CN105160214A - Multi-password electronic signature account protection system and multi-password electronic signature account protection method - Google Patents
Multi-password electronic signature account protection system and multi-password electronic signature account protection method Download PDFInfo
- Publication number
- CN105160214A CN105160214A CN201510347582.5A CN201510347582A CN105160214A CN 105160214 A CN105160214 A CN 105160214A CN 201510347582 A CN201510347582 A CN 201510347582A CN 105160214 A CN105160214 A CN 105160214A
- Authority
- CN
- China
- Prior art keywords
- user side
- server
- normal
- private key
- alarm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a multi-password electronic signature account protection method, which comprises the following steps that: a user side creates a normal password and a warning password, and sends normal password digests and warning password digests generated through operation on the normal password and the warning password to a server; the user side generates a normal private key file corresponding to the normal password and a warning private key file corresponding to the warning password; the user side transmits the password digests to the server for verification; if the password digests are identical to the normal password digests, the server stops calling the warning password digests, and the normal private key file is used for signature; if the password digests are identical to the warning password digests, the warning private key file is used for signature; and after the user side information is sent to a warning server, the corresponding operation of the user side is executed. The method provided by the invention has the advantage that the property security of the user is protected to the maximum degree on the premise of protecting the user security to the maximum degree. Meanwhile, the invention also discloses a multi-password electronic signature account protection system.
Description
Technical field
What the present invention relates to is account protection method and the system of a kind of many cryptography electronic signature, belongs to data information security technical field.
Background technology
The Account Guard system occurred on the market now, only has a password mostly, and other some checkings (as pre-information) etc. are all the protections to this password, and what prevent is that the password protection of user is stolen;
If but when the personal safety of user occurs dangerous, user then can only abandon oneself property, and when danger is eliminated, then report to the police, likely late, property sustains a loss,
If user does not say password or deliberately inputs password by mistake, likely life danger can be caused.
How again can when not found by ruffian in guarantee user personal safety, realizing the shortest time warning, is the technical problem to be solved in the present invention.
Summary of the invention
In order to solve the problems of the technologies described above; the invention provides a kind of account protection method of many cryptography electronic signatures, when the method can be implemented in user's personal safety appearance danger, by input alarm cipher; carry out operation of withdrawing the money after warning, do not found by ruffian.
Technical scheme of the present invention is as follows:
An account protection method for many cryptography electronic signatures, the method comprises:
When digital certificate generates, user side creates normal password and alarm cipher, and generate the normal private key file and the warning private key file corresponding with alarm cipher of answering with normal codon pair, normal password and alarm cipher are sent to server through the normal cryptographic summary of computing generation and alarm cipher summary respectively, normal cryptographic summary described in server stores and alarm cipher summary simultaneously;
When user side is signed, the cryptographic summary that the crypto-operation received produces is sent to server verify, sequence server calls normal cryptographic summary and alarm cipher summary is verified respectively, if alarm cipher Digest Authentication success, sign successfully until warning private key file, collect user side information, and after user side information is sent to Alarm Server, performs user side and operate accordingly.
Further, described sequence server calls normal cryptographic summary and alarm cipher summary is verified respectively, specifically comprises:
If the cryptographic summary that user side transmits is identical with the normal cryptographic summary of server calls, server stops calling alarm cipher summary, and downward message, notice user side uses normal private key file to sign;
If the cryptographic summary that user side transmits is not identical with the normal cryptographic summary of server calls, server calls alarm cipher summary is verified, after being proved to be successful, server downward message, notice user side uses warning private key file to sign, collect user side information simultaneously, and after user side information is sent to Alarm Server, performs user side and operate accordingly.
Further, described normal cryptographic summary inverse operator cannot become original code with alarm cipher summary.
Further, when user side mistake in codon pair information is signed, the normal cryptographic summary of server calls and alarm cipher summary are verified respectively, after checking is all failed, terminates checking flow process, and point out client, code error.
Further, collects user side information comprises: warning private key file is signed successfully, user side account information, name information, the IP address information of server automatic acquisition respective user end, and start sectional drawing instruction, instruction of taking pictures or record a video is collected user side information.
Further, when Alarm Server receives the user side information of server transmission, user side information is sent to the police and reports to the police.
The beneficial effect of method disclosed by the invention is: when not being perceived by the user, automatic alarm, protects the safety of user's property to greatest extent.
The invention also discloses a kind of Account Guard system of many cryptography electronic signatures, it is characterized in that, this system bag user side, server and Alarm Server,
Described user side, for creating normal password and alarm cipher, generate and store the normal private key file and the warning private key file corresponding with alarm cipher of answering with normal codon pair, normal password and alarm cipher are sent to server through the normal cryptographic summary of computing generation and alarm cipher summary respectively simultaneously, and use normal private key file to sign according to the instruction of server;
Described server, make a summary with described normal cryptographic summary and alarm cipher for storing, the normal cryptographic summary of sequence call and alarm cipher summary are verified the cryptographic summary that user side transmits, and the result is judged, sign successfully until warning private key file, collect user side information, and after user side information is sent to Alarm Server, performs user side and operate accordingly;
Described Alarm Server, for the user side information that reception server sends, is sent to the police by user side information and reports to the police.
Further, described server, comprises the first execution module and the second execution module,
Described first execution module, for signing successfully at normal private key file, performing user side and operating accordingly;
Described first execution module, for after normal private key file and warning private key file all sign failure, terminates checking flow process, and points out client, code error.
Further, described server, also comprise information submodule, described information submodule, for signing successfully at warning private key file, automatic acquisition user side account information, name information, IP address information, and start sectional drawing instruction, to take pictures or record a video instruction pair, user side information is collected.
The beneficial effect of system disclosed by the invention is: when not being perceived by the user, automatic alarm, protects the safety of user's property to greatest extent.
Embodiment
Below technical scheme of the present invention is specifically addressed; it is to be noted; technical scheme of the present invention is not limited to the embodiment described in embodiment; the content of those skilled in the art's reference and reference technical solution of the present invention; the improvement that basis of the present invention is carried out and design, should belong to protection scope of the present invention.
Electronic signature refers in electronic message Electronically contained, appended for identifying signer's identity and showing that signer approves the data of wherein content, after information is signed, namely representing that signer legally appoints can content wherein, and is responsible for the result occurred after signature.User side is encrypted by codon pair private key.
Embodiment one:
Embodiments provide a kind of account protection method of many cryptographic signatures, the method comprises:
S101: when digital certificate generates, user side creates normal password and alarm cipher, and generate the normal private key file and the warning private key file corresponding with alarm cipher of answering with normal codon pair, normal password and alarm cipher are sent to server through the normal cryptographic summary of computing generation and alarm cipher summary respectively, normal cryptographic summary described in server stores and alarm cipher summary simultaneously;
S102: when user side is signed, is sent to server by the cryptographic summary that the crypto-operation received produces and verifies, sequence server calls normal cryptographic summary and alarm cipher summary is verified respectively;
User side receives the password of user side input, and the mode of reception is Quick Response Code autoscan, message push etc.
S103: if the cryptographic summary that user side transmits is identical with the normal cryptographic summary of server calls, server stops calling alarm cipher summary, and downward message, notice user side uses normal private key file to sign; Sign successfully, server performs user side and operates accordingly.
S104: if the cryptographic summary that user side transmits is not identical with the normal cryptographic summary of server calls, server calls alarm cipher summary is verified, after being proved to be successful, server downward message, notice user side uses warning private key file to sign, collect user side information simultaneously, and after user side information is sent to Alarm Server, performs user side and operate accordingly.
Described normal cryptographic summary inverse operator cannot become original code with alarm cipher summary.
Further, when user side mistake in codon pair information is signed, the normal cryptographic summary of server calls and alarm cipher summary are verified respectively, after checking is all failed, terminates checking flow process, and point out client, code error.
Further, collects user side information comprises: warning private key file is signed successfully, user side account information, name information, the IP address information of server automatic acquisition respective user end, and start sectional drawing instruction, instruction of taking pictures or record a video is collected user side information.
Further, when Alarm Server receives the user side information of server transmission, user side information is sent to the police and reports to the police.
The beneficial effect of method disclosed by the invention is: when not being perceived by the user, automatic alarm, protects the safety of user's property to greatest extent.
Embodiment two:
The invention also discloses a kind of Account Guard system of many cryptography electronic signatures, this system bag user side, server and Alarm Server,
Described user side, for creating normal password and alarm cipher, generate and store the normal private key file and the warning private key file corresponding with alarm cipher of answering with normal codon pair, normal password and alarm cipher are sent to server through the normal cryptographic summary of computing generation and alarm cipher summary respectively simultaneously, and use normal private key file to sign according to the instruction of server;
User side receives the password of user side input, and the mode of reception is Quick Response Code autoscan, message push etc.
Described server, make a summary with described normal cryptographic summary and alarm cipher for storing, the normal cryptographic summary of sequence call and alarm cipher summary are verified the cryptographic summary that user side transmits, and the result is judged, sign successfully until warning private key file, collect user side information, and after user side information is sent to Alarm Server, performs user side and operate accordingly;
Described Alarm Server, for using warning private key file to sign according to the instruction of server, the user side information that reception server sends, is sent to the police by user side information and reports to the police.
Described normal cryptographic summary inverse operator cannot become original code with alarm cipher summary.
Further, described server, comprises the first execution module and the second execution module,
Described first execution module, for signing successfully at normal private key file, performing user side and operating accordingly;
Described first execution module, for after normal private key file and warning private key file all sign failure, terminates checking flow process, and points out client, code error.
Further, described server, also comprise information submodule, described information submodule, for signing successfully at warning private key file, automatic acquisition user side account information, name information, IP address information, and start sectional drawing instruction, to take pictures or record a video instruction pair, user side information is collected.
The beneficial effect of system disclosed by the invention is: when not being perceived by the user, automatic alarm, protects the safety of user's property to greatest extent.
Embodiment three:
When in the unwarrantable situation of user's inherently safe, said as coerced password of withdrawing the money, when withdrawing the money before cash machine, user uses bank card password to log in cash dispenser;
When withdrawing the money or to transfer accounts etc. key operation time, input alarm cipher, the alarm cipher summary that alarm cipher carries out computing generation by cash machine system transfers to server, and sequence server calls normal summary and warning summary is verified.The process of checking is identical with embodiment two with embodiment one, no longer repeats at this.
Embodiment four:
When in the unwarrantable situation of user's inherently safe, password of withdrawing the money is said as coerced, when account on the net, as Net silver, online shopping mall etc., or when mobile phone terminal operates, as mobile phone Net silver class Alipay operate time, the password login system of user account own, carrying out transferring accounts, the transaction such as shopping time, input alarm cipher, the alarm cipher summary that alarm cipher produces through computing transfers to server, the password of server receives user end input.It is identical with embodiment two with embodiment one that sequence server calls the process that normal private key file and warning private key file sign, and no longer repeats at this.
Technical scheme provided by the invention, when user operates account, user arranges normal password and alarm cipher to electric signing tools, when using alarm cipher, send after warning message, user still can normal running account, when not being perceived by the user, automatic collection information is also reported to the police, and other cooperation account such as bank does not need to add other and relevant work of reporting to the police.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention can by hardware implementing, and the mode that also can add necessary general hardware platform by software realizes.Based on such understanding, technical scheme of the present invention can embody with the form of software product, it (can be CD-ROM that this software product can be stored in a non-volatile memory medium, USB flash disk, portable hard drive etc.) in, comprise some instructions and perform method described in each embodiment of the present invention in order to make a computer equipment (can be personal computer, server, or the network equipment etc.).
Be only several specific embodiment of the present invention above, but the present invention is not limited to the propelling movement of bill and contract, the changes that any person skilled in the art can think of all should fall into protection scope of the present invention.
Claims (9)
1. an account protection method for the signature of cryptography electronic more than, it is characterized in that, the method comprises:
When digital certificate generates, user side creates normal password and alarm cipher, and generate the normal private key file and the warning private key file corresponding with alarm cipher of answering with normal codon pair, normal password and alarm cipher are sent to server through the normal cryptographic summary of computing generation and alarm cipher summary respectively, normal cryptographic summary described in server stores and alarm cipher summary simultaneously;
When user side is signed, the cryptographic summary that the crypto-operation received produces is sent to server verify, sequence server calls normal cryptographic summary and alarm cipher summary is verified respectively, if alarm cipher Digest Authentication success, sign successfully until warning private key file, collect user side information, and after user side information is sent to Alarm Server, performs user side and operate accordingly.
2. the method for claim 1, is characterized in that, described sequence server calls normal cryptographic summary and alarm cipher summary is verified respectively, specifically comprises:
If the cryptographic summary that user side transmits is identical with the normal cryptographic summary of server calls, server stops calling alarm cipher summary, and downward message, notice user side uses normal private key file to sign;
If the cryptographic summary that user side transmits is not identical with the normal cryptographic summary of server calls, server calls alarm cipher summary is verified, after being proved to be successful, server downward message, notice user side uses warning private key file to sign, collect user side information simultaneously, and after user side information is sent to Alarm Server, performs user side and operate accordingly.
3. the method for claim 1, is characterized in that, described normal cryptographic summary inverse operator cannot become original code with alarm cipher summary.
4. the method for claim 1, is characterized in that, the method also comprises:
When user side mistake in codon pair information is signed, the normal cryptographic summary of server calls and alarm cipher summary are verified respectively, after checking is all failed, terminates checking flow process, and point out client, code error.
5. the method for claim 1, it is characterized in that, collects user side information comprises: warning private key file is signed successfully, user side account information, name information, the IP address information of server automatic acquisition respective user end, and starting sectional drawing instruction, instruction of taking pictures or record a video is collected user side information.
6. the method for claim 1, is characterized in that, when Alarm Server receives the user side information of server transmission, user side information is sent to the police and reports to the police.
7. an Account Guard system for the signature of cryptography electronic more than, is characterized in that, this system bag user side, server and Alarm Server,
Described user side, for creating normal password and alarm cipher, generate and store the normal private key file and the warning private key file corresponding with alarm cipher of answering with normal codon pair, normal password and alarm cipher are sent to server through the normal cryptographic summary of computing generation and alarm cipher summary respectively simultaneously, and use normal private key file to sign according to the instruction of server;
Described server, make a summary with described normal cryptographic summary and alarm cipher for storing, the normal cryptographic summary of sequence call and alarm cipher summary are verified the cryptographic summary that user side transmits, and the result is judged, sign successfully until warning private key file, collect user side information, and after user side information is sent to Alarm Server, performs user side and operate accordingly;
Described Alarm Server, for the user side information that reception server sends, is sent to the police by user side information and reports to the police.
8. system as claimed in claim 7, is characterized in that, described server, comprises the first execution module and the second execution module,
Described first execution module, for signing successfully at normal private key file, performing user side and operating accordingly;
Described first execution module, for after normal private key file and warning private key file all sign failure, terminates checking flow process, and points out client, code error.
9. system as claimed in claim 7 or 8, it is characterized in that, described server, also comprise information submodule, described information submodule, for signing successfully at warning private key file, automatic acquisition user side account information, name information, IP address information, and starting sectional drawing instruction, instruction pair of taking pictures or record a video, collects user side information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510347582.5A CN105160214A (en) | 2015-06-19 | 2015-06-19 | Multi-password electronic signature account protection system and multi-password electronic signature account protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510347582.5A CN105160214A (en) | 2015-06-19 | 2015-06-19 | Multi-password electronic signature account protection system and multi-password electronic signature account protection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105160214A true CN105160214A (en) | 2015-12-16 |
Family
ID=54801070
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510347582.5A Pending CN105160214A (en) | 2015-06-19 | 2015-06-19 | Multi-password electronic signature account protection system and multi-password electronic signature account protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105160214A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105681282A (en) * | 2015-12-29 | 2016-06-15 | 宇龙计算机通信科技(深圳)有限公司 | Business numerical value transfer method and device |
CN112039677A (en) * | 2020-11-05 | 2020-12-04 | 飞天诚信科技股份有限公司 | Method and system for code scanning operation processing based on server |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1417702A (en) * | 2001-10-31 | 2003-05-14 | 梁钢 | Bank safety alarm system and method |
CN1681247A (en) * | 2004-06-30 | 2005-10-12 | 中国银行股份有限公司 | System of bank on-line inquiring system |
CN101051904A (en) * | 2007-05-17 | 2007-10-10 | 成都金山互动娱乐科技有限公司 | Method for landing by account number cipher for protecting network application sequence |
CN101286249A (en) * | 2007-04-09 | 2008-10-15 | 米明 | Anti-riot method utilizing double code for alarming |
CN101303782A (en) * | 2008-06-25 | 2008-11-12 | 贾宇航 | Method and system for implementing bank card automatic alarm |
CN101359414A (en) * | 2007-08-05 | 2009-02-04 | 方景义 | Novel electronic card and use method thereof |
CN101616148A (en) * | 2009-07-31 | 2009-12-30 | 北京握奇数据系统有限公司 | Internet transaction identity authentication method and device |
US20100169151A1 (en) * | 2008-12-27 | 2010-07-01 | Shenzhen Futaihong Precision Industry Co., Ltd. | Alarming system and method for protecting malicious access to bank accounts |
CN101814169A (en) * | 2010-03-05 | 2010-08-25 | 刘辛越 | Method and device for realizing secure payment based on payment confirmation terminal and digital certification |
CN102737311A (en) * | 2012-05-11 | 2012-10-17 | 福建联迪商用设备有限公司 | Internet bank security authentication method and system |
-
2015
- 2015-06-19 CN CN201510347582.5A patent/CN105160214A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1417702A (en) * | 2001-10-31 | 2003-05-14 | 梁钢 | Bank safety alarm system and method |
CN1681247A (en) * | 2004-06-30 | 2005-10-12 | 中国银行股份有限公司 | System of bank on-line inquiring system |
CN101286249A (en) * | 2007-04-09 | 2008-10-15 | 米明 | Anti-riot method utilizing double code for alarming |
CN101051904A (en) * | 2007-05-17 | 2007-10-10 | 成都金山互动娱乐科技有限公司 | Method for landing by account number cipher for protecting network application sequence |
CN101359414A (en) * | 2007-08-05 | 2009-02-04 | 方景义 | Novel electronic card and use method thereof |
CN101303782A (en) * | 2008-06-25 | 2008-11-12 | 贾宇航 | Method and system for implementing bank card automatic alarm |
US20100169151A1 (en) * | 2008-12-27 | 2010-07-01 | Shenzhen Futaihong Precision Industry Co., Ltd. | Alarming system and method for protecting malicious access to bank accounts |
CN101616148A (en) * | 2009-07-31 | 2009-12-30 | 北京握奇数据系统有限公司 | Internet transaction identity authentication method and device |
CN101814169A (en) * | 2010-03-05 | 2010-08-25 | 刘辛越 | Method and device for realizing secure payment based on payment confirmation terminal and digital certification |
CN102737311A (en) * | 2012-05-11 | 2012-10-17 | 福建联迪商用设备有限公司 | Internet bank security authentication method and system |
Non-Patent Citations (3)
Title |
---|
于鹏,丁喜纲: "《计算机网络技术项目教程 高级网络管理员级》", 31 August 2014, 清华大学出版社 * |
志凌团队等: "《ASP从入门到精通》", 30 June 2001, 中国铁道出版社 * |
林欣: "《电子商务与电子政务》", 30 June 2006, 贵州教育出版社 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105681282A (en) * | 2015-12-29 | 2016-06-15 | 宇龙计算机通信科技(深圳)有限公司 | Business numerical value transfer method and device |
CN105681282B (en) * | 2015-12-29 | 2019-03-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of business numeric value transfer and device |
CN112039677A (en) * | 2020-11-05 | 2020-12-04 | 飞天诚信科技股份有限公司 | Method and system for code scanning operation processing based on server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106656503B (en) | Method for storing cipher key, data encryption/decryption method, electric endorsement method and its device | |
CN1937498A (en) | Dynamic cipher authentication method, system and device | |
CN106656476A (en) | Password protecting method and device | |
CN104462949B (en) | The call method and device of a kind of plug-in unit | |
CN104468611A (en) | Data security processing method and device based on dual-system switching | |
CN106027501B (en) | A kind of system and method for being traded safety certification in a mobile device | |
CN101351027A (en) | Method and system for processing service authentication | |
CN103051453A (en) | Digital certificate-based mobile terminal network security trading system and digital certificate-based mobile terminal network security trading method | |
CN102789607A (en) | Network transaction method and system | |
CN107864124B (en) | Terminal information security protection method, terminal and Bluetooth lock | |
CN104202163B (en) | A kind of cryptographic system based on mobile terminal | |
CN103297403A (en) | Method and system for achieving dynamic password authentication | |
CN109684129B (en) | Data backup recovery method, storage medium, encryption machine, client and server | |
CN111178884A (en) | Information processing method, device, equipment and readable storage medium | |
CN102647279B (en) | Encryption method, encrypted card, terminal equipment and interlocking of phone and card device | |
CN111355591A (en) | Block chain account safety management method based on real-name authentication technology | |
CN106790208A (en) | A kind of communication encrypting method and device | |
CN101741826A (en) | Method and system for realizing encryption unloading on virtualized platform | |
CN105119716A (en) | Secret key negotiation method based on SD cards | |
CN111062059B (en) | Method and device for service processing | |
CN110634072A (en) | Block chain transaction system based on multiple tags and hardware encryption and operation mechanism thereof | |
CN104408360A (en) | Encryption equipment and method based on mobile terminal | |
CN105160214A (en) | Multi-password electronic signature account protection system and multi-password electronic signature account protection method | |
CN103336918B (en) | Electronic hard disk system authorization method and device | |
CN104753879A (en) | Method and system for authenticating cloud service provider through terminal and method and system for authenticating terminal through cloud service provider |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151216 |