CN104866348A - Method and device for realizing safe installation of application - Google Patents
Method and device for realizing safe installation of application Download PDFInfo
- Publication number
- CN104866348A CN104866348A CN201510267192.7A CN201510267192A CN104866348A CN 104866348 A CN104866348 A CN 104866348A CN 201510267192 A CN201510267192 A CN 201510267192A CN 104866348 A CN104866348 A CN 104866348A
- Authority
- CN
- China
- Prior art keywords
- application
- terminal
- database
- authentication database
- installation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000009434 installation Methods 0.000 title claims abstract description 66
- 238000000034 method Methods 0.000 title claims abstract description 44
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 10
- 238000007689 inspection Methods 0.000 description 7
- 230000002155 anti-virotic effect Effects 0.000 description 5
- 238000012795 verification Methods 0.000 description 5
- 230000001186 cumulative effect Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000630 rising effect Effects 0.000 description 1
Landscapes
- Stored Programmes (AREA)
Abstract
The invention belongs to the technical field of terminals, and particularly relates to a method and a device for realizing safe installation and application. The method comprises the following steps: on the premise of determining that the authentication database is not damaged, judging whether the application to be installed is in the authentication database, and if so, allowing installation; otherwise, refusing installation; the method comprises the steps of counting applications which can be safely installed by a user into a database, verifying and encrypting the database, judging whether the applications to be installed are in the database or not on the premise of determining that the database is not damaged when the user wants to install certain applications, and if so, allowing installation; otherwise, the installation is refused. The invention allows the terminal to install the application on the premise of determining that the application to be installed is the safe application, thereby effectively preventing the terminal from installing malicious application software and creating a healthy and safe operating environment for the terminal.
Description
Technical field
The invention belongs to field of terminal technology, be specifically related to a kind of safety that realizes and the method and device applied are installed.
Background technology
Today of mobile terminal high speed development, the malicious application amount of software in Android application is in rising trend.According to statistics, at present, the malicious application software of 17% is had in Android application.The downloading mode of Android system and channel comparatively freedom and flexibility, but this freedom and flexibility are often also along with certain risk.Such as, some malicious application softwares can steal the frequent contact telephone number of user, sell black website subsequently and obtain profit; Some malicious application softwares can cause the smart machine of user to pay extra-pay when sending note; Some malicious application softwares can bomb user etc. with the advertisement bullet window chain of rings.
Due to existence and the ascendant trend thereof of malicious application software, the running environment of mobile terminal is day by day severe.
Summary of the invention
Given this, the present invention proposes a kind of safety that realizes and installs the method and device applied, the present invention to be applied as under the prerequisite of safety applications just permission terminal to install this application for installing determining, thus effectively prevent terminal from malicious application software being installed, for terminal makes a healthy and safe running environment.
Technical solution of the present invention:
Realize the method that safety installs application, comprising:
Judging whether authentication database is destroyed, if not, then judging for installing application whether in described authentication database; Otherwise refusal is installed.
Judge, for installing application whether in described authentication database, if so, then to allow to install; Otherwise refusal is installed.
Further, server carries out real-time update, School Affairs encryption, to generate authentication database to database.
Further, describedly judge whether authentication database is destroyed, and also comprises before: download authentication database to terminal.
Further, describedly judge whether authentication database is destroyed, and also comprises before: the relevant information for installing application that receiving terminal sends.
Further, described refusal installation is specially: the information sending refusal installation is to terminal, and to make, the installation of terminal refusal is described applies for installing;
Described permission installation is specially: send and allow the information of installing to terminal, allows installation described for installing application to make terminal.
Realize the device that safety installs application, comprising:
Authentication database judging unit, for judging whether authentication database is destroyed, if not, then judges for installing application whether in described authentication database; Otherwise refusal is installed.
For installing application judging unit, if so, then allow to install for installing application whether in described authentication database for judging; Otherwise refusal is installed.
Further, server carries out real-time update, School Affairs encryption, to generate authentication database to database.
Further, described device also comprises authentication database download unit, for downloading authentication database to terminal.
Further, described device also comprises information receiving unit, for the relevant information for installing application that receiving terminal sends.
Further, described refusal installation is specially: the information sending refusal installation is to terminal, and to make, the installation of terminal refusal is described applies for installing;
Described permission installation is specially: send and allow the information of installing to terminal, allows installation described for installing application to make terminal.
Beneficial effect of the present invention:
Method of the present invention comprises: under determining the prerequisite that authentication database is not destroyed, and judges, for installing application whether in described authentication database, if so, then to allow to install; Otherwise refusal is installed.The present invention by the applied statistics of Gong the user installation of safety to a lane database, and to this database carry out verification encryption, when user for install certain application time, under determining the prerequisite that database is not destroyed, judge, for whether installing application at described lane database, if so, then to allow to install; Otherwise refusal is installed.The present invention just allows terminal to install this application for installing to be applied as under the prerequisite of safety applications determining, thus effectively prevents terminal installation malicious application software, for terminal makes a healthy and safe running environment.
Accompanying drawing explanation
Fig. 1 is a kind of process flow diagram realizing the method for safety installation application of the present invention.
Fig. 2 is a kind of second process flow diagram realizing the method for safety installation application of the present invention.
Fig. 3 is a kind of the 3rd process flow diagram realizing the method for safety installation application of the present invention.
Fig. 4 is a kind of the first block diagram realizing the device of safety installation application of the present invention.
Fig. 5 is a kind of the second block diagram realizing the device of safety installation application of the present invention.
Embodiment
Technical scheme of the present invention is further illustrated by embodiment below in conjunction with accompanying drawing.
Embodiment one
Fig. 1 is a kind of process flow diagram realizing the method for safety installation application of the present invention.
As shown in Figure 1, a kind of safety that realizes installs the method applied, and comprising:
S101, judge whether authentication database is destroyed, if not, then perform S102; Otherwise, perform S104.
In step S101, set up a database on the server, this database purchase relevant information of safety applications; And server carries out real-time update, School Affairs encryption, to generate authentication database to this database.
Such as, set up a database on the server, this database purchase relevant information of safety applications:
This database is collected and has been added up in application market, all " safety applications ", when user is for installing a certain application, user is contrasted for the application that the application of installation is relevant to this lane database, thus judge whether user is " safety applications " for the application of installing.
Such as, user is for installing " search dog input method ", network searches " search dog input method ", before user installation, user is searched on network relevant information (the application official website of " search dog input method ", whether detect through antivirus software, update date, version, size) (apply official website with the relevant information of " the search dog input method " of this lane database, whether detect through antivirus software, update date, version, size) contrast, if consistent, then illustrate that " search dog input method " that user searches on network is safety applications, user installation is allowed to be somebody's turn to do " search dog input method ", if inconsistent, then illustrate that " search dog input method " that user searches on network is dangerous, refusal user installation is somebody's turn to do " search dog input method ".
Server is set up the database of " safety applications ", and server will carry out real-time update to this database, what ensure that this lane database adds up is the up-to-date information of all " safety applications ".Such as, " search dog input method " upgrades at 2015-05-09, upgrade to 7.5.0.5650 version, application size becomes 37M, 3 functions in " rarely used word " " cloud expression " " tool box " are increased newly, server carries out real-time update to database, and the relevant information of " search dog input method " is updated to:
Server often once upgrades database, all will carry out School Affairs encryption, to generate authentication database to the database after renewal.The object of carrying out School Affairs encryption to database is the data in order to prevent third-party application altered data storehouse, ensures accuracy and the integrality of database data.
Checksum check addition can be adopted to the mode of database verification.Checksum: summation inspection code, verification summation; In data processing and data communication field, for verify one group of data item of object and, these data item can be numerals or calculate other character string regarding numeral in inspection summation process as; For ensureing integrality and the accuracy of data.Server does Checksum verification to database, and namely server is the data stored in database by the cumulative summation of byte, obtains summation inspection code, this summation inspection code is write the last of data database storing.
Server is encrypted the database with Checksum summation inspection code after doing Checksum summation to database.Cryptographic algorithm can select DES (Data Encryption Standard) algorithm, IDEA (InternationalData Encryption Algorithm) algorithm, DSA (Digital Signature Algorithm) algorithm, MD5 algorithm etc.
Server carries out real-time update, verification, encryption to database, generate authentication database, what ensure lane database statistics is the up-to-date information of all " safety applications ", and prevents the data in third-party application altered data storehouse, for this database of follow-up utilization is ready.
Because database is through School Affairs, encryption obtains authentication database, so judge that the step whether authentication database is destroyed is: first decipher accordingly authentication database, then the data that store in the database after deciphering (except last data, because these last data are Checksum summation inspection codes) by the cumulative summation of byte, obtain an accumulated value, judge that whether this accumulated value is equal with Checksum summation inspection code, if equal, then database is not destroyed, if unequal, then database is destroyed.
When judgement authentication database is destroyed, then cannot distinguish and apply whether safety for installing, so when judging that authentication database is destroyed, refusal is installed for installing application.
When judgement authentication database is not destroyed, applying whether safety for installing, also will carry out distinguishing of next step S102.
S102, judge, for installing application whether in described authentication database, if so, then to perform S103; Otherwise, perform S104.
In step S102, authentication database is collected and has been added up all " safety applications " up-to-date in application market, " safety applications " of authentication authorization and accounting lane database is exactly standard, user applies whether safety for installing, as long as judge for installing application whether in authentication database, if for installing " application " that be applied as in authentication database, then this wish installs application safety, allow this wish of user installation that application is installed, if different from " application " in authentication database for installing application, then this wish installation application is dangerous, and this wish of refusal user installation installs application.
S103, permission are installed.
S104, refusal are installed.
The present embodiment just allows terminal to install this application for installing to be applied as under the prerequisite of safety applications determining, thus effectively prevents terminal installation malicious application software, for terminal makes a healthy and safe running environment.
Embodiment two
Fig. 2 is a kind of second process flow diagram realizing the method for safety installation application of the present invention.
As shown in Figure 2, a kind of safety that realizes installs the method applied, and comprising:
S200, download authentication database are to terminal.
The present embodiment realizes the method described in this invention from terminal.
In step S200, when user is when terminal is for installing certain application, terminal downloads authentication database to terminal from server.
About the authentication database on server, elaborate in embodiment one, repeat no more herein.
S201, judge whether authentication database is destroyed, if not, then perform S202; Otherwise, perform S204;
In step S201, after terminal downloads authentication database from server, whether this authentication database downloaded to of terminal judges is destroyed.
Judge that the mode whether authentication database is destroyed has detailed description in an embodiment, repeat no more herein.
S202, judge, for installing application whether in described authentication database, if so, then to perform S203; Otherwise, perform S204.
In step S202, terminal judges is for installing application whether in described authentication database, and if so, then terminal allows this wish of user installation to install application, otherwise the installation of this wish of terminal refusal user installation is applied.
S203, permission are installed;
In step S203, terminal allows this wish of user installation to install application.
S204, refusal are installed;
In step S204, this wish of terminal refusal user installation installs application.
The present embodiment, terminal is carried out a judgement to user for installation application and is distinguished, under the prerequisite determining user's wish installation application safety, just allow terminal that this application is installed, this process is completed by terminal, user is not needed to participate in, the present invention can effectively prevent terminal from installing malicious application software, for terminal makes a healthy and safe running environment.
Embodiment three
Fig. 3 is a kind of the 3rd process flow diagram realizing the method for safety installation application of the present invention.
As shown in Figure 3, a kind of safety that realizes installs the method applied, and comprising:
The relevant information for installing application that S300, receiving terminal send.
The present embodiment realizes the method described in this invention from server.
In step S300, when user is when terminal is for installing certain application, terminal sends relevant information for installing application to server, judges to distinguish that whether safety is applied in the installation of this wish to allow server.
Such as, user installs " QQ " in terminal wish, terminal sends the relevant information (application official website, whether through antivirus software detections, update date, version, size) of " QQ " to server, judges to distinguish that whether safety is applied in the installation of this wish to allow server.
S301, judge whether authentication database is destroyed, if not, then perform S302; Otherwise, perform S304.
In step S301, the relevant information for installing application that server sends according to the terminal that receives, judges to apply whether safety for installation.
About authentication database, in embodiment one, there is detailed description, repeat no more herein.
Server receives the relevant information for installing application that terminal sends, and carries out judgement and distinguishes.Server judges that the first step distinguished judges whether authentication database is destroyed, when judgement authentication database is destroyed, then cannot distinguish and apply whether safety for installing, so when judging that authentication database is destroyed, server sends the information of refusal installation to terminal, and to make, the installation of terminal refusal is described applies for installing; When judgement authentication database is not destroyed, applying whether safety for installing, also will carry out distinguishing of next step S302.
S302, judge, for installing application whether in described authentication database, if so, then to perform S303; Otherwise, perform S304;
In step S302, whether the relevant information for installing application that server sends according to the terminal that receives, judge to apply in described authentication database for installing.Such as, server by the relevant information of " QQ " of the relevant information of " QQ " that receive (application official website, whether through antivirus software detections, update date, version, size) and lane database (apply official website, whether detect through antivirus software, update date, version, size) contrast, if consistent, then illustrate that user is in terminal " QQ " safety for installing, server sends permission installation and is somebody's turn to do the information of " QQ " to terminal, allows to install to be somebody's turn to do " QQ " to make terminal; If inconsistent, then illustrate that user is dangerous for " QQ " installed in terminal, server send refusal install should the information of " QQ " to terminal, refusing to make terminal to install should " QQ ".
S303, transmission allow the information of installing to terminal, allow to install described wish install application to make terminal.
The information that S304, transmission refusal are installed, to terminal, is refused to install described wish and is installed application to make terminal.
The present embodiment is compared with the difference of embodiment two, and the present embodiment realizes distinguishing the judgement for installing application at server end, will judge that the result distinguished sends to terminal, installs to make terminal or do not install this application.Realize the present invention at server end, contribute to the processing load alleviating terminal.
The present embodiment, server carries out a judgement to user for installation application and distinguishes, under the prerequisite determining user's wish installation application safety, just allow terminal that this application is installed, this process is completed by server, terminal is not needed to participate in, the present invention can effectively prevent terminal from installing malicious application software, for terminal makes a healthy and safe running environment.
Embodiment four
Fig. 4 is a kind of the first block diagram realizing the device of safety installation application of the present invention.
Realize the device that safety installs application, comprising:
Authentication database download unit 20, for downloading authentication database to terminal.
Authentication database judging unit 21, for judging whether authentication database is destroyed, if not, then judges for installing application whether in described authentication database; Otherwise refusal is installed.
For installing application judging unit 22, if so, then allow to install for installing application whether in described authentication database for judging; Otherwise refusal is installed.
Device described in the present embodiment is in terminal, and wherein said authentication database is at server.Server is set up the database of a safety applications, and server will carry out real-time update to this database, what ensure that this lane database adds up is the up-to-date information of all safety applications; Server often once upgrades database, all to carry out School Affairs encryption to the database after renewal, to generate authentication database, the object of carrying out School Affairs encryption to database is the data in order to prevent third-party application altered data storehouse, ensures accuracy and the integrality of database data.
Device described in the present embodiment is in terminal, device described in the present embodiment just allows terminal to install this application under the prerequisite determining user's wish installation application safety, can effectively prevent terminal from malicious application software being installed, for terminal makes a healthy and safe running environment.
Embodiment five
Fig. 5 is a kind of the second block diagram realizing the device of safety installation application of the present invention.
Realize the device that safety installs application, comprising:
Information receiving unit 30, for the relevant information for installing application that receiving terminal sends.
Authentication database judging unit 31, for judging whether authentication database is destroyed, if not, then whether what send according to the terminal that receives judges to apply in described authentication database for installing for the relevant information of installing application; Otherwise the information sending refusal installation is to terminal, and to make, the installation of terminal refusal is described applies for installing.
For installing application judging unit 32, judge to apply whether in described authentication database for installing for the relevant information of installing application for what send according to the terminal that receives, if so, then sending and allow the information of installing to terminal, allowing installation described for installing application to make terminal; Otherwise the information sending refusal installation is to terminal, and to make, the installation of terminal refusal is described applies for installing.
Device described in the present embodiment is at server, device described in the present embodiment just sends and allows the information of installing to terminal under the prerequisite determining user's wish installation application safety, allow that to make terminal described wish is installed and application is installed, can effectively prevent terminal from malicious application software being installed, for terminal makes a healthy and safe running environment.
Below know-why of the present invention is described in conjunction with specific embodiments.These describe just in order to explain principle of the present invention, and can not be interpreted as limiting the scope of the invention by any way.Based on explanation herein, those skilled in the art does not need to pay performing creative labour can associate other embodiment of the present invention, and these modes all will fall within protection scope of the present invention.
Claims (10)
1. realize the method that safety installs application, it is characterized in that, comprising:
Judging whether authentication database is destroyed, if not, then judging for installing application whether in described authentication database; Otherwise refusal is installed.
Judge, for installing application whether in described authentication database, if so, then to allow to install; Otherwise refusal is installed.
2. a kind of safety that realizes according to claim 1 installs the method applied, and it is characterized in that, server carries out real-time update, School Affairs encryption, to generate authentication database to database.
3. according to claim 1ly a kind ofly realize the method that safety installs application, it is characterized in that, describedly judge whether authentication database is destroyed, and also comprises before: download authentication database to terminal.
4. according to claim 1ly a kind ofly realize the method that safety installs application, it is characterized in that, describedly judge whether authentication database is destroyed, and also comprises before: the relevant information for installing application that receiving terminal sends.
5. a kind of safety that realizes according to claim 4 installs the method applied, and it is characterized in that, described refusal installation is specially: the information that transmission refusal is installed, to terminal, is refused the described wish of installation to make terminal and installed application;
Described permission installation is specially: send and allow the information of installing to terminal, allows installation described for installing application to make terminal.
6. realize the device that safety installs application, it is characterized in that, comprising:
Authentication database judging unit, for judging whether authentication database is destroyed, if not, then judges for installing application whether in described authentication database; Otherwise refusal is installed.
For installing application judging unit, if so, then allow to install for installing application whether in described authentication database for judging; Otherwise refusal is installed.
7. a kind of safety that realizes according to claim 6 installs the device applied, and it is characterized in that, server carries out real-time update, School Affairs encryption, to generate authentication database to database.
8. a kind of safety that realizes according to claim 6 installs the device applied, and it is characterized in that, described device also comprises authentication database download unit, for downloading authentication database to terminal.
9. a kind of safety that realizes according to claim 6 installs the device applied, and it is characterized in that, described device also comprises information receiving unit, for the relevant information for installing application that receiving terminal sends.
10. a kind of safety that realizes according to claim 9 installs the device applied, and it is characterized in that, described refusal installation is specially: the information that transmission refusal is installed, to terminal, is refused the described wish of installation to make terminal and installed application;
Described permission installation is specially: send and allow the information of installing to terminal, allows installation described for installing application to make terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510267192.7A CN104866348A (en) | 2015-05-22 | 2015-05-22 | Method and device for realizing safe installation of application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510267192.7A CN104866348A (en) | 2015-05-22 | 2015-05-22 | Method and device for realizing safe installation of application |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104866348A true CN104866348A (en) | 2015-08-26 |
Family
ID=53912197
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510267192.7A Pending CN104866348A (en) | 2015-05-22 | 2015-05-22 | Method and device for realizing safe installation of application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104866348A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106355082A (en) * | 2016-09-14 | 2017-01-25 | 江苏北弓智能科技有限公司 | Mobile equipment APP installation control method based on credible APP list |
CN107483523A (en) * | 2016-11-02 | 2017-12-15 | 深圳市波普安创技术有限公司 | Legal the firmware debugging system and its method of information safety devices |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101490698A (en) * | 2006-07-14 | 2009-07-22 | 英特尔公司 | Component authentication for computer systems |
CN102750491A (en) * | 2012-06-05 | 2012-10-24 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for restricting terminals from mounting or upgrading third-party application programs |
US20120278606A1 (en) * | 2008-07-28 | 2012-11-01 | Huang Evan S | Methods and apparatuses for securely operating shared host devices with portable apparatuses |
CN103179124A (en) * | 2013-03-25 | 2013-06-26 | 东莞宇龙通信科技有限公司 | Method for certifying third-party application program, mobile terminal and cloud server |
-
2015
- 2015-05-22 CN CN201510267192.7A patent/CN104866348A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101490698A (en) * | 2006-07-14 | 2009-07-22 | 英特尔公司 | Component authentication for computer systems |
US20120278606A1 (en) * | 2008-07-28 | 2012-11-01 | Huang Evan S | Methods and apparatuses for securely operating shared host devices with portable apparatuses |
CN102750491A (en) * | 2012-06-05 | 2012-10-24 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for restricting terminals from mounting or upgrading third-party application programs |
CN103179124A (en) * | 2013-03-25 | 2013-06-26 | 东莞宇龙通信科技有限公司 | Method for certifying third-party application program, mobile terminal and cloud server |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106355082A (en) * | 2016-09-14 | 2017-01-25 | 江苏北弓智能科技有限公司 | Mobile equipment APP installation control method based on credible APP list |
CN107483523A (en) * | 2016-11-02 | 2017-12-15 | 深圳市波普安创技术有限公司 | Legal the firmware debugging system and its method of information safety devices |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109214168B (en) | Firmware upgrading method and device | |
CN107615292B (en) | System and method for managing installation of application packages requiring high risk permission access | |
CN108334753B (en) | Pirate application verification method and distributed server node | |
CN108460273B (en) | Application management method of terminal, application server and terminal | |
CN104751049A (en) | Application program installing method and mobile terminal | |
CN112231702B (en) | Application protection method, device, equipment and medium | |
CN103886230A (en) | Software copyright protection method of android system and system thereof | |
CN104199654A (en) | Open platform calling method and device | |
CN102685727A (en) | Method for transmitting and operating application program, system for operating application program, server and terminal | |
CN104462965A (en) | Method for verifying integrity of application program and network device | |
CN109634615B (en) | Issuing method, verification method and device of application installation package | |
CN105683990A (en) | Method and apparatus for protecting dynamic libraries | |
CN108229144B (en) | Verification method of application program, terminal equipment and storage medium | |
CN103514000A (en) | Browser plug-in installation method and device | |
CN106548065B (en) | Application program installation detection method and device | |
CN112257086A (en) | User privacy data protection method and electronic equipment | |
CN102622251B (en) | The method of navigation software updating and management and server | |
US20150277887A1 (en) | Tamperproof installation of building control software in approved runtime environments | |
CN111176685A (en) | Upgrading method and device | |
CN106709281A (en) | Patch releasing and obtaining method and device | |
CN104572169B (en) | A kind of software distribution and installation system based on UEFI | |
CN107169318A (en) | A kind of method and device of application security protection | |
CN104866348A (en) | Method and device for realizing safe installation of application | |
US20160352522A1 (en) | User Terminal For Detecting Forgery Of Application Program Based On Signature Information And Method Of Detecting Forgery Of Application Program Using The Same | |
CN107145342B (en) | Method and device for processing channel information of application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150826 |
|
RJ01 | Rejection of invention patent application after publication |