CN107294965A - A kind of business management big data method for authenticating and system - Google Patents
A kind of business management big data method for authenticating and system Download PDFInfo
- Publication number
- CN107294965A CN107294965A CN201710473230.3A CN201710473230A CN107294965A CN 107294965 A CN107294965 A CN 107294965A CN 201710473230 A CN201710473230 A CN 201710473230A CN 107294965 A CN107294965 A CN 107294965A
- Authority
- CN
- China
- Prior art keywords
- data
- business management
- big data
- mobile terminal
- grade
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A kind of business management big data method for authenticating, it comprises the following steps:S1, configuration business management big data correspondence mobile terminal data sampling and processing Permission Levels;S2, the unique identifier that business management is corresponded into mobile terminal with big data are sent to server after being encrypted;S3, server recognize identification table of the business management with the data sampling and processing Permission Levels of big data correspondence mobile terminal according to the unique identifier generation of mobile terminal in data sampling and processing Permission Levels in step S1 and step S2 according to the unique identifier of mobile terminal;The business management big data that S4, reception business management are sent with big data correspondence mobile terminal, is identified to data acquisition, processing authority grade by identification table, step S5 is jumped to when being identified by;Jump to step S6.
Description
Technical field
The present invention relates to business management big data technical field, more particularly to a kind of business management big data method for authenticating
And system.
Background technology
For " big data "(Big data)Research institution Gartner gives such definition." big data " is desirable
New tupe could have stronger decision edge, see clearly discovery power and process optimization ability adapt to magnanimity, high growth rate and
Diversified information assets.
Mai Kenxi studies in the whole world given a definition that:A kind of scale arrives greatly big in terms of acquisition, storage, management, analysis
The big data acquisition system beyond traditional database software means capability scope, the data scale with magnanimity, quick data flow
Turn, various data type and the big feature of value density low four.
The strategic importance of big data technology, which is not lain in, grasps huge data message, and is to enter these containing significant data
Row specialized process.In other words, if big data is compared to a kind of industry, then this industry realizes the key of profit,
In improving " working ability " to data, " increment " of data is realized by " processing ".
Technically, the relation of big data and cloud computing is inseparable just as the positive and negative of one piece of coin.Big data must
It can not so be handled with the computer of separate unit, it is necessary to use distributed structure/architecture.Its characteristic is to divide mass data
Cloth data mining.But it must rely on distributed treatment, distributed data base and the cloud storage of cloud computing, virtualization technology.
With the arriving of cloud era, big data(Big data)Also increasing concern has been attracted.Analyst team is recognized
For big data(Big data)A large amount of unstructured datas and semi-structured data commonly used to describe company's creation,
These data are downloading to meeting overspending time and money when relevant database is used to analyze.Big data analyzes normal and cloud meter
It is linked together, because large data set analysis needs the framework as MapReduce to come to tens of, Shuo Baihuo in real time
Even thousands of computers shares out the work.
Big data needs special technology, effectively to handle the data in the substantial amounts of tolerance elapsed time.Suitable for big
The technology of data, including MPP(MPP)Database, data mining, distributed file system, distributed data
Storehouse, cloud computing platform, internet and expansible storage system
Lack a kind of method and technology authenticated to business management with big data in the prior art.
The content of the invention
In view of this, the present invention proposes that one kind can be realized to business management big data method for authenticating and system.
A kind of business management big data method for authenticating, it comprises the following steps:
S1, configuration business management big data correspondence mobile terminal data sampling and processing Permission Levels;
S2, the unique identifier that business management is corresponded into mobile terminal with big data are sent to server after being encrypted;
S3, server are according to the unique identification of mobile terminal in data sampling and processing Permission Levels in step S1 and step S2
Code generation recognizes data sampling and processing of the business management with big data correspondence mobile terminal according to the unique identifier of mobile terminal
The identification table of Permission Levels;
The business management big data that S4, reception business management are sent with big data correspondence mobile terminal, by recognizing table logarithm
It is identified according to collection, processing authority grade, step S5 is jumped to when being identified by;Jump to step S6;
S5, according to default big data resolution rules business management is parsed with big data, and preserve analysis result;Terminate
Flow;
S6, the data of reception are divided into invalid data, and record the correspondence business management of transmission business management big data with big
The corresponding unique identifier of data correspondence mobile terminal, transmission time information.
In business management of the present invention with big data method for authenticating,
The step S1 includes:
Obtain business management big data correspondence mobile terminal corresponding types;Business management big data correspondence mobile terminal
Corresponding types include gathered data type, data-privacy grade, data value grade;
Configure data processing authority grade of the business management with big data correspondence mobile terminal;The processing authority grade is included just
Step processing, general processing and three ranks of specially treated;The processing authority grade and data type, data-privacy grade,
Data value grade has corresponding relation.
In business management of the present invention with big data method for authenticating,
The step S2 includes:
It is used for the key pair encrypted, decrypted between configuration business management big data correspondence mobile terminal and server;By commercial affairs
The public key of management big data correspondence mobile terminal is handled by SHA256 Hash obtains primary treatment value, then to primary treatment value
Handled by message digest algorithm RIPEMD160 Hash, obtain the Hash result value of multiple bytes, Hash result value is passed through
BASE58CHECK codings obtain readable character and ploughed location;Location is ploughed to the correspondence shifting of business management big data using readable character
The unique identifier of dynamic terminal is sent to server after being encrypted;By for the key encrypting, decrypt to corresponding private key from
Line, which updates, arrives server.
The present invention also provides a kind of business management big data right discriminating system, and it includes such as lower unit:
Authority configuration unit, the data sampling and processing Permission Levels for configuring business management big data correspondence mobile terminal;
Identification code transmitting element, for being sent out after business management is encrypted with the unique identifier of big data correspondence mobile terminal
It is sent to server;
Recognize table dispensing unit, for by server according to data sampling and processing Permission Levels in authority configuration unit and
The unique identifier generation of mobile terminal recognizes business management according to the unique identifier of mobile terminal in identification code transmitting element
With the identification table of the data sampling and processing Permission Levels of big data correspondence mobile terminal;
Data identification unit, for receiving the business management big data that business management big data correspondence mobile terminal is sent,
Data acquisition, processing authority grade are identified by identification table, data resolution unit is jumped to when being identified by;Redirect
To data record unit;
Data resolution unit, for being parsed according to default big data resolution rules to business management with big data, and is protected
Deposit analysis result;Terminate flow;
Data record unit, for the data of reception to be divided into invalid data, and records transmission business management big data pair
Answer the corresponding unique identifier of business management big data correspondence mobile terminal, transmission time information.
In business management of the present invention with big data right discriminating system,
The authority configuration unit includes:
Obtain business management big data correspondence mobile terminal corresponding types;Business management big data correspondence mobile terminal
Corresponding types include gathered data type, data-privacy grade, data value grade;
Configure data processing authority grade of the business management with big data correspondence mobile terminal;The processing authority grade is included just
Step processing, general processing and three ranks of specially treated;The processing authority grade and data type, data-privacy grade,
Data value grade has corresponding relation.
In business management of the present invention with big data right discriminating system,
The identification code transmitting element includes:
It is used for the key pair encrypted, decrypted between configuration business management big data correspondence mobile terminal and server;By commercial affairs
The public key of management big data correspondence mobile terminal is handled by SHA256 Hash obtains primary treatment value, then to primary treatment value
Handled by message digest algorithm RIPEMD160 Hash, obtain the Hash result value of multiple bytes, Hash result value is passed through
BASE58CHECK codings obtain readable character and ploughed location;Location is ploughed to the correspondence shifting of business management big data using readable character
The unique identifier of dynamic terminal is sent to server after being encrypted;By for the key encrypting, decrypt to corresponding private key from
Line, which updates, arrives server.
The business management that the present invention is provided big data method for authenticating and system, relative to prior art, can be realized pair
The business management big data that business management is sent with big data correspondence mobile terminal, by recognizing table to data sampling and processing
Permission Levels are identified.
Brief description of the drawings
Fig. 1 is the business management big data right discriminating system structured flowchart of the embodiment of the present invention.
Embodiment
A kind of business management big data method for authenticating of the embodiment of the present invention, it comprises the following steps:
S1, configuration business management big data correspondence mobile terminal data sampling and processing Permission Levels;
S2, the unique identifier that business management is corresponded into mobile terminal with big data are sent to server after being encrypted;
S3, server are according to the unique identification of mobile terminal in data sampling and processing Permission Levels in step S1 and step S2
Code generation recognizes data sampling and processing of the business management with big data correspondence mobile terminal according to the unique identifier of mobile terminal
The identification table of Permission Levels;
The business management big data that S4, reception business management are sent with big data correspondence mobile terminal, by recognizing table logarithm
It is identified according to collection, processing authority grade, step S5 is jumped to when being identified by;Jump to step S6;
S5, according to default big data resolution rules business management is parsed with big data, and preserve analysis result;Terminate
Flow;
S6, the data of reception are divided into invalid data, and record the correspondence business management of transmission business management big data with big
The corresponding unique identifier of data correspondence mobile terminal, transmission time information.
In business management of the present invention with big data method for authenticating,
The step S1 includes:
Obtain business management big data correspondence mobile terminal corresponding types;Business management big data correspondence mobile terminal
Corresponding types include gathered data type, data-privacy grade, data value grade;
Configure data processing authority grade of the business management with big data correspondence mobile terminal;The processing authority grade is included just
Step processing, general processing and three ranks of specially treated;The processing authority grade and data type, data-privacy grade,
Data value grade has corresponding relation.
In business management of the present invention with big data method for authenticating,
The step S2 includes:
It is used for the key pair encrypted, decrypted between configuration business management big data correspondence mobile terminal and server;By commercial affairs
The public key of management big data correspondence mobile terminal is handled by SHA256 Hash obtains primary treatment value, then to primary treatment value
Handled by message digest algorithm RIPEMD160 Hash, obtain the Hash result value of multiple bytes, Hash result value is passed through
BASE58CHECK codings obtain readable character and ploughed location;Location is ploughed to the correspondence shifting of business management big data using readable character
The unique identifier of dynamic terminal is sent to server after being encrypted;By for the key encrypting, decrypt to corresponding private key from
Line, which updates, arrives server.
As shown in figure 1, the present invention also provides a kind of business management big data right discriminating system, it includes such as lower unit:
Authority configuration unit, the data sampling and processing Permission Levels for configuring business management big data correspondence mobile terminal;
Identification code transmitting element, for being sent out after business management is encrypted with the unique identifier of big data correspondence mobile terminal
It is sent to server;
Recognize table dispensing unit, for by server according to data sampling and processing Permission Levels in authority configuration unit and
The unique identifier generation of mobile terminal recognizes business management according to the unique identifier of mobile terminal in identification code transmitting element
With the identification table of the data sampling and processing Permission Levels of big data correspondence mobile terminal;
Data identification unit, for receiving the business management big data that business management big data correspondence mobile terminal is sent,
Data acquisition, processing authority grade are identified by identification table, data resolution unit is jumped to when being identified by;Redirect
To data record unit;
Data resolution unit, for being parsed according to default big data resolution rules to business management with big data, and is protected
Deposit analysis result;Terminate flow;
Data record unit, for the data of reception to be divided into invalid data, and records transmission business management big data pair
Answer the corresponding unique identifier of business management big data correspondence mobile terminal, transmission time information.
In business management of the present invention with big data right discriminating system,
The authority configuration unit includes:
Obtain business management big data correspondence mobile terminal corresponding types;Business management big data correspondence mobile terminal
Corresponding types include gathered data type, data-privacy grade, data value grade;
Configure data processing authority grade of the business management with big data correspondence mobile terminal;The processing authority grade is included just
Step processing, general processing and three ranks of specially treated;The processing authority grade and data type, data-privacy grade,
Data value grade has corresponding relation.
In business management of the present invention with big data right discriminating system,
The identification code transmitting element includes:
It is used for the key pair encrypted, decrypted between configuration business management big data correspondence mobile terminal and server;By commercial affairs
The public key of management big data correspondence mobile terminal is handled by SHA256 Hash obtains primary treatment value, then to primary treatment value
Handled by message digest algorithm RIPEMD160 Hash, obtain the Hash result value of multiple bytes, Hash result value is passed through
BASE58CHECK codings obtain readable character and ploughed location;Location is ploughed to the correspondence shifting of business management big data using readable character
The unique identifier of dynamic terminal is sent to server after being encrypted;By for the key encrypting, decrypt to corresponding private key from
Line, which updates, arrives server.
The business management that the present invention is provided big data method for authenticating and system, relative to prior art, can be realized pair
The business management big data that business management is sent with big data correspondence mobile terminal, by recognizing table to data sampling and processing
Permission Levels are identified.
Hardware, computing device can be directly used with reference to the method or algorithm that the embodiments described herein is described
Software module, or the two combination are implemented.Software module can be placed in random access memory, internal memory, read-only storage, electricity can
Well known in programming ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
In the storage medium of any other forms.
It is understood that for the person of ordinary skill of the art, can be done with technique according to the invention design
Go out other various corresponding changes and deformation, and all these changes and deformation should all belong to the protection model of the claims in the present invention
Enclose.
Claims (6)
1. a kind of business management big data method for authenticating, it is characterised in that it comprises the following steps:
S1, configuration business management big data correspondence mobile terminal data sampling and processing Permission Levels;
S2, the unique identifier that business management is corresponded into mobile terminal with big data are sent to server after being encrypted;
S3, server are according to the unique identification of mobile terminal in data sampling and processing Permission Levels in step S1 and step S2
Code generation recognizes data sampling and processing of the business management with big data correspondence mobile terminal according to the unique identifier of mobile terminal
The identification table of Permission Levels;
The business management big data that S4, reception business management are sent with big data correspondence mobile terminal, by recognizing table logarithm
It is identified according to collection, processing authority grade, step S5 is jumped to when being identified by;Jump to step S6;
S5, according to default big data resolution rules business management is parsed with big data, and preserve analysis result;Terminate
Flow;
S6, the data of reception are divided into invalid data, and record the correspondence business management of transmission business management big data with big
The corresponding unique identifier of data correspondence mobile terminal, transmission time information.
2. business management as claimed in claim 1 big data method for authenticating, it is characterised in that
The step S1 includes:
Obtain business management big data correspondence mobile terminal corresponding types;Business management big data correspondence mobile terminal
Corresponding types include gathered data type, data-privacy grade, data value grade;
Configure data processing authority grade of the business management with big data correspondence mobile terminal;The processing authority grade is included just
Step processing, general processing and three ranks of specially treated;The processing authority grade and data type, data-privacy grade,
Data value grade has corresponding relation.
3. business management as claimed in claim 2 big data method for authenticating, it is characterised in that
The step S2 includes:
It is used for the key pair encrypted, decrypted between configuration business management big data correspondence mobile terminal and server;By commercial affairs
The public key of management big data correspondence mobile terminal is handled by SHA256 Hash obtains primary treatment value, then to primary treatment value
Handled by message digest algorithm RIPEMD160 Hash, obtain the Hash result value of multiple bytes, Hash result value is passed through
BASE58CHECK codings obtain readable character and ploughed location;Location is ploughed to the correspondence shifting of business management big data using readable character
The unique identifier of dynamic terminal is sent to server after being encrypted;By for the key encrypting, decrypt to corresponding private key from
Line, which updates, arrives server.
4. a kind of business management big data right discriminating system, it is characterised in that it includes such as lower unit:
Authority configuration unit, the data sampling and processing Permission Levels for configuring business management big data correspondence mobile terminal;
Identification code transmitting element, for being sent out after business management is encrypted with the unique identifier of big data correspondence mobile terminal
It is sent to server;
Recognize table dispensing unit, for by server according to data sampling and processing Permission Levels in authority configuration unit and
The unique identifier generation of mobile terminal recognizes business management according to the unique identifier of mobile terminal in identification code transmitting element
With the identification table of the data sampling and processing Permission Levels of big data correspondence mobile terminal;
Data identification unit, for receiving the business management big data that business management big data correspondence mobile terminal is sent,
Data acquisition, processing authority grade are identified by identification table, data resolution unit is jumped to when being identified by;Redirect
To data record unit;
Data resolution unit, for being parsed according to default big data resolution rules to business management with big data, and is protected
Deposit analysis result;Terminate flow;
Data record unit, for the data of reception to be divided into invalid data, and records transmission business management big data pair
Answer the corresponding unique identifier of business management big data correspondence mobile terminal, transmission time information.
5. business management as claimed in claim 4 big data right discriminating system, it is characterised in that
The authority configuration unit includes:
Obtain business management big data correspondence mobile terminal corresponding types;Business management big data correspondence mobile terminal
Corresponding types include gathered data type, data-privacy grade, data value grade;
Configure data processing authority grade of the business management with big data correspondence mobile terminal;The processing authority grade is included just
Step processing, general processing and three ranks of specially treated;The processing authority grade and data type, data-privacy grade,
Data value grade has corresponding relation.
6. business management as claimed in claim 5 big data right discriminating system, it is characterised in that
The identification code transmitting element includes:
It is used for the key pair encrypted, decrypted between configuration business management big data correspondence mobile terminal and server;By commercial affairs
The public key of management big data correspondence mobile terminal is handled by SHA256 Hash obtains primary treatment value, then to primary treatment value
Handled by message digest algorithm RIPEMD160 Hash, obtain the Hash result value of multiple bytes, Hash result value is passed through
BASE58CHECK codings obtain readable character and ploughed location;Location is ploughed to the correspondence shifting of business management big data using readable character
The unique identifier of dynamic terminal is sent to server after being encrypted;By for the key encrypting, decrypt to corresponding private key from
Line, which updates, arrives server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710473230.3A CN107294965A (en) | 2017-06-21 | 2017-06-21 | A kind of business management big data method for authenticating and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710473230.3A CN107294965A (en) | 2017-06-21 | 2017-06-21 | A kind of business management big data method for authenticating and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107294965A true CN107294965A (en) | 2017-10-24 |
Family
ID=60097385
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710473230.3A Pending CN107294965A (en) | 2017-06-21 | 2017-06-21 | A kind of business management big data method for authenticating and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107294965A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114978649A (en) * | 2022-05-16 | 2022-08-30 | 遥相科技发展(北京)有限公司 | Information security protection method, device, equipment and medium based on big data |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105681295A (en) * | 2016-01-11 | 2016-06-15 | 清华大学 | Associated big data sharing method and device |
CN106230865A (en) * | 2016-09-29 | 2016-12-14 | 郑州云海信息技术有限公司 | A kind of secure access monitoring method, system and big data platform |
-
2017
- 2017-06-21 CN CN201710473230.3A patent/CN107294965A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105681295A (en) * | 2016-01-11 | 2016-06-15 | 清华大学 | Associated big data sharing method and device |
CN106230865A (en) * | 2016-09-29 | 2016-12-14 | 郑州云海信息技术有限公司 | A kind of secure access monitoring method, system and big data platform |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114978649A (en) * | 2022-05-16 | 2022-08-30 | 遥相科技发展(北京)有限公司 | Information security protection method, device, equipment and medium based on big data |
CN114978649B (en) * | 2022-05-16 | 2023-12-08 | 广州市巨应信息科技有限公司 | Information security protection method, device, equipment and medium based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10762241B1 (en) | Third-party platform for tokenization and detokenization of network packet data | |
Li et al. | RETRACTED ARTICLE: Information security model of block chain based on intrusion sensing in the IoT environment | |
US8955143B1 (en) | Use of decoy data in a data store | |
US9990507B2 (en) | Adapting decoy data present in a network | |
Premarathne et al. | Hybrid cryptographic access control for cloud-based EHR systems | |
US8997248B1 (en) | Securing data | |
CN106503574A (en) | Block chain safe storage method | |
CN105471826A (en) | Ciphertext data query method, device and ciphertext query server | |
CN107360156A (en) | P2P network method for cloud storage based on block chain under a kind of big data environment | |
US9118633B2 (en) | Topic protection policy for publish-subscribe messaging system | |
US9509689B1 (en) | Security for cloud systems and virtualization cloud systems, mobile cloud systems and mobile virtualization cloud systems, and computer clusters and mobile device clusters | |
CN105825094A (en) | Method and apparatus for managing identity data collected from network data flows | |
Yadav et al. | Big data hadoop: Security and privacy | |
Qiu | Ciphertext database audit technology under searchable encryption algorithm and blockchain technology | |
Zhao | Graph-based forensic investigation of bitcoin transactions | |
Kumar et al. | Investigation on privacy preserving using K-anonymity techniques | |
CN107124265A (en) | A kind of identity identifying method based on Hash hash tables | |
CN106991332A (en) | The method and device that a kind of mass data is stored safely | |
CN107733936B (en) | Encryption method for mobile data | |
CN107229743A (en) | A kind of business management big data classified use method and system | |
CN113239401A (en) | Big data analysis system and method based on power Internet of things and computer storage medium | |
Lv et al. | A review of big data security and privacy protection technology | |
CN107294965A (en) | A kind of business management big data method for authenticating and system | |
Tian et al. | A trusted control model of cloud storage | |
CN108182368A (en) | A kind of business management big data classified use method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171024 |