CN104376462A - Safe code scanning payment method - Google Patents
Safe code scanning payment method Download PDFInfo
- Publication number
- CN104376462A CN104376462A CN201410664309.0A CN201410664309A CN104376462A CN 104376462 A CN104376462 A CN 104376462A CN 201410664309 A CN201410664309 A CN 201410664309A CN 104376462 A CN104376462 A CN 104376462A
- Authority
- CN
- China
- Prior art keywords
- payment
- information
- client
- intelligent
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3276—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
Abstract
The invention discloses a safe code scanning payment method. A customer selects and purchases needed commodities after entering a store; if the customer selects an online store, a payment intelligent code is displayed on a third party payment gateway; if the customer selects a physical store, the customer transmits purchase information to an intelligent pos of the merchant, a payment request is transmitted to a third party payment platform through the intelligent pos, and then the payment intelligent code is sent back to the intelligent pos; after the customer has chosen the commodities, the payment intelligent code displayed on the payment gateway or the intelligent pos is scanned, merchant information, commodity information and commodity prices are decrypted, and a payment procedure is to be conducted after correctness of the merchant information, the commodity information and the commodity prices is confirmed; the customer selects whether to adopt a password carrier or to directly transmit the payment intelligent code to complete payment; the third party payment platform completes money deduction and account entry procedures according to information of the payment intelligent code, meanwhile, transaction success information is fed back to the merchant, and verification information is given to the customer; a transaction is completed. According to the safe code scanning payment method, customers can select and purchase commodities by themselves and place orders to generate payment intelligent codes; information is encrypted in the whole process, and the payment process is safe and reliable; payment is convenient, simple and direct; both merchants and customers can complete transactions quickly.
Description
Technical field
The present invention relates to a kind of safe barcode scanning method of payment, be applicable to market, hotel, tourism, food and drink or other fields that barcode scanning can be used to pay.
Background technology
Along with the development of economy, in payment, paid under upper thread by traditional, progressively move towards the line by internet pays.Along with the continuous progress of science and technology, IC industry obtains develop rapidly, and from strength to strength, volume is more and more less for IC chip functions, and price is more and more lower.Meanwhile, mechanics of communication is also in very fast development, and the application of smart mobile phone is very general, and the processing speed of smart mobile phone is also more and more faster, and function also from strength to strength.And wireless network covering is also progressively increase with the service traffics that can support.The development of these basic technologies, has promoted the further change of the modes of payments, based on the mode of mobile terminal payment, has been accepted gradually.
Along with popularizing of mobile payment mode, there is the method for sweeping Quick Response Code payment, there are two risks in this method: 1. client is before sweeping Quick Response Code, the information of not knowing Quick Response Code code, if this Quick Response Code occurs the disadvantageous information of client or behavior, client is ignorant in advance, such as has virus, and client just can know after barcode scanning; 2. the information of businessman or client is easily obtained by the mode of barcode scanning by other people.
Summary of the invention
Based on the demand, the present invention proposes a kind of safe barcode scanning method of payment, the method can realize the patron self-service free choice of goods and place an order to generate paying intelligence code; The encryption of information whole process, payment process is safe and reliable; Payment facilitates simple and direct; Businessman and client can complete transaction very soon.
Technical scheme of the present invention is as follows:
A safe barcode scanning method of payment, comprises the following steps:
Step one, after client enters trade company, chooses required commodity;
Step 2, if trade company is on-line shop, then after having chosen, has called Third-party payment gateway, Third-party payment gateway shows and pays intelligence code; If trade company is solid shop/brick and mortar store, then when choosing, the information of choosing is sent on the intelligent pos that hotel owner provides by client, and by intelligent pos, Third-party payment is passed in payment request, payment intelligence code transfers back on intelligent pos by Third-party payment;
Step 3, pays intelligence code and includes merchant information, merchandise news and price, after client completes and chooses, and the payment intelligence code on the payment intelligence code that scanning payment gateway shows or intelligent pos;
Step 4, client can decrypt merchant information, merchandise news and price after scanning and paying intelligence code, confirm errorless after, enter payment flow;
Step 5, customer selectable is selected and is adopted crypto carrier to complete payment, also directly can pass payment intelligence code and complete payment; Adopt cipher key carrier to complete payment, need intelligent terminal cipher key carrier being inserted client, after generating client's signature, pass to the account management system of Third-party payment together with payment intelligence code;
Step 6, Third-party payment, according to the information paying intelligence code, completes flow process of withholing and keep accounts, and feedback trading successful information is to trade company simultaneously, and check information is to client;
Step 7, transaction completes.
Its further technical scheme is: the trade company in described step one is virtual trade company or entity trade company.
Its further technical scheme is: if adopt cipher key carrier to pay in described step 6, then have sign test process.
Its further technical scheme is: the flow process that keeps accounts in described step 6 can postpone.
Advantageous Effects of the present invention is:
(1) after realizing client's free choice of goods, according to merchandise news, generate at Third-party payment and pay intelligence code; Client can complete commodity shopping in on-line shop, also can complete at solid shop/brick and mortar store and choose, complete after choosing.Choose if complete in on-line shop, then merchandise news directly issues Third-party payment, and generates payment intelligence code (merchandise news after encryption and price, merchant information); If at solid shop/brick and mortar store, then need the intelligent pos that use shop side provides, use the intelligent pos that shop side provides when choosing, merchandise news is recorded, and passes to Third-party payment mechanism, and generate payment intelligence code.
(2) paying intelligence code is presented on the intelligent pos of Third-party payment gateway or businessman; Choose place according to different, if on-line shop, then pay intelligence code and be presented on Third-party payment gateway, if solid shop/brick and mortar store under line, then pay intelligence code and be presented on the intelligent pos that shop side provides.
(3) client uses intelligent terminal and APP to scan above-mentioned payment intelligence code; Client uses intelligent terminal and APP to scan above-mentioned payment intelligence code, if on line, then scanning is presented at the payment intelligence code of the payment gateway on PC, if under line, then scans the payment intelligence code on intelligence code pos that hotel owner provides.
(4) client accesses to your password carrier (optional), or directly according to above-mentioned payment intelligence code, completes payment; Client deciphers and parses merchandise news and price, Business Information after scanning above-mentioned payment intelligence code, if with client select consistent, then confirm pay, above-mentioned payment intelligence code is passed to channel of disbursement, completes payment.In order to safer, while payment, cipher key carrier can be inserted the intelligent terminal of client, the information passing to Third-party payment is signed, be through the real information of consumer's agreement with the information guaranteeing to pass to Third-party payment.
(5) payment process is convenient, can not need to input password, does not need bank card; In the process paid, due to whole process encryption, encrypted by cipher key carrier or APP, particularly adopt cipher key carrier encryption, client can not need password to complete payment, and whole process does not need bank card, also inputs account without client.
(6) information whole process encryption, payment process is safe and reliable; At employing payment intelligence code, or time intelligent terminal and crypto carrier or APP encryption pay, the encryption of payment process whole process, safe and reliable.
Accompanying drawing explanation
Fig. 1 is the cipher key carrier structural drawing in the present invention.
Fig. 2 is that the client in the present invention scans payment intelligence code process flow diagram.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described further.
The present invention proposes a kind of safe barcode scanning method of payment, the method relates to the intelligent pos of businessman or intelligent terminal or on-line shop of businessman, Third-party payment mechanism (such as bank or Alipay), represents instrument, cipher key carrier that the ciphering two-dimension code (namely paying intelligence code) of merchant information and client's free choice of goods information, the intelligent terminal of client and APP and scanning pay intelligence code, and supports the Hardware & software system of said system.
Cipher key carrier structure as shown in Figure 1, comprises microprocessor, safety chip (comprising security logic, self-destruction unit), I/O interface (comprising USB/ serial ports/audio port), random access memory ram, read only memory ROM, the electronics formula of erasing can make carbon copies ROM (read-only memory) EEPROM.
The course of work of cipher key carrier comprises the steps:
Step one, by I/O interface (USB/ serial ports/audio port), or other safe read-write mouths, working procedure is solidificated in ROM in binary form, and the pseudo-random sequence that chaotic maps produces, fascination key, and private key is solidificated in the security logic of safety chip all in binary form;
Step 2, after having solidified, activation of microprocessor, RAM, ROM, EEPROM, security logic and self-destruction unit;
Step 3, is connected cipher key carrier with terminal, provides working power by I/O interface, and then starts microprocessor;
Step 4, is delivered to working procedure in microprocessor and RAM from ROM;
Step 5, reads in the information of the user spy in EEPROM, and the information that user is special is passed to security logic;
Step 6, the information of security logic to user spy identifies, completes authentication, and the work of information encryption and decryption;
Step 7, by I/O interface, is obtained external information, carries out encryption and decryption work, and result exported by I/O interface at security logic to external information;
Step 8, if continuous several times is not all by authentication in security logic, then thinks and None-identified user start self-destruction unit immediately, EEPROM is used for store the distinctive information of user all to destroy, meanwhile, in order to prevent reverse engineering, when continuous several times is not by authentication, start fascination key, follow-up authentication is all use fascination key to carry out authentication, even if reverse engineering success, the key obtained also is false.
As shown in Figure 2, step is as follows for scanning payment flow of the present invention:
Step one, client chooses required commodity after entering trade company (virtual trade company or entity trade company);
Step 2, if on-line shop, then after having chosen, calls Third-party payment gateway, Third-party payment gateway shows and pays intelligence code; If solid shop/brick and mortar store, then when choosing, the information of choosing is sent on the intelligent pos that hotel owner provides by client, and by intelligent pos, Third-party payment is passed in payment request, payment intelligence code transfers back on intelligent pos by Third-party payment;
Step 3, pays intelligence code and includes merchant information, merchandise news and price, after client completes and chooses, and the payment intelligence code on the payment intelligence code that scanning payment gateway shows or intelligent pos;
Step 4, client can decrypt merchant information, merchandise news and price after scanning and paying intelligence code, confirm errorless after, enter payment flow;
Step 5, customer selectable is selected and is adopted crypto carrier to complete payment, also directly can pass payment intelligence code and complete payment; Adopt cipher key carrier to complete payment, need intelligent terminal cipher key carrier being inserted client, after generating client's signature, pass to the account management system of Third-party payment together with payment intelligence code;
Step 6, Third-party payment, according to the information (if adopt cipher key carrier to pay, then having sign test process) paying intelligence code, completes flow process of withholing and keep accounts (flow process that keeps accounts can postpone), feedback trading successful information is to trade company simultaneously, and check information is to client;
Step 7, transaction completes.
Private key in cipher key carrier, adds the random series that produced by the chaotic maps secret variable as each private key combination in " the complex encryption computing " of the process produced at key, improves the ability of resistance against colluders.And Chaotic map sequence and private key are bundled in private key background data base.
" complex encryption computing ", includes the calculating of identity private key (isk), and the calculating of identity private key (isk) is carried out at KMC.If the i-th row row-coordinate wi used represents, make identity private key be isk, so private key realizes with the multiple addition on Galois field territory, then private key is:
Sc
ibe the pseudo-random sequence produced by chaotic maps, to be also the present invention be improves security performance, and prevent the measure of collusion attack, in systems in practice, can not have completely random sequence, be all pseudo-random sequence, and the pseudo-random sequence correlativity of different identification is the smaller the better.Due to the existence of Lyapunov exponent positive in chaos system, thus the fine difference between original state is amplified rapidly, finally become completely uncorrelated, therefore, by chaotic maps, such as logistic maps, according to the different id of user, configure different coefficients, produce different user, the pseudo-random sequence that cross correlation is minimum.
Sc
icarry out dot product with the element in " private key matrix ", get the mould of n after cumulative, n is the parameter representing exponent number.
Same, PKI calculates and realizes with the doubly some addition on elliptic curve E, and corresponding PKI is:
By different chaotic maps, according to user ID, the extraordinary Sc of correlativity can be obtained
ipseudo-random sequence.Bind with private key, these sequences are solidificated on private key carrier.
Above-described is only the preferred embodiment of the present invention, the invention is not restricted to above embodiment.Be appreciated that the oher improvements and changes that those skilled in the art directly derive without departing from the spirit and concept in the present invention or associate, all should think and be included within protection scope of the present invention.
Claims (4)
1. a barcode scanning method of payment for safety, is characterized in that, comprise the following steps:
Step one, after client enters trade company, chooses required commodity;
Step 2, if trade company is on-line shop, then after having chosen, has called Third-party payment gateway, Third-party payment gateway shows and pays intelligence code; If trade company is solid shop/brick and mortar store, then when choosing, the information of choosing is sent on the intelligent pos that hotel owner provides by client, and by intelligent pos, Third-party payment is passed in payment request, payment intelligence code transfers back on intelligent pos by Third-party payment;
Step 3, pays intelligence code and includes merchant information, merchandise news and price, after client completes and chooses, and the payment intelligence code on the payment intelligence code that scanning payment gateway shows or intelligent pos;
Step 4, client can decrypt merchant information, merchandise news and price after scanning and paying intelligence code, confirm errorless after, enter payment flow;
Step 5, customer selectable is selected and is adopted crypto carrier to complete payment, also directly can pass payment intelligence code and complete payment; Adopt cipher key carrier to complete payment, need intelligent terminal cipher key carrier being inserted client, after generating client's signature, pass to the account management system of Third-party payment together with payment intelligence code;
Step 6, Third-party payment, according to the information paying intelligence code, completes flow process of withholing and keep accounts, and feedback trading successful information is to trade company simultaneously, and check information is to client;
Step 7, transaction completes.
2. safe barcode scanning method of payment according to claim 1, is characterized in that: the trade company in described step one is virtual trade company or entity trade company.
3. safe barcode scanning method of payment according to claim 1, is characterized in that: if adopt cipher key carrier to pay in described step 6, then have sign test process.
4. safe barcode scanning method of payment according to claim 1, is characterized in that: the flow process that keeps accounts in described step 6 can postpone.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410664309.0A CN104376462A (en) | 2014-11-19 | 2014-11-19 | Safe code scanning payment method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410664309.0A CN104376462A (en) | 2014-11-19 | 2014-11-19 | Safe code scanning payment method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104376462A true CN104376462A (en) | 2015-02-25 |
Family
ID=52555355
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410664309.0A Pending CN104376462A (en) | 2014-11-19 | 2014-11-19 | Safe code scanning payment method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104376462A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105512876A (en) * | 2015-12-25 | 2016-04-20 | 上海易码信息科技有限公司 | Financial card payment and settlement method |
CN105631656A (en) * | 2015-12-25 | 2016-06-01 | 上海易码信息科技有限公司 | Financial card payment and settlement method under online card consumption mode |
CN105741099A (en) * | 2016-02-26 | 2016-07-06 | 上海易码信息科技有限公司 | Payment clearance method |
CN105809429A (en) * | 2016-02-26 | 2016-07-27 | 上海易码信息科技有限公司 | Online transaction payment settlement method |
CN105868974A (en) * | 2015-12-07 | 2016-08-17 | 乐视移动智能信息技术(北京)有限公司 | Resource processing method and device |
CN107194695A (en) * | 2017-04-25 | 2017-09-22 | 国民技术股份有限公司 | Transaction code is generated and end of scan, transaction code generation and method of commerce |
CN107451813A (en) * | 2016-06-01 | 2017-12-08 | 华为终端(东莞)有限公司 | Method of payment, payment devices and paying server |
CN107808284A (en) * | 2017-11-17 | 2018-03-16 | 上海瀚银信息技术有限公司 | A kind of method of payment based on POS system |
CN109308614A (en) * | 2018-10-23 | 2019-02-05 | 北京奇虎科技有限公司 | Implementation method, the device and system of e-payment |
CN111160884A (en) * | 2019-11-29 | 2020-05-15 | 中国建设银行股份有限公司四川省分行 | Aggregated payment method, system, server and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101051372A (en) * | 2006-04-06 | 2007-10-10 | 北京易富金川科技有限公司 | Method for safety verifying financial business information in electronic business |
CN103198403A (en) * | 2013-03-12 | 2013-07-10 | 中国地质大学(武汉) | Safe mobile payment method based on two-dimension code |
US20140070001A1 (en) * | 2012-09-11 | 2014-03-13 | First Data Corporation | Systems and methods for facilitating the approval and use of a credit account via mobile commerce |
CN103778531A (en) * | 2014-02-23 | 2014-05-07 | 王恩惠 | Method and system for implementing electronic bank card payment on basis of two-dimensional code |
-
2014
- 2014-11-19 CN CN201410664309.0A patent/CN104376462A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101051372A (en) * | 2006-04-06 | 2007-10-10 | 北京易富金川科技有限公司 | Method for safety verifying financial business information in electronic business |
US20140070001A1 (en) * | 2012-09-11 | 2014-03-13 | First Data Corporation | Systems and methods for facilitating the approval and use of a credit account via mobile commerce |
CN103198403A (en) * | 2013-03-12 | 2013-07-10 | 中国地质大学(武汉) | Safe mobile payment method based on two-dimension code |
CN103778531A (en) * | 2014-02-23 | 2014-05-07 | 王恩惠 | Method and system for implementing electronic bank card payment on basis of two-dimensional code |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105868974A (en) * | 2015-12-07 | 2016-08-17 | 乐视移动智能信息技术(北京)有限公司 | Resource processing method and device |
WO2017096798A1 (en) * | 2015-12-07 | 2017-06-15 | 乐视控股(北京)有限公司 | Resource processing method and apparatus |
CN105631656A (en) * | 2015-12-25 | 2016-06-01 | 上海易码信息科技有限公司 | Financial card payment and settlement method under online card consumption mode |
CN105512876A (en) * | 2015-12-25 | 2016-04-20 | 上海易码信息科技有限公司 | Financial card payment and settlement method |
CN105741099A (en) * | 2016-02-26 | 2016-07-06 | 上海易码信息科技有限公司 | Payment clearance method |
CN105809429A (en) * | 2016-02-26 | 2016-07-27 | 上海易码信息科技有限公司 | Online transaction payment settlement method |
CN107451813A (en) * | 2016-06-01 | 2017-12-08 | 华为终端(东莞)有限公司 | Method of payment, payment devices and paying server |
CN107194695A (en) * | 2017-04-25 | 2017-09-22 | 国民技术股份有限公司 | Transaction code is generated and end of scan, transaction code generation and method of commerce |
CN107808284A (en) * | 2017-11-17 | 2018-03-16 | 上海瀚银信息技术有限公司 | A kind of method of payment based on POS system |
CN107808284B (en) * | 2017-11-17 | 2021-12-28 | 上海瀚银信息技术有限公司 | Payment method based on POS machine system |
CN109308614A (en) * | 2018-10-23 | 2019-02-05 | 北京奇虎科技有限公司 | Implementation method, the device and system of e-payment |
CN111160884A (en) * | 2019-11-29 | 2020-05-15 | 中国建设银行股份有限公司四川省分行 | Aggregated payment method, system, server and storage medium |
CN111160884B (en) * | 2019-11-29 | 2021-06-11 | 中国建设银行股份有限公司四川省分行 | Aggregated payment method, system, server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104376462A (en) | Safe code scanning payment method | |
US11544707B2 (en) | Systems and methods for cryptographic authentication of contactless cards | |
van den Breekel et al. | EMV in a nutshell | |
AU2015259162B2 (en) | Master applet for secure remote payment processing | |
CN105593883B (en) | Method for verifying a transaction | |
CN101978646B (en) | For performing the system and method for file distributing and purchase | |
EP3861704A1 (en) | Systems and methods for cryptographic authentication of contactless cards | |
US20150324800A1 (en) | System and Method of Processing PIN-Based Payment Transactions via Mobile Devices | |
CN107210918A (en) | Use the token and password of transaction-specific information | |
CN108665263B (en) | Multi-dimensional bar code action payment method, buyer device and payment servo mechanism | |
US20200104844A1 (en) | Systems and methods for cryptographic authentication of contactless cards | |
KR20140054213A (en) | Payment device with integrated chip | |
JP2012165356A (en) | System and method for establishing communication session between communication device | |
TWI684152B (en) | Payment method and device | |
CN107209889A (en) | Multi-protocols transaction encryption | |
US20170103389A1 (en) | Electronic Payment Validation and Authorization System | |
CA3110292A1 (en) | Systems and methods for cryptographic authentication of contactless cards | |
CN104318437A (en) | Online payment system and payment method for virtual prepaid card | |
CN103959312A (en) | Method of paying for a product or service on a commercial website via an internet connection and a corresponding terminal | |
CN104376465A (en) | Safe mobile payment method | |
CA3115142A1 (en) | Systems and methods for cryptographic authentication of contactless cards | |
CN104376464A (en) | Safe code scanning payment method | |
US10089631B2 (en) | System and method of neutralizing mobile payment | |
Hnaif et al. | Mobile payment method based on public-key cryptography | |
CN104732394A (en) | Internet payment method and internet payment device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150225 |
|
RJ01 | Rejection of invention patent application after publication |