CN105959279A - Computer information transmission system and method based on encryption processing - Google Patents

Computer information transmission system and method based on encryption processing Download PDF

Info

Publication number
CN105959279A
CN105959279A CN201610279930.4A CN201610279930A CN105959279A CN 105959279 A CN105959279 A CN 105959279A CN 201610279930 A CN201610279930 A CN 201610279930A CN 105959279 A CN105959279 A CN 105959279A
Authority
CN
China
Prior art keywords
information
encryption
unit
algorithm
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610279930.4A
Other languages
Chinese (zh)
Inventor
卢志茂
葛韬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University of Technology
Original Assignee
Dalian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University of Technology filed Critical Dalian University of Technology
Priority to CN201610279930.4A priority Critical patent/CN105959279A/en
Publication of CN105959279A publication Critical patent/CN105959279A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention discloses a computer information transmission system and method based on encryption processing. The system is provided with an encryption information sending end. The sending end comprises a secret key generation unit, a secret key encryption unit and an information sending unit. The secret key generation unit is capable of randomly generating a group of secret key data. The secret key encryption unit is capable of selecting any encryption algorithm pre-stored in the unit to carry out encryption processing on the information to be transmitted at present based on the secret key data generated by the secret key generation unit. The information sending unit is capable of sending out the information to be transmitted after the encryption processing. The system also comprises an encryption information receiving end. The receiving end comprises an information receiving unit and a decryption management unit. The decryption management unit is capable of carrying out decryption on the received encryption information based on a decryption algorithm restored in the unit. According to the invention, the safety of computer information transmission is effectively improved, and the data privacy of a user is protected.

Description

A kind of computer information transmitting system and method based on encryption
Technical field
The present invention relates to computer information transmitting technology, a kind of computer based on encryption Information transmission system and method.
Background technology
Fast development along with computer technology so that computer has become as people and working, learning and give birth to Instrument indispensable in work.Computer network also allows people exchange whenever and wherever possible, the most several The information sharing that year rises, it just can be sent to generation in a very quick way within several seconds In boundary, any place that you specify, contacts with the network user in any one corner in the world, and these information can To be the various modes such as word, image, sound, meanwhile, user can obtain the most free news, specially Topic mail, and realize information search easily.But all of information is all with form transmission in plain text, So as the information of some secrets, the such as information of these secrets such as Email often during transmission Easily by illicit interception or distort, confidential information mail is very easy to illegally is transmitted to irrelevant people simultaneously Member.
Summary of the invention
The defect existed in view of prior art, the invention aims to provide a kind of meter based on encryption Calculating machine information transmission system, this security of system is reliable, convenient and practical, is effectively increased computer information transmitting Safety, be conducive to protection user data privacy.
To achieve these goals, technical scheme:
A kind of computer information transmitting system based on encryption, it is characterised in that:
Described system possesses
Encryption information transmitting terminal, this encryption information transmitting terminal include encryption key generation unit, secret key encryption unit with And information transmitting unit, described encryption key generation unit can randomly generate group key data, and described key adds Close unit can be based on key data produced by aforementioned key generation unit, and prestore in this unit selected appoints Current information waiting for transmission is encrypted by a kind of AES of meaning, and described information transmitting unit can be by Information waiting for transmission after encrypted process sends;
And the encryption information receiving end matched with aforementioned encryption information transmitting terminal, this encryption information receiving end Including information receiving unit and deciphering administrative unit, described information receiving unit is able to receive that adding confidential information sends The information that end sends, described deciphering administrative unit can be based on the decipherment algorithm prestored in this unit to reception Adding confidential information to be decrypted, described decipherment algorithm includes that some and aforementioned AES deciphers calculation one to one Method.
As the further prioritization scheme of the present invention, aforementioned key ciphering unit is to current information waiting for transmission After being encrypted, additionally it is possible to insert the algorithm corresponding with currently employed AES in this information Characteristic information, in order to reception can quickly be added by aforementioned deciphering administrative unit according to corresponding decipherment algorithm Confidential information is decrypted, and described algorithm characteristics information is the some groups of symbol datas preset, any one group code Data are all the most corresponding with a kind of algorithm in the AES that aforementioned key ciphering unit is prestored.
As the further prioritization scheme of the present invention, aforementioned encryption information transmitting terminal also includes that encryption selects unit, This encryption selects unit to choose whether information waiting for transmission is encrypted place in order to be actually needed according to user Reason.
As the further prioritization scheme of the present invention, each AES that aforementioned key ciphering unit is used leads to Cross storage device to preserve.
As the further prioritization scheme of the present invention, described storage device is computer system memory or calculating Machine management system application heap.
As the further prioritization scheme of the present invention, described storage device is computer External memory equipment.
It is another object of the present invention to provide a kind of computer information transmitting method based on encryption, its It is characterised by: described method comprises the steps
S1, randomly generate group key data;
S2, based on aforementioned produced key data, selected any one AES prestored is to currently treating The information of transmission is encrypted;
S3, the information waiting for transmission after encrypted process is sent;
S4, reception S3 transmitted information, be decrypted the confidential information received based on the decipherment algorithm prestored, Described decipherment algorithm includes some and aforementioned AES decipherment algorithm one to one.
As the further prioritization scheme of the present invention, current information waiting for transmission is being encrypted by S2 After, additionally it is possible in this information, insert the algorithm characteristics information corresponding with currently employed AES, with It is easy to aforementioned S4 quickly according to corresponding decipherment algorithm, reception to be added confidential information and be decrypted, described calculation Method characteristic information be some groups preset symbol datas, any one group code data all with the aforementioned encryption prestored A kind of algorithm in algorithm is the most corresponding.
As the further prioritization scheme of the present invention, preceding method also includes: S0, be actually needed according to user Choose whether information waiting for transmission is encrypted, be to carry out S1;Otherwise directly by letter waiting for transmission Breath sends.
As the further prioritization scheme of the present invention, aforementioned each AES is preserved by storage device.
As the further prioritization scheme of the present invention, described storage device is computer system memory or calculating Machine system management ram section.
As the further prioritization scheme of the present invention, described storage device is computer External memory equipment.
Compared with prior art, beneficial effects of the present invention:
The present invention is by processing the encryption and decryption of computer transmission information so that information waiting for transmission has reached close The demand of code safety, attack protection performance is good, has faster encryption and decryption simultaneously and calculates speed.
Accompanying drawing explanation
Fig. 1 is the system architecture diagram of computer information transmitting system based on encryption of the present invention;
Fig. 2 is the system concrete structure of computer information transmitting system based on encryption of the present invention Schematic diagram;
Fig. 3 is the flow chart of steps of computer information transmitting method based on encryption of the present invention.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with accompanying drawing, right The present invention is further elaborated.
As Figure 1-Figure 2, computer information transmitting system based on encryption of the present invention, its Possess encryption information transmitting terminal and the encryption information receiving end matched with aforementioned encryption information transmitting terminal,
Described encryption information transmitting terminal includes encryption key generation unit, secret key encryption unit and information transmitting unit, Described encryption key generation unit can randomly generate group key data, described secret key encryption unit prestore one or Multiple AESs, it can be based on key data produced by aforementioned key generation unit, this unit selected In any one AES of prestoring current information waiting for transmission is encrypted, and aforementioned key adds Close unit is after being encrypted current information waiting for transmission, additionally it is possible to insert in this information with current The algorithm characteristics information that the AES that used is corresponding, in order to aforementioned deciphering administrative unit can quickly be pressed According to corresponding decipherment algorithm, reception is added confidential information to be decrypted, described algorithm characteristics information be some groups pre- If symbol data, in the AES that any one group code data are all prestored with aforementioned key ciphering unit A kind of algorithm the most corresponding;Described information transmitting unit can be by the information waiting for transmission after encrypted process Send;
Described encryption information receiving end includes information receiving unit and deciphering administrative unit, and described information receives single Unit is able to receive that the information that encryption information transmitting terminal sends, and described deciphering administrative unit can be based in this unit The decipherment algorithm prestored adds confidential information to reception and is decrypted, and described decipherment algorithm includes some and aforementioned adds Close algorithm decipherment algorithm one to one, to ensure that encryption information receiving end effectively can add secret letter to reception Breath is decrypted.
As the further prioritization scheme of the present invention, aforementioned encryption information transmitting terminal also includes that encryption selects unit, This encryption selects unit to choose whether information waiting for transmission is encrypted place in order to be actually needed according to user Reason, if without encryption, information the most waiting for transmission is directly sent by information transmitting unit, and by Information receiving unit receives this information.
As the further prioritization scheme of the present invention, each AES that aforementioned key ciphering unit is used leads to Cross storage device to preserve;Described storage device is basic input/output system memory, i.e. described Storage device is computer system memory or computer management system application heap, it is also possible to be to deposit outside computer Storage equipment, such as USB flash disk, portable hard drive etc..
As the further prioritization scheme of the present invention, aforementioned key ciphering unit prestores in this unit selected When current information waiting for transmission is encrypted by AES, can select at random or can also be according to Current information waiting for transmission is encrypted by the predetermined AES corresponding to AES table, described AES table can be set as carrying out which kind of AES within which kind of time period to current information waiting for transmission It is encrypted, it is also possible to according to the quantity of information waiting for transmission in certain period of time to the most waiting for transmission Information is encrypted;6 kinds of AESs if prestoring, respectively ES algorithm, aes algorithm, MD5 Algorithm, RSA Algorithm, dual key encryption algorithm, rivest, shamir, adelman, then can set, with 24 hours systems Algorithm sets round-robin basis, set a kind of algorithm every 4 hours and i.e. sets employing DES between 0 .-4 (Data Encryption Standard) algorithm is encrypted, and sets and use between 4 .-8 AES (Advanced Encryption Standard) algorithm is encrypted, and next coming in order are analogized;If Prestore 6 kinds of AESs, respectively ES algorithm, aes algorithm, MD5 algorithm, RSA Algorithm, dual key encryption Algorithm, rivest, shamir, adelman, then can set, and with one day internal information quantity set round-robin basis, often passes Defeated 10 information i.e. change a kind of algorithm, i.e. set between the 1st to the 10th and use DES (Data Encryption Standard) algorithm is encrypted, and set between the 11st to the 20th and use AES (Advanced Encryption Standard) algorithm is encrypted, and next coming in order are analogized.
Such as Fig. 3, a kind of computer information transmitting method based on encryption of the present invention,
It is characterized in that: described method comprises the steps
S1, randomly generate group key data;
S2, based on aforementioned produced key data, selected any one AES prestored is to currently treating The information of transmission is encrypted;
S3, the information waiting for transmission after encrypted process is sent;
S4, reception S3 transmitted information, be decrypted the confidential information received based on the decipherment algorithm prestored, Described decipherment algorithm includes some and aforementioned AES decipherment algorithm one to one.
As the further prioritization scheme of the present invention, current information waiting for transmission is being encrypted by S2 After, additionally it is possible in this information, insert the algorithm characteristics information corresponding with currently employed AES, with It is easy to aforementioned S4 quickly according to corresponding decipherment algorithm, reception to be added confidential information and be decrypted, described calculation Method characteristic information be some groups preset symbol datas, any one group code data all with the aforementioned encryption prestored A kind of algorithm in algorithm is the most corresponding.
As the further prioritization scheme of the present invention, at the selected AES prestored to the most to be transmitted in S2 Information when being encrypted, can select at random or can also be right according to predetermined AES table institute Current information waiting for transmission is encrypted by the AES answered, and described AES table can be set as Within which kind of, carry out which kind of AES current information waiting for transmission is encrypted time period, it is also possible to According to the quantity of information waiting for transmission in certain period of time, current information waiting for transmission is encrypted;As 6 kinds of AESs if prestoring, respectively ES algorithm, aes algorithm, MD5 algorithm, RSA Algorithm, conbined public or double key add Close algorithm, rivest, shamir, adelman, then can set, and sets round-robin basis with 24 hours algorithms processed, every Within 4 hours, set a kind of algorithm between 0 .-4, i.e. set employing DES (Data Encryption Standard) algorithm is encrypted, and sets and use AES (Advanced between 4 .-8 Encryption Standard) algorithm is encrypted, and next coming in order are analogized;Encrypt for 6 kinds if prestoring Algorithm, respectively ES algorithm, aes algorithm, MD5 algorithm, RSA Algorithm, dual key encryption algorithm, asymmetric AES, then can set, and with one day internal information quantity set round-robin basis, often 10 information of transmission were i.e. Change a kind of algorithm, i.e. set between the 1st to the 10th and use DES (Data Encryption Standard) algorithm is encrypted, and sets and use AES (Advanced between the 11st to the 20th Encryption Standard) algorithm is encrypted, and next coming in order are analogized.
As the further prioritization scheme of the present invention, preceding method also includes: S0, be actually needed according to user Choose whether information waiting for transmission is encrypted, be to carry out S1;Otherwise directly by letter waiting for transmission Breath sends.
As the further prioritization scheme of the present invention, aforementioned each AES is preserved by storage device.
As the further prioritization scheme of the present invention, described storage device is computer system memory or calculating Machine management system application heap.
As the further prioritization scheme of the present invention, described storage device is computer External memory equipment.
The above, the only present invention preferably detailed description of the invention, but protection scope of the present invention not office Being limited to this, any those familiar with the art is in the technical scope that the invention discloses, according to this The technical scheme of invention and inventive concept thereof in addition equivalent or change, all should contain the protection in the present invention Within the scope of.

Claims (8)

1. a computer information transmitting system based on encryption, it is characterised in that:
Described system possesses
Encryption information transmitting terminal, this encryption information transmitting terminal includes encryption key generation unit, secret key encryption unit and information transmitting unit, described encryption key generation unit can randomly generate group key data, described secret key encryption unit can be based on key data produced by aforementioned key generation unit, current information waiting for transmission is encrypted by any one AES prestored in this unit selected, and the information waiting for transmission after encrypted process can be sent by described information transmitting unit;
And the encryption information receiving end matched with aforementioned encryption information transmitting terminal, this encryption information receiving end includes information receiving unit and deciphering administrative unit, described information receiving unit is able to receive that the information that encryption information transmitting terminal sends, and described deciphering administrative unit can add confidential information based on the decipherment algorithm prestored in this unit to reception and be decrypted.
Computer information transmitting system the most according to claim 1, it is characterised in that:
Aforementioned key ciphering unit is after being encrypted current information waiting for transmission, the algorithm characteristics information corresponding with currently employed AES can also be inserted in this information, described algorithm characteristics information is the some groups of symbol datas preset, and any one group code data are all the most corresponding with a kind of algorithm in the AES that aforementioned key ciphering unit is prestored.
Computer information transmitting system the most according to claim 1, it is characterised in that:
Aforementioned encryption information transmitting terminal also includes that encryption selects unit, and this encryption selects unit to choose whether to be encrypted information waiting for transmission in order to be actually needed according to user.
Computer information transmitting system the most according to claim 1, it is characterised in that: each AES that aforementioned key ciphering unit is used is preserved by storage device.
Computer information transmitting system the most according to claim 1, it is characterised in that:
Aforesaid storage device includes any one form in computer system memory, computer management system application heap, computer External memory equipment.
6. a computer information transmitting method based on encryption, it is characterised in that: described method comprises the steps
S1, randomly generate group key data;
S2, based on aforementioned produced key data, current information waiting for transmission is encrypted by selected any one AES prestored;
S3, the information waiting for transmission after encrypted process is sent;
S4, reception S3 transmitted information, be decrypted the confidential information received based on the decipherment algorithm prestored.
Computer information transmitting method the most according to claim 6, it is characterised in that:
In aforementioned S2 after current information waiting for transmission is encrypted, the algorithm characteristics information corresponding with currently employed AES can also be inserted in this information, described algorithm characteristics information is the some groups of symbol datas preset, and any one group code data are all the most corresponding with a kind of algorithm in the aforementioned AES prestored.
Computer information transmitting method the most according to claim 6, it is characterised in that:
Preceding method also includes: S0, be actually needed according to user choose whether to information waiting for transmission send be encrypted, be to carry out S1;Otherwise directly information waiting for transmission is sent.
CN201610279930.4A 2016-04-29 2016-04-29 Computer information transmission system and method based on encryption processing Pending CN105959279A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610279930.4A CN105959279A (en) 2016-04-29 2016-04-29 Computer information transmission system and method based on encryption processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610279930.4A CN105959279A (en) 2016-04-29 2016-04-29 Computer information transmission system and method based on encryption processing

Publications (1)

Publication Number Publication Date
CN105959279A true CN105959279A (en) 2016-09-21

Family

ID=56916889

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610279930.4A Pending CN105959279A (en) 2016-04-29 2016-04-29 Computer information transmission system and method based on encryption processing

Country Status (1)

Country Link
CN (1) CN105959279A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453319A (en) * 2016-10-14 2017-02-22 北京握奇智能科技有限公司 Data transmission system and method based on security module
CN107332655A (en) * 2017-06-29 2017-11-07 商丘医学高等专科学校 Computer control system and computer
CN109391609A (en) * 2018-04-10 2019-02-26 江苏亨通工控安全研究院有限公司 Support the transmission encryption method and system of industry control agreement
CN110417802A (en) * 2019-08-06 2019-11-05 上海七口田科技有限公司 A kind of electric business platform website data protection system
CN111917555A (en) * 2020-07-13 2020-11-10 上海明略人工智能(集团)有限公司 Data processing method and device
CN112291268A (en) * 2020-11-26 2021-01-29 上海优扬新媒信息技术有限公司 Information transmission method, device, equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004021663A1 (en) * 2002-08-13 2004-03-11 Siemens Aktiengesellschaft Method and device for the data source-specific marking of useful push data
CN1620005A (en) * 2003-11-18 2005-05-25 华为技术有限公司 Method of safety transmitting key
CN101203025A (en) * 2006-12-15 2008-06-18 上海晨兴电子科技有限公司 Method for transmitting and receiving safe mobile message
CN101262340A (en) * 2008-04-22 2008-09-10 中兴通讯股份有限公司 MMS encryption method and mobile terminal for transmitting and receiving encrypted MMS
CN101442409A (en) * 2007-11-23 2009-05-27 东方钢铁电子商务有限公司 Encipher method and system for B2B data exchange
CN102740239A (en) * 2011-03-31 2012-10-17 中兴通讯股份有限公司 Method and system for secure transmission of media information
CN102904713A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Key exchange method for secret key encryption communication system
CN104408381A (en) * 2014-11-27 2015-03-11 大连理工大学 Protection method of data integrity in cloud storage

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004021663A1 (en) * 2002-08-13 2004-03-11 Siemens Aktiengesellschaft Method and device for the data source-specific marking of useful push data
CN1620005A (en) * 2003-11-18 2005-05-25 华为技术有限公司 Method of safety transmitting key
CN101203025A (en) * 2006-12-15 2008-06-18 上海晨兴电子科技有限公司 Method for transmitting and receiving safe mobile message
CN101442409A (en) * 2007-11-23 2009-05-27 东方钢铁电子商务有限公司 Encipher method and system for B2B data exchange
CN101262340A (en) * 2008-04-22 2008-09-10 中兴通讯股份有限公司 MMS encryption method and mobile terminal for transmitting and receiving encrypted MMS
CN102740239A (en) * 2011-03-31 2012-10-17 中兴通讯股份有限公司 Method and system for secure transmission of media information
CN102904713A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Key exchange method for secret key encryption communication system
CN104408381A (en) * 2014-11-27 2015-03-11 大连理工大学 Protection method of data integrity in cloud storage

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453319A (en) * 2016-10-14 2017-02-22 北京握奇智能科技有限公司 Data transmission system and method based on security module
CN107332655A (en) * 2017-06-29 2017-11-07 商丘医学高等专科学校 Computer control system and computer
CN109391609A (en) * 2018-04-10 2019-02-26 江苏亨通工控安全研究院有限公司 Support the transmission encryption method and system of industry control agreement
CN110417802A (en) * 2019-08-06 2019-11-05 上海七口田科技有限公司 A kind of electric business platform website data protection system
CN110417802B (en) * 2019-08-06 2021-05-07 上海七口田科技有限公司 E-commerce platform website data protection system
CN111917555A (en) * 2020-07-13 2020-11-10 上海明略人工智能(集团)有限公司 Data processing method and device
CN111917555B (en) * 2020-07-13 2024-03-15 上海明略人工智能(集团)有限公司 Data processing method and device
CN112291268A (en) * 2020-11-26 2021-01-29 上海优扬新媒信息技术有限公司 Information transmission method, device, equipment and storage medium
CN112291268B (en) * 2020-11-26 2023-05-26 度小满科技(北京)有限公司 Information transmission method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105959279A (en) Computer information transmission system and method based on encryption processing
US6125185A (en) System and method for encryption key generation
CN107086915B (en) Data transmission method, data sending end and data receiving end
CN111510281B (en) Homomorphic encryption method and device
CN104253694B (en) A kind of time slot scrambling for network data transmission
CN107294697B (en) Symmetrical full homomorphic cryptography method based on plaintext similar matrix
CN102437912B (en) Digital rights management method based on N RSA (Rivest Shamir Adleman) encryption algorithms based on chaotic algorithm
US20110145576A1 (en) Secure method of data transmission and encryption and decryption system allowing such transmission
CN105915520A (en) File storage and searching method based on public key searchable encryption, and storage system
Bisht et al. A comparative study of some symmetric and asymmetric key cryptography algorithms
CN104270242B (en) A kind of ciphering and deciphering device for network data encryption transmission
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
Pansotra et al. Cloud security algorithms
US9641328B1 (en) Generation of public-private key pairs
Alomari et al. Efficiency of using the Diffie-Hellman key in cryptography for internet security
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
Thein et al. Comparative performance study on ordinary and chaos image encryption schemes
Sekar et al. Comparative study of encryption algorithm over big data in cloud systems
US10110373B2 (en) System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient
CN101383825A (en) Method, apparatus and terminal implementing computer file ciphering
Sujithra et al. ID based adaptive-key signcryption for data security in cloud environment
CN102404107A (en) Method, device, transmitting end and receiving end all capable of guaranteeing safety of inputted content
Barukab et al. Secure communication using symmetric and asymmetric cryptographic techniques
KR20120069387A (en) A method for searching keyword based on public key
CN114726549A (en) Data security query method and system based on bidirectional RSA three-time transmission protocol

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160921