CN106850190A - It is a kind of to the destroying method based on block chain digital certificate - Google Patents
It is a kind of to the destroying method based on block chain digital certificate Download PDFInfo
- Publication number
- CN106850190A CN106850190A CN201710077951.2A CN201710077951A CN106850190A CN 106850190 A CN106850190 A CN 106850190A CN 201710077951 A CN201710077951 A CN 201710077951A CN 106850190 A CN106850190 A CN 106850190A
- Authority
- CN
- China
- Prior art keywords
- block chain
- address
- public key
- assets
- digital certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Abstract
The invention discloses a kind of to the destroying method based on block chain digital certificate, comprise the following steps:(1)A constant numeral of 160bits is directly specified as the Hash result of the SHA256 and RIPEMD60 of public key;(2)The block chain address version number of one byte is connected to public key Hash head, SHA256 computings twice then are carried out to it, using 4 bytes before result as the check value of public key Hash, be connected to its afterbody;(3)The result that will be obtained is encoded using BASE58, has just obtained the destruction address of block chain assets;(4)Digital asset is transferred to the block chain assets for obtaining to destroy on address.The present invention solves freezing or disposal problems for the digital certificate/assets on block chain on the premise of existing block chain data structure and book keeping operation mode is not changed;Operating method is simple, computing reliability.
Description
Technical field
The present invention relates to block chain technology, and in particular to a kind of to the destroying method based on block chain digital certificate.
Background technology
Block chain technology, be it is a kind of by cryptography as ensure by data with the time be order be connected combination a kind of chain
Formula data structure.Associated by summary info between each block in block chain, each block head includes one
The summary info of individual block, it is ensured that all blocks for linking together can in order be arranged by summary info.Block chain
Concept this acute hearing in calling oneself first(Satoshi Nakamoto)Paper《Bit coin:A kind of point-to-point electronic cash system
(Bitcoin: A Peer-to-Peer Electronic Cash System)》Middle proposition, therefore bit coin can be regarded as
The digital cash that first utilization block chain technology is realized.Bit coin is the electronic cash of similar Email, and both parties need
" the bit coin wallet " of similar E-mail address and " the bit coin address " of similar Email addresses, with sending and receiving e-mail, converges
Other side is directly paid by beneficiary address by bit coin in money side by computer or smart mobile phone.
Public key and private key are the keys pair obtained by a kind of algorithm, and public key is part disclosed in cipher key pair, private
Key is then private part.The transaction payment of digital certificate or assets using the private key corresponding to its address, it is necessary to be signed
Name, in general private key is a number of 256bits, and having this string numeral just can be to the numeral money in corresponding wallet address
Product is operated, so must be kept securely.Private key can process generation public key by SECP256K1 algorithms, and
When known to public key but cannot backwards calculation go out private key, this be ensure digital asset safety algorithm basis.
The all book keeping operation of digital certificate based on the distribution of block chain is all based on the string number signature of cryptography:Each institute
The person of having signs a digital signature for random hash by the public key to preceding once book keeping operation and next bit owner, and this is signed
Name is attached to the end of current record, and such digital certificate is just shifted and gives the next bit private key owner.And recipient is by right
Signature is tested, it becomes possible to verify the owner of the assets.Its transaction verification is as shown in Figure 1.
Just because of being that recorded public key corresponding to private key to carry out Hash based on the digital certificate that block chain is issued or shifts
In the digital coding of hash, hereinafter referred to as voucher address.It is only corresponding by its when digital certificate is remembered in this address
Private key could be decrypted employs this part assets.And distribution digital certificate out or assets are in computer block chain network
It is physically present.For example after now largest block chain digital asset bit coin is extracted, it is similar on the earth
The same cannot being sent out of gold metal element arbitrarily destroyed.Actually bit coin is this kind of based on proof of work
(POW) decentralization distribution digital asset need not also should not be destroyed, but for issued by centralization numeral with
Card is a need for destroyed, thus there is freezing or disposal problems for the digital certificate/assets on block chain.
The content of the invention
In order to solve the weak point existing for above-mentioned technology, the invention provides one kind to based on block chain digital certificate
Destroying method.
In order to solve the above technical problems, the technical solution adopted by the present invention is:One kind is to based on block chain digital certificate
Destroying method, comprise the following steps:
(1)A constant numeral of 160bits is directly specified as the Hash result of the SHA256 and RIPEMD60 of public key;
(2)The address version number of one byte is connected to public key Hash head(Version number can select 0- by block chain formulation side
Any Digit between 255), SHA256 computings twice then are carried out to it, using verification of 4 bytes as public key Hash before result
Value, is connected to its afterbody;(3)By step(2)The result for obtaining is encoded using BASE58, has just obtained block chain assets
Destroy address;
(4)Digital asset is transferred to the block chain assets for obtaining to destroy on address, due to the address for consuming digital asset
Not with known private key, public-key cryptographic keys to deriving, because without private key, this part assets cannot be employed,
Equivalent to destroyed.
Step(1)The constant of use can be constituted by rule by 160 0,160 1 or by 0,1.
The present invention solves the number on block chain on the premise of existing block chain data structure and book keeping operation mode is not changed
Word voucher/assets are freezed or disposal problems;Operating method is simple, computing reliability, after assets are transferred into this without private key address,
Even if all supercomputers in the whole world being added up and being also required to tens thousand of years, nobody can be further continued for using.
Brief description of the drawings
The present invention is further detailed explanation with reference to the accompanying drawings and detailed description.
Fig. 1 is the flow chart based on block chain transaction verification.
Fig. 2 is implementing procedure figure of the invention.
Fig. 3 is the implementing procedure figure of prior art.
Specific embodiment
As shown in Fig. 2 the present invention is comprised the following steps:
(1)A constant of 160bits is directly specified as public key;Constant can have 160 0,160 1 or by 0,1 by rule
Rule composition.Four high of such as each byte be 1 low four for 0 20 numerals of byte:
1111000011110000111100001111000011110000111100001111000011110000111100001
11100001111000011110000111100001111000011110000111100001111000011110000111100
0011110000;
It is in turn then unworkable by public key Hash calculation public key due to the only unidirectional computing of SHA256 and RIPEMD160 algorithms
's;(2)The address version number of one byte is connected to public key Hash head(Version number can select 0- by block chain formulation side
Any Digit between 255), SHA256 computings twice then are carried out to it, using verification of 4 bytes as public key Hash before result
Value, is connected to its afterbody;(3)By step(2)The result for obtaining is encoded using BASE58, has just obtained block chain assets
Destroy address(An address without known private key and public key is calculated as shown in Figure 2, and this address institute correspondence that may be present is private
Key is the one of 2 160 powers point);
(4)Digital asset is transferred in the block chain asset addresses for obtaining(Destroy address), due to for consuming digital money
Not with known private key, public-key cryptographic keys to deriving, because without private key, this part assets is cannot be by for the address of product
Employ, equivalent to destroyed.
After this transaction address without private key is arrived in transaction in assets book keeping operation, because without private key, wanting to reuse or moving
Can not possibly occur with this side transaction.Even if wanting to calculate private key by Brute Force, wherein also need to by SHA256 and
RIPEMD160 Hash calculations twice.Therefore in the case where existing block chain data structure and book keeping operation mode is not changed, can be by
After assets are transferred to this without private key address, even if all supercomputers in the whole world are added up being also required to tens thousand of years, quilt
The assets voucher for being transferred to this address is equivalent to destroy, and nobody can be continuing with.
As shown in figure 1, the block chain that the present invention can be used with destroyed digital asset is one kind being made by cryptography
For ensure by data with the time be order be connected combination a kind of linked data structure.Pass through between each block in block chain
Summary info is associated, and each block head includes a summary info for block, it is ensured that what is linked together is all
Block can in order be arranged by summary info.All book keeping operation is all based on the string number signature of cryptography:Each institute
The person of having signs a digital signature for random hash by the public key to preceding once book keeping operation and next bit owner, and this is signed
Name is attached to the end of current record, and such digital certificate has been transmitted to the next bit owner, and recipient is by signature
Test, it becomes possible to verify the owner of the assets.
Additionally, digital certificate is based on cryptography asymmetric cryptosystem signature technology, by private/public key key to transaction data
The accounting records with signature are encrypted, assets digital certificate cannot rollback and revocation and deletion once distribution.Issued
Or the digital certificate of transfer is to recorded public key corresponding to private key to carry out in the digital coding of Hash hash, hereinafter referred to as voucher
Address.When digital certificate is remembered in this address, could only be decrypted by its corresponding private key and employ this part assets.
As shown in figure 3, in the block chain assets of routine, private key, public key, the triangular derivation in address and difference of the invention
It is that the present invention is directly to specify a constant as public key, and conventional promotes the step also to include:A, use randomizer
One number of 256bits of generation generates the process of public key by SECP256K1 algorithm process as private key, and b, private key.This
Invention is to skip foregoing step a, b, directly specifies the constant of a 160bits to calculate one without known private key and public key
Address, this address corresponding private key that may be present be 2 160 powers point one.Because asset acceptance address is by public key
Derive, and public key is derived by private key, public/private keys are that occur in pairs, can be derived by private key unique true
Fixed public key, but private key counter cannot be pushed away by public key.The signature that private key is carried out, is verified by public key;The encryption that public key is carried out, by
Private key is decrypted.Because the present invention is without private key, this part assets cannot be employed, equivalent to destroyed.
With the ECDSA elliptic curve SECP256K1 AESs that the conventional cipher key calculation of block chain book keeping operation is used, can use
It is individual about more than 2 160 powers in the asset addresses derived.The 70 powers grain of the upper sand about 2 of the earth, and the milky way galaxy
In star be probably 35 powers that 5000*1000000 is about no more than 2, by tellurian sand and the milky way galaxy
Star is multiplied, also just 2 105 powers.It can be said that the usable asset addresses of ECDSA elliptic curve encryption algorithms and universe
It is a magnitude.
Above-mentioned implementation method is not limitation of the present invention, and the present invention is also not limited to the example above, this technology neck
Change, remodeling, addition or replacement that the technical staff in domain is made in the range of technical scheme, also belong to this hair
Bright protection domain.
Claims (2)
1. a kind of to the destroying method based on block chain digital certificate, it is characterised in that:Comprise the following steps:
(1)A constant numeral of 160bits is directly specified as the Hash result of the SHA256 and RIPEMD60 of public key;
(2)The block chain address version number of one byte is connected to public key Hash head, SHA256 twice then is carried out to it
Computing, using 4 bytes before result as the check value of public key Hash, is connected to its afterbody;(3)By step(2)The result for obtaining
Encoded using BASE58, just obtained block chain assets and destroyed address;
(4)Digital asset is transferred to the block chain assets for obtaining to destroy on address, due to the address for consuming digital asset
Not with known private key, public-key cryptographic keys to deriving, because without private key, this part assets cannot be employed,
Equivalent to destroyed.
2. according to claim 1 to the destroying method based on block chain digital certificate, it is characterised in that:The step
(1)The constant of use is by 160 0,160 1 or by 0,1 numeral constituted by rule.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710077951.2A CN106850190A (en) | 2017-02-14 | 2017-02-14 | It is a kind of to the destroying method based on block chain digital certificate |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710077951.2A CN106850190A (en) | 2017-02-14 | 2017-02-14 | It is a kind of to the destroying method based on block chain digital certificate |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106850190A true CN106850190A (en) | 2017-06-13 |
Family
ID=59128771
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710077951.2A Pending CN106850190A (en) | 2017-02-14 | 2017-02-14 | It is a kind of to the destroying method based on block chain digital certificate |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106850190A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107194613A (en) * | 2017-06-20 | 2017-09-22 | 无锡井通网络科技有限公司 | Digital asset coding method |
CN107222312A (en) * | 2017-06-20 | 2017-09-29 | 无锡井通网络科技有限公司 | Assets digitizing solution based on block chain technology |
CN107633400A (en) * | 2017-08-09 | 2018-01-26 | 北京云知科技有限公司 | A kind of method of payment and device of the machine wallet based on block chain |
CN108876382A (en) * | 2018-08-09 | 2018-11-23 | 上海点融信息科技有限责任公司 | The method, apparatus and readable storage medium storing program for executing of digital certificate are handled on block chain |
CN109324997A (en) * | 2018-09-14 | 2019-02-12 | 佛山科学技术学院 | A kind of digital right guard method and device based on block chain |
CN109636602A (en) * | 2018-12-04 | 2019-04-16 | 武汉东湖大数据交易中心股份有限公司 | A kind of safety certification management system based on block chain big data |
TWI714100B (en) * | 2019-05-24 | 2020-12-21 | 魏文科 | Method for establishing and verifying input value by using asymmetric encryption algorithm and its application method |
CN112258192A (en) * | 2020-09-15 | 2021-01-22 | 山东鲁能软件技术有限公司 | Mail confirmation method and device based on block chain wallet address |
TWI732247B (en) * | 2019-07-16 | 2021-07-01 | 中華電信股份有限公司 | Method to display the validation of certificate at signing time |
CN113421094A (en) * | 2021-04-28 | 2021-09-21 | 中国电子科技网络信息安全有限公司 | Intelligent inseparable asset contract implementation method based on block chain |
CN114679261A (en) * | 2021-12-22 | 2022-06-28 | 北京邮电大学 | Chain anonymous communication method and system based on key derivation algorithm |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105719185A (en) * | 2016-01-22 | 2016-06-29 | 杭州复杂美科技有限公司 | Block chain data comparison and consensus method |
CN105959307A (en) * | 2016-06-30 | 2016-09-21 | 中国科学院计算技术研究所 | Existence certification and authentication service method and system based on block chain technology |
KR101680260B1 (en) * | 2015-12-14 | 2016-11-29 | 주식회사 코인플러그 | Certificate issuance system and method based on block chain |
-
2017
- 2017-02-14 CN CN201710077951.2A patent/CN106850190A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101680260B1 (en) * | 2015-12-14 | 2016-11-29 | 주식회사 코인플러그 | Certificate issuance system and method based on block chain |
CN105719185A (en) * | 2016-01-22 | 2016-06-29 | 杭州复杂美科技有限公司 | Block chain data comparison and consensus method |
CN105959307A (en) * | 2016-06-30 | 2016-09-21 | 中国科学院计算技术研究所 | Existence certification and authentication service method and system based on block chain technology |
Non-Patent Citations (1)
Title |
---|
西西: ""精通比特币 - 第4章 密钥、地址、钱包"", 《巴比特社区》 * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107222312A (en) * | 2017-06-20 | 2017-09-29 | 无锡井通网络科技有限公司 | Assets digitizing solution based on block chain technology |
CN107194613A (en) * | 2017-06-20 | 2017-09-22 | 无锡井通网络科技有限公司 | Digital asset coding method |
CN107633400A (en) * | 2017-08-09 | 2018-01-26 | 北京云知科技有限公司 | A kind of method of payment and device of the machine wallet based on block chain |
CN108876382A (en) * | 2018-08-09 | 2018-11-23 | 上海点融信息科技有限责任公司 | The method, apparatus and readable storage medium storing program for executing of digital certificate are handled on block chain |
CN109324997B (en) * | 2018-09-14 | 2022-05-10 | 佛山科学技术学院 | Block chain-based digital right protection method and device |
CN109324997A (en) * | 2018-09-14 | 2019-02-12 | 佛山科学技术学院 | A kind of digital right guard method and device based on block chain |
CN109636602A (en) * | 2018-12-04 | 2019-04-16 | 武汉东湖大数据交易中心股份有限公司 | A kind of safety certification management system based on block chain big data |
TWI714100B (en) * | 2019-05-24 | 2020-12-21 | 魏文科 | Method for establishing and verifying input value by using asymmetric encryption algorithm and its application method |
TWI732247B (en) * | 2019-07-16 | 2021-07-01 | 中華電信股份有限公司 | Method to display the validation of certificate at signing time |
CN112258192A (en) * | 2020-09-15 | 2021-01-22 | 山东鲁能软件技术有限公司 | Mail confirmation method and device based on block chain wallet address |
CN112258192B (en) * | 2020-09-15 | 2023-07-28 | 山东鲁能软件技术有限公司 | Mail confirmation method and device based on blockchain wallet address |
CN113421094A (en) * | 2021-04-28 | 2021-09-21 | 中国电子科技网络信息安全有限公司 | Intelligent inseparable asset contract implementation method based on block chain |
CN113421094B (en) * | 2021-04-28 | 2023-05-09 | 中国电子科技网络信息安全有限公司 | Block chain-based indivisible asset intelligent contract implementation method |
CN114679261A (en) * | 2021-12-22 | 2022-06-28 | 北京邮电大学 | Chain anonymous communication method and system based on key derivation algorithm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106850190A (en) | It is a kind of to the destroying method based on block chain digital certificate | |
US11356280B2 (en) | Personal device security using cryptocurrency wallets | |
US11936774B2 (en) | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys | |
CN106779636B (en) | Block chain digital currency wallet based on mobile phone earphone interface | |
WO2018168723A1 (en) | Technology for authenticating device on network | |
CN111476573B (en) | Account data processing method, device, equipment and storage medium | |
CN111125781B (en) | File signature method and device and file signature verification method and device | |
CN111147245A (en) | Algorithm for encrypting by using national password in block chain | |
CN109818741A (en) | A kind of decryption calculation method and device based on elliptic curve | |
CN107528689B (en) | Password modification method based on Ukey | |
CN107070896B (en) | Safe and efficient block chain network customized login method and safe reinforcement system | |
Vyakaranal et al. | Performance analysis of symmetric key cryptographic algorithms | |
CN113343255A (en) | Data interaction method based on privacy protection | |
CN111159774B (en) | Decentralized intelligent contract escrow wallet method and system | |
Manz | Digital Signature | |
Navale et al. | M-Banking Security-a futuristic improved security approach | |
CN112311534A (en) | Method for generating asymmetric algorithm key pair | |
CN110572256B (en) | Anti-quantum computing asymmetric key management method and system based on asymmetric key pool and implicit certificate | |
Li | The Advance of Ethereum Digital Signature | |
CN117221002A (en) | Target port determining method and device | |
CN116188009A (en) | National cipher soft encryption mode key acquisition method, system, terminal and readable storage medium | |
CN112258169A (en) | Parallel signature system and method based on key generation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170613 |