CN105871900A - Identity authentication method and system - Google Patents
Identity authentication method and system Download PDFInfo
- Publication number
- CN105871900A CN105871900A CN201610349204.5A CN201610349204A CN105871900A CN 105871900 A CN105871900 A CN 105871900A CN 201610349204 A CN201610349204 A CN 201610349204A CN 105871900 A CN105871900 A CN 105871900A
- Authority
- CN
- China
- Prior art keywords
- audio
- video response
- instruction
- response
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000004044 response Effects 0.000 claims abstract description 171
- 238000010586 diagram Methods 0.000 description 4
- 230000002457 bidirectional effect Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/75—Media network packet handling
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to an identity authentication method and system. The identity authentication method comprises steps as follows: a client side sends a connection request to a server side, so that a server can send a connection response according to the connection request; the client side receives the connection response sent from the server side, and the connection response is used for instructing connection establishment with the client side; the client side sends an authentication request to the server side, and the server side can send instructions including a first instruction and a second instruction according to the authentication request; the client side instructs a user to make a first audio and video response according to the first instruction; the client side is instructed to make a second audio and video response according to the second instruction, and the server side can acquire an authentication result according to the first audio and video response and the second audio and video response; the client side receives the authentication result. The safety of real-time audio and video authentication is improved.
Description
Technical Field
The invention relates to the field of network application, in particular to an identity authentication method and system.
Background
In the real world, the basic methods for authenticating a user can be divided into three types: the first is to prove the identity of the user himself according to the information known to the user; the second is to prove the identity of the user based on what the user owns; the third type directly proves the identity of the user based on unique biometrics, such as fingerprints, faces, etc.
The identity authentication method in the network is consistent with that in the real world, and in order to achieve higher identity authentication security, the three methods are selected and mixed for use in some scenes, so that identity security authentication is enhanced.
On the network and the mobile internet, the identity information of the user can be authenticated and used on line, which is a very important thing and brings great convenience to the application with high safety requirement.
But authenticating the identity of the user on the network is a difficult task; even if the image of the opposite party can be seen, the audio and video information recorded by the opposite party can be also be the audio information which is not generated by the opposite party of the real conversation at the moment, and the audio information can also be the forged information. Therefore, secure authentication of the identity is essential.
The invention uses two-way audio and video information, which comprises instruction information and feedback information of the authenticatee to confirm that the audio and video is the audio and video generated by the authenticator in time.
Disclosure of Invention
The invention aims to provide an identity authentication method and an identity authentication system aiming at the defects of the prior art so as to solve the problem of identity security authentication.
In order to achieve the above object, in a first aspect, the present invention provides an identity authentication method, including:
the client sends a connection request to the server so that the server sends a connection response according to the connection request;
the client receives a connection response sent by the server, wherein the connection response is used for indicating the establishment of connection with the client;
the client sends an authentication request to the server for the server to send an instruction according to the authentication request; wherein the instructions comprise a first instruction and a second instruction;
the client instructs a user to make a first audio and video response according to the first instruction; the client is instructed to make a second audio and video response according to the second instruction, so that the server side obtains an authentication result according to the first audio response and the second audio and video response;
the client receives the authentication result.
Preferably, the step of obtaining the authentication result by the server according to the first audio/video response and the second audio/video response includes:
and the server side calculates the first audio-video response, the time information of the second audio-video response and the second audio-video response according to the identification algorithm to obtain an authentication result.
In a second aspect, the present invention provides an identity authentication method, including:
a server receives a connection request sent by a client;
the server side sends a connection response to the client side;
the method comprises the steps that after receiving an authentication request sent by a client, a server generates an instruction, wherein the instruction comprises a first instruction and a second instruction, and is used for instructing a user to send a first audio and video response according to the first instruction and instructing the client to send a second audio and video response according to the second instruction;
the server receives the first audio-video response and the second audio-video response, records the first audio-video response, the second audio-video response, the time information of the first audio-video response and the time information of the second audio-video response at the same time, and obtains an authentication result according to the recorded information so as to send the authentication result to the client.
Preferably, before obtaining the authentication result, according to the recorded information, the method further includes:
and the server side judges that the first instruction conforms to the first audio/video response and/or the second instruction conforms to the second audio/video response.
Preferably, the step of obtaining the authentication result according to the recorded information includes:
when the first instruction is in accordance with the first audio-video response and the second instruction is in accordance with the second audio-video response, and the time information of the first audio-video response and the first audio-video response corresponds to the time information of the second audio-video response and the second audio-video response, the authentication is successful; otherwise, the authentication fails.
In a third aspect, the present invention provides an identity authentication system, including:
establishing connection between a server side and a client side in a two-way mode;
the client sends an authentication request to the server;
after receiving the authentication request, the server generates and sends an instruction to the client, wherein the instruction comprises a first instruction and a second instruction;
the client instructs a user to make a first audio and video response according to the first instruction, instructs the client to make a second audio and video response according to the second instruction, and sends the first audio and video response and the second audio and video response to the server;
the server receives the first audio-video response and the second audio-video response, records the first audio-video response and the second audio-video response, time information of the first audio-video response and the time information of the second audio-video response, obtains an authentication result according to the recorded information, and sends the authentication result to the client;
the client receives the authentication result.
Preferably, the server side and the client side transmit two-way audio and video signals through two-way connection.
Preferably, the instructions comprise text and/or sound and/or images.
Preferably, the server side is configured to: and judging that the first instruction is consistent with the first audio-video response and/or the second instruction is consistent with the second audio-video response.
Preferably, the server side is configured to:
when the first instruction is in accordance with the first audio-video response and the second instruction is in accordance with the second audio-video response, and the time information of the first audio-video response and the first audio-video response corresponds to the time information of the second audio-video response and the second audio-video response, the authentication is successful; otherwise, the authentication fails.
The invention improves the safety of using real-time audio and video authentication.
Drawings
FIG. 1 is a diagram of an application scenario of the present invention;
fig. 2 is a flow chart illustrating an identity authentication method according to an embodiment of the present invention;
fig. 3 is a flow chart illustrating a structure of another identity authentication method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an identity authentication system according to an embodiment of the present invention.
Detailed Description
The invention verifies the authenticity of the instant audio and video information of the client by setting the server to record the bidirectional audio and video information, thereby completing the authentication of the identity.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Fig. 1 is a diagram of an application scenario of the present invention. As shown in fig. 1, the server side is a cloud robot; the client is a tablet, a smart phone APP or application software on a computer. Taking a mobile phone as an example, firstly, a bidirectional audio-video connection is established between the mobile phone and a cloud robot, then the mobile phone sends an identity authentication request to the cloud robot, the cloud robot generates an instruction (characters, sounds, pictures or audio-video) related to identity authentication after receiving the authentication request, the instruction is sent to the mobile phone in the next step, a user holding the mobile phone makes a corresponding response according to the instruction, after the mobile phone detects a response corresponding to the user execution instruction, the mobile phone needs to store the audio-video of the response and upload the audio-video to the cloud robot, and the cloud robot needs to record the instruction, the audio-video signal of the response and time information of the user responding according to the instruction at the same time; and comparing the instruction with the responded audio/video signal, thereby completing the identity authentication.
Fig. 2 shows an identity authentication method according to an embodiment of the present invention. As shown in fig. 2, the steps of the identity authentication method include:
step S200: the client sends a connection request to the server so that the server sends a connection response according to the connection request;
step S210: the client receives a connection response sent by the server, wherein the connection response is used for indicating the establishment of connection with the client;
step S220: the method comprises the steps that a client sends an authentication request to a server, so that the server sends an instruction to the client according to the authentication request, wherein the instruction comprises a first instruction and a second instruction;
step S230: the client instructs the user to make a first audio and video response according to the first instruction and instructs the client to make a second audio and video response according to the second instruction, so that the server side obtains an authentication result according to the first audio and video response and the second audio and video response;
step S240: the client receives the authentication result.
Optionally, the server side calculates a first audio/video response, time information of the first audio/video response, a second audio/video response and time information of the second audio/video response according to a recognition algorithm; comparing the first instruction with the first audio-video response and the second instruction with the second audio-video response, and when the first instruction is consistent with the first audio-video response and the second instruction is consistent with the second audio-video response, and the time of the first audio-video response are corresponding to the time of the second audio-video response and the time of the second audio-video response, the authentication is successful; otherwise, the authentication fails.
Fig. 3 is another identity authentication method according to an embodiment of the present invention. As shown in fig. 3, the identity authentication method includes:
step S300: a server receives a connection request sent by a client;
step S310: the server side sends a connection response to the client side;
step S320: the method comprises the steps that after receiving an authentication request sent by a client, a server generates an instruction, wherein the instruction comprises a first instruction and a second instruction, and is used for instructing a user to send a first audio and video response according to the first instruction and instructing the client to send a second audio and video response according to the second instruction;
step S330: the server receives the first audio-video response and the second audio-video response, records the first audio-video response, the second audio-video response, the time information of the first audio-video response and the time information of the second audio-video response at the same time, and obtains an authentication result according to the recorded information so as to send the authentication result to the client.
Optionally, the server determines whether the first instruction conforms to the first audio/video response and/or whether the second instruction conforms to the second audio/video response.
Optionally, when the first instruction conforms to the first audio-video response and the second instruction conforms to the second audio-video response, and the first audio-video response and the time information of the first audio-video response correspond to the second audio-video response and the time information of the second audio-video response, the authentication is successful.
Specifically, when the instruction is consistent with the audio-video response and the audio-video response is an instant audio-video response, the authentication is successful; otherwise, the authentication fails.
In the method described in fig. 3 and fig. 4, the client makes a corresponding response according to the instruction sent by the server, and this process may be performed several times as required by the authentication effect, and is not limited to 2 audiovisual responses.
Fig. 4 is a diagram of an identity authentication system according to an embodiment of the present invention. As shown in fig. 4, the identity authentication system includes: a client and a server; wherein,
establishing connection between a server side and a client side in a two-way mode; the client sends an authentication request to the server; after receiving the authentication request, the server generates and sends instructions (characters, sound, pictures, audios, videos and the like); the method comprises the steps that a user is instructed to make a first audio and video response, a client side makes a second audio and video response, and the first audio and video response and the second audio and video response are sent to a server side; such as: uttering speech, e.g., responses; the server side and the client side repeat the process for several times, and the specific audio and video response made by the instruction is different randomly; the server receives the first audio-video response and the second audio-video response, and simultaneously records the first audio-video response, the second audio-video response, the time information of the first audio-video response and the time information of the second audio-video response; finally, the server side confirms that the received audio and video information is as follows according to the recognition algorithm: the user instant audio and video information is not forged audio and video information; thus, the image information and the voice information of the user are confirmed on line, and the user can be completely identified.
The identity authentication system is described below in one specific embodiment. In fig. 4, before the interactive communication between the client and the server is performed, a bidirectional audio/video signal connection needs to be established; after the server side and the client side are connected, the client side sends an identity authentication request to the server side, at the moment, the server side sends instructions (for example, "reading the own identity card information of the user aloud", "clearly shooting out the identity card of the user", "touching the nose of the user with the hand", "covering the left eye of the user with the right hand", and the like, the responses of the instructions are different and random changes), and after receiving the instructions, the client side indicates the user with the client side to make a first audio-video response, indicates the client side to make a second audio-video response, and sends the first audio-video response and the second audio-video response to the server side; and the server simultaneously records the first audio-video response and the second audio-video response as well as the time when the first audio-video response occurs and the time when the second audio-video response occurs, and determines that the received audio-video information is the instant audio-video information of the user and is not the forged audio-video information according to an identification algorithm after the recording. Thus, the image information and the voice information of the user are confirmed on line, and the user can be completely identified.
Specifically, the instruction sent to the client by the server comprises characters, sound, pictures and audio/video information, and if the instruction is the characters, the instruction can be hidden in an audio/video image and needs to be identified by a user, so that the client is prevented from using a robot to deal with false audio/video information.
Specifically, after the instruction is matched with the audio/video response, if the first audio/video response and the time information of the first audio/video response are required to be corresponding to the second audio/video response and the time information of the second audio/video response, the authentication is successful; otherwise, the authentication fails.
To enhance the security of authentication, the instructional information and audiovisual may be persistent, also not limited to first, second, but may be more.
The embodiment of the invention detects the authenticity of the instant audio and video information of the client user through two-way audio and video information, thereby completing identity authentication on line.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (10)
1. An identity authentication method, comprising:
the client sends a connection request to the server so that the server can send a connection response according to the connection request;
the client receives the connection response sent by the server, wherein the connection response is used for indicating the establishment of connection with the client;
the client sends an authentication request to the server, so that the server sends an instruction according to the authentication request; wherein the instructions comprise a first instruction and a second instruction;
the client instructs a user to make a first audio and video response according to the first instruction; the client is instructed to make a second audio and video response according to the second instruction, so that the server side obtains an authentication result according to the first audio response and the second audio and video response;
and the client receives the authentication result.
2. The method according to claim 1, wherein the step of the server side obtaining the authentication result according to the first audio/video response and the second audio/video response comprises:
and the server side calculates the first audio/video response, the time information of the second audio/video response and the second audio/video response according to an identification algorithm to obtain an authentication result.
3. An identity authentication method, comprising:
a server receives a connection request sent by a client;
the server side sends a connection response to the client side;
the server side generates an instruction after receiving an authentication request sent by the client side, wherein the instruction comprises a first instruction and a second instruction, and is used for instructing a user to send a first audio and video response according to the first instruction and instructing the client side to send a second audio and video response according to the second instruction; and the server receives the first audio and video response and the second audio and video response, records the first audio and video response, the second audio and video response, time information of the first audio and video response and time information of the second audio and video response, and obtains an authentication result according to the recorded information so as to send the authentication result to the client.
4. The method of claim 3, wherein obtaining the authentication result according to the recorded information further comprises:
and the server side judges that the first instruction conforms to the first audio/video response and/or the second instruction conforms to the second audio/video response.
5. The method of claim 4, wherein the step of obtaining the authentication result according to the recorded information comprises:
when the first instruction is in line with the first audio-video response and the second instruction is in line with the second audio-video response, and the time information of the first audio-video response and the first audio-video response corresponds to the time information of the second audio-video response and the second audio-video response, the authentication is successful; otherwise, the authentication fails.
6. An identity authentication system is characterized by comprising a client and a server.
Establishing connection between a server side and a client side in a two-way mode;
the client sends an authentication request to the server;
after receiving the authentication request, the server generates and sends an instruction to the client, wherein the instruction comprises a first instruction and a second instruction;
the client instructs a user to make a first audio and video response according to the first instruction, instructs the client to make a second audio and video response according to the second instruction, and sends the first audio and video response and the second audio and video response to the server;
the server receives the first audio and video response and the second audio and video response, records the first audio and video response and the second audio and video response, time information of the first audio and video response and the time information of the second audio and video response, obtains an authentication result according to the recorded information, and sends the authentication result to the client;
and the client receives the authentication result.
7. The system according to claim 6, wherein the server side and the client side transmit two-way audio/video signals through a two-way connection.
8. The system according to claim 6, characterized in that the instructions comprise text and/or sound and/or images.
9. The system of claim 6, wherein the server is configured to: and judging that the first instruction conforms to the first audio-video response and/or the second instruction conforms to the second audio-video response.
10. The system according to claim 9, wherein the server is configured to:
when the first instruction is in line with the first audio-video response and the second instruction is in line with the second audio-video response, and the time information of the first audio-video response and the first audio-video response corresponds to the time information of the second audio-video response and the second audio-video response, the authentication is successful; otherwise, the authentication fails.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610349204.5A CN105871900A (en) | 2016-05-24 | 2016-05-24 | Identity authentication method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610349204.5A CN105871900A (en) | 2016-05-24 | 2016-05-24 | Identity authentication method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105871900A true CN105871900A (en) | 2016-08-17 |
Family
ID=56634707
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610349204.5A Pending CN105871900A (en) | 2016-05-24 | 2016-05-24 | Identity authentication method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105871900A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107743214A (en) * | 2017-09-11 | 2018-02-27 | 深圳市金溢科技股份有限公司 | System, method, terminal, application program and the backstage of activation line board units |
CN110247898A (en) * | 2019-05-23 | 2019-09-17 | 平安普惠企业管理有限公司 | Auth method, device, medium and electronic equipment |
WO2019223149A1 (en) * | 2018-05-23 | 2019-11-28 | 平安科技(深圳)有限公司 | Security authentication method, authentication server and computer readable storage medium |
CN113256288A (en) * | 2021-06-08 | 2021-08-13 | 中国银行股份有限公司 | Bank card hanging-off method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130342703A1 (en) * | 2012-06-25 | 2013-12-26 | PSP Security Co., Ltd. | System and Method for Identifying Human Face |
CN104751110A (en) * | 2013-12-31 | 2015-07-01 | 汉王科技股份有限公司 | Bio-assay detection method and device |
CN104965589A (en) * | 2015-06-13 | 2015-10-07 | 东莞市微模式软件有限公司 | Human living body detection method and device based on human brain intelligence and man-machine interaction |
CN105407069A (en) * | 2014-06-30 | 2016-03-16 | 阿里巴巴集团控股有限公司 | Living body authentication method and device, client equipment, and server |
CN105450407A (en) * | 2014-07-31 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Identity authentication method and device |
-
2016
- 2016-05-24 CN CN201610349204.5A patent/CN105871900A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130342703A1 (en) * | 2012-06-25 | 2013-12-26 | PSP Security Co., Ltd. | System and Method for Identifying Human Face |
CN104751110A (en) * | 2013-12-31 | 2015-07-01 | 汉王科技股份有限公司 | Bio-assay detection method and device |
CN105407069A (en) * | 2014-06-30 | 2016-03-16 | 阿里巴巴集团控股有限公司 | Living body authentication method and device, client equipment, and server |
CN105450407A (en) * | 2014-07-31 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Identity authentication method and device |
CN104965589A (en) * | 2015-06-13 | 2015-10-07 | 东莞市微模式软件有限公司 | Human living body detection method and device based on human brain intelligence and man-machine interaction |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107743214A (en) * | 2017-09-11 | 2018-02-27 | 深圳市金溢科技股份有限公司 | System, method, terminal, application program and the backstage of activation line board units |
WO2019223149A1 (en) * | 2018-05-23 | 2019-11-28 | 平安科技(深圳)有限公司 | Security authentication method, authentication server and computer readable storage medium |
CN110247898A (en) * | 2019-05-23 | 2019-09-17 | 平安普惠企业管理有限公司 | Auth method, device, medium and electronic equipment |
CN110247898B (en) * | 2019-05-23 | 2021-11-19 | 平安普惠企业管理有限公司 | Identity verification method, identity verification device, identity verification medium and electronic equipment |
CN113256288A (en) * | 2021-06-08 | 2021-08-13 | 中国银行股份有限公司 | Bank card hanging-off method and device |
CN113256288B (en) * | 2021-06-08 | 2024-02-27 | 中国银行股份有限公司 | Bank card unhooking method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2019202631B2 (en) | Toggling biometric authentication | |
US20230188521A1 (en) | Secure authorization for access to private data in virtual reality | |
US9712526B2 (en) | User authentication for social networks | |
CN105468950B (en) | Identity authentication method and device, terminal and server | |
US9660995B2 (en) | Methods, systems, and computer readable media for combating device theft with user notarization | |
CN105871900A (en) | Identity authentication method and system | |
CN108391141B (en) | Method and apparatus for outputting information | |
CN102802150B (en) | phone number verification method, system and terminal | |
US9461987B2 (en) | Audio authentication system | |
CN109005104A (en) | A kind of instant communicating method, device, server and storage medium | |
CN111862432B (en) | Entrance guard verification method, entrance guard device, server and system | |
CN111882739B (en) | Entrance guard verification method, entrance guard device, server and system | |
WO2016124008A1 (en) | Voice control method, apparatus and system | |
US11546390B1 (en) | Peer-supervised video conference based account recovery | |
US11128620B2 (en) | Online verification method and system for verifying the identity of a subject | |
CN115022030B (en) | Bank business handling request processing method and device based on blockchain | |
US20240054193A1 (en) | Authenticating a user based on expected behaviour | |
CN111475794B (en) | Living body authentication method and device and computer equipment | |
CN114175666B (en) | Method and device for associating a first device with a second device | |
US20230188478A1 (en) | Establishing network presence | |
CN115100726A (en) | Intelligent one-way video witness method and related products |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160817 |