CN102883324A - Security verification method, security verification device and mobile terminal for plugin call in mobile terminal - Google Patents

Security verification method, security verification device and mobile terminal for plugin call in mobile terminal Download PDF

Info

Publication number
CN102883324A
CN102883324A CN2012104025494A CN201210402549A CN102883324A CN 102883324 A CN102883324 A CN 102883324A CN 2012104025494 A CN2012104025494 A CN 2012104025494A CN 201210402549 A CN201210402549 A CN 201210402549A CN 102883324 A CN102883324 A CN 102883324A
Authority
CN
China
Prior art keywords
plug
unit
signature
calls
portable terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012104025494A
Other languages
Chinese (zh)
Inventor
梁捷
俞永福
何小鹏
朱顺炎
马石磊
李炳津
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Dongjing Computer Technology Co Ltd
Original Assignee
Guangzhou Dongjing Computer Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Dongjing Computer Technology Co Ltd filed Critical Guangzhou Dongjing Computer Technology Co Ltd
Priority to CN2012104025494A priority Critical patent/CN102883324A/en
Publication of CN102883324A publication Critical patent/CN102883324A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a security verification method for plugin call in a mobile terminal. The security verification method includes acquiring plugin ID and signature of a plugin from a plugin manager of a browser after detecting that the plugin is expected to call; comparing to verify the acquired plugin ID and signature to plugin ID and signature stored in the mobile terminal in advance; performing a plugin call process to the plugin according to the comparison and verification results; if both the acquired plugin ID and signature are correct, then calling the plugin; if both the acquired plugin ID and signature are incorrect, then not calling the plugin while sending a prompt to update the plugin; if the acquired plugin ID is incorrect, then linking to a plugin management server to verify the plugin on-line. By the security verification method, security of the browser in plugin call is increased greatly, and users can use the plugin freely and conveniently, while loss caused by attack of malicious plugins is avoided.

Description

Plug-in unit in the portable terminal calls safe verification method and device, portable terminal
Technical field
The present invention relates to moving communicating field, more specifically, the plug-in unit that relates in a kind of browser of mobile terminal calls safe verification method and device, and a kind ofly has a portable terminal that this plug-in unit calls the safety verification device.
Background technology
Plug-in unit is a kind of separate procedure in the computer software, and it can not be carried out separately, and must depend on certain software.A lot of softwares all have plug-in unit, because that plug-in unit has is small but excellent, and can realize the function that software itself does not have, therefore obtain using very widely at software.Such as, in IE, after relevant plug-in unit was installed, the WEB browser can directly call plug-in card program, for the treatment of the file of particular type.
At present, when utilizing portable terminal to carry out web page browsing, when when Webpage calls plug-in unit, when calling the flash plug-in unit, because plug-in unit itself may be replaced by virus or hacker, the plug-in unit of having been transferred may be different with the original plug-in unit that need to transfer, may so that the privacy of user data are stolen, cause thus user's significant data to reveal even cause user's property loss like this.This problem is by extensive cognition.Therefore, when calling plug-in unit, need to carry out safety verification to plug-in unit.
Verify for plug-in security, can only be carried out in service layer at present the verifying data signature of plug-in unit by website itself, and for universal card (or claiming third party's plug-in unit), browser does not have unified plug-in security verification scheme and carries out safety verification, thereby causes malicious plugins popular everywhere.In case the user clicks this class malicious plugins, will cause user's important information to reveal.Because portable terminal and individual subscriber identity are contacted directly, therefore, malicious plugins is larger to the hazard ratio individual PC that portable terminal causes.
Summary of the invention
In view of the above problems, one object of the present invention is to provide the plug-in unit in a kind of browser of mobile terminal to call safe verification method and device, and it can carry out safety verification when plug-in unit calls, thereby guarantees that each invoked plug-in unit is safe and legal.
Another object of the present invention is to provide a kind of and comprise that above-mentioned plug-in unit calls the portable terminal of safety verification device.
According to an aspect of the present invention, provide a kind of plug-in unit of browser of mobile terminal to call safe verification method, comprise: after detecting the operation that the plug-in unit carry out desired is called, from the plugin manager of browser of mobile terminal, obtain plug-in unit ID and the signature of this plug-in unit; With the checking of comparing of plug-in unit ID pre-stored in the plug-in unit ID that obtains and signature and the portable terminal and signature, pre-stored plug-in unit ID and signature are to issue from the plug-in unit ID that is used for configuration plug-in and the plug-in card configuration server of signing messages in the described portable terminal; According to the comparison result, this plug-in unit is carried out plug-in unit call processing, wherein, when the plug-in unit ID that obtains and signature are all correct, call this plug-in unit; Correct but sign when incorrect at the plug-in unit ID that obtains, never call this plug-in unit and point out simultaneously and carry out update of plug-in; And when the plug-in unit ID that obtains is incorrect, is linked to the plug-in management server and comes plug-in unit called and carry out online verification.
In one or more examples aspect above-mentioned, when the plug-in unit ID that obtains is incorrect, being linked to the plug-in management server carries out online verification and can comprise: the plug-in unit ID and the signature that obtain are sent to the plug-in management server, for in the plug-in management server, with the plug-in unit ID that receives and signature be entered in advance the verification of comparing of plug-in unit ID in the plug-in management server and signature; The Inspection result who returns according to the plug-in management server, this plug-in unit is carried out plug-in unit call processing, wherein, when the Inspection result shows that the plug-in unit ID that obtains is incorrect, send warning information to the user, show in the Inspection result that the plug-in unit ID that obtains is correct but sign when incorrect, never call this plug-in unit and prompting and carry out update of plug-in, and when the Inspection result shows that the plug-in unit ID that obtains and signature are all correct, call this plug-in unit.
In one or more examples aspect above-mentioned, plug-in unit ID and signature pre-stored in the portable terminal are downloaded by following manner: after described plug-in card configuration server was ready to plug-in unit ID commonly used and signature, whether the described plug-in card configuration server regularly described portable terminal of inquiry needed plug-in unit ID and signature; And when described portable terminal needed plug-in unit ID and signature, described plug-in card configuration server was handed down to described portable terminal with ready plug-in unit ID commonly used and signature.
In one or more examples aspect above-mentioned, plug-in unit ID and signature pre-stored in the described portable terminal are downloaded in the following way: whether have new plug-in unit ID and signature in the described plug-in card configuration server of described mobile terminal enquiry; And when having new plug-in unit ID and signature, described plug-in card configuration server issues this new plug-in unit ID and signature to described portable terminal.
In one or more examples aspect above-mentioned, described plug-in card configuration server is when issuing plug-in unit ID and signature to described portable terminal, also issue and use cryptographic algorithm signature to be encrypted the signature verification string of processing and generating, and, before the plug-in unit ID that will obtain and signature and pre-stored plug-in unit ID and signature are compared checking, described method also comprises: according to the decipherment algorithm corresponding with described cryptographic algorithm, the signature verification string that issues is verified; And when being proved to be successful, carry out described comparison, and when authentication failed, do not carry out described comparison and prompting and carry out update of plug-in.
According to a further aspect in the invention, provide a kind of plug-in unit of browser of mobile terminal to call the safety verification device, comprise: plug-in unit ID and signature acquiring unit, be used for after detecting the operation that the plug-in unit carry out desired is called, from the plugin manager of browser of mobile terminal, obtaining plug-in unit ID and the signature of this plug-in unit; The comparison unit, be used for the checking of comparing of the pre-stored plug-in unit ID of the plug-in unit ID that will obtain and signature and portable terminal and signature, pre-stored plug-in unit ID and to sign be from issuing for the plug-in unit ID of configuration plug-in and the plug-in card configuration server of signing messages in the described portable terminal; Plug-in unit calls processing unit, be used for according to the comparison result, this plug-in unit is carried out plug-in unit call processing, wherein, when the plug-in unit ID that obtains and signature are all correct, described plug-in unit calls processing unit and calls this plug-in unit, correct but sign when incorrect at the plug-in unit ID that obtains, described plug-in unit calls processing unit and never calls this plug-in unit and point out simultaneously and carry out update of plug-in, and when the plug-in unit ID that obtains was incorrect, described plug-in unit called processing unit and is linked to the plug-in management server and comes plug-in unit called and carry out online verification.
In one or more examples aspect above-mentioned, when the plug-in unit ID that obtains is incorrect, described plug-in unit calls processing unit and also comprises: sending module, be used for plug-in unit ID and the signature that obtains sent to the plug-in management server, in the plug-in management server with the plug-in unit ID that receives and signature be entered in advance the verification of comparing of plug-in unit ID in the plug-in management server and signature; And receiver module, be used for receiving the Inspection result that the plug-in management server returns, wherein, after receiving the Inspection result, described plug-in unit calls the Inspection result that processing unit returns according to the plug-in management server, this plug-in unit is carried out plug-in unit call processing, wherein, when the Inspection result shows that the plug-in unit ID that obtains is incorrect, described plug-in unit calls processing unit and sends warning information to the user, show in the Inspection result that the plug-in unit ID that obtains is correct but sign when incorrect, described plug-in unit calls that processing unit is never called this plug-in unit and update of plug-in is carried out in prompting, and when the Inspection result showed that the plug-in unit ID that obtains and signature are all correct, described plug-in unit called processing unit and calls this plug-in unit.
In one or more examples aspect above-mentioned, described plug-in card configuration server is when issuing plug-in unit ID and signature to described portable terminal, also issue and use cryptographic algorithm signature to be encrypted the signature verification string of processing and generating, and, described plug-in unit calls the safety verification device and can also comprise: signature verification string authentication unit, be used for the plug-in unit ID that will obtain and signature and pre-stored plug-in unit ID and signature compare verify before, according to the decipherment algorithm corresponding with described cryptographic algorithm, the signature verification string that issues is verified, wherein, when being proved to be successful, described comparison is carried out in described comparison unit, and when authentication failed, described comparison unit does not carry out described comparison and update of plug-in is carried out in prompting.
According to a further aspect in the invention, provide a kind of portable terminal, comprised that aforesaid plug-in unit calls the safety verification device.
Utilize above-mentioned plug-in unit to call safe verification method and device, can greatly increase the fail safe of browser when calling plug-in unit, so that the loss that the user when can enjoying easily the freedom that plug-in unit brings and making things convenient for function, avoids the attack owing to malicious plugins to cause.
In order to realize above-mentioned and relevant purpose, one or more aspects of the present invention comprise the feature that the back will describe in detail and particularly point out in the claims.Following explanation and accompanying drawing describe some illustrative aspects of the present invention in detail.Yet, the indication of these aspects only be some modes that can use in the variety of way of principle of the present invention.In addition, the present invention is intended to comprise all these aspects and their equivalent.
Description of drawings
According to following detailed description of carrying out with reference to accompanying drawing, above and other purpose of the present invention, feature and advantage will become more apparent.In the accompanying drawings:
Fig. 1 shows the flow chart that calls safe verification method according to the plug-in unit of browser of mobile terminal of the present invention;
Fig. 2 shows and carries out the flow chart of the process of online verification at the plug-in management server among Fig. 1;
Fig. 3 shows the plug-in card configuration server issues schematic diagram from an example of plug-in unit ID and signature to portable terminal;
Fig. 4 shows the plug-in card configuration server issues schematic diagram from another example of plug-in unit ID and signature to portable terminal;
Fig. 5 A shows the schematic diagram that user's plug-in unit when portable terminal uses Unionpay's payment plug-in unit to pay the bill payment calls each process of safety verification to 5D;
Fig. 6 shows the block diagram that calls the safety verification device according to the plug-in unit of browser of mobile terminal of the present invention; With
Fig. 7 shows has the block diagram that insert according to the invention is called the portable terminal of safety verification device.
Identical label is indicated similar or corresponding feature or function in institute's drawings attached.
Embodiment
Various aspects of the present disclosure are described below.Should be understood that the instruction of this paper can be with varied form imbody, and disclosed any concrete structure, function or both only are representational in this article.Based on the instruction of this paper, those skilled in the art should be understood that an aspect disclosed herein can be independent of any other side and realize, and the two or more aspects in these aspects can make up according to variety of way.For example, can use the aspect of any number described in this paper, implement device or hands-on approach.In addition, can use other structure, function or except one or more aspects described in this paper or be not the 26S Proteasome Structure and Function of one or more aspects described in this paper, realize this device or put into practice this method.In addition, any aspect described herein can comprise at least one element of claim.
Each embodiment of the present invention is described below with reference to accompanying drawings.
Fig. 1 shows the flow chart that calls safe verification method according to the plug-in unit of browser of mobile terminal of the present invention.
When plug-in unit on the browser of portable terminal was called in user expectation, the user can call to this plug-in unit carry out desired the operation of (that is, starting) usually, and for example, the user clicks this plug-in unit.
The user executes the expectation operation of calling to this plug-in unit after, as described in Figure 1, when detect the operation (such as clicking this plug-in unit) that this plug-in unit carry out desired is called at browser of mobile terminal after, at step S110, obtain plug-in unit ID and the signature of this plug-in unit in the plugin manager from browser of mobile terminal.Here, plugin manager is a kind of Program Manager in the portable terminal, is used for installation, system registry, startup and the unloading etc. of each program (such as, plug-in unit) are managed.Well known to a person skilled in the art to be that after plug-in unit was installed in the operating system at portable terminal, plug-in unit ID and the signing messages of this plug-in unit can be provided by the system API that calls mobile terminal operating system and provide plugin manager.
Particularly, in the operating system of portable terminal, the installation of each application must have an Apply Names, this title is used for being operated system identification and registers in portable terminal this locality, so that when next user starts application, which application what operating system knew that the user will open is, this register name is the software I D of application, be placed on the plug-in unit and say, be exactly plug-in unit ID(such as: the ProductName of UC browser is " UC browser ", is com.UCMobile but its system forms software I D).And the plug-in unit signature, that mobile terminal system manufacturer is the management of using in the standard mobile terminal system, when using, software developers develop need to permit to the access that the application of mobile terminal system manufacturer obtains, and the form difference that this license shows in different mobile terminal systems (such as: what Nokia provided is 16 a string 10 system character strings; What google provided is an encrypt file; Two digital certificate files that apple provides), the signature of this application must be built in the development process of application, and carry all the time, and this signature is unique, (the only having applicant itself could decipher and write signature) that can be read but can not be replicated, so plugin manager (application manager) can read the signature of plug-in unit.
Behind the plug-in unit ID that from the plugin manager of browser of mobile terminal, obtains this plug-in unit and signature, at step S120, with the checking of comparing of plug-in unit ID pre-stored in the plug-in unit ID of this plug-in unit of obtaining and signing messages and the portable terminal and signing messages.Here, the plug-in unit ID that described portable terminal is pre-stored and signing messages be plug-in unit ID and the signing messages of the most frequently used one or more plug-in units of browser of mobile terminal normally, and is stored in the local storage (such as, buffer memory) of portable terminal.In addition, pre-stored plug-in unit ID and signing messages is from issuing for the plug-in unit ID of configuration plug-in and the plug-in card configuration server of signing messages in the described browser of mobile terminal.How issuing plug-in unit ID and signing messages from the plug-in card configuration server to portable terminal will specifically describe with reference to Fig. 3 and Fig. 4 below.
After pre-stored plug-in unit ID and signing messages are compared checking in the plug-in unit ID of this plug-in unit that will obtain and signing messages and portable terminal, will according to the comparison result, this plug-in unit be carried out plug-in unit call processing.
Particularly, at step S140, whether the plug-in unit ID that judges the plug-in unit obtain is identical with the plug-in unit ID of a plug-in unit in the pre-stored plug-in unit in the portable terminal.If the plug-in unit ID of any one plug-in unit that the plug-in unit ID of the plug-in unit that obtains and portable terminal are pre-stored is not identical, namely, the determination result is NO for step S140, and then flow process proceeds to step S160, is linked to the plug-in management server and comes plug-in unit called and carry out online verification.Fig. 2 shows and carries out the flow chart of the process of online verification at the plug-in management server among Fig. 1.
As shown in Figure 2, when the plug-in unit ID of any one pre-stored plug-in unit was identical in the plug-in unit ID that judges the plug-in unit that obtains and portable terminal, at step S161, portable terminal sent plug-in unit ID and the signature of the plug-in unit that obtains to the plug-in management server.After receiving the plug-in unit ID and signature that portable terminal sends, at step S163, the plug-in management server with the plug-in unit ID that receives and signature be entered in advance the verification of comparing of plug-in unit ID in the plug-in management server and signature.Here, the plug-in management server is a kind of background server, is used for management plug-in unit relevant information.
Then, at step S165, return the Inspection result to portable terminal.For example, when the plug-in unit ID that receives and the plug-in unit ID that is entered in advance all plug-in units in the plug-in management server not simultaneously, return to portable terminal and to show the incorrect Inspection result of plug-in unit ID, for example, can adopt numerical value 0 expression, that is, return numerical value 0 to portable terminal, the plug-in unit that this explanation is obtained is not within the range of management of plug-in management server.When the plug-in unit ID that receives identical with the plug-in unit ID of a plug-in unit in being entered in advance the plug-in management server, but when corresponding signature is not identical, return to portable terminal and to show the correct but incorrect Inspection result that signs of plug-in unit ID, for example, can adopt numerical value 1 expression, namely, return numerical value 1 to portable terminal, this explanation plug-in unit was registered in the plug-in management server, but signature is not right, belongs to illegal plug-in unit.When the plug-in unit ID that receives identical with the plug-in unit ID of a plug-in unit in being entered in advance the plug-in management server, and the signature that obtains also be entered in advance the plug-in management server in corresponding signature when also identical, return to portable terminal and to show all correct Inspection results of plug-in unit ID and signature, for example, can adopt numerical value 2 expressions, that is, return numerical value 2 to portable terminal, this explanation plug-in unit ID and signature are all correct, have passed through plug-in unit and have called safety verification.
Then, at step S167, the Inspection result who returns according to the plug-in management server, this plug-in unit is carried out plug-in unit call processing, particularly, when the Inspection result who returns shows that the plug-in unit ID that obtains is incorrect, send warning information to the user, for example, point out risk by dialog box to the user.Perhaps, when the user sent warning information, this plug-in unit is set to can be by calling behind user's manual confirmation.Show in the Inspection result that the plug-in unit ID that obtains is correct but sign when incorrect that force to never call this plug-in unit and update of plug-in is carried out in prompting, for example, prompting user has the plug-in unit of the correct signature that conforms to plug-in unit ID to the download of plug-in management server.When the Inspection result shows that the plug-in unit ID that obtains and signature are all correct, call this plug-in unit and use to the user.
In the local verification of above-mentioned portable terminal, if the plug-in unit ID of the pre-stored plug-in unit of the plug-in unit ID of the plug-in unit that obtains and portable terminal is identical, namely the judged result of step S140 is yes, and then flow process proceeds to step S150.
At step S150, judge the signature obtain whether with portable terminal in the corresponding signature of the plug-in unit identical with plug-in unit that obtain that store identical.If identical, show that then signature is correct, flow process proceeds to step S180, at step S180, calls this plug-in unit and uses to the user.If not identical, show that then signature is incorrect, flow process proceeds to step S170.At step S170, uncomfortable this plug-in unit, and prompting user is downloaded the plug-in unit with the correct signature that conforms to plug-in unit ID in the plug-in management server.
As above see figures.1.and.2 and described the flow chart that calls the safety verification process according to the plug-in unit of browser of mobile terminal of the present invention.In another embodiment of the present invention, described plug-in card configuration server is when issuing plug-in unit ID and signature to described portable terminal, can also issue and use cryptographic algorithm signature to be encrypted the signature verification string of processing and generating, for example, issue the signature verification string that uses the RSA private key to be encrypted rear generation.In this case, described method can also comprise: before the plug-in unit ID that will obtain and signature and pre-stored plug-in unit ID and signature are compared checking, namely before step S120, according to the decipherment algorithm corresponding with described cryptographic algorithm, the signature verification string that issues is verified, for example, in the situation of using the RSA private key to be encrypted, at portable terminal, use the RSA PKI that the signature verification string is verified.And, to being proved to be successful of signature verification string the time, carry out above-mentioned comparison, and to the authentication failed of signature verification string the time, not carrying out described comparison and prompting carries out update of plug-in, as the correct but incorrect situation of signing of the plug-in unit ID among Fig. 1.Use RSA cryptographic algorithms to the benefit that the plug-in unit signature is encrypted to be: the first, prevent with the plug-in unit signature by Internet Transmission to the process of browser in the plug-in unit signature maliciously stolen; The second, play the effect of carrying out mutually authentication.
In addition, when carrying out online verification, can also timer be set at portable terminal, be used for sending from portable terminal to the plug-in management server the plug-in unit ID and signature that obtains, carry out timing to the time that receives the Inspection result that the plug-in management server returns.And, timing time and the threshold value that sets in advance of timer compared, if surpass threshold value, namely safety check is overtime, then determines the safety check failure, and again initiates online verification by browser of mobile terminal.
Fig. 3 shows the plug-in card configuration server issues schematic diagram from an example of plug-in unit ID and signature to portable terminal.As shown in Figure 3, at step S310, at first in the plug-in card configuration server, be ready to plug-in unit ID and the corresponding signature of the most frequently used plug-in unit of browser of mobile terminal.Then, at S320, between portable terminal and plug-in card configuration server, set up Handshake Protocol.After setting up Handshake Protocol, at step S330, the plug-in card configuration server inquires regularly whether portable terminal needs plug-in unit ID and signature.If portable terminal needs plug-in unit ID and signature, then portable terminal sends reply (the step S340) that needs plug-in unit ID and signature to the plug-in card configuration server.After receiving replying that portable terminal sends, at step S350, the plug-in card configuration server sends to portable terminal with ready plug-in unit ID and signature.Then, at step S360, portable terminal is stored plug-in unit ID and the signature that receives in local cache.
Fig. 4 shows the plug-in card configuration server issues schematic diagram from another example of plug-in unit ID and signature to portable terminal.As shown in Figure 4, at step S410, portable terminal sends about whether there is the inquiry request of new plug-in unit ID and signature in the plug-in card configuration server to the plug-in card configuration server.After receiving the inquiry request, at step S420, the plug-in card configuration server determines whether to exist new plug-in unit ID and signature.When not having new plug-in unit ID and signature, do not issue plug-in unit ID and signature (step S450) to portable terminal.When having new plug-in unit ID and signature, at step S430, send new plug-in unit ID and signature to portable terminal.Then, at step S440, the new plug-in unit ID that the portable terminal utilization receives and signature upgrade and store.
Fig. 5 A shows the schematic diagram that user's plug-in unit when portable terminal uses Unionpay's payment plug-in unit to pay the bill payment calls each process of safety verification to 5D.
Fig. 5 A shows the situation of user when portable terminal is prepared to use Unionpay's payment plug-in unit to pay the bill payment.The user pays in click plug-in unit payment button, also not carrying out plug-in unit has transferred when operating, browser of mobile terminal automatically reads the signature verification information of this plug-in unit in plugin manager and (is uid under the symbian system, under Android system, be the program signature), then with portable terminal in the verification of comparing of the information registered in storage or the plug-in management server.In the Inspection process, the information exchange that transmits is crossed RSA128 position superencipher, guarantees data security, shown in Fig. 5 B.
If Inspection passes through, then to user prompting and show the affiliated source company of this plug-in unit, shown in Fig. 5 C.Then, shown in Fig. 5 D, transferred this Unionpay's payment plug-in unit and payment of paying the bill.
As above referring to figs. 1 through Fig. 5 D the flow chart that calls safe verification method according to the plug-in unit of browser of mobile terminal of the present invention has been described.The plug-in unit of above-mentioned browser of mobile terminal of the present invention calls safe verification method, can adopt software to realize, also can adopt hardware to realize, or adopts the mode of software and hardware combination to realize.
Fig. 6 shows the block diagram that calls safety verification device 600 according to the plug-in unit of browser of mobile terminal of the present invention.As shown in Figure 6, plug-in unit calls safety verification device 600 and comprises that plug-in unit ID and signature acquiring unit 610, comparison unit 620 and plug-in unit call processing unit 630.
Plug-in unit ID and signature acquiring unit 610 are used for obtaining plug-in unit ID and the signature of this plug-in unit from the plugin manager of browser of mobile terminal after detecting the operation that the plug-in unit carry out desired is called.
Comparison unit 620 is used for the checking of comparing of the pre-stored plug-in unit ID of the plug-in unit ID that will obtain and signature and portable terminal and signature, pre-stored plug-in unit ID and to sign be from issuing for the plug-in unit ID of configuration plug-in and the plug-in card configuration server of signing messages in the described portable terminal.In addition, plug-in unit ID and the corresponding signature of the most frequently used one or more plug-in units of described pre-stored plug-in unit ID and the browser of mobile terminal normally of signing.
Plug-in unit calls processing unit 630 and is used for according to the comparison result, this plug-in unit is carried out plug-in unit call processing, wherein, when the plug-in unit ID that obtains and signature are all correct, described plug-in unit calls processing unit and calls this plug-in unit, correct but sign when incorrect at the plug-in unit ID that obtains, described plug-in unit calls processing unit and never calls this plug-in unit, update of plug-in is carried out in simultaneously prompting, and when the plug-in unit ID that obtains was incorrect, described plug-in unit called processing unit and is linked to the plug-in management server and comes plug-in unit called and carry out online verification.
In addition, when the plug-in unit ID that obtains is incorrect, described plug-in unit calls processing unit 630 and can also comprise: the sending module (not shown), be used for plug-in unit ID and the signature that obtains sent to the plug-in management server, in the plug-in management server with the plug-in unit ID that receives and signature be entered in advance the verification of comparing of plug-in unit ID in the plug-in management server and signature; And receiver module (not shown), be used for receiving the result that the plug-in management server returns, wherein, after receiving the Inspection result that described plug-in management server returns, described plug-in unit calls the Inspection result that processing unit 630 returns according to the plug-in management server, this plug-in unit is carried out plug-in unit call processing.Particularly, when the Inspection result shows that the plug-in unit ID that obtains is incorrect, described plug-in unit calls processing unit and sends warning information to the user, show in the Inspection result that the plug-in unit ID that obtains is correct but sign when incorrect, described plug-in unit calls that processing unit is never called this plug-in unit and update of plug-in is carried out in prompting, and when the Inspection result showed that the plug-in unit ID that obtains and signature are all correct, described plug-in unit called processing unit and calls this plug-in unit.
In addition, in another example of the present invention, described plug-in card configuration server also issues and uses cryptographic algorithm signature to be encrypted the signature verification string of processing and generating when issuing plug-in unit ID and signature to described portable terminal.In this case, described plug-in unit calls the safety verification device can also comprise signature verification string authentication unit (not shown), be used for the plug-in unit ID that will obtain and signature and pre-stored plug-in unit ID and signature compare verify before, according to the decipherment algorithm corresponding with described cryptographic algorithm, the signature verification string that issues is verified, wherein, when being proved to be successful, comparison is carried out in described comparison unit, and when authentication failed, described comparison unit does not carry out comparison and update of plug-in is carried out in prompting.
Fig. 7 shows has the block diagram that insert according to the invention is called the portable terminal 10 of safety verification device.Plug-in unit among Fig. 7 calls the safety verification device can also comprise that the plug-in unit shown in Fig. 6 calls the various modification of safety verification device 600.
In addition, typically, portable terminal of the present invention can be various hand-held terminal devices, such as mobile phone, PDA(Personal Digital Assistant) etc., so protection scope of the present invention should not be defined as the portable terminal of certain particular type.
In addition, the method according to this invention can also be implemented as the computer program of being carried out by CPU.When this computer program is carried out by CPU, carry out the above-mentioned functions that limits in the method for the present invention.
In addition, said method step and system unit also can utilize controller and be used for storage so that controller is realized the computer readable storage devices realization of the computer program of above-mentioned steps or Elementary Function.
In addition, should be understood that computer readable storage devices as herein described (for example, memory) can be volatile memory or nonvolatile memory, perhaps can comprise volatile memory and nonvolatile memory.And nonrestrictive, nonvolatile memory can comprise read-only memory (ROM), programming ROM (PROM), electrically programmable ROM(EPROM as an example), electrically erasable programmable ROM(EEPROM) or flash memory.Volatile memory can comprise random-access memory (ram), and this RAM can serve as the External Cache memory.As an example and nonrestrictive, RAM can obtain in a variety of forms, such as synchronous random access memory (DRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate SDRAM(DDR SDRAM), strengthen SDRAM(ESDRAM), synchronization link DRAM(SLDRAM) and direct RambusRAM(DRRAM).The memory device of disclosed aspect is intended to include but not limited to the memory of these and other adequate types.
Those skilled in the art will also understand is that, may be implemented as electronic hardware, computer software or both combinations in conjunction with the described various illustrative logical blocks of disclosure herein, module, circuit and algorithm steps.For this interchangeability of hardware and software clearly is described, with regard to the function of various exemplary components, square, module, circuit and step it has been carried out general description.This function is implemented as software or is implemented as hardware and depends on concrete application and the design constraint that imposes on whole system.Those skilled in the art can realize described function in every way for every kind of concrete application, but this realization determines should not be interpreted as causing departing from the scope of the present invention.
Can utilize the following parts that are designed to carry out function described here to realize or carry out in conjunction with the described various illustrative logical blocks of disclosure herein, module and circuit: general processor, digital signal processor (DSP), application-specific integrated circuit (ASIC) (ASIC), field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete nextport hardware component NextPort or any combination of these parts.General processor can be microprocessor, but replacedly, processor can be any conventional processors, controller, microcontroller or state machine.Processor also may be implemented as the combination of computing equipment, and for example, the combination of DSP and microprocessor, multi-microprocessor, one or more microprocessor are in conjunction with DSP nuclear or any other this configuration.
In the software module that can directly be included in the hardware, be carried out by processor in conjunction with the step of the described method of disclosure herein or algorithm or in the two the combination.Software module can reside in the storage medium of RAM memory, flash memory, ROM memory, eprom memory, eeprom memory, register, hard disk, removable dish, CD-ROM or any other form known in the art.Exemplary storage medium is coupled to processor so that processor can be from this storage medium reading information or to this storage medium writing information.In an alternative, described storage medium can be integral to the processor together.Processor and storage medium can reside among the ASIC.ASIC can reside in the user terminal.In an alternative, processor and storage medium can be used as discrete assembly and reside in the user terminal.
Although the disclosed content in front shows exemplary embodiment of the present invention, should be noted that under the prerequisite of the scope of the present invention that does not deviate from the claim restriction, can carry out multiple change and modification.Function, step and/or action according to the claim to a method of inventive embodiments described herein do not need to carry out with any particular order.In addition, although element of the present invention can be with individual formal description or requirement, also it is contemplated that a plurality of, unless clearly be restricted to odd number.
Be described although as above described each embodiment according to the present invention with reference to figure, it will be appreciated by those skilled in the art that each embodiment that the invention described above is proposed, can also make various improvement on the basis that does not break away from content of the present invention.Therefore, protection scope of the present invention should be determined by the content of appending claims.

Claims (9)

1. the plug-in unit of a browser of mobile terminal calls safe verification method, comprising:
After detecting the operation that the plug-in unit carry out desired is called, from the plugin manager of browser of mobile terminal, obtain plug-in unit ID and the signature of this plug-in unit;
With the checking of comparing of plug-in unit ID pre-stored in the plug-in unit ID that obtains and signature and the portable terminal and signature, pre-stored plug-in unit ID and signature are to issue from the plug-in unit ID that is used for configuration plug-in and the plug-in card configuration server of signing messages in the described portable terminal;
According to the comparison result, this plug-in unit is carried out plug-in unit call processing,
Wherein, when the plug-in unit ID that obtains and signature are all correct, call this plug-in unit; Correct but sign when incorrect at the plug-in unit ID that obtains, never call this plug-in unit, update of plug-in is carried out in simultaneously prompting; And when the plug-in unit ID that obtains is incorrect, is linked to the plug-in management server and comes plug-in unit called and carry out online verification.
2. plug-in unit as claimed in claim 1 calls safe verification method, wherein, when the plug-in unit ID that obtains is incorrect, is linked to the plug-in management server and carries out online verification and comprise:
The plug-in unit ID and the signature that obtain are sent to the plug-in management server, in the plug-in management server with the plug-in unit ID that receives and signature be entered in advance the verification of comparing of plug-in unit ID in the plug-in management server and signature;
Inspection result according to the plug-in management server returns carries out plug-in unit to this plug-in unit and calls processing,
Wherein, when the Inspection result shows that the plug-in unit ID that obtains is incorrect, send warning information to the user; Show in the Inspection result that the plug-in unit ID that obtains is correct but sign when incorrect, never call this plug-in unit and prompting and carry out update of plug-in; And when the Inspection result shows that the plug-in unit ID that obtains and signature are all correct, call this plug-in unit.
3. plug-in unit as claimed in claim 1 calls safe verification method, and wherein, plug-in unit ID and signature pre-stored in the portable terminal are downloaded by following manner:
After described plug-in card configuration server was ready to plug-in unit ID commonly used and signature, whether the described plug-in card configuration server regularly described portable terminal of inquiry needed plug-in unit ID and signature; And
When described portable terminal needed plug-in unit ID and signature, described plug-in card configuration server was handed down to described portable terminal with ready plug-in unit ID commonly used and signature.
4. plug-in unit as claimed in claim 1 calls safe verification method, and wherein, plug-in unit ID and signature pre-stored in the described portable terminal are downloaded in the following way:
Whether there are new plug-in unit ID and signature in the described plug-in card configuration server of described mobile terminal enquiry; And
When having new plug-in unit ID and signature, described plug-in card configuration server issues this new plug-in unit ID and signature to described portable terminal.
5. plug-in unit as claimed in claim 1 calls safe verification method, wherein, described plug-in card configuration server is when issuing plug-in unit ID and signature to described portable terminal, also issue and use cryptographic algorithm signature to be encrypted the signature verification string of processing and generating, and, before the plug-in unit ID that will obtain and signature and pre-stored plug-in unit ID and signature were compared checking, described method also comprised:
According to the decipherment algorithm corresponding with described cryptographic algorithm, the signature verification string that issues is verified; And
When being proved to be successful, carry out described comparison, and
When authentication failed, do not carry out described comparison and prompting and carry out update of plug-in.
6. the plug-in unit of a browser of mobile terminal calls the safety verification device, comprising:
Plug-in unit ID and signature acquiring unit are used for obtaining plug-in unit ID and the signature of this plug-in unit from the plugin manager of browser of mobile terminal after detecting the operation that the plug-in unit carry out desired is called;
The comparison unit, be used for the checking of comparing of the pre-stored plug-in unit ID of the plug-in unit ID that will obtain and signature and portable terminal and signature, pre-stored plug-in unit ID and to sign be from issuing for the plug-in unit ID of configuration plug-in and the plug-in card configuration server of signing messages in the described portable terminal;
Plug-in unit calls processing unit, is used for according to the comparison result, and this plug-in unit is carried out plug-in unit call processing,
Wherein, when the plug-in unit ID that obtains and signature were all correct, described plug-in unit called processing unit and calls this plug-in unit; Correct but sign when incorrect at the plug-in unit ID that obtains, described plug-in unit calls processing unit and never calls this plug-in unit, and update of plug-in is carried out in simultaneously prompting; And when the plug-in unit ID that obtains was incorrect, described plug-in unit called processing unit and is linked to the plug-in management server and comes plug-in unit called and carry out online verification.
7. plug-in unit as claimed in claim 1 calls the safety verification device, and wherein, when the plug-in unit ID that obtains was incorrect, described plug-in unit called processing unit and also comprises:
Sending module is used for plug-in unit ID and the signature that obtains sent to the plug-in management server, in the plug-in management server with the plug-in unit ID that receives and signature be entered in advance the verification of comparing of plug-in unit ID in the plug-in management server and signature; And
Receiver module is used for receiving the Inspection result that the plug-in management server returns,
Wherein, after receiving the Inspection result that described plug-in management server returns, described plug-in unit calls the Inspection result that processing unit returns according to the plug-in management server, and this plug-in unit is carried out plug-in unit call processing,
Wherein, when the Inspection result shows that the plug-in unit ID that obtains is incorrect, described plug-in unit calls processing unit and sends warning information to the user, show in the Inspection result that the plug-in unit ID that obtains is correct but sign when incorrect, described plug-in unit calls that processing unit is never called this plug-in unit and update of plug-in is carried out in prompting, and when the Inspection result showed that the plug-in unit ID that obtains and signature are all correct, described plug-in unit called processing unit and calls this plug-in unit.
8. plug-in unit as claimed in claim 6 calls the safety verification device, wherein, described plug-in card configuration server is when issuing plug-in unit ID and signature to described portable terminal, also issue and use cryptographic algorithm signature to be encrypted the signature verification string of processing and generating, and described plug-in unit calls the safety verification device and also comprises:
Signature verification string authentication unit, be used for the plug-in unit ID that will obtain and signature and pre-stored plug-in unit ID and signature compare verify before, according to the decipherment algorithm corresponding with described cryptographic algorithm, the signature verification string that issues is verified,
Wherein, when being proved to be successful, comparison is carried out in described comparison unit, and when authentication failed, described comparison unit does not carry out comparison and update of plug-in is carried out in prompting.
9. a portable terminal comprises such as any one described plug-in unit in the claim 6 to 8 and calls the safety verification device.
CN2012104025494A 2012-10-19 2012-10-19 Security verification method, security verification device and mobile terminal for plugin call in mobile terminal Pending CN102883324A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012104025494A CN102883324A (en) 2012-10-19 2012-10-19 Security verification method, security verification device and mobile terminal for plugin call in mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012104025494A CN102883324A (en) 2012-10-19 2012-10-19 Security verification method, security verification device and mobile terminal for plugin call in mobile terminal

Publications (1)

Publication Number Publication Date
CN102883324A true CN102883324A (en) 2013-01-16

Family

ID=47484426

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012104025494A Pending CN102883324A (en) 2012-10-19 2012-10-19 Security verification method, security verification device and mobile terminal for plugin call in mobile terminal

Country Status (1)

Country Link
CN (1) CN102883324A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103440453A (en) * 2013-09-10 2013-12-11 北京奇虎科技有限公司 Method for detecting operation environment of browser, client, server and system
CN103544013A (en) * 2013-10-25 2014-01-29 优视科技有限公司 Plug-in system and plug-in management method
CN103560883A (en) * 2013-10-30 2014-02-05 南京邮电大学 Safety identification method, between android application programs, based on user right
CN103685277A (en) * 2013-12-17 2014-03-26 南京大学 Safety protection system and method for webpage access through browser
CN103677898A (en) * 2013-11-08 2014-03-26 北京奇虎科技有限公司 Method for checking loaded extension and/or plug-in on server side and server
CN103761114A (en) * 2013-10-18 2014-04-30 北京奇虎科技有限公司 Method and device for loading extensions and/or plugins on browser side
CN103778367A (en) * 2013-12-30 2014-05-07 网秦(北京)科技有限公司 Method and terminal for detecting safety of application installation package based on application certificate and auxiliary server
CN104462949A (en) * 2014-10-27 2015-03-25 中国建设银行股份有限公司 Method and device for calling plug-in
CN104965827A (en) * 2014-04-25 2015-10-07 腾讯科技(深圳)有限公司 Method, apparatus and terminal for processing plug-ins
CN105912362A (en) * 2016-04-11 2016-08-31 北京金山安全软件有限公司 Method and device for loading plug-in and electronic equipment
CN106571928A (en) * 2016-11-09 2017-04-19 北京海泰方圆科技股份有限公司 Method and device for managing browser
CN106598661A (en) * 2016-12-08 2017-04-26 上海众人网络安全技术有限公司 Method and system for dynamically updating plug-in
CN106934272A (en) * 2017-02-09 2017-07-07 北京奇虎科技有限公司 The method of calibration and device of a kind of application message
US9798827B2 (en) 2013-10-25 2017-10-24 Uc Mobile Co., Ltd. Methods and devices for preloading webpages
CN107291563A (en) * 2017-05-05 2017-10-24 广东网金控股股份有限公司 A kind of call method and device of back-end code plug-in unit
CN107766716A (en) * 2016-08-16 2018-03-06 阿里巴巴集团控股有限公司 Certificate detection method and device, electronic equipment
CN110569088A (en) * 2019-09-09 2019-12-13 五八有限公司 client plug-in management method and device, electronic equipment and storage medium
WO2020233044A1 (en) * 2019-05-21 2020-11-26 深圳壹账通智能科技有限公司 Plug-in verification method and device, and server and computer-readable storage medium
CN112099827A (en) * 2020-09-21 2020-12-18 上海二三四五网络科技有限公司 Control method and device for automatic updating of plug-in browser
CN113157387A (en) * 2021-03-30 2021-07-23 东风汽车有限公司东风日产乘用车公司 Function simulator, function software running end, function simulation system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179378A (en) * 2006-12-21 2008-05-14 腾讯科技(深圳)有限公司 Method and system for executing plug-in unit
CN101369930A (en) * 2008-09-01 2009-02-18 深圳市深信服电子科技有限公司 Security examination method, system and equipment for network plug-in
CN102682014A (en) * 2011-03-14 2012-09-19 腾讯科技(深圳)有限公司 Open-type plug-in module management platform implemented on browser and open-type plug-in module management method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179378A (en) * 2006-12-21 2008-05-14 腾讯科技(深圳)有限公司 Method and system for executing plug-in unit
CN101369930A (en) * 2008-09-01 2009-02-18 深圳市深信服电子科技有限公司 Security examination method, system and equipment for network plug-in
CN102682014A (en) * 2011-03-14 2012-09-19 腾讯科技(深圳)有限公司 Open-type plug-in module management platform implemented on browser and open-type plug-in module management method

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105447383B (en) * 2013-09-10 2018-05-29 北京奇虎科技有限公司 Browser execution environment detection method, client, server and system
CN103440453B (en) * 2013-09-10 2017-01-18 北京奇虎科技有限公司 Method for detecting operation environment of browser, client, server and system
CN103440453A (en) * 2013-09-10 2013-12-11 北京奇虎科技有限公司 Method for detecting operation environment of browser, client, server and system
CN105447383A (en) * 2013-09-10 2016-03-30 北京奇虎科技有限公司 Browser operating environment detection method, client, server and browser operating environment detection system
CN103761114B (en) * 2013-10-18 2017-10-17 北京奇虎科技有限公司 A kind of browser side loading extension and/or the method and device of plug-in unit
CN103761114A (en) * 2013-10-18 2014-04-30 北京奇虎科技有限公司 Method and device for loading extensions and/or plugins on browser side
CN103544013A (en) * 2013-10-25 2014-01-29 优视科技有限公司 Plug-in system and plug-in management method
US9798827B2 (en) 2013-10-25 2017-10-24 Uc Mobile Co., Ltd. Methods and devices for preloading webpages
CN103544013B (en) * 2013-10-25 2017-06-06 优视科技有限公司 A kind of plug-in system and plug-in management method
US10489476B2 (en) 2013-10-25 2019-11-26 Uc Mobile Co., Ltd. Methods and devices for preloading webpages
CN103560883B (en) * 2013-10-30 2016-08-31 南京邮电大学 A kind of security authentication method between Android application program based on user right
CN103560883A (en) * 2013-10-30 2014-02-05 南京邮电大学 Safety identification method, between android application programs, based on user right
CN103677898A (en) * 2013-11-08 2014-03-26 北京奇虎科技有限公司 Method for checking loaded extension and/or plug-in on server side and server
CN103685277B (en) * 2013-12-17 2016-08-17 南京大学 A kind of browser access safe web page guard method
CN103685277A (en) * 2013-12-17 2014-03-26 南京大学 Safety protection system and method for webpage access through browser
CN103778367A (en) * 2013-12-30 2014-05-07 网秦(北京)科技有限公司 Method and terminal for detecting safety of application installation package based on application certificate and auxiliary server
CN104965827A (en) * 2014-04-25 2015-10-07 腾讯科技(深圳)有限公司 Method, apparatus and terminal for processing plug-ins
CN104462949A (en) * 2014-10-27 2015-03-25 中国建设银行股份有限公司 Method and device for calling plug-in
CN105912362A (en) * 2016-04-11 2016-08-31 北京金山安全软件有限公司 Method and device for loading plug-in and electronic equipment
CN105912362B (en) * 2016-04-11 2019-02-26 珠海豹趣科技有限公司 A kind of method, apparatus and electronic equipment loading plug-in unit
CN107766716A (en) * 2016-08-16 2018-03-06 阿里巴巴集团控股有限公司 Certificate detection method and device, electronic equipment
CN106571928B (en) * 2016-11-09 2018-05-01 北京海泰方圆科技股份有限公司 A kind of method and device of browser administration
CN106571928A (en) * 2016-11-09 2017-04-19 北京海泰方圆科技股份有限公司 Method and device for managing browser
CN106598661A (en) * 2016-12-08 2017-04-26 上海众人网络安全技术有限公司 Method and system for dynamically updating plug-in
CN106934272A (en) * 2017-02-09 2017-07-07 北京奇虎科技有限公司 The method of calibration and device of a kind of application message
CN107291563A (en) * 2017-05-05 2017-10-24 广东网金控股股份有限公司 A kind of call method and device of back-end code plug-in unit
CN107291563B (en) * 2017-05-05 2020-10-09 广东网金控股股份有限公司 Calling method and device of back-end code plug-in
WO2020233044A1 (en) * 2019-05-21 2020-11-26 深圳壹账通智能科技有限公司 Plug-in verification method and device, and server and computer-readable storage medium
CN110569088A (en) * 2019-09-09 2019-12-13 五八有限公司 client plug-in management method and device, electronic equipment and storage medium
CN112099827A (en) * 2020-09-21 2020-12-18 上海二三四五网络科技有限公司 Control method and device for automatic updating of plug-in browser
CN112099827B (en) * 2020-09-21 2021-06-04 上海二三四五网络科技有限公司 Control method and device for automatic updating of plug-in browser
CN113157387A (en) * 2021-03-30 2021-07-23 东风汽车有限公司东风日产乘用车公司 Function simulator, function software running end, function simulation system and method
CN113157387B (en) * 2021-03-30 2023-11-14 东风汽车有限公司东风日产乘用车公司 Function simulator, function software running end, function simulation system and method

Similar Documents

Publication Publication Date Title
CN102883324A (en) Security verification method, security verification device and mobile terminal for plugin call in mobile terminal
US10567385B2 (en) System and method for provisioning a security token
CN101106455B (en) Identity authentication method and intelligent secret key device
TWI667586B (en) System and method for verifying changes to uefi authenticated variables
CN101034991B (en) Secure guiding system, method, code signature construction method and authentication method
CN108334753B (en) Pirate application verification method and distributed server node
WO2019200799A1 (en) Short message verification code pushing method, electronic device and readable storage medium
CN106656502A (en) Computer systems and safe execution method
EP2727040B1 (en) A secure hosted execution architecture
CN105446713A (en) Safe storage method and equipment
CN108335105B (en) Data processing method and related equipment
KR101756692B1 (en) Terminal Device for Dynamic Secure Module and Driving Method Thereof
JP2009175923A (en) Platform integrity verification system and method
Nauman et al. Using trusted computing for privacy preserving keystroke-based authentication in smartphones
US20160330030A1 (en) User Terminal For Detecting Forgery Of Application Program Based On Hash Value And Method Of Detecting Forgery Of Application Program Using The Same
WO2022073340A1 (en) Mobile terminal application security detection method and system, terminal, and storage medium
WO2016154783A1 (en) Control method and terminal for short message reading
CN112257086A (en) User privacy data protection method and electronic equipment
WO2020088323A1 (en) Capability exposure method and device
WO2019051839A1 (en) Data processing method and device
US20200265135A1 (en) Protecting a software program against tampering
JP2007094879A (en) Authentication system for basic program of operating system, computer used for the same, and computer program
CN106332000A (en) Terminal location information obtaining method and device
US9177123B1 (en) Detecting illegitimate code generators
CN111224826B (en) Configuration updating method, device, system and medium based on distributed system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20130116

RJ01 Rejection of invention patent application after publication