CN106327723B - A kind of mPOS transaction systems based on intelligent platform - Google Patents
A kind of mPOS transaction systems based on intelligent platform Download PDFInfo
- Publication number
- CN106327723B CN106327723B CN201610745328.5A CN201610745328A CN106327723B CN 106327723 B CN106327723 B CN 106327723B CN 201610745328 A CN201610745328 A CN 201610745328A CN 106327723 B CN106327723 B CN 106327723B
- Authority
- CN
- China
- Prior art keywords
- key
- encryption
- mobile phone
- card reader
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/12—Cash registers electronically operated
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/206—Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry
Landscapes
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Cash Registers Or Receiving Machines (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The present invention relates to a kind of mPOS transaction systems based on intelligent platform.User passes through cell-phone customer terminal registering service server, service server verifies username and password by encryption equipment, and return to verification result, then mobile phone card reader is inserted into cell-phone customer terminal, cell-phone customer terminal reads mobile phone card reader KSN, is sent to service server, and service server verifies user name and the binding information of mobile phone card reader KSN by encryption equipment, after being proved to be successful, transaction of swiping the card is carried out;Cell-phone customer terminal is issued to swipe the card and be instructed to mobile phone card reader, user is swiped the card by mobile phone card reader, mobile phone card reader encryption brushing card data is encryption track data, and return includes mobile phone card reader KSN, encryption track data, the response data of random number and is back to cell-phone customer terminal, response data is sent to service server by cell-phone customer terminal, service server decrypts the encryption track data by encryption equipment and obtains brushing card data, and return to track data to service server.Present system product is small, portable, fashionable appearance, has good playing property, and connect intelligent terminal mobile internet, is not limited by time and location.
Description
Technical field
The present invention relates to a kind of mPOS transaction systems based on intelligent platform.
Background technology
Traditional POS transaction systems, terminal is of high cost, transaction cost is high, O&M cost is high, and function is single.
Invention content
The purpose of the present invention is to provide a kind of mPOS transaction systems based on intelligent platform, the system product it is small, portable,
Fashionable appearance has good playing property, and connects intelligent terminal mobile internet, is not limited by time and location.
To achieve the above object, the technical scheme is that:A kind of mPOS transaction systems based on intelligent platform, including
Service server and the encryption equipment being connect with the service server, cell-phone customer terminal, the cell-phone customer terminal are also associated with mobile phone
Card reader;
Card reader certification:User is verified by cell-phone customer terminal registering service server, service server by encryption equipment
Username and password, and verification result is returned, then mobile phone card reader is inserted into cell-phone customer terminal, and cell-phone customer terminal reads mobile phone brush
Card device KSN, is sent to service server, and service server verifies user name and the binding of mobile phone card reader KSN by encryption equipment
Information after being proved to be successful, carries out transaction of swiping the card;
It swipes the card transaction:Cell-phone customer terminal issues instruction of swiping the card to mobile phone card reader, and user is swiped the card by mobile phone card reader, hand
Machine card reader encryption brushing card data is encryption track data, and returns and include mobile phone card reader KSN, encrypt track data, is random
Several response datas is back to cell-phone customer terminal, and response data is sent to service server, service server by cell-phone customer terminal
The encryption track data is decrypted by encryption equipment and obtains brushing card data, and return to track data to service server.
In an embodiment of the present invention, the encryption equipment memory contains root key, and the root key includes equipment root master control
Key, equipment application maintenance key, equipment application external authentication key, is recognized inside equipment application equipment application root master control key
Demonstrate,prove key, equipment application root working key.
In an embodiment of the present invention, the mobile phone card reader memory contains distributed key, and the distributed key is to be based on
Mobile phone card reader KSN is obtained using key decentralized algorithm, and the distributed key includes master control key, using master control key, application
Maintenance key, using external authentication key, using internal authentication key, track encryption working key, the track encryption work
Key generates the interim magnetic track information encryption key for encrypting brushing card data by random number decentralized algorithm.
In an embodiment of the present invention, the specific acquisition pattern of the distributed key is as follows:Using root key MK as encryption
Key pair mobile phone card reader KSN carries out 3DEA operations, obtains the left-half of distributed key DK, then using root key MK as adding
Value after close key pair mobile phone card reader KSN negates carries out 3DEA operations, obtains the right half part of distributed key DK, distributed key
The set of the left-half of DK, the right half part of distributed key DK, i.e. distributed key DK.
In an embodiment of the present invention, the mobile phone card reader encryption brushing card data is the detailed process for encrypting track data
For:Track encryption working key by random number decentralized algorithm, is generated interim magnetic track information encryption key by mobile phone card reader, and
Brushing card data is encrypted by interim magnetic track information encryption key afterwards acquisition encryption track data.
In an embodiment of the present invention, the service server is decrypted the encryption track data by encryption equipment and is brushed
The detailed process of card data is:Encryption equipment obtains track encryption work according to equipment application root working key, mobile phone card reader KSN
Key, then and interim magnetic track information encryption key is obtained according to track encryption working key, random number, then pass through interim magnetic track
Information encryption key decryption encryption track data, obtains brushing card data.
Compared to the prior art, the invention has the advantages that:
Present system, encryption chip safe to use protect data, and it is close and one-time pad to have a machine one
Function;
Present system is feature-rich, supports all bank cards, it can be achieved that transferring accounts, remitting money, credit card repayment, online branch
It pays, Yi Jishui, electricity, coal gas, communication expense, broadband access fee etc. are paid;And there is following characteristic in mobile payment:
1st, with oneself at any time:Small, portable, fashionable appearance has good playing property;
2nd, whenever and wherever possible:Intelligent terminal mobile internet is connect, is not limited by time and location;
3rd, caprice with:Want, with regard to that can use, by charging not perplexed;
4th, follow one's inclinations step by step:It is close to the users custom, bankcard consumption;User self-help operates, and follows one's inclinations step by step;
Meanwhile for different Third-party payment clients, it is possible to provide customize service, including appearance, function etc., so as to for
Client provides preferably service.
Description of the drawings
Fig. 1 is present system block diagram.
Fig. 2 is card reader identifying procedure figure of the present invention.
Fig. 3 swipes the card transaction flow figure for the present invention.
Fig. 4 encrypts block diagram for mobile phone card reader of the present invention.
Fig. 5 decrypts block diagram for encryption equipment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawings, technical scheme of the present invention is specifically described.
As shown in Figs. 1-3, a kind of mPOS transaction systems based on intelligent platform of the invention, including service server and with
Encryption equipment, the cell-phone customer terminal of service server connection, the cell-phone customer terminal are also associated with mobile phone card reader;
Card reader certification:User is verified by cell-phone customer terminal registering service server, service server by encryption equipment
Username and password, and verification result is returned, then mobile phone card reader is inserted into cell-phone customer terminal, and cell-phone customer terminal reads mobile phone brush
Card device KSN, is sent to service server, and service server verifies user name and the binding of mobile phone card reader KSN by encryption equipment
Information after being proved to be successful, carries out transaction of swiping the card;
It swipes the card transaction:Cell-phone customer terminal issues instruction of swiping the card to mobile phone card reader, and user is swiped the card by mobile phone card reader, hand
Machine card reader encryption brushing card data is encryption track data, and returns and include mobile phone card reader KSN, encrypt track data, is random
Several response datas is back to cell-phone customer terminal, and response data is sent to service server, service server by cell-phone customer terminal
The encryption track data is decrypted by encryption equipment and obtains brushing card data, and return to track data to service server.
The encryption equipment memory contains root key, and the root key includes equipment root master control key, equipment application root master control
Key, equipment application maintenance key, equipment application external authentication key, equipment application internal authentication key, equipment application root work
Make key.
The mobile phone card reader memory contains distributed key, and the distributed key is using close based on mobile phone card reader KSN
Key decentralized algorithm obtains, and the distributed key includes master control key, recognizes using master control key, applicating maintenance key, using outside
Demonstrate,prove key, using internal authentication key, track encryption working key, the track encryption working key disperses to calculate by random number
Method generates the interim magnetic track information encryption key for encrypting brushing card data.
The specific acquisition pattern of the distributed key is as follows:Using root key MK as encryption key to mobile phone card reader KSN
3DEA operations are carried out, the left-half of distributed key DK are obtained, then using root key MK as encryption key to mobile phone card reader
Value after KSN negates carries out 3DEA operations, obtains the right half part of distributed key DK, the left-half of distributed key DK, dispersion
The set of the right half part of key DK, i.e. distributed key DK.
The mobile phone card reader encryption brushing card data is that the detailed process of encryption track data is:Mobile phone card reader is by magnetic track
Cryptographic work key generates interim magnetic track information encryption key, then passes through interim magnetic track information by random number decentralized algorithm
Brushing card data is encrypted acquisition encryption track data in encryption key.
The service server decrypts the detailed process for encrypting track data acquisition brushing card data by encryption equipment:
Encryption equipment obtains track encryption working key, then and is added according to magnetic track according to equipment application root working key, mobile phone card reader KSN
Close working key, random number obtain interim magnetic track information encryption key, are then added by interim magnetic track information encryption key decryption
Close track data obtains brushing card data.
Specific implementation process for the present invention below.
As shown in Figure 1, a kind of mPOS transaction systems based on intelligent platform of the present invention, including service server, encryption
Machine, cell-phone customer terminal, mobile phone card reader;
Card reader transaction includes two parts, and a part is card reader certification, and another part is transaction of swiping the card.
As shown in Fig. 2, card reader certification:
Basic procedure is as follows:
1)Mobile phone client users log in;
2)Background authentication username and password;
3)Mobile phone card reader is inserted into, and cell-phone customer terminal takes card reader KSN;
4)After cell-phone customer terminal obtains KSN, this information is returned into backstage;
5)Background authentication user and mobile phone card reader KSN binding informations;
6)It swipes the card transaction;
As shown in figure 3, transaction of swiping the card:
Basic procedure is as follows:
1)Cell-phone customer terminal issues instruction of swiping the card;
2)User card punching;
3)Mobile phone card reader encrypts brushing card data, and returns【KSN】、【Encrypt track data】、【Random number】Etc. information;
4)Encryption data is sent on cell-phone customer terminal to backstage;
5)Backstage is decrypted by encryption equipment, obtains corresponding magnetic track information(That is brushing card data).
The key management of the present invention includes the two large divisions such as the generation of key and the use of key;
First, the generation of key:
(1)Root key
There are special medias for root key(Such as master card, encryption equipment)In, mainly include:
L equipment root master control keys
L equipment application root master control keys
L equipment application maintenance keys
L equipment application external authentication keys
L equipment application internal authentication keys
L equipment application root working keys
(2)Distributed key
By corresponding key decentralized algorithm, disperse the corresponding secret key of each corresponding card reader from root key, from
And achieve the purpose that a machine one is close.
Decentralized algorithm
Key decentralized algorithm is:Root key passes through dispersion factor --- and 8 terminal unique key KSN generate sub-key.
By a double length(128bit)Root key MK, by decentralized processing, derive the double length of the close terminal of a machine one
(128bit)Sub-key DK.
Derive DK left-halfs method be:
The first step:Using dispersion factor as input data;
Second step:Using MK as encryption key;
Third walks:3DEA operations are carried out to input data with MK.
Derive DK right half parts method be:
The first step:Dispersion factor is negated, as input data;
Second step:Using MK as encryption key;
Third walks:3DEA operations are carried out to input data with MK.
The set of left-half and right half part is exactly corresponding terminal key.
By more than decentralized algorithm, corresponding each station terminal can uniquely be generated using main working key.
The key code system table of mobile phone card reader of the present invention is as shown in table 1:
2nd, the use of key
(1)Mobile phone card reader encryption flow
The encryption block diagram of the present invention is illustrated in figure 4, during magnetic track information cryptographic operation is carried out, terminal adds magnetic track
Close working key is directly generated interim magnetic track information encryption key, is believed using interim magnetic track by random number distributed key algorithm
Encryption for information key pair magnetic track information(Brushing card data)Be encrypted, then on send corresponding terminal KSN, random number and encryption it is close
Literary information is to server background.
(2)Encryption equipment decrypts flow
Be illustrated in figure 5 the present invention decryption block diagram, after service server receives encryption information data packet, need into
Row decryption.
Decrypting process is mainly the magnetic that equipment application root working key first derives the corresponding card reader terminal by KSN
Then road cryptographic work key disperses interim magnetic track information encryption key by 8 random numbers received, finally using facing
When magnetic track information encryption key complete decryption work to encrypted cipher text information.
The form of brushing card data, i.e. track data
Track data combination operation is as follows:
L obtains two or three magnetic track informations, calculates the length of two or three magnetic tracks;
After bis- or three magnetic tracks of l carry out BCD compressions, it is stitched together, structure is as follows:2 track lengths(HEX, 1BYTE)+ 2
Track data(Packed BCD)+ 3 track lengths(HEX, 1BYTE)+ 3 track datas(Packed BCD) + 0X90 +
0x00;
L carries out 3DES encryption, ciphering process to spliced data:Work is obtained with terminal master key dispersion random number
Key, then with the every 8 byte 3des of work key pair magnetic track information (x00 is mended below less than 8);
Citing:
Two track datas(37):
1234567890123456789=05082017819991683
Three track datas(102):
1234567890123456789=1560000000000000000003781999216000005080000000000
00000000000=000000000003=00000000
So it is combined into character string such as the following table 1, table 2:
That is converted into being stitched together after binary-coded decimal
\x251234567890123456789D05082017819991683F661234567890123456789D15600
0000000000000000378199921600000508000000000000000000000D000000000003D00000000
Then 3DES encryption is carried out.
The above are preferred embodiments of the present invention, all any changes made according to the technical solution of the present invention, and generated function is made
During with range without departing from technical solution of the present invention, all belong to the scope of protection of the present invention.
Claims (3)
1. a kind of mPOS transaction systems based on intelligent platform, it is characterised in that:Including service server and with the business service
Encryption equipment, the cell-phone customer terminal of device connection, the cell-phone customer terminal are also associated with mobile phone card reader;
Card reader certification:User verifies user by cell-phone customer terminal registering service server, service server by encryption equipment
Name and password, and verification result is returned, then mobile phone card reader is inserted into cell-phone customer terminal, and cell-phone customer terminal reads mobile phone card reader
KSN is sent to service server, and service server verifies user name and the binding information of mobile phone card reader KSN by encryption equipment,
After being proved to be successful, transaction of swiping the card is carried out;
It swipes the card transaction:Cell-phone customer terminal issues instruction of swiping the card to mobile phone card reader, and user is swiped the card by mobile phone card reader, mobile phone brush
Card device encryption brushing card data is encryption track data, and returns and include mobile phone card reader KSN, encrypts track data, random number
Response data is back to cell-phone customer terminal, and response data is sent to service server by cell-phone customer terminal, and service server passes through
The encryption equipment decryption encryption track data obtains brushing card data, and return to track data to service server;
The encryption equipment memory contains root key, the root key include equipment root master control key, equipment application root master control key,
Equipment application maintenance key, equipment application external authentication key, equipment application internal authentication key, the work of equipment application root are close
Key;
The mobile phone card reader memory contains distributed key, and the distributed key is using key point based on mobile phone card reader KSN
It dissipates algorithm to obtain, the distributed key includes master control key, using master control key, applicating maintenance key, close using external authentication
Key, using internal authentication key, track encryption working key, the track encryption working key is given birth to by random number decentralized algorithm
Into for encrypting the interim magnetic track information encryption key of brushing card data;
The specific acquisition pattern of the distributed key is as follows:Mobile phone card reader KSN is carried out using root key MK as encryption key
3DEA operations obtain the left-half of distributed key DK, then mobile phone card reader KSN are asked using root key MK as encryption key
Value after anti-carries out 3DEA operations, obtains the right half part of distributed key DK, the left-half of distributed key DK, distributed key DK
Right half part set, i.e. distributed key DK.
2. a kind of mPOS transaction systems based on intelligent platform according to claim 1, it is characterised in that:The mobile phone brush
Card device encryption brushing card data is that the detailed process of encryption track data is:Mobile phone card reader by track encryption working key by with
Machine number decentralized algorithm generates interim magnetic track information encryption key, then by interim magnetic track information encryption key to brushing card data
Acquisition encryption track data is encrypted.
3. a kind of mPOS transaction systems based on intelligent platform according to claim 1, it is characterised in that:The business clothes
Business device decrypts the detailed process for encrypting track data acquisition brushing card data by encryption equipment:Encryption equipment is according to equipment application
Root working key, mobile phone card reader KSN obtain track encryption working key, then and according to track encryption working key, random number
Interim magnetic track information encryption key is obtained, track data is then encrypted by interim magnetic track information encryption key decryption, is brushed
Card data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610745328.5A CN106327723B (en) | 2016-08-29 | 2016-08-29 | A kind of mPOS transaction systems based on intelligent platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610745328.5A CN106327723B (en) | 2016-08-29 | 2016-08-29 | A kind of mPOS transaction systems based on intelligent platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106327723A CN106327723A (en) | 2017-01-11 |
CN106327723B true CN106327723B (en) | 2018-07-10 |
Family
ID=57791577
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610745328.5A Active CN106327723B (en) | 2016-08-29 | 2016-08-29 | A kind of mPOS transaction systems based on intelligent platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106327723B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI622947B (en) * | 2017-01-13 | 2018-05-01 | 飛捷科技股份有限公司 | Composite mobile payment system and mobile pos module thereof |
CN108155993B (en) * | 2017-12-29 | 2021-12-17 | 北京树米网络科技有限公司 | Data encryption method and device for VSIM card |
CN108460597B (en) * | 2018-03-23 | 2022-03-15 | 银联商务股份有限公司 | Key management system and method |
CN109194491B (en) * | 2018-09-21 | 2021-05-25 | 北京六合安通科技有限公司 | Password evaluation test system and password evaluation test method |
CN111325540B (en) * | 2020-01-21 | 2021-12-10 | 江苏荣泽信息科技股份有限公司 | POS system based on block chain |
CN111565104B (en) * | 2020-04-29 | 2023-07-04 | 上海瀚银信息技术有限公司 | Key management method and system of card reader |
CN111600703B (en) * | 2020-05-12 | 2023-08-04 | 京东科技信息技术有限公司 | SM 2-based signature method, system, electronic equipment and storage medium |
CN112583592A (en) * | 2020-12-29 | 2021-03-30 | 湖南万慧通科技有限公司 | Working method of encryption system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102136172A (en) * | 2011-04-02 | 2011-07-27 | 方园 | Card terminal and realization method thereof used by individuals or families |
CN102222293A (en) * | 2011-06-01 | 2011-10-19 | 程永生 | Mobile payment method, mobile terminal and system |
CN102354418A (en) * | 2011-10-09 | 2012-02-15 | 钱袋网(北京)信息技术有限公司 | System for processing trade information and method therefor |
CN102938696A (en) * | 2011-08-15 | 2013-02-20 | 国民技术股份有限公司 | Generating method of session key and module |
CN105373918A (en) * | 2015-11-10 | 2016-03-02 | 广东汇卡商务服务有限公司 | Multi-POS terminal integrated payment system and method |
CN105741117A (en) * | 2016-01-25 | 2016-07-06 | 恒宝股份有限公司 | Method and off-line transaction device based on security key |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140019366A1 (en) * | 2011-03-31 | 2014-01-16 | Infosys Limited | Method and a system for securing financial transaction |
-
2016
- 2016-08-29 CN CN201610745328.5A patent/CN106327723B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102136172A (en) * | 2011-04-02 | 2011-07-27 | 方园 | Card terminal and realization method thereof used by individuals or families |
CN102222293A (en) * | 2011-06-01 | 2011-10-19 | 程永生 | Mobile payment method, mobile terminal and system |
CN102938696A (en) * | 2011-08-15 | 2013-02-20 | 国民技术股份有限公司 | Generating method of session key and module |
CN102354418A (en) * | 2011-10-09 | 2012-02-15 | 钱袋网(北京)信息技术有限公司 | System for processing trade information and method therefor |
CN105373918A (en) * | 2015-11-10 | 2016-03-02 | 广东汇卡商务服务有限公司 | Multi-POS terminal integrated payment system and method |
CN105741117A (en) * | 2016-01-25 | 2016-07-06 | 恒宝股份有限公司 | Method and off-line transaction device based on security key |
Also Published As
Publication number | Publication date |
---|---|
CN106327723A (en) | 2017-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106327723B (en) | A kind of mPOS transaction systems based on intelligent platform | |
CN103793815B (en) | Mobile intelligent terminal acquirer system and method suitable for bank cards and business cards | |
CN102170357B (en) | Combined secret key dynamic security management system | |
CN103390124B (en) | Safety input and the equipment, system and method for processing password | |
JP2018522353A (en) | Authentication system and method for server-based payment | |
US10089627B2 (en) | Cryptographic authentication and identification method using real-time encryption | |
CN107278307A (en) | Software layer is mutually authenticated | |
CN104393993B (en) | A kind of safety chip and its implementation for electricity-selling terminal | |
CN1514635A (en) | Method of realizing mobile electronic business using finger print intelligence terminal and intelligent hand set | |
CN109766979A (en) | Two-dimensional code generation method, verification method and device | |
CN105871546A (en) | Verification method combining static password and dynamic password and terminal equipment | |
CN103971071B (en) | Computer network system for preventing input data from being recorded | |
CN103456050B (en) | Electronic affirmation method and system | |
CN102801730A (en) | Information protection method and device for communication and portable devices | |
CN102238193A (en) | Data authentication method and system using same | |
CN104318437A (en) | Online payment system and payment method for virtual prepaid card | |
CN104281272B (en) | Password Input processing method and processing device | |
CN102118385A (en) | Security domain management method and device | |
CN104978144A (en) | Gesture password input device and system and method for transaction based on system | |
CN103281180B (en) | User is protected to access the bill generation method of privacy in a kind of network service | |
CN108460597A (en) | A kind of key management system and method | |
KR20120037314A (en) | Online credit card issue system and method using user identity authentication device | |
CN108416400A (en) | A kind of method of payment and payment system based on dynamic two-dimension code | |
CN107689867B (en) | Key protection method and system under open environment | |
WO2011058629A1 (en) | Information management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |