CN104639563A - Method and device for safely processing data - Google Patents

Method and device for safely processing data Download PDF

Info

Publication number
CN104639563A
CN104639563A CN201510092873.4A CN201510092873A CN104639563A CN 104639563 A CN104639563 A CN 104639563A CN 201510092873 A CN201510092873 A CN 201510092873A CN 104639563 A CN104639563 A CN 104639563A
Authority
CN
China
Prior art keywords
described
password input
input mode
browser
ordering system
Prior art date
Application number
CN201510092873.4A
Other languages
Chinese (zh)
Inventor
厉旗
Original Assignee
利诚服装集团股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 利诚服装集团股份有限公司 filed Critical 利诚服装集团股份有限公司
Priority to CN201510092873.4A priority Critical patent/CN104639563A/en
Publication of CN104639563A publication Critical patent/CN104639563A/en

Links

Abstract

The invention discloses a method for safely processing data. The method comprises the following steps of scanning a built-in browser inserted with a supply management system, and closing an external process when the external process calls or modifies the content in the built-in browser, wherein the external process means an out-of-process request which is sent by other processes different from the content process of the operated browser; sending a login request to a remote shopping mall and supermarket order system, wherein the login request carries the information of the terminal in which a supply management system is located; receiving a password entering method which is randomly generated by the remote shopping mall and supermarket order system, and prompting users to log in according to the password entering method, wherein the password entering method comprises password entering order and/or the password entering number; sending a query request to the remote shopping mall and supermarket order system, and importing order data returned by the remote shopping mall and supermarket order system. According to the invention, the safety that suppliers access the shopping mall and supermarket order system through the supply management system can be guaranteed, and the order data is not intercepted and changed by Trojan horse programs.

Description

A kind of data safety processing method and device

Technical field

The present invention relates to technical field of data processing, particularly a kind of data safety processing method and device.

Background technology

Along with the growing growth of E-commerce market, business can be surpassed by the supply chain management of automation and set up conveniently information interchange between supplier, such as business surpasses the order data being received client by form ordering system, and these order data are supplied to supplier, order data is entered into its supply management system by supplier, thus can understand business in detail according to order situation and surpass the sales situation of extensive stock and timely supplying more than the planned quota to business should commodity accordingly.For the order data that business surpasses, traditional way is that after supplier obtains the order data that business surpasses, arranging data typing personnel, are manually entered into the supply management system of oneself by order data.But along with the increase of electronic commerce data amount, particularly the data volume of the super online order of business is very huge, above-mentioned manual typing order data more and more cannot be satisfied the demand, therefore more existing software vendor on market, achieve the order page packing surpassed in form ordering system by business preserve or order is downloaded into order file one by one, then the file these downloaded is transferred to the server of supply management system by modes such as FTP, then imports management system by certain technological means.

But be no matter the problem that mode that the mode of above-mentioned traditional-handwork typing or the above order are uploaded onto the server all exists fail safe, such as, can exist in manual Input Process typing error or artificial malice change order data may, even likely appear in manual Input Process and occur computer crash or power-off thus the situation causing loss of data; Trojan horse program may be there is in the process download at order, uploaded and intercept and capture change order data, therefore greatly reduce the fail safe of order data.Further, because Virus majority is hidden in advance at user side, and do not run, most defence software all cannot detect.And often need the manual killing when Virus runs, do not reach the object of Initiative Defense.Virus, once reach trigger condition, runs at once, and completes its malicious act fast at short notice.Visible how effectively to ensure that business's order data surpassed in form ordering system can be safe and reliable be input to the problem becoming in the supply management system of supplier and need solution badly.

Summary of the invention

In order to solve the problem, embodiments provide a kind of data safety processing method and device, the method business that can guarantee supply surpasses the fail safe of form ordering system by supply management system access business, in whole process, directly by business, the order data surpassed in form ordering system transfers in the database of supply management system, and the manual control do not related to order data and operation, and can ensure that order data is not intercepted and captured change by trojan horse program at any time.Described technical scheme is as follows:

On the one hand, provide a kind of data safety processing method, described method comprises:

The built-in browser that scanning supply management system is nested, and judged whether that external progress calls or revise content in built-in browser, described external progress refers to the striding course request that other processes different from running content process in described browser send;

When result of determination is for being, close described external progress, surpass form ordering system to long-range business and send logging request, described logging request carries described supply management system place end message;

Receive the password input mode that described long-range business surpasses form ordering system stochastic generation, and log according to described password input mode prompting user, described password input mode comprises input order and/or the Password Input number of password;

Surpass form ordering system to described long-range business and send inquiry request, import described long-range business and surpass the order data that form ordering system returns.

Alternatively, described built-in browser is that direct nested IE kernel is formed in supply management system, and described built-in browser acquiescence can only be accessed business and be surpassed form ordering system address.

Alternatively, carry out login according to described password input mode prompting user to comprise:

According to described password input mode, prompting user inputs a few position in original code and logs in; Or,

According to described password input mode, after original code is exchanged with particular order by prompting user, input logs in; Or,

According to described password input mode, a few inputs in password after exchange log in after being exchanged with particular order by original code by prompting user; Or,

According to described password input mode, after position a few in original code is exchanged with particular order by prompting user, a few positions after input exchange log in.

Alternatively, import before described long-range business surpasses the order data that form ordering system returns, described method also comprises:

Filter described order data, the order data bag returned is carried out analysis and obtain its website domain name and port information, feature in the website domain name analyzed out and port information and feature database is contrasted, if be judged as fishing website or other malicious websites, then filter out the packet that this returns.

Alternatively, described method also comprises:

Whether judge by the time of Password Input overtime, when result of determination is for being, current password input mode, need again to surpass form ordering system from described long-range business and obtain password input mode if losing efficacy.

On the other hand, provide a kind of data safe processing device, described device comprises:

Scan module, for scanning the nested built-in browser of supply management system, and having judged whether that external progress calls or revise content in built-in browser, described external progress refers to the striding course request that other processes different from running content process in described browser send;

Request sending module, for when result of determination is for being, closes described external progress, and surpass form ordering system to long-range business and send logging request, described logging request carries described supply management system place end message;

Login module, surpasses the password input mode of form ordering system stochastic generation for receiving described long-range business, and logs according to described password input mode prompting user, and described password input mode comprises input order and/or the Password Input number of password;

Order data imports module, sends inquiry request, import described long-range business and surpass the order data that form ordering system returns for surpassing form ordering system to described long-range business.

Alternatively, described built-in browser is that direct nested IE kernel is formed in supply management system, and described built-in browser acquiescence can only be accessed business and be surpassed form ordering system address.

Alternatively, described login module also for according to described password input mode, is pointed out user to input a few position in original code and is logged in; Or according to described password input mode, after original code is exchanged with particular order by prompting user, input logs in; Or according to described password input mode, a few inputs in password after exchange log in after being exchanged with particular order by original code by prompting user; Or according to described password input mode, after position a few in original code is exchanged with particular order by prompting user, a few positions after input exchange log in.

Alternatively, described device also comprises:

Filtering module, for filtering described order data, the order data bag returned is carried out analysis and obtain its website domain name and port information, feature in the website domain name analyzed out and port information and feature database is contrasted, if be judged as fishing website or other malicious websites, then filter out the packet that this returns.

Alternatively, described device also comprises:

Whether password is acquisition module again, judge by the time of Password Input overtime, and when result of determination is for being, current password input mode lost efficacy, and needs again to surpass form ordering system from described long-range business and obtains password input mode.

The beneficial effect that the technical scheme that the embodiment of the present invention provides is brought is:

By the built-in browser that scanning supply management system is nested, when judging have external progress to call or revise content in built-in browser, close described external progress, the business that can guarantee supply surpasses the fail safe of form ordering system by supply management system access business, in whole process, directly by business, the order data surpassed in form ordering system transfers in the database of supply management system, and the manual control do not related to order data and operation; Further, surpass form ordering system to long-range business and send logging request, to obtain the password input mode that long-range business surpasses form ordering system stochastic generation, make login mode diversified at random, ensure that order data is not intercepted and captured change by trojan horse program further.

Accompanying drawing explanation

In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.

Fig. 1 is the data safety processing method flow chart that the embodiment of the present invention provides;

Fig. 2 is the data safe processing apparatus structure schematic diagram that the embodiment of the present invention provides.

Embodiment

For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.

Fig. 1 is the data safety processing method flow chart that the embodiment of the present invention provides.See Fig. 1, the method comprises:

101, scan the nested built-in browser of supply management system, and judged whether that external progress calls or revise content in built-in browser, described external progress refers to the striding course request that other processes different from running content process in described browser send;

In embodiments of the present invention, this external progress can be trojan horse program, and the process yet can called this built-in browser for other or scan content in this browser, the embodiment of the present invention does not do concrete restriction.

In embodiments of the present invention, this built-in browser can be that direct nested IE kernel is formed in supply management system, and described built-in browser acquiescence can only be accessed business and be surpassed form ordering system address.

102, when result of determination is for being, close described external progress, surpass form ordering system to long-range business and send logging request, described logging request carries described supply management system place end message;

In embodiments of the present invention, long-range business surpasses form ordering system correspondingly can preserve supply management system place end message and login password, when long-range business surpass form ordering system receive supply management system send logging request time, according to the login password corresponding with supply management system place end message preserved, determine password input mode at random, and preserve so that the password of subsequent contrast's supply management system place terminal use input.

103, receive the password input mode that described long-range business surpasses form ordering system stochastic generation, and log according to described password input mode prompting user, described password input mode comprises input order and/or the Password Input number of password;

In embodiments of the present invention, carry out login according to described password input mode prompting user and comprise following implementation: according to described password input mode, prompting user inputs a few position in original code and logs in; Or according to described password input mode, after original code is exchanged with particular order by prompting user, input logs in; Or according to described password input mode, a few inputs in password after exchange log in after being exchanged with particular order by original code by prompting user; Or according to described password input mode, after position a few in original code is exchanged with particular order by prompting user, a few positions after input exchange log in.

Such as, when original code is 123456, it can be input after first, password and second position being exchanged that long-range business surpasses password input mode that form ordering system returns, that is to say 213456; Also can be input original code first to fourth, that is to say 1234, also can be alternate manner.

Whether alternatively, the embodiment of the present invention also comprises: judge by the time of Password Input overtime, and when result of determination is for being, current password input mode lost efficacy, and needs again to surpass form ordering system from described long-range business and obtains password input mode.

104, surpass form ordering system to described long-range business and send inquiry request, import described long-range business and surpass the order data that form ordering system returns.

Alternatively, in embodiments of the present invention, import before described long-range business surpasses the order data that form ordering system returns, described method also comprises: filter described order data, the order data bag returned is carried out analysis and obtain its website domain name and port information, feature in the website domain name analyzed out and port information and feature database is contrasted, if be judged as fishing website or other malicious websites, then filters out the packet that this returns.What wherein preserve in this feature database is website domain-name information and the port information of collected various fishing website or malicious websites.

The method that the embodiment of the present invention provides, by the built-in browser that scanning supply management system is nested, when judging have external progress to call or revise content in built-in browser, close described external progress, the business that can guarantee supply surpasses the fail safe of form ordering system by supply management system access business, in whole process, directly by business, the order data surpassed in form ordering system transfers in the database of supply management system, and the manual control do not related to order data and operation; Further, surpass form ordering system to long-range business and send logging request, to obtain the password input mode that long-range business surpasses form ordering system stochastic generation, make login mode diversified at random, ensure that order data is not intercepted and captured change by trojan horse program further.

Fig. 2 is the data safe processing apparatus structure schematic diagram that the embodiment of the present invention provides.See Fig. 2, this device comprises:

Scan module 21, for scanning the nested built-in browser of supply management system, and having judged whether that external progress calls or revise content in built-in browser, described external progress refers to the striding course request that other processes different from running content process in described browser send;

Request sending module 22, for when result of determination is for being, closes described external progress, and surpass form ordering system to long-range business and send logging request, described logging request carries described supply management system place end message;

Login module 23, surpasses the password input mode of form ordering system stochastic generation for receiving described long-range business, and logs according to described password input mode prompting user, and described password input mode comprises input order and/or the Password Input number of password;

Order data imports module 24, sends inquiry request, import described long-range business and surpass the order data that form ordering system returns for surpassing form ordering system to described long-range business.

Alternatively, described built-in browser is that direct nested IE kernel is formed in supply management system, and described built-in browser acquiescence can only be accessed business and be surpassed form ordering system address.

Alternatively, described login module 23 also for according to described password input mode, is pointed out user to input a few position in original code and is logged in; Or according to described password input mode, after original code is exchanged with particular order by prompting user, input logs in; Or according to described password input mode, a few inputs in password after exchange log in after being exchanged with particular order by original code by prompting user; Or according to described password input mode, after position a few in original code is exchanged with particular order by prompting user, a few positions after input exchange log in.

Alternatively, described device also comprises: filtering module, for filtering described order data, the order data bag returned is carried out analysis and obtain its website domain name and port information, feature in the website domain name analyzed out and port information and feature database is contrasted, if be judged as fishing website or other malicious websites, then filter out the packet that this returns.

Whether alternatively, described device also comprises: password is acquisition module again, judge by the time of Password Input overtime, and when result of determination is for being, current password input mode lost efficacy, and needs again to surpass form ordering system from described long-range business and obtains password input mode.

The device that the embodiment of the present invention provides, by the built-in browser that scanning supply management system is nested, when judging have external progress to call or revise content in built-in browser, close described external progress, the business that can guarantee supply surpasses the fail safe of form ordering system by supply management system access business, in whole process, directly by business, the order data surpassed in form ordering system transfers in the database of supply management system, and the manual control do not related to order data and operation; Further, surpass form ordering system to long-range business and send logging request, to obtain the password input mode that long-range business surpasses form ordering system stochastic generation, make login mode diversified at random, ensure that order data is not intercepted and captured change by trojan horse program further.

One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, this program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.

The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a data safety processing method, is characterized in that, described method comprises:
The built-in browser that scanning supply management system is nested, and judged whether that external progress calls or revise content in built-in browser, described external progress refers to the striding course request that other processes different from running content process in described browser send;
When result of determination is for being, close described external progress, surpass form ordering system to long-range business and send logging request, described logging request carries described supply management system place end message;
Receive the password input mode that described long-range business surpasses form ordering system stochastic generation, and log according to described password input mode prompting user, described password input mode comprises input order and/or the Password Input number of password;
Surpass form ordering system to described long-range business and send inquiry request, import described long-range business and surpass the order data that form ordering system returns.
2. method according to claim 1, is characterized in that, described built-in browser is that direct nested IE kernel is formed in supply management system, and described built-in browser acquiescence can only be accessed business and be surpassed form ordering system address.
3. method according to claim 1, is characterized in that, carries out login comprise according to described password input mode prompting user:
According to described password input mode, prompting user inputs a few position in original code and logs in; Or,
According to described password input mode, after original code is exchanged with particular order by prompting user, input logs in; Or,
According to described password input mode, a few inputs in password after exchange log in after being exchanged with particular order by original code by prompting user; Or,
According to described password input mode, after position a few in original code is exchanged with particular order by prompting user, a few positions after input exchange log in.
4. method according to claim 1, is characterized in that, import before described long-range business surpasses the order data that form ordering system returns, described method also comprises:
Filter described order data, the order data bag returned is carried out analysis and obtain its website domain name and port information, feature in the website domain name analyzed out and port information and feature database is contrasted, if be judged as fishing website or other malicious websites, then filter out the packet that this returns.
5. method according to claim 1, is characterized in that, described method also comprises:
Whether judge by the time of Password Input overtime, when result of determination is for being, current password input mode, need again to surpass form ordering system from described long-range business and obtain password input mode if losing efficacy.
6. a data safe processing device, is characterized in that, described device comprises:
Scan module, for scanning the nested built-in browser of supply management system, and having judged whether that external progress calls or revise content in built-in browser, described external progress refers to the striding course request that other processes different from running content process in described browser send;
Request sending module, for when result of determination is for being, closes described external progress, and surpass form ordering system to long-range business and send logging request, described logging request carries described supply management system place end message;
Login module, surpasses the password input mode of form ordering system stochastic generation for receiving described long-range business, and logs according to described password input mode prompting user, and described password input mode comprises input order and/or the Password Input number of password;
Order data imports module, sends inquiry request, import described long-range business and surpass the order data that form ordering system returns for surpassing form ordering system to described long-range business.
7. device according to claim 6, is characterized in that, described built-in browser is that direct nested IE kernel is formed in supply management system, and described built-in browser acquiescence can only be accessed business and be surpassed form ordering system address.
8. device according to claim 6, is characterized in that, described login module also for according to described password input mode, is pointed out user to input a few position in original code and logged in; Or according to described password input mode, after original code is exchanged with particular order by prompting user, input logs in; Or according to described password input mode, a few inputs in password after exchange log in after being exchanged with particular order by original code by prompting user; Or according to described password input mode, after position a few in original code is exchanged with particular order by prompting user, a few positions after input exchange log in.
9. device according to claim 6, is characterized in that, described device also comprises:
Filtering module, for filtering described order data, the order data bag returned is carried out analysis and obtain its website domain name and port information, feature in the website domain name analyzed out and port information and feature database is contrasted, if be judged as fishing website or other malicious websites, then filter out the packet that this returns.
10. device according to claim 6, is characterized in that, described device also comprises:
Whether password is acquisition module again, judge by the time of Password Input overtime, and when result of determination is for being, current password input mode lost efficacy, and needs again to surpass form ordering system from described long-range business and obtains password input mode.
CN201510092873.4A 2015-03-02 2015-03-02 Method and device for safely processing data CN104639563A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510092873.4A CN104639563A (en) 2015-03-02 2015-03-02 Method and device for safely processing data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510092873.4A CN104639563A (en) 2015-03-02 2015-03-02 Method and device for safely processing data

Publications (1)

Publication Number Publication Date
CN104639563A true CN104639563A (en) 2015-05-20

Family

ID=53217876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510092873.4A CN104639563A (en) 2015-03-02 2015-03-02 Method and device for safely processing data

Country Status (1)

Country Link
CN (1) CN104639563A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105678131A (en) * 2015-12-31 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Information processing method, information device, mobile terminal and server

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050198348A1 (en) * 2003-12-23 2005-09-08 Microsoft Corporation Methods and systems for providing secure access to a hosted service via a client application
US20070143628A1 (en) * 2005-12-20 2007-06-21 Konica Minolta Business Technologies, Inc. User authentication method, system provided with user authentication function, and, apparatus and computer software provided with user authentication function
CN101291225A (en) * 2007-04-27 2008-10-22 丁洪涛 Authentication method adopting complex cryptographic technique
CN102098315A (en) * 2011-03-02 2011-06-15 中国工商银行股份有限公司 Secure login method, device and system for client
US20110202981A1 (en) * 2010-02-15 2011-08-18 Shigetomo Tamai Content presentation-type authentication system
CN102693380A (en) * 2012-05-07 2012-09-26 李良 Password authentication method
CN102739667A (en) * 2012-06-21 2012-10-17 北京小米科技有限责任公司 Verification method, device and system based on verification prompt message and server
CN103116718A (en) * 2013-03-06 2013-05-22 无锡德飞科技有限公司 Password setting and verification method based on spatial position code log-in computer system
US20130185778A1 (en) * 2010-10-05 2013-07-18 Shigetomo Tamai System, method and program for off-line two-factor user authentication
CN103971048A (en) * 2014-04-30 2014-08-06 宇龙计算机通信科技(深圳)有限公司 Method and system for entering password
CN104091124A (en) * 2014-07-03 2014-10-08 利诚服装集团股份有限公司 Data safety processing method

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050198348A1 (en) * 2003-12-23 2005-09-08 Microsoft Corporation Methods and systems for providing secure access to a hosted service via a client application
US20070143628A1 (en) * 2005-12-20 2007-06-21 Konica Minolta Business Technologies, Inc. User authentication method, system provided with user authentication function, and, apparatus and computer software provided with user authentication function
CN101291225A (en) * 2007-04-27 2008-10-22 丁洪涛 Authentication method adopting complex cryptographic technique
US20110202981A1 (en) * 2010-02-15 2011-08-18 Shigetomo Tamai Content presentation-type authentication system
US20130185778A1 (en) * 2010-10-05 2013-07-18 Shigetomo Tamai System, method and program for off-line two-factor user authentication
CN102098315A (en) * 2011-03-02 2011-06-15 中国工商银行股份有限公司 Secure login method, device and system for client
CN102693380A (en) * 2012-05-07 2012-09-26 李良 Password authentication method
CN102739667A (en) * 2012-06-21 2012-10-17 北京小米科技有限责任公司 Verification method, device and system based on verification prompt message and server
CN103116718A (en) * 2013-03-06 2013-05-22 无锡德飞科技有限公司 Password setting and verification method based on spatial position code log-in computer system
CN103971048A (en) * 2014-04-30 2014-08-06 宇龙计算机通信科技(深圳)有限公司 Method and system for entering password
CN104091124A (en) * 2014-07-03 2014-10-08 利诚服装集团股份有限公司 Data safety processing method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105678131A (en) * 2015-12-31 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Information processing method, information device, mobile terminal and server
CN105678131B (en) * 2015-12-31 2018-09-07 宇龙计算机通信科技(深圳)有限公司 Information processing method, massaging device, mobile terminal and server

Similar Documents

Publication Publication Date Title
US10193909B2 (en) Using instrumentation code to detect bots or malware
US9531744B2 (en) In-line filtering of insecure or unwanted mobile device software components or communications
US9900346B2 (en) Identification of and countermeasures against forged websites
US20160087939A1 (en) Hierarchical rule development and binding for web application server firewall
JP6559694B2 (en) Automatic SDK acceptance
US9081862B2 (en) Method and device for resource sharing
US20170243029A1 (en) Security Systems And Methods For Encoding And Decoding Digital Content
CN104980412B (en) A kind of applications client, server-side and corresponding portal authentication method
US20190243951A1 (en) Stateless web content anti-automation
US20170257416A1 (en) Generating processed web address information
EP2673708B1 (en) DISTINGUISH VALID USERS FROM BOTS, OCRs AND THIRD PARTY SOLVERS WHEN PRESENTING CAPTCHA
US8918882B2 (en) Quantifying the risks of applications for mobile devices
CN102857493B (en) Content filtering method and device
US9609006B2 (en) Detecting the introduction of alien content
US9832210B2 (en) Multi-core browser and method for intercepting malicious network address in multi-core browser
US8886937B2 (en) PCI DSS compliant proxy service
US10164988B2 (en) External link processing
US9977921B2 (en) Security systems and methods for encoding and decoding digital content
US20180212993A1 (en) Code modification for automation detection
US9990507B2 (en) Adapting decoy data present in a network
US20150143455A1 (en) Off-device anti-malware protection for mobile devices
KR101662685B1 (en) Deep packet inspection method and device, and coprocessor
US9032085B1 (en) Identifying use of software applications
US8266687B2 (en) Discovery of the use of anonymizing proxies by analysis of HTTP cookies
CN103020687B (en) Quick Response Code sharing method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150520