CN106603562A - RIM cloud data identity verification system and method - Google Patents

RIM cloud data identity verification system and method Download PDF

Info

Publication number
CN106603562A
CN106603562A CN201611260592.6A CN201611260592A CN106603562A CN 106603562 A CN106603562 A CN 106603562A CN 201611260592 A CN201611260592 A CN 201611260592A CN 106603562 A CN106603562 A CN 106603562A
Authority
CN
China
Prior art keywords
rim
information
module
characteristic
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611260592.6A
Other languages
Chinese (zh)
Inventor
方延春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Intermediate Worker Information Technology Ltd By Share Ltd
Original Assignee
Shandong Intermediate Worker Information Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Intermediate Worker Information Technology Ltd By Share Ltd filed Critical Shandong Intermediate Worker Information Technology Ltd By Share Ltd
Priority to CN201611260592.6A priority Critical patent/CN106603562A/en
Publication of CN106603562A publication Critical patent/CN106603562A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention belongs to the communication technology field and especially relates to a RIM cloud data identity verification system and method. The RIM cloud data identity verification system, based on a RIM identity management system, comprises a RIM cloud server, an information acquisition module, an information loading module, and an information processing module. Through a cloud database, a cloud server and other cloud computing technologies, a comparison verification mode effectively avoids problems that reference characteristic data is unreal and it is difficult to supervise when cross-enterprises, cross-regions and cross platforms are authorized by a person himself/herself. In this way, the security of biological identification and verification of actual identities is greatly improved, and properties and all rights of the person can be better guaranteed. Moreover, with the system and method, the person can prove that he/she is who he/she is and that he/she is still alive.

Description

A kind of RIM clouds data verification identification system and method
Technical field
The invention belongs to communication technical field, more particularly to a kind of RIM clouds data verification identification system and method.
Background technology
With the improvement of people's living standards, people's transacting business of going out is also more and more, handles different business every time It is required for a variety of certificates and handles to prove to come in person, in existing technology, it is common to use " I is identity card proving I " this problem, if many times forget to may result in by identity document made a fruitless trip, it is impossible to transacting business, not only waste Time effects work efficiency, can also affect the emotion of oneself.And present existing identity recognizing technology such as fingerprint, face, rainbow Film etc., is all that the fixed thing in fixed place can just be used, can not be public service well.
The content of the invention
The present invention is directed to above-mentioned problem, and the present invention devises a kind of RIM clouds data verification identification system and method.
In order to achieve the above object, the technical solution used in the present invention is that the present invention provides a kind of RIM clouds data verification body Part method, is applied to cloud data verification identification system, it is characterised in that the RIM clouds data verification identification system is based on RIM The data compilation carried out on identity management system, methods described specifically include following steps:
1) gather information, finds the characteristic of personal institute's typing in RIM identity management system types of applications first;
2) information is uploaded, all characteristics collected is uploaded to into RIM cloud servers;
3) information processing, RIM cloud servers will carry out big data analysis to the characteristic for uploading, and filter out this Reference characteristic of the biometric feature that RIM user personnel use always as the biometric feature of the RIM user;
4) download information, in life, we need the office unit for contacting download the reference characteristic of RIM user to respectively In the corresponding equipment in place;
5) information compare, when RIM user handle correlation business when, department of relevant unit can according to reference characteristic come Whether the biological characteristic of contrast RIM user matches;
6) business handling, when RIM user biological characteristic and reference characteristic to match when, can normal transacting business, biology When feature is mismatched with reference characteristic, it is impossible to handle related service.
Preferably, in the RIM identity management systems types of applications characteristic of institute's typing include going home opening the door, on Bancor is diligent, handle permit business, handle bank settlement business, access in the biometric feature data that client or friend use one Plant or various.
Preferably, the biometric feature includes one or more in iris, face, fingerprint.
Preferably, we need the office unit for contacting to include housekeeping department, bank counter, Che Guan in the life Institute, the RIM user handles related service includes house property business, banking and CAR SERVICE.
A kind of RIM clouds data verification identification system, it is characterised in that including RIM cloud servers, information acquisition module, Signal load unit, message processing module;
Information acquisition module:For collecting the characteristic of personal institute's typing in RIM identity management system types of applications And it is uploaded to RIM cloud servers;
RIM cloud servers:For all information collected by receive information acquisition module and it is acted upon, to uploading Characteristic carry out big data analysis, filter out the biometric feature that the RIM user personnel use always and use as the RIM The reference characteristic of the biometric feature at family, and preserved realize cloud share;
Signal load unit:For downloading the reference characteristic in RIM cloud servers;
Message processing module:Whether reference characteristic and the RIM user biologicals feature downloaded for identification information load-on module Matching.
Preferably, described information RIM cloud server, acquisition module, signal load unit and message processing module it Between pass through signal transmission.
Preferably, described information acquisition module includes fingerprint input device, recognition of face device and iris identification device.
Compared with prior art, advantages of the present invention and good effect be,
1st, the present invention is using the cloud computing technology such as cloud data base, Cloud Server, can across enterprise, trans-regional, cross-platform Jing after I authorizes, the verification mode compared can effectively evade some row such as untrue, the difficult supervision of reference characteristic data Problem, greatly improves the safety that bio-identification verifies true identity, preferably ensures the property and every rights and interests of client;More Energy is easy, effectively solving proves phenomenons such as " I is myself " " I also live ".
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be to using needed for embodiment description Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for ability For the those of ordinary skill of domain, without having to pay creative labor, can be with other according to these accompanying drawings acquisitions Accompanying drawing.
Fig. 1 is the schematic diagram of a kind of RIM clouds data verification identification system that embodiment 1 is provided and method;
Fig. 2 is the workflow diagram of a kind of RIM clouds data verification identification system that embodiment 1 is provided and method;
Specific embodiment
In order to be more clearly understood that the above objects, features and advantages of the present invention, with reference to the accompanying drawings and examples The present invention will be further described.It should be noted that in the case where not conflicting, in embodiments herein and embodiment Feature can be mutually combined.
Many details are elaborated in the following description in order to fully understand the present invention, but, the present invention may be used also Implemented with adopting different from other modes described here, therefore, the present invention is not limited to the concrete of description described below The restriction of embodiment.
Embodiment 1, can be seen that the system that inventor devises a set of RIM clouds data verification identity according to Fig. 1 and Fig. 2, This system is on the basis of RIM identity management systems, using the biological characteristic of RIM user input RIM systems so as to formation The system of systems of complete set, it is main just to include RIM cloud servers, information acquisition module, signal load unit, information processing This four part of module, wherein information acquisition module are for collecting personal institute's typing in RIM identity management system types of applications Characteristic and be uploaded to RIM cloud servers, the input of fingerprint that such as RIM user is adopted when being on duty is carrying out work attendance core It is real, come home from work using iris identification opening gate, by recognition of face proving " I when also visiting or calling on a customer It is me " this problem, the institute of personal institute's typing in RIM identity management system types of applications is collected by information acquisition module There is characteristic, and all characteristics collected are uploaded to into RIM cloud servers;RIM cloud servers will connect afterwards All information collected by the information acquisition module for receiving simultaneously are acted upon, and the characteristic to uploading carries out big data point Analysis, filters out biometric feature that the RIM user personnel use always as the benchmark of the biometric feature of the RIM user Feature, including fingerprint, face, iris, and preserved realize cloud share;When the RIM cloud data verification bodies designed with inventor When part system place company sets up the unit of partnership relation and needs using this system, can be by under signal load unit Reference characteristic in load RIM cloud servers, such as housekeeping department, Banking sector and vehicle administration office, these are at ordinary times in transacting business When need accurately to examine transacting business person identity information unit department, may be by this system and save the plenty of time, Illustrated how to using this system and the benefit using the system with Banking sector below, the method is mainly attached to Complete on RIM identity management systems, what is RIM identity management systems, specifically, the RIM identity management systems include again It is using the RIM identity management methods of the system, specific as follows:
A kind of RIM identity management methods, are applied to identity management system, and methods described specifically includes following steps:
1) identity typing
A, the identification typing module for first, setting up a storage module and correlation;
B, in the identity card identification typing module typing treat Identity Management personnel (user) identification card number, its identity card identification Typing module is identified to the identification card number, if identification is correct, can be by the identity card relevant information in the identification card number Calling in carries out short time storage in the identity card identification typing module, after storage is finished, can jump out the identification record of 3D living body finger prints Enter module;
C, 3D living body finger print identification typing module is identified to all fingerprints for treating Identity Management personnel, is recognized errorless Afterwards, then all fingerprints are entered in 3D living body finger prints identification typing module carries out short time storage, after storage is finished, jumps out rainbow Film recognizes typing module;
D, iris identification typing module are then identified at least one iris for treating Identity Management personnel, are recognized errorless Afterwards, then the iris is entered in iris identification typing module carries out short time storage;
After E, storage are finished, storage module will be collected and be recognized by above-mentioned identity card identification typing module, 3D living body finger prints Information stored by typing module and iris identification typing module is preserved;
After F, storage module are finished to above- mentioned information storage, will automatically form and the corresponding work of Identity Management personnel be treated with this Signal, which treats that Identity Management personnel can arrange password to work signal;
After G, work signal code are provided with, relevant this stored by storage module treats all letters of Identity Management personnel Breath is uploaded to cloud server, and its cloud server then can carry out independent numbering, i.e. identity typing according to work signal to the information Complete;
2) identity information modification.
The related identification typing module also includes that bank card recognizes typing module and auxiliary typing module, and which is concrete Input method is:I.e. after the storage of iris identification typing module is finished, bank card identification typing module treats Identity Management personnel Bank card be identified, recognize it is errorless after, i.e., bank card identification typing module in carry out short time storage;Storage is finished Afterwards, auxiliary typing module is jumped out, and the phone number of Identity Management personnel, exchange number is treated successive typing in typing module is aided in Code, license plate number and existing residence, and short time storage is carried out in auxiliary typing module;After storage is finished, storage module will The information stored in recognizing typing module and auxiliary typing module by above-mentioned bank card can be collected to be preserved, preservation is finished and is followed by The step of getting off then continues to complete F, G step in claim 1.
The identity information modification comprises the steps:
H, set up an identity modified module and with cloud server keep information exchange;
I, Identity Management personnel log in identity modified module, identity modified module first by work signal and work signal code Work signal and work signal code are identified;
After J, identification are errorless, identity modified module extracts all letters corresponding with the work signal from cloud server Breath;
After K, Identity Management personnel determine that all information are errorless, modified as needed to, identity modified module can then jump out 3D live bodies Fingerprint recognition typing module, its 3D living body finger prints identification typing module are identified to the fingerprint of Identity Management personnel's typing;
After L, identification are errorless, Identity Management personnel can remove identity card relevant information, refer in modification in identity modified module Stored all information in cloud server beyond stricture of vagina information and iris information;
After M, modification are finished, identity modified module can be by amended identity information, and being sent in cloud server is carried out Storage.
The identity card relevant information be identity card on record name, sex, nationality, the date of birth, address, photo, Citizenship number, issuing authority and expiry date.
The short time is not more than 3 hours.
The exchange number includes QQ accounts, microblog account and Facebook accounts.
A kind of RIM identity management systems, including cloud server, storage module, identity card identification typing module, 3D live bodies Fingerprint recognition typing module, iris identification typing module, bank card identification typing module, auxiliary typing module and identity modification Module;
Identity card identification typing module:For the typing of the identification card number to Identity Management personnel, identification and of short duration storage Deposit, relevant information on the identity card of Identity Management personnel can also be called in;
3D living body finger prints recognize typing module:For the typing to Identity Management personnel's fingerprint, identification and of short duration storage;
Iris identification typing module:For the typing to Identity Management personnel's iris, identification and of short duration storage;
Bank card recognizes typing module:For to Identity Management personnel's bank card typing, identification and of short duration storage;
Auxiliary typing module:For to Identity Management personnel's phone number, exchange number, license plate number and existing residence record Enter and of short duration storage;
Storage module:For being preserved to above- mentioned information for a long time;
Cloud server:For receiving information that storage module sends and storing, can also realize that cloud is shared;
Identity modified module:For modification of the Identity Management personnel to its own partial information, and protect with cloud server Hold interaction.
The identity card identification typing module, 3D living body finger prints identification typing module, iris identification typing module, bank card Working range between identification typing module and auxiliary typing module is separate.
The identity card identification typing module, 3D living body finger prints identification typing module, iris identification typing module, bank card Pass through signal transmission between identification typing module and auxiliary typing module and storage module.
The storage module passes through signal transmission with cloud server.
By described above, it can be appreciated that after a huge network of personal connections is set up, RIM cloud servers are The benchmark of user biological identification feature is generated according to the biometric feature that user commonly uses, Banking sector can be tested by identity Card adds RIM plans, downloads reference characteristic to oneself department, by fingerprint characteristic, face characteristic, rainbow from RIM cloud servers Film feature is all loaded, and is arranged fingerprint input device, recognition of face device and iris identification device and tested as transacting business personnel selection The approach of card identity, as user because cause specific can not select one as having multiple choices during checking, by letter Breath processing module comes whether the reference characteristic of identification information load-on module download is matched with RIM user biologicals feature, as RIM user Biological characteristic and reference characteristic to match when, can normal transacting business, when biological characteristic is mismatched with reference characteristic, you can demonstrate,prove It is bright come transacting business personnel be not me, not transacting business.The list when present invention solves people's transacting business at this stage " I is me " this problem is passed judgment on by an identity card, will not be smudgy because of identity card or be gone out the problems such as by chance expiring Now cannot transacting business phenomenon, effectively can evade reference characteristic data it is untrue, it is difficult supervision etc. some row problems, significantly The safety that bio-identification verifies true identity is improved, the property and every rights and interests of client is preferably ensured;More can it is easy, have Effect solves to prove phenomenons such as " I is myself " " I also live ".
The above, is only presently preferred embodiments of the present invention, is not the restriction for making other forms to the present invention, is appointed What those skilled in the art possibly also with the disclosure above technology contents changed or be modified as equivalent variations etc. Effect embodiment is applied to other fields, but every without departing from technical solution of the present invention content, according to the technical spirit of the present invention Any simple modification, equivalent variations and the remodeling made to above example, still falls within the protection domain of technical solution of the present invention.

Claims (7)

1. a kind of RIM clouds data verification identity process, is applied to cloud data verification identification system, it is characterised in that the RIM clouds Data verification identification system is that, based on the data compilation carried out on RIM identity management systems, methods described specifically includes following step Suddenly:
1) gather information, finds the characteristic of personal institute's typing in RIM identity management system types of applications first;
2) information is uploaded, all characteristics collected is uploaded to into RIM cloud servers;
3) information processing, RIM cloud servers will carry out big data analysis to the characteristic for uploading, and filter out the RIM and use Reference characteristic of the biometric feature that family personnel use always as the biometric feature of the RIM user;
4) download information, in life, we need the office unit for contacting download the reference characteristic of RIM user to each place In corresponding equipment;
5) information is compared, and when RIM user is when the business of correlation is handled, department of relevant unit can be contrasted according to reference characteristic Whether the biological characteristic of RIM user matches;
6) business handling, when RIM user biological characteristic and reference characteristic to match when, can normal transacting business, biological characteristic When mismatching with reference characteristic, it is impossible to handle related service.
2. a kind of RIM clouds data verification identity process according to claim 1, it is characterised in that:The RIM Identity Managements In system types of applications, the characteristic of institute's typing includes going home opening the door, work attendance of going to work, handles permit business, handles bank settlement industry Business, one or more accessed in the biometric feature data that client or friend use.
3. a kind of RIM clouds data verification identity process according to claim 1 and 2, it is characterised in that:The bio-identification Feature includes one or more in iris, face, fingerprint.
4. a kind of RIM clouds data verification identity process according to claim 1 and 2, it is characterised in that:In the life I Need contact office unit include housekeeping department, bank counter, vehicle administration office, the RIM user handles related service to be included House property business, banking and CAR SERVICE.
5. a kind of RIM clouds data verification identification system, it is characterised in that including RIM cloud servers, information acquisition module, letter Breath load-on module, message processing module;
Information acquisition module:For collect personal institute's typing in RIM identity management system types of applications characteristic and Reach RIM cloud servers;
RIM cloud servers:For all information collected by receive information acquisition module and it is acted upon, to the spy for uploading Levying data carries out big data analysis, filters out biometric feature that the RIM user personnel use always as the RIM user's The reference characteristic of biometric feature, and preserved realize cloud share;
Signal load unit:For downloading the reference characteristic in RIM cloud servers;
Message processing module:Whether the reference characteristic downloaded for identification information load-on module is matched with RIM user biologicals feature.
6. a kind of RIM clouds data verification identification system according to claim 5, it is characterised in that:Described information RIM high in the clouds Pass through signal transmission between server, acquisition module, signal load unit and message processing module.
7. a kind of RIM clouds data verification identification system according to claim 5, it is characterised in that:Described information gathers mould Block includes fingerprint input device, recognition of face device and iris identification device.
CN201611260592.6A 2016-12-30 2016-12-30 RIM cloud data identity verification system and method Pending CN106603562A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611260592.6A CN106603562A (en) 2016-12-30 2016-12-30 RIM cloud data identity verification system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611260592.6A CN106603562A (en) 2016-12-30 2016-12-30 RIM cloud data identity verification system and method

Publications (1)

Publication Number Publication Date
CN106603562A true CN106603562A (en) 2017-04-26

Family

ID=58581726

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611260592.6A Pending CN106603562A (en) 2016-12-30 2016-12-30 RIM cloud data identity verification system and method

Country Status (1)

Country Link
CN (1) CN106603562A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108932773A (en) * 2018-06-15 2018-12-04 王若清 A kind of intelligent unlocking system and method
CN109617984A (en) * 2018-12-26 2019-04-12 安徽大尺度网络传媒有限公司 A kind of data storage cloud online management system
CN109978316A (en) * 2018-08-21 2019-07-05 国网天津市电力公司 A kind of enterprise IT data resource configuration management system
CN110415805A (en) * 2019-08-15 2019-11-05 成都市佳颖医用制品有限公司 One kind adopting slurry total management system and management method
CN112733110A (en) * 2020-11-23 2021-04-30 融钰四海(武汉)信息科技有限公司 Enterprise client resource intelligent screening processing service platform

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201904809U (en) * 2010-12-20 2011-07-20 惠州紫旭科技有限公司 Data service system based on cloud computing
CN102568125A (en) * 2010-12-31 2012-07-11 鸿富锦精密工业(深圳)有限公司 System and method for performing credit card consumption through fingerprint identification
CN103107886A (en) * 2013-01-17 2013-05-15 深圳市元征科技股份有限公司 Identification recognition system and method
CN104112116A (en) * 2011-06-30 2014-10-22 深圳市君盛惠创科技有限公司 Cloud server
US20150047005A1 (en) * 2011-06-30 2015-02-12 Shenzhen Junshenghuichuang Technologies Co.,Ltd Method for Authenticating Identity of Handset User
CN104392221A (en) * 2014-11-28 2015-03-04 曾嵘 Multi-element identity recognition system and multidimensional multi-element identity recognition method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201904809U (en) * 2010-12-20 2011-07-20 惠州紫旭科技有限公司 Data service system based on cloud computing
CN102568125A (en) * 2010-12-31 2012-07-11 鸿富锦精密工业(深圳)有限公司 System and method for performing credit card consumption through fingerprint identification
CN104112116A (en) * 2011-06-30 2014-10-22 深圳市君盛惠创科技有限公司 Cloud server
US20150047005A1 (en) * 2011-06-30 2015-02-12 Shenzhen Junshenghuichuang Technologies Co.,Ltd Method for Authenticating Identity of Handset User
CN103107886A (en) * 2013-01-17 2013-05-15 深圳市元征科技股份有限公司 Identification recognition system and method
CN104392221A (en) * 2014-11-28 2015-03-04 曾嵘 Multi-element identity recognition system and multidimensional multi-element identity recognition method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108932773A (en) * 2018-06-15 2018-12-04 王若清 A kind of intelligent unlocking system and method
CN109978316A (en) * 2018-08-21 2019-07-05 国网天津市电力公司 A kind of enterprise IT data resource configuration management system
CN109617984A (en) * 2018-12-26 2019-04-12 安徽大尺度网络传媒有限公司 A kind of data storage cloud online management system
CN110415805A (en) * 2019-08-15 2019-11-05 成都市佳颖医用制品有限公司 One kind adopting slurry total management system and management method
CN112733110A (en) * 2020-11-23 2021-04-30 融钰四海(武汉)信息科技有限公司 Enterprise client resource intelligent screening processing service platform

Similar Documents

Publication Publication Date Title
US11416602B2 (en) Methods and systems for identity creation, verification and management
CN106603562A (en) RIM cloud data identity verification system and method
EP3596613B1 (en) Methods and devices for acquiring and recording tracking information on blockchain
EP3257222B1 (en) Authentication of web content
CN104240342B (en) Access control method and device based on identity authentication
US7805415B1 (en) Systems and methods for sharing data between entities
CN110223068A (en) A kind of electronic evidence based on block chain intelligence contract deposits card method
CN108140152A (en) Computer implemented tracking mechanism and data management
CN103957217A (en) Internet-electronic-business-transaction-oriented method and system
CA3073714A1 (en) Method and system for identifying potential fraud activity in a tax return preparation system to trigger an identity verification challenge through the tax return preparation system
CN104704521B (en) Multifactor profile and security fingerprint analysis
CN108768968A (en) A kind of method and system that service request is handled based on data safety management engine
De et al. A refinement approach for the reuse of privacy risk analysis results
CN101702168A (en) Method for inquiring information based on key information of the second generation identity card
CN106845178A (en) A kind of RIM identity management systems and method
Perlman et al. Focus note: the use of eKYC for customer identity and verification and AML
CN108183906B (en) Time bank management method, server, terminal, storage medium and electronic device
CN111079111A (en) Computer network identity verification system
Makulilo et al. Data protection in Kenya
Ismailov Organizational And Legal Aspects Of Digital Technologies In Counteracting Corruption
Stines Blockchain 101: A Laweyr's (Brief) Guide
Gazizov et al. Methods and Means of Information Countermeasures to Threats of Information Security Breaches in an Open Computer Network of an Online Store
JP2023554555A (en) Network identity
Newell et al. Regulating the US Consumer Data Market: Comparing the Material Scope of US Consumer Data Privacy Laws and the GDPR
CN116074101A (en) Method for realizing service account authentication based on FIDO

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Fang Yanchun

Inventor after: Fang Zheng

Inventor before: Fang Yanchun

CB03 Change of inventor or designer information
RJ01 Rejection of invention patent application after publication

Application publication date: 20170426

RJ01 Rejection of invention patent application after publication