CN101795293A - File download method, file download system, sending device and detecting device - Google Patents

File download method, file download system, sending device and detecting device Download PDF

Info

Publication number
CN101795293A
CN101795293A CN201010102488A CN201010102488A CN101795293A CN 101795293 A CN101795293 A CN 101795293A CN 201010102488 A CN201010102488 A CN 201010102488A CN 201010102488 A CN201010102488 A CN 201010102488A CN 101795293 A CN101795293 A CN 101795293A
Authority
CN
China
Prior art keywords
file
verification
source file
checking routine
complete
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010102488A
Other languages
Chinese (zh)
Inventor
王洪亮
刘成平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201010102488A priority Critical patent/CN101795293A/en
Publication of CN101795293A publication Critical patent/CN101795293A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a file download method, a file download system, a sending device and a detecting device; the file download method comprises the steps that: a network side executes checking program to check a source file of a client to be downloaded, so that a first check file can be obtained; the checking program, the first check file and the source file are got together to generate an executable file which is then transmitted into the client; the executable file is executed by the client and is decomposed into the source file, the first check file and the checking program, and the checking program is transferred to check the source file to obtain a second check file; and according to the comparison result between the first check file and the second check file, the client can judge whether the source file is complete or not, if being the same, the source file is judged to be complete, or the source file is judged to be damaged. The invention can automatically detect the completeness of the downloaded files, is universal and flexible, and is more convenient and humanized when being applied to a computer.

Description

A kind of method for down loading of file, system and dispensing device, checkout gear
Technical field
The present invention relates to computer network field, be specifically related to a kind of method for down loading, system and dispensing device, checkout gear of file.
Background technology
Current, the extensive use of computer causes the download of file also more and more frequent.Traditional file in download does not have file integrality automatic detecting machine system, and the client is also often because of matter of time or detect the loaded down with trivial details detection of often ignoring file integrality.As shown in Figure 1, if file in download is damaged, two kinds of possibilities are arranged so, a kind of user of being knows, and then abandons using; Another kind is that the user does not know, can in use cause a hidden trouble like this, can't normally open such as file, the installation process of installation file has two kinds of results for another example, a kind of is wrongly can not normally finish installation, and this moment, the user can know that installation file damaged or have an other problems; Another kind is wrongly can normally finish installation, and will there be the safe handling hidden danger of this document in the user like this.So indispensable link that the integrity detection of file has become file to download.
The scheme of current computer manufacturer utilizes special testing tool to carry out manual detection to downloading to local file, has certain loaded down with trivial details property in operation, and expends time in, and lacks flexibility, can not well embody fast the purpose of hommization.
Summary of the invention
The technical problem to be solved in the present invention provides a kind of method for down loading, system and dispensing device, checkout gear of file, can carry out integrity detection to downloaded files automatically, and universal flexible makes computer more convenientization on using, hommization.
In order to address the above problem, the invention provides a kind of method for down loading of file, comprising:
Network side is carried out checking routine verification client source file to be downloaded and is obtained first verification file, and described checking routine, first verification file and source file are generated an executable file together, issues described client;
The described executable file of described client executing is disassembled described executable file and is described source file, first verification file and checking routine, calls the described source file of described checking routine verification and obtains second verification file;
Described client judges according to the comparative result of described first, second verification file whether described source file is complete, identically judges that then source file is complete, otherwise judges that source file damages.
Further, described network side is carried out the step that checking routine verification client source file to be downloaded obtains first verification file and is also comprised:
Whether complete, the result of verification is write described first verification file if carrying out the described source file of described checking routine verification;
After the described step that described executable file is disassembled, call and also comprise step before the step that the described source file of described checking routine verification obtains second verification file:
Earlier judge according to the check results in described first verification file whether described source file is complete; If it is complete then call the described source file of described checking routine verification and obtain second verification file; Otherwise judge that source file damages, and never calls described this source file of checking routine verification.
Further, described method also comprises:
After judging that described source file is whether complete, judged result is write described second verification file.
The present invention also provides a kind of download system of file, comprising: dispensing device and receiving system;
Described dispensing device comprises:
The verification module is used to carry out checking routine verification source file to be downloaded and obtains first verification file;
Package module is used for described checking routine, first verification file and source file are generated an executable file together;
Sending module is used to send described executable file;
Described receiving system comprises:
Receiver module is used for described executable file is received this locality;
Executive Module is used to carry out described executable file, described executable file is disassembled be described source file, first verification file and checking routine, calls the described source file of described checking routine verification and obtains second verification file;
Authentication module is used for obtaining judged result according to the comparative result of described first, second verification file; Judge that source file is complete if described first, second verification file is identical, otherwise judge that source file damages.
Further, whether the verification module in the described dispensing device also is used to carry out the described source file of described checking routine verification complete, and the result of verification is write described first verification file;
Executive Module in the described receiving system judges according to the check results in described first verification file whether described source file is complete earlier before also being used for described executable file disassembled the back, calls the described source file of described checking routine verification and obtain second verification file; If it is complete then call the described source file of described checking routine verification and obtain second verification file; Otherwise judge that source file damages, and never calls described this source file of checking routine verification.
Further, the authentication module in the described receiving system also is used for after judging that described source file is whether complete judged result being write described second verification file.
The present invention also provides a kind of dispensing device of file, comprising:
The verification module is used to carry out checking routine verification source file to be downloaded and obtains first verification file;
Package module is used for described checking routine, first verification file and source file are generated an executable file together;
Sending module is used to send described executable file.
Further, whether described verification module also is used to carry out the described source file of described checking routine verification complete, and the result of verification is write described first verification file.
The present invention also provides a kind of receiving system of file, comprising:
Receiver module is used for the executable file that network side generates is received this locality; Described executable file comprises checking routine, first verification file and source file; Described first verification file is carried out the described source file of described checking routine verification by network side and is obtained;
Executive Module is used to carry out described executable file, described executable file is disassembled be described source file, first verification file and checking routine, calls the described source file of described checking routine verification and obtains second verification file;
Authentication module is used for obtaining judged result according to the comparative result of described first, second verification file; Judge that source file is complete if described first, second verification file is identical, otherwise judge that source file damages.
Further, described first verification file comprises that also network side carries out whether complete results of the described source file of described checking routine verification;
Described Executive Module judges according to the check results in described first verification file whether described source file is complete earlier before also being used for described executable file disassembled the back, calls the described source file of described checking routine verification and obtain second verification file; If it is complete then call the described source file of described checking routine verification and obtain second verification file; Otherwise judge that source file damages, and never calls described this source file of checking routine verification.
Further, described authentication module also is used for after judging that described source file is whether complete judged result being write described second verification file.
Technical scheme of the present invention can automatically (comprise the file that direct download obtains for downloaded files, file with the automatic generation in download back) carries out the inspection of integrality, the installation of avoiding the imperfect of file and causing or open failure, perhaps in the running software because of the imperfect mistake that causes of file, make things convenient for client that the integrality of file is checked.
Description of drawings
Fig. 1 is the schematic flow sheet of traditional file in download;
Fig. 2 is the schematic flow sheet of the method for down loading of file among the embodiment one;
Fig. 3 is the schematic block diagram of the download system of file among the embodiment two.
Embodiment
Below in conjunction with drawings and Examples technical scheme of the present invention is described in detail.
Need to prove that if do not conflict, each feature among the embodiment of the invention and the embodiment can mutually combine, all within protection scope of the present invention.In addition, can in computer system, carry out in the step shown in the flow chart of accompanying drawing such as a set of computer-executable instructions, and, though there is shown logical order in flow process, but in some cases, can carry out step shown or that describe with the order that is different from herein.
Embodiment one, and a kind of method for down loading of file as shown in Figure 2, comprising:
Network side is carried out checking routine verification client source file to be downloaded and is obtained first verification file, and described checking routine, first verification file and source file are generated an executable file together, issues described client;
The described executable file of described client executing is disassembled described executable file and is described source file, first verification file and checking routine, calls the described source file of described checking routine verification and obtains second verification file;
Described client judges according to the comparative result of described first, second verification file whether described source file is complete, identically judges that then source file is complete, otherwise judges that source file damages.
Described executable file in the present embodiment is integrated source file, verification file, checking routine, when carrying out this executable file, procedure script can at first call checking routine and finish verification to source file, generate new verification file (second verification file), whether the verification file (first verification file) in judgement and the executable file mates, and provides corresponding results; Compare with existing scheme, the executable file that network side generated has increased the authentication mechanism of file integrality, and client is when carrying out " executable file ", if file is imperfect, then can provide unusual prompting, inform that in time the file of user's download has problem.
In the present embodiment, described network side can find described source file to be downloaded according to the download request of client.
In the present embodiment, the step that described network side execution checking routine verification client source file to be downloaded obtains first verification file can also comprise:
Whether complete, the result of verification is write described first verification file if carrying out the described source file of described checking routine verification;
Can also comprise step after the described step that described executable file is disassembled, before calling the step that the described source file of described checking routine verification obtains second verification file:
Earlier judge according to the check results in described first verification file whether described source file is complete; If it is complete then call the described source file of described checking routine verification and obtain second verification file; Otherwise judge that source file damages, and never calls described this source file of checking routine verification.
Judge that according to first verification file source file is complete, illustrate that the source file that downloads in the local executable file before is complete; The reason that continues to do integrity detection is in order to prevent the damage of source file in the executable file in downloading process.
In the present embodiment, described method can also comprise:
After judging that described source file is whether complete, judged result is write described second verification file.
The purpose that writes is the integrality for mark source file this moment.
Whether in the present embodiment, described method can further include: after judging that described source file is whether complete, complete according to the described source file of judged result prompting user.
Embodiment two, and a kind of download system of file comprises: dispensing device and receiving system;
Described dispensing device comprises:
The verification module is used to carry out checking routine verification source file to be downloaded and obtains first verification file;
Package module is used for described checking routine, first verification file and source file are generated an executable file together;
Sending module is used to send described executable file;
Described receiving system comprises:
Receiver module is used for described executable file is received this locality;
Executive Module is used to carry out described executable file, described executable file is disassembled be described source file, first verification file and checking routine, calls the described source file of described checking routine verification and obtains second verification file;
Authentication module is used for obtaining judged result according to the comparative result of described first, second verification file; Judge that source file is complete if described first, second verification file is identical, otherwise judge that source file damages.
In the present embodiment, whether the verification module in the described dispensing device can also be used to carry out the described source file of described checking routine verification complete, and the result of verification is write described first verification file;
Executive Module in the described receiving system can also be used for:
Before described executable file disassembled the back, calls the described source file of described checking routine verification and obtain second verification file, judge according to the check results in described first verification file whether described source file is complete earlier; If it is complete then call the described source file of described checking routine verification and obtain second verification file; Otherwise judge that source file damages, and never calls described this source file of checking routine verification.
In the present embodiment, the authentication module in the described receiving system can also be used for after judging that described source file is whether complete judged result being write described second verification file.
Whether in the present embodiment, the authentication module in the described receiving system can also be used for after judging that described source file is whether complete, complete according to the described source file of judged result prompting user.
Embodiment three, and a kind of dispensing device of file comprises:
The verification module is used to carry out checking routine verification source file to be downloaded and obtains first verification file;
Package module is used for described checking routine, first verification file and source file are generated an executable file together;
Sending module is used to send described executable file.
In the present embodiment, whether described verification module can also be used to carry out the described source file of described checking routine verification complete, and the result of verification is write described first verification file.
Embodiment three, and a kind of receiving system of file comprises:
Receiver module is used for the executable file that network side generates is received this locality; Described executable file comprises checking routine, first verification file and source file; Described first verification file is carried out the described source file of described checking routine verification by network side and is obtained;
Executive Module is used to carry out described executable file, described executable file is disassembled be described source file, first verification file and checking routine, calls the described source file of described checking routine verification and obtains second verification file;
Authentication module is used for obtaining judged result according to the comparative result of described first, second verification file; Judge that source file is complete if described first, second verification file is identical, otherwise judge that source file damages.
In the present embodiment, described first verification file can also comprise that network side carries out whether complete results of the described source file of described checking routine verification;
Described Executive Module can also be used for:
Before described executable file disassembled the back, calls the described source file of described checking routine verification and obtain second verification file, judge according to the check results in described first verification file whether described source file is complete earlier; If it is complete then call the described source file of described checking routine verification and obtain second verification file; Otherwise judge that source file damages, and never calls described this source file of checking routine verification.
In the present embodiment, described authentication module can also be used for after judging that described source file is whether complete judged result being write described second verification file.
Whether in the present embodiment, described authentication module can also be used for after judging that described source file is whether complete, complete according to the described source file of judged result prompting user.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with the general calculation device, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the storage device and carry out by calculation element, perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of claim of the present invention.

Claims (11)

1. the method for down loading of a file comprises:
Network side is carried out checking routine verification client source file to be downloaded and is obtained first verification file, and described checking routine, first verification file and source file are generated an executable file together, issues described client;
The described executable file of described client executing is disassembled described executable file and is described source file, first verification file and checking routine, calls the described source file of described checking routine verification and obtains second verification file;
Described client judges according to the comparative result of described first, second verification file whether described source file is complete, identically judges that then source file is complete, otherwise judges that source file damages.
2. the method for claim 1 is characterized in that, the step that described network side execution checking routine verification client source file to be downloaded obtains first verification file also comprises:
Whether complete, the result of verification is write described first verification file if carrying out the described source file of described checking routine verification;
After the described step that described executable file is disassembled, call and also comprise step before the step that the described source file of described checking routine verification obtains second verification file:
Earlier judge according to the check results in described first verification file whether described source file is complete; If it is complete then call the described source file of described checking routine verification and obtain second verification file; Otherwise judge that source file damages, and never calls described this source file of checking routine verification.
3. method as claimed in claim 1 or 2 is characterized in that, also comprises:
After judging that described source file is whether complete, judged result is write described second verification file.
4. the download system of a file is characterized in that, comprising: dispensing device and receiving system;
Described dispensing device comprises:
The verification module is used to carry out checking routine verification source file to be downloaded and obtains first verification file;
Package module is used for described checking routine, first verification file and source file are generated an executable file together;
Sending module is used to send described executable file;
Described receiving system comprises:
Receiver module is used for described executable file is received this locality;
Executive Module is used to carry out described executable file, described executable file is disassembled be described source file, first verification file and checking routine, calls the described source file of described checking routine verification and obtains second verification file;
Authentication module is used for obtaining judged result according to the comparative result of described first, second verification file; Judge that source file is complete if described first, second verification file is identical, otherwise judge that source file damages.
5. system as claimed in claim 4 is characterized in that:
Whether the verification module in the described dispensing device also is used to carry out the described source file of described checking routine verification complete, and the result of verification is write described first verification file;
Executive Module in the described receiving system judges according to the check results in described first verification file whether described source file is complete earlier before also being used for described executable file disassembled the back, calls the described source file of described checking routine verification and obtain second verification file; If it is complete then call the described source file of described checking routine verification and obtain second verification file; Otherwise judge that source file damages, and never calls described this source file of checking routine verification.
6. as claim 4 or 5 described systems, it is characterized in that:
Authentication module in the described receiving system also is used for after judging that described source file is whether complete judged result being write described second verification file.
7. the dispensing device of a file is characterized in that, comprising:
The verification module is used to carry out checking routine verification source file to be downloaded and obtains first verification file;
Package module is used for described checking routine, first verification file and source file are generated an executable file together;
Sending module is used to send described executable file.
8. dispensing device as claimed in claim 7 is characterized in that:
Whether described verification module also is used to carry out the described source file of described checking routine verification complete, and the result of verification is write described first verification file.
9. the receiving system of a file is characterized in that, comprising:
Receiver module is used for the executable file that network side generates is received this locality; Described executable file comprises checking routine, first verification file and source file; Described first verification file is carried out the described source file of described checking routine verification by network side and is obtained;
Executive Module is used to carry out described executable file, described executable file is disassembled be described source file, first verification file and checking routine, calls the described source file of described checking routine verification and obtains second verification file;
Authentication module is used for obtaining judged result according to the comparative result of described first, second verification file; Judge that source file is complete if described first, second verification file is identical, otherwise judge that source file damages.
10. receiving system as claimed in claim 9 is characterized in that:
Described first verification file comprises that also network side carries out whether complete results of the described source file of described checking routine verification;
Described Executive Module judges according to the check results in described first verification file whether described source file is complete earlier before also being used for described executable file disassembled the back, calls the described source file of described checking routine verification and obtain second verification file; If it is complete then call the described source file of described checking routine verification and obtain second verification file; Otherwise judge that source file damages, and never calls described this source file of checking routine verification.
11., it is characterized in that as claim 9 or 10 described receiving systems:
Described authentication module also is used for after judging that described source file is whether complete judged result being write described second verification file.
CN201010102488A 2010-01-27 2010-01-27 File download method, file download system, sending device and detecting device Pending CN101795293A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010102488A CN101795293A (en) 2010-01-27 2010-01-27 File download method, file download system, sending device and detecting device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010102488A CN101795293A (en) 2010-01-27 2010-01-27 File download method, file download system, sending device and detecting device

Publications (1)

Publication Number Publication Date
CN101795293A true CN101795293A (en) 2010-08-04

Family

ID=42587716

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010102488A Pending CN101795293A (en) 2010-01-27 2010-01-27 File download method, file download system, sending device and detecting device

Country Status (1)

Country Link
CN (1) CN101795293A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103345602A (en) * 2013-06-14 2013-10-09 腾讯科技(深圳)有限公司 Client-side code integrality detection method, device and system
CN103399804A (en) * 2013-07-31 2013-11-20 珠海金山网络游戏科技有限公司 Method and system for repairing remote package files
CN104123481A (en) * 2013-04-24 2014-10-29 贝壳网际(北京)安全技术有限公司 Method and device for preventing application program from being tampered
CN104954353A (en) * 2015-02-10 2015-09-30 腾讯科技(深圳)有限公司 Verification method and apparatus of APK file package
CN105373747A (en) * 2015-12-09 2016-03-02 上海斐讯数据通信技术有限公司 File generation method, file verification method and systems for preventing system from being tampered
CN105550071A (en) * 2015-12-28 2016-05-04 迈普通信技术股份有限公司 System file upgrading and detecting method and communication device
CN106650473A (en) * 2016-12-01 2017-05-10 中国工商银行股份有限公司 Method and system for verifying multiple document encapsulation packages, transmitting device and receiving device
CN112947846A (en) * 2019-12-11 2021-06-11 北京金山云网络技术有限公司 Batch processing task execution method and device of object storage system and electronic equipment
CN113139716A (en) * 2021-03-31 2021-07-20 成都飞机工业(集团)有限责任公司 Remote automatic error-proof checking method for numerical control machining program package
CN113691546A (en) * 2021-08-26 2021-11-23 广东电网有限责任公司广州供电局 Integrity verification method, system, equipment and medium for text file

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104123481A (en) * 2013-04-24 2014-10-29 贝壳网际(北京)安全技术有限公司 Method and device for preventing application program from being tampered
US10481905B2 (en) 2013-06-14 2019-11-19 Tencent Technology (Shenzhen) Company Limited Method, apparatus and system for verifying code integrity on clients
WO2014198228A1 (en) * 2013-06-14 2014-12-18 Tencent Technology (Shenzhen) Company Limited Method, apparatus and system for verifying code integrity on clients
CN103345602B (en) * 2013-06-14 2015-08-19 腾讯科技(深圳)有限公司 A kind of client-side code integrality detection, device and system
CN103345602A (en) * 2013-06-14 2013-10-09 腾讯科技(深圳)有限公司 Client-side code integrality detection method, device and system
US10083028B2 (en) 2013-06-14 2018-09-25 Tencent Technology (Shenzhen) Company Limited Method, apparatus and system for verifying code integrity on clients
CN103399804A (en) * 2013-07-31 2013-11-20 珠海金山网络游戏科技有限公司 Method and system for repairing remote package files
CN104954353A (en) * 2015-02-10 2015-09-30 腾讯科技(深圳)有限公司 Verification method and apparatus of APK file package
CN104954353B (en) * 2015-02-10 2018-03-30 腾讯科技(深圳)有限公司 The method of calibration and device of APK file bag
CN105373747A (en) * 2015-12-09 2016-03-02 上海斐讯数据通信技术有限公司 File generation method, file verification method and systems for preventing system from being tampered
CN105550071A (en) * 2015-12-28 2016-05-04 迈普通信技术股份有限公司 System file upgrading and detecting method and communication device
CN105550071B (en) * 2015-12-28 2018-09-18 迈普通信技术股份有限公司 System file upgrades and detection method, communication equipment
CN106650473A (en) * 2016-12-01 2017-05-10 中国工商银行股份有限公司 Method and system for verifying multiple document encapsulation packages, transmitting device and receiving device
CN112947846A (en) * 2019-12-11 2021-06-11 北京金山云网络技术有限公司 Batch processing task execution method and device of object storage system and electronic equipment
CN113139716A (en) * 2021-03-31 2021-07-20 成都飞机工业(集团)有限责任公司 Remote automatic error-proof checking method for numerical control machining program package
CN113691546A (en) * 2021-08-26 2021-11-23 广东电网有限责任公司广州供电局 Integrity verification method, system, equipment and medium for text file

Similar Documents

Publication Publication Date Title
CN101795293A (en) File download method, file download system, sending device and detecting device
CN110024362B (en) Bluetooth test system and method
US8370816B2 (en) Device, method and computer program product for evaluating a debugger script
CN109409096B (en) Kernel vulnerability repairing method, device, server and system
US7987298B2 (en) System and method for detecting the status of a universal serial bus port of a mobile phone
CN104850475B (en) A kind of test method and device of equipment
US10310964B2 (en) System and method for determining relevance of application software maintenance
CN105897461A (en) Multi-system OTA upgrading method and multi-system device
KR20130077846A (en) Exception handling test device and method thereof
CN106648762B (en) Method and device for building development environment
CN110267215B (en) Data detection method, equipment and storage medium
CN104361285A (en) Method and device for detecting security of application programs of mobile devices
CN105045671B (en) The method for upgrading system and device of a kind of intelligent terminal
CN104050054A (en) Processing method for installation package installation failure and cause determining method and device
CN110908708B (en) Code release method, device and system
CN108319551B (en) Software testing method and device, computer equipment and readable storage medium
CN106445541B (en) Software construction method, software construction device and software construction system
CN109710479B (en) Processing method, first device and second device
CN105549995A (en) Audio device upgrading method and apparatus
CN108959915B (en) Rootkit detection method, rootkit detection device and server
CN103856537A (en) Method, platform and system for obtaining operation state of application program on terminal
CN110704307A (en) Application product testing method and device, user equipment and computer storage medium
CN103902312B (en) The sending method and device of a kind of application program
CN106528248B (en) Downloading method and system of mobile terminal based on software integrity
CN102646063A (en) Method and device for downloading software of mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100804