CN102402667A - Method, equipment and system for installing program file - Google Patents

Method, equipment and system for installing program file Download PDF

Info

Publication number
CN102402667A
CN102402667A CN2010102789983A CN201010278998A CN102402667A CN 102402667 A CN102402667 A CN 102402667A CN 2010102789983 A CN2010102789983 A CN 2010102789983A CN 201010278998 A CN201010278998 A CN 201010278998A CN 102402667 A CN102402667 A CN 102402667A
Authority
CN
China
Prior art keywords
program file
user profile
installation
mount message
installation side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102789983A
Other languages
Chinese (zh)
Inventor
孟钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN2010102789983A priority Critical patent/CN102402667A/en
Publication of CN102402667A publication Critical patent/CN102402667A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method, equipment and a system for installing a program file. The method comprises the following steps that: a sender replaces partial data in the program file with invalid data and then sends the program file; after receiving an installation request and user information which are sent by an installer during installation of the program file, the sender authenticates the installer according to the user information and sends installation information which corresponds to the user information to the installer after the installer passes authentication; and the installer replaces the invalid data with the partial data according to the installation information and then installs the program file. By adoption of the technical scheme provided by the embodiment of the invention, the program file can be simply and effectively protected.

Description

The installation method of program file, equipment and system
Technical field
The present invention relates to the communications field, relate in particular to a kind of installation method, equipment and system of program file.
Background technology
Along with Internet development, the propagation of digital contents such as online e-book, music, film, picture is more and more, because digital content is easy to duplicate, revise, the digital content of propagating on the network exists a large amount of piracies and impinge issue.Therefore, more and more important to the copyright protection of digital content.
DRM (Digital Right Management, Digital Right Management) is a kind of digital copyright protection technology of present widespread use, and it is primarily aimed at program file copyright protection in use, combats copyright piracy protection copyright owner's legitimate rights and interests.But; Existing DRM solution more complicated; Need dispose complicated DRM system at server side and end side; Layoutprocedure goes wrong easily, and then causes realizing the digital copyright protecting of program file, and for example the program file of user's purchase can use for other user installation by massive duplication.
Summary of the invention
The embodiment of the invention provides a kind of installation method, equipment and system of program file, carries out simple configuration through server side and end side and realizes the copyright protection to program file.
The embodiment of the invention provides a kind of installation method of program file, comprising:
Transmit leg replaces the back to send said program file with invalid data the partial data in the program file;
After said transmit leg receives the install request and user profile of when said program file is installed, sending installation side; According to said user profile said installation side is carried out authentication, and after authentication is passed through, the mount message corresponding with said user profile sent to said installation side;
Said installation root uses said partial data to replace the installation of the laggard line program file of said invalid data according to said mount message.
The embodiment of the invention provides a kind of network equipment, comprising:
The file transmitting element is used for replacing the back to send said program file with invalid data the partial data of program file;
Receiving element is used to receive install request and the user profile that installation side sends when said program file is installed;
Processing unit is used for according to the user profile that said receiving element receives said installation side being carried out authentication, and after authentication is passed through, the mount message corresponding with said user profile is sent to said installation side.
The embodiment of the invention provides a kind of network equipment, comprising:
Transmitting element is used for when the installation procedure file, sending install request and user profile to server; Partial data in the said program file replaces with invalid data;
Receiving element is used to receive the mount message that said server sends;
Processing unit is used for using said partial data to carry out the installation of said program file according to the said mount message that said receiving element receives.
The embodiment of the invention provides a kind of installation system of program file, comprises transmit leg and installation side, wherein
Said transmit leg; Be used for replacing the back to send said program file with invalid data the partial data of program file; After receiving the install request and user profile of when said program file is installed, sending said installation side; According to said user profile said installation side is carried out authentication, and after authentication is passed through, the mount message corresponding with said user profile sent to said installation side;
Said installation side is used for when said program file is installed, sending install request and user profile to said transmit leg, uses said partial data to replace the installation of the laggard line program file of said invalid data according to the said mount message that receives.
Compared with prior art, the embodiment of the invention has the following advantages at least:
In the embodiment of the invention, transmit leg replaces the partial data in the program file when the router file with invalid data, makes installation side can't only use this program file to accomplish and installs; After receiving the install request and user profile of sending installation side; Transmit leg carries out authentication according to user profile to the side of installation; And authentication through after send mount message to installation side again the installations side complete program file of acquisition installed, thereby through carrying out the protection of simple configuration realization to program file at transmit leg and installation side.
Description of drawings
Fig. 1 is the installation method schematic flow sheet of the program file that provides of the embodiment of the invention one;
Fig. 2 is the installation method schematic flow sheet of the program file that provides of the embodiment of the invention two;
Fig. 3 is the installation method schematic flow sheet of the program file that provides of the embodiment of the invention three;
Fig. 4 is the structural representation of the network equipment that provides of the embodiment of the invention four;
Fig. 5-the 6th, the structural representation of the network equipment that the embodiment of the invention five provides.
Embodiment
To combine the accompanying drawing in the embodiments of the invention below, the technical scheme in the embodiments of the invention is carried out clear, intactly description, obviously, the embodiments described below only are the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of embodiments of the invention protection.
Embodiment one
The embodiment of the invention one provides a kind of installation method of program file, and is as shown in Figure 1, may further comprise the steps:
Step 101, transmit leg replaces the back to send to the take over party with invalid data the partial data in the program file.
Concrete, said transmit leg replaces with invalid data in the data of the random site extraction random-length of said program file.
Step 102; After said transmit leg receives the install request and user profile of when said program file is installed, sending installation side; According to said user profile said installation side is carried out authentication, and after authentication is passed through, the mount message corresponding with said user profile sent to said installation side.
Said take over party can think identical or different equipment with installation.For example, installation side and take over party are distinct device, and the use of installation side is duplicated the data that obtain from the take over party and carried out the installation of program file.
Wherein, Transmit leg can have multiple to the authentication mode of the side of installation; For example; Transmit leg can be stored the mount message that comprises said partial data and the corresponding relation of terminal iidentification (for example phone number), according to terminal iidentification the side of installation is carried out authentication, and carried terminal identifies in the user profile of installations side transmission this moment.Concrete, installation side is when sending user profile, and the terminal iidentification that initiatively obtains self is carried in this user profile and sends to transmit leg.Transmit leg replaces the partial data in the program file with invalid data after, also storage comprises the mount message of said partial data and the corresponding relation of terminal iidentification; After receiving the install request and user profile of sending installation side, transmit leg search with said user profile in the corresponding mount message of terminal iidentification, if search success then the mount message that finds sent to said installation side; Fail then authentification failure if search.
Transmit leg can be stored the mount message that comprises said partial data and the corresponding relation of user account information, according to user account information the side of installation is carried out authentication, carries user account information in the user profile of the side's of installationing transmission this moment.Concrete, installation side receives the user account information of user's input, said user account information is carried at user profile sends.Transmit leg search with said user profile in the corresponding mount message of user account information, if search success then the mount message that finds sent to said installation side; Fail then authentification failure if search.
Step 103, said installation root uses said partial data to replace the installation of the laggard line program file of said invalid data according to said mount message.
Wherein, said transmit leg is the equipment of router file, for example server; Said take over party and the equipment of installation side for reception and installation procedure file, for example terminal device.
Be that server, installation side are that the terminal is an example below with the transmit leg, the installation method of the program file that provides among the embodiment one is further introduced.
Embodiment two
The embodiment of the invention two provides a kind of installation method of program file, and is as shown in Figure 2, may further comprise the steps:
Step 201, server is transformed the program file that will distribute.
Concrete, server in position at random, is randomly drawed the data of certain-length to software document, and fills the data on the relevant position with invalid data (for example complete 0 value).Mount messages such as the data that server record extracted, position and length, and this mount message and terminal bound.Concrete binding mode can perhaps be bound with terminal iidentification (for example SIM cards of mobile phones number) for binding with the account at terminal.Server can also be encrypted the mount message of record; For example the mount message of record is encrypted through the AES and the key that consult with the terminal in advance, AES and key can and terminal binding (for example IMEI), or and information binding such as user account number.
Step 202, terminal are carried out program according to the improved program file of server and are installed.
Concrete, the employed program file in terminal can be the improved program file from downloaded, perhaps obtains (program file that for example obtains from other device replications) from other equipment.
Step 203, terminal are sent install request information and user profile to server in installation process.
Concrete, when installing according to improved program file, the terminal can initiatively obtain terminal identification information, send install request information and user profile, carried terminal identification information in this user profile to server then.
Step 204, server carries out authentication according to the user profile at terminal to the terminal, behind the authentification failure, execution in step 205; Authentication is through back execution in step 206.
Concrete, server obtains the identification information at terminal, searches in step 201, extract and the mount message this terminal identification information binding of record, searches successfully, and then authentication is passed through, otherwise authentification failure.
Step 205, terminal do not receive the needed mount message of installation procedure file that server sends, and failure is installed.
Step 206, server sends the mount message corresponding with user profile to the terminal.
Step 207, the mount message that send according to server at the terminal is accomplished the installation of program file.
Concrete, when the mount message that obtains when the terminal was the mount message after encrypting, AES and secret key decryption mount message that the terminal is also good through consultation were merged into effective program file completion installation with itself and improved program file.Need to prove that the mount message that the terminal obtains is stored in the safety zone that the user can't visit, and deletion automatically after installation.
Need to prove that the mount message that server will be corresponding with user profile in the step 206 can also charge to the terminal before send at the terminal.
Server carries out authentication through terminal iidentification to the terminal in the foregoing description two, when introducing server among the embodiment three and authentication carried out at the terminal through user account, and the installation method of program file.
Embodiment three
The embodiment of the invention three provides a kind of installation method of program file, and is as shown in Figure 3, may further comprise the steps:
Step 301, server is transformed the program file that will distribute.
Step 302, terminal are carried out program according to the improved program file of server and are installed.
Step 303, terminal are sent install request information and user profile to server in installation process.
In the present embodiment, user profile is account and password, is imported by the user.For example, prompting frame is ejected at the terminal in installation process, requires the user to input account and password.
Step 304, server carries out authentication according to the user profile at terminal to the terminal, behind the authentification failure, execution in step 305; Authentication is through back execution in step 306.
Storage user's account and password in the server, and the corresponding relation of account and mount message.Whether server is correct according to user's account and the account and the password in the password judges information of storage, if correctly then otherwise authentification failure is passed through in authentication.
Step 305, terminal do not receive the needed mount message of installation procedure file that server sends, and failure is installed.
Step 306, server charges to the terminal, and the mount message corresponding with user profile sent to the terminal.
Step 307, the mount message that send according to server at the terminal is accomplished the installation of program file.
Need to prove; The user profile that provides in the embodiment of the invention two and three (terminal iidentification, user's account and password) is merely two kinds of concrete modes that realize the present invention program; Be not limited to the scope of user profile among the present invention program, every according to the present invention technical conceive the concrete mode of the user profile that can expect all should belong to protection scope of the present invention.In addition, the type of program file is not limit in the foregoing description, can for various application programs the installation file, APK program file for example makes the terminal of only obtaining the authorization that the APK program file of distribution can be installed.
In the embodiment of the invention, server replaces the partial data in the program file to terminal router file the time with invalid data, makes the terminal can't only use this program file to accomplish and installs; After receiving the install request and user profile of sending at the terminal; Server carries out authentication according to user profile to the terminal; And authentication through after send corresponding mount message to the terminal again and make installations side completion installation, process is simple, and has effectively realized the copyright protection to program file.
Embodiment four
The embodiment of the invention four provides a kind of network equipment, and is as shown in Figure 4, comprising:
File transmitting element 11 is used for replacing the back to send said program file with invalid data the partial data of program file;
Receiving element 12 is used to receive install request and the user profile that installation side sends when said program file is installed;
Processing unit 13 is used for according to the user profile that said receiving element receives said installation side being carried out authentication, and after authentication is passed through, the mount message corresponding with said user profile is sent to said installation side.
Said file transmitting element 11 also is used for: the data that extract random-length at the random site of said program file replace with invalid data.
This network equipment also comprises storage unit 14, is used to store the mount message that comprises said partial data and the corresponding relation of terminal iidentification.Said processing unit 13 also is used for: search the mount message corresponding with the terminal iidentification of said user profile, if search success then the mount message that finds is sent to said installation side; Fail then authentification failure if search.
Storage unit 14 can also be used to store the mount message that comprises said partial data and the corresponding relation of user account information.Accordingly, said processing unit 13 also is used for: search the mount message corresponding with the user account information of said user profile, if search success then the mount message that finds is sent to said installation side; Fail then authentification failure if search.Said processing unit 13 also is used for: according to said user profile the installation of said program file is chargeed through the back in authentication.
Embodiment five
The embodiment of the invention five provides a kind of network equipment, and is as shown in Figure 5, comprising:
Transmitting element 21 is used for when the installation procedure file, sending install request and user profile to server; Partial data in the said program file replaces with invalid data;
Receiving element 22 is used to receive the mount message that said server sends;
Processing unit 23 is used for using said partial data to carry out the installation of said program file according to the said mount message that said receiving element receives.
Said user profile comprises terminal iidentification, and the said network equipment also comprises sign acquiring unit 24, is used to obtain the terminal iidentification of the said network equipment, supplies said transmitting element to send to said transmit leg.
Said user profile comprises user account information; As shown in Figure 6, the said network equipment also comprises accounts information acquiring unit 25, is used to receive the user account information of user's input.
Embodiment six
The embodiment of the invention six provides a kind of installation system of program file, comprises transmit leg, take over party and installation side, wherein
Said transmit leg is used for replacing the back to send to said take over party with invalid data the partial data of program file; After receiving the install request and user profile of sending said installation side, according to said user profile said installation side is carried out authentication, and after authentication is passed through, the mount message corresponding with said user profile sent to said installation side;
Said installation side is used for when said program file is installed, sending install request and user profile to said transmit leg, uses said partial data to replace the installation of the laggard line program file of said invalid data according to the said mount message that receives.
In the embodiment of the invention, transmit leg replaces the partial data in the program file to take over party's router file the time with invalid data, makes installation side can't only use this program file to accomplish and installs; After receiving the install request and user profile of sending installation side; According to user profile the side of installation is carried out authentication; And authentication through after send corresponding mount message to installation side again and make installations side completion installation, process is simple, and has effectively realized the copyright protection to program file.
Through the description of above embodiment, those skilled in the art can be well understood to the present invention and can realize by the mode that software adds essential general hardware platform, can certainly pass through hardware, but the former is better embodiment under a lot of situation.Based on such understanding; The part that technical scheme of the present invention contributes to prior art in essence in other words can be come out with the embodied of software product; This computer software product is stored in the storage medium; Comprise some instructions with so that computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out the described method of each embodiment of the present invention.
It will be appreciated by those skilled in the art that accompanying drawing is the synoptic diagram of a preferred embodiment, module in the accompanying drawing or flow process might not be that embodiment of the present invention is necessary.
It will be appreciated by those skilled in the art that the module in the device among the embodiment can be distributed in the device of embodiment according to the embodiment description, also can carry out respective change and be arranged in the one or more devices that are different from present embodiment.The module of the foregoing description can be merged into a module, also can further split into a plurality of submodules.
The invention described above embodiment sequence number is not represented the quality of embodiment just to description.
More than disclosedly be merely several specific embodiment of the present invention, still, the present invention is not limited thereto, any those skilled in the art can think variation all should fall into protection scope of the present invention.

Claims (14)

1. the installation method of a program file is characterized in that, comprising:
Transmit leg replaces the back to send said program file with invalid data the partial data in the program file;
After said transmit leg receives the install request and user profile of when said program file is installed, sending installation side; According to said user profile said installation side is carried out authentication, and after authentication is passed through, the mount message corresponding with said user profile sent to said installation side;
Said installation root uses said partial data to replace the installation of the laggard line program file of said invalid data according to said mount message.
2. the method for claim 1 is characterized in that, said transmit leg replaces the partial data in the program file to comprise with invalid data: said transmit leg replaces with invalid data in the data of the random site extraction random-length of said program file.
3. according to claim 1 or claim 2 method is characterized in that, said transmit leg replaces the partial data in the program file with invalid data after, storage comprises the mount message of said partial data and the corresponding relation of terminal iidentification;
Said installation side also comprised before sending install request and user profile: said installation side obtains the terminal iidentification of self;
According to said user profile said installation side is carried out authentication; And authentication through after will be corresponding with said user profile mount message send to said installation side and comprise: search with said user profile in the corresponding mount message of terminal iidentification, if search success then the mount message that finds sent to said installation side; Fail then authentification failure if search.
4. according to claim 1 or claim 2 method is characterized in that, said transmit leg replaces the partial data in the program file with invalid data after, storage comprises the mount message of said partial data and the corresponding relation of user account information;
Said installation side sends install request and user profile comprises: said installation side receives the user account information of user's input, said user account information is carried at user profile sends;
According to said user profile said installation side is carried out authentication; And authentication through after will be corresponding with said user profile mount message send to said installation side and comprise: search with said user profile in the corresponding mount message of user account information, if search success then the mount message that finds sent to said installation side; Fail then authentification failure if search.
5. method as claimed in claim 4 is characterized in that, said authentication through after also comprise: said transmit leg charges to the installation of said program file according to said user profile.
6. a network equipment is characterized in that, comprising:
The file transmitting element is used for replacing the back to send said program file with invalid data the partial data of program file;
Receiving element is used to receive install request and the user profile that installation side sends when said program file is installed;
Processing unit is used for according to the user profile that said receiving element receives said installation side being carried out authentication, and after authentication is passed through, the mount message corresponding with said user profile is sent to said installation side.
7. the network equipment as claimed in claim 6 is characterized in that, said file transmitting element also is used for: the data that extract random-length at the random site of said program file replace with invalid data.
8. like the claim 6 or the 7 described network equipments, it is characterized in that, also comprise storage unit, be used to store the mount message that comprises said partial data and the corresponding relation of terminal iidentification;
Said processing unit also is used for: search the mount message corresponding with the terminal iidentification of said user profile, if search success then the mount message that finds is sent to said installation side; Fail then authentification failure if search.
9. like the claim 6 or the 7 described network equipments, it is characterized in that, also comprise storage unit, be used to store the mount message that comprises said partial data and the corresponding relation of user account information;
Said processing unit also is used for: search the mount message corresponding with the user account information of said user profile, if search success then the mount message that finds is sent to said installation side; Fail then authentification failure if search.
10. the network equipment as claimed in claim 9 is characterized in that, said processing unit also is used for: according to said user profile the installation of said program file is chargeed through the back in authentication.
11. a network equipment is characterized in that, comprising:
Transmitting element is used for when the installation procedure file, sending install request and user profile to server; Partial data in the said program file replaces with invalid data;
Receiving element is used to receive the mount message that said server sends;
Processing unit is used for using said partial data to carry out the installation of said program file according to the said mount message that said receiving element receives.
12. the network equipment as claimed in claim 11 is characterized in that, said user profile comprises terminal iidentification,
The said network equipment also comprises the sign acquiring unit, is used to obtain the terminal iidentification of the said network equipment.
13. the network equipment as claimed in claim 11 is characterized in that, said user profile comprises user account information;
The said network equipment also comprises the accounts information acquiring unit, is used to receive the user account information of user's input.
14. the installation system of a program file is characterized in that, comprises transmit leg and installation side, wherein
Said transmit leg; Be used for replacing the back to send said program file with invalid data the partial data of program file; After receiving the install request and user profile of when said program file is installed, sending said installation side; According to said user profile said installation side is carried out authentication, and after authentication is passed through, the mount message corresponding with said user profile sent to said installation side;
Said installation side is used for when said program file is installed, sending install request and user profile to said transmit leg, uses said partial data to replace the installation of the laggard line program file of said invalid data according to the said mount message that receives.
CN2010102789983A 2010-09-09 2010-09-09 Method, equipment and system for installing program file Pending CN102402667A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102789983A CN102402667A (en) 2010-09-09 2010-09-09 Method, equipment and system for installing program file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102789983A CN102402667A (en) 2010-09-09 2010-09-09 Method, equipment and system for installing program file

Publications (1)

Publication Number Publication Date
CN102402667A true CN102402667A (en) 2012-04-04

Family

ID=45884862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102789983A Pending CN102402667A (en) 2010-09-09 2010-09-09 Method, equipment and system for installing program file

Country Status (1)

Country Link
CN (1) CN102402667A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108090368A (en) * 2017-12-20 2018-05-29 北京小牛互联科技有限公司 The guard method of APK program files and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003140955A (en) * 2001-11-07 2003-05-16 Technoart:Kk Information processing system, information processing program, computer readable recording medium recording information processing program and information processing method
CN101252673A (en) * 2008-02-04 2008-08-27 西安电子科技大学 Leakage proof apparatus and method of high speed digital video signal
CN201233601Y (en) * 2008-05-05 2009-05-06 丁卓 File concealment system and apparatus based on USB equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003140955A (en) * 2001-11-07 2003-05-16 Technoart:Kk Information processing system, information processing program, computer readable recording medium recording information processing program and information processing method
CN101252673A (en) * 2008-02-04 2008-08-27 西安电子科技大学 Leakage proof apparatus and method of high speed digital video signal
CN201233601Y (en) * 2008-05-05 2009-05-06 丁卓 File concealment system and apparatus based on USB equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108090368A (en) * 2017-12-20 2018-05-29 北京小牛互联科技有限公司 The guard method of APK program files and system

Similar Documents

Publication Publication Date Title
CN101404576B (en) Network resource query method and system
EP1942430B1 (en) Token Passing Technique for Media Playback Devices
CN102281300B (en) Digital rights management license distribution method and system, server and terminal
CN101699819B (en) Method and system for managing digital rights
CN110798315B (en) Data processing method and device based on block chain and terminal
CN101977190B (en) Digital content encryption transmission method and server side
CN100472550C (en) Method for generating licence and method and apparatus for providing contents using the same
CN108243176B (en) Data transmission method and device
CN103457733A (en) Data sharing method and system under cloud computing environment
CN102891843A (en) Method for authorizing application program at android client side through local service unit
CN103995991A (en) Method for binding hardware information and secret keys in software copyright protection
CN1997953A (en) Method and device for protecting digital content in mobile applications
CN110611657A (en) File stream processing method, device and system based on block chain
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN101286994A (en) Digital literary property management method, server and system for content sharing within multiple devices
CN105516135A (en) Method and device used for account login
CN103237010B (en) The server end of digital content is cryptographically provided
CN101425112A (en) Digital exequatur sending system and digital work decipher operation method
CN101997878A (en) Method, device and system for verifying domain name link
CN104657629A (en) Document copyright protection method and device
CN106411520B (en) Method, device and system for processing virtual resource data
CN112653556A (en) TOKEN-based micro-service security authentication method, device and storage medium
CN112507296A (en) User login verification method and system based on block chain
KR101479290B1 (en) Agent for providing security cloud service, security token device for security cloud service
CN103237011B (en) Digital content encryption transmission method and server end

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120404