system of claim 7,
the telephone scheduling module comprises a facial information acquisition sub-module and a voice information acquisition sub-module, the facial information acquisition sub-module is connected with the facial information verification module, and the voice information acquisition sub-module is connected with the voice information verification module;
the facial information acquisition submodule is used for acquiring facial feature information of a user and transmitting the information to the facial information verification module;
the voice information acquisition submodule is used for acquiring voice characteristic information of a user and transmitting the information to the voice information verification module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110588605.7A CN113329013A (en) | 2021-05-28 | 2021-05-28 | Power dispatching data network security encryption method and system based on digital certificate |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110588605.7A CN113329013A (en) | 2021-05-28 | 2021-05-28 | Power dispatching data network security encryption method and system based on digital certificate |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113329013A true CN113329013A (en) | 2021-08-31 |
Family
ID=77421895
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110588605.7A Pending CN113329013A (en) | 2021-05-28 | 2021-05-28 | Power dispatching data network security encryption method and system based on digital certificate |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113329013A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014063363A1 (en) * | 2012-10-26 | 2014-05-01 | Baina Innovation (Chengdu) Technology Co., Limited | Method and system for authenticating computing devices |
CN106790054A (en) * | 2016-12-20 | 2017-05-31 | 四川长虹电器股份有限公司 | Interactive authentication system and method based on recognition of face and Application on Voiceprint Recognition |
CN109119084A (en) * | 2018-07-13 | 2019-01-01 | 广东电网有限责任公司 | A kind of dispatch call method and system based on speech recognition |
CN111953841A (en) * | 2020-08-11 | 2020-11-17 | 广东电网有限责任公司 | Power dispatching telephone system |
CN112332990A (en) * | 2020-09-09 | 2021-02-05 | 深圳市奥拓电子股份有限公司 | Security control method, device and storage medium for commanding and scheduling seats |
-
2021
- 2021-05-28 CN CN202110588605.7A patent/CN113329013A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014063363A1 (en) * | 2012-10-26 | 2014-05-01 | Baina Innovation (Chengdu) Technology Co., Limited | Method and system for authenticating computing devices |
CN106790054A (en) * | 2016-12-20 | 2017-05-31 | 四川长虹电器股份有限公司 | Interactive authentication system and method based on recognition of face and Application on Voiceprint Recognition |
CN109119084A (en) * | 2018-07-13 | 2019-01-01 | 广东电网有限责任公司 | A kind of dispatch call method and system based on speech recognition |
CN111953841A (en) * | 2020-08-11 | 2020-11-17 | 广东电网有限责任公司 | Power dispatching telephone system |
CN112332990A (en) * | 2020-09-09 | 2021-02-05 | 深圳市奥拓电子股份有限公司 | Security control method, device and storage medium for commanding and scheduling seats |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112055024B (en) | Authority verification method and device, storage medium and electronic equipment | |
US10818291B2 (en) | Method and apparatus for interacting information | |
CN1783773A (en) | Method of auto-configuration and auto-prioritizing for wireless security network | |
CN109618392B (en) | Network sharing method, device, equipment and computer readable storage medium | |
US11403380B2 (en) | Method for managing fingerprint and system thereof | |
WO2016127551A1 (en) | Communication method and system based on wearable device | |
CN104301317A (en) | Power telecommunication network field operation and maintenance data encryption transmission and verification method | |
CN110266576A (en) | Audio communication method and device | |
CN104916022A (en) | Intelligent lock control method, mobile terminal and intelligent lock system | |
CN109002875B (en) | Two-dimensional code encryption method, two-dimensional code transmission system and storage medium | |
CN110858971A (en) | Intelligent device network distribution method and system | |
CN104301369A (en) | Vehicle authentication for a BEV charger | |
CN107302428B (en) | Method for negotiating cipher algorithm of data transmission service in power distribution network | |
KR20140054970A (en) | Gateway or its processing method | |
CN109460646A (en) | Method for identifying ID, device, system, electronic equipment and readable medium | |
CN113329013A (en) | Power dispatching data network security encryption method and system based on digital certificate | |
CN104883535A (en) | Monitoring system and operation method thereof | |
CN102158856A (en) | Mobile terminal identification code authentication system and method, server and terminal | |
CN107257573A (en) | A kind of equipment accesses the system and method for wireless network | |
CN105471977A (en) | File transmission system for electric power system | |
CN109451497A (en) | Wireless network connecting method and device, electronic equipment, storage medium | |
CN111953841A (en) | Power dispatching telephone system | |
CN110430098B (en) | Data processing system | |
CN112838933A (en) | Information synchronization method, equipment and storage medium in network traffic analysis | |
CN205788310U (en) | A kind of system realizing Intelligent Checking on Work Attendance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210831 |