CN107483193A - A kind of encryption method, decryption method, encryption device and decryption device - Google Patents

A kind of encryption method, decryption method, encryption device and decryption device Download PDF

Info

Publication number
CN107483193A
CN107483193A CN201710767447.5A CN201710767447A CN107483193A CN 107483193 A CN107483193 A CN 107483193A CN 201710767447 A CN201710767447 A CN 201710767447A CN 107483193 A CN107483193 A CN 107483193A
Authority
CN
China
Prior art keywords
data
key
array
encryption
buf
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710767447.5A
Other languages
Chinese (zh)
Inventor
陈春风
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710767447.5A priority Critical patent/CN107483193A/en
Publication of CN107483193A publication Critical patent/CN107483193A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Abstract

The invention discloses a kind of encryption method, decryption method, encryption device and decryption device.It is related to information security field;Solve the problems, such as existing cipher mode can not take into account efficiency with it is safe.This method includes:Read key used during decryption;According to the key, data are encrypted, the data after being encrypted.Technical scheme provided by the invention is applied to data transmission security guarantee, realizes and cracks the higher data encryption of difficulty.

Description

A kind of encryption method, decryption method, encryption device and decryption device
Technical field
The present invention relates to information security technology, espespecially a kind of encryption method, decryption method, encryption device and decryption device.
Background technology
With the fast development of information-intensive society, increasing enterprise recognizes weight of the data safety for the development of enterprise The property wanted, and data encryption is the basis of data safety, is the foundation stone of modern business development.
As commercial competition is more and more fierce, the R&D cycle of enterprise is increasingly longer, Innovation Input more and more higher, subversiveness Innovate the appearance of situation being also increasingly difficult to, fighting secretly between each enterprise is also fierce all the more, steals, divulges a secret, hacker, cracking Means emerge in an endless stream, so we need that algorithm exploration is constantly encrypted, there is provided reliable Information Security guarantee.
There are the DEA of many comparative maturities, such as MD5, AES scheduling algorithm at present.As long as some algorithms are known Its corresponding AES of road, it is possible to crack encryption data easily;Also although some algorithms can be realized and data are added It is close, and crack that difficulty is very big, it is possible that causing the data of encryption can not normally decrypt.
The content of the invention
In order to solve the above-mentioned technical problem, the invention provides a kind of encryption method, decryption method, encryption device and decryption Device.Identical key is used during encrypting and decrypting, among key is incorporated into whole AES and decipherment algorithm, is improved The security of algorithm, solve the problems, such as existing cipher mode can not take into account efficiency with it is safe.
In order to reach the object of the invention, the invention provides a kind of encryption method, including:
Read key used during decryption;
According to the key, data are encrypted, the data after being encrypted.
Preferably, key used during the reading decryption is specially:
Key used during the decryption is read from special hardware storage device.
Preferably, it is encrypted according to the key, data, is included the step of data after being encrypted:
By the key and data with reference to ACCII code standard handovers, the key array and data array of char types are obtained;
Define one and the array of data length identical StringBuffer class string variables buf;
The length L of the key array is obtained, circulates the length of the array of data, by the t*L+ of the array of data I element and i-th of element of the key array are transformed into int types and then carry out addition, the numerical value that addition is obtained Change into the character string that initial character is comma, the character string after buf splicing conversions, until the length cycles to the array of data Finish;
Buf is changed into character string, the character string for converting to obtain using buf is used as the data after encryption.
Present invention also offers a kind of decryption method, including:
Read key used during encryption;
According to the key, the data of encryption are decrypted, the data after being decrypted.
Preferably, key used is specially when reading encryption:
Key used during the encryption is read from special hardware storage device.
Preferably, according to the key, the data of encryption are decrypted, included the step of data after being decrypted:
Key array by the key with reference to ACCII codes standard handovers into char types;
The data of the encryption are changed into the array of data of String types;
Define one and the array of data length identical StringBuffer class string variables buf;
The length L of the key array is obtained, circulates the array of data, by the t*L+i member of the array of data I-th of cycling of elements of plain and described key array is numerical value, then carries out additive operation, and the result of additive operation is changed into In string types deposit buf, until being finished to the length cycles of the array of data;
Buf is changed into character string, the character string obtained after being converted using buf is used as the data after decryption.
Present invention also offers a kind of encryption device, including:
Decruption key acquisition module, key used when being decrypted for reading;
Encrypting module, for being encrypted according to the key, data, the data after being encrypted.
Preferably, the encrypting module includes:
Date Conversion Unit, for reference to ACCII code standard handovers, the key and data to be obtained into the key of char types Array and array of data;
Variable-definition unit, for defining one and the array of data length identical StringBuffer class character strings Variable buf;
Cryptographic calculation unit, for obtaining the length L of the key array, the length of the array of data is circulated, by institute The t*L+i element of array of data is stated to be transformed into int types with i-th of element of the key array and then added Into the numerical value for obtaining addition changes into the character string that initial character is comma, the character string after buf splicing conversions, until to institute The length cycles for stating array of data finish;
Data conversion unit, for buf to be changed into character string, using the character string that buf converts to obtain as after encrypting Data.
Present invention also offers one kind to decrypt device, including:
Encryption key acquisition module, key used when being encrypted for reading;
Deciphering module, for according to the key, the data of encryption being decrypted, the data after being decrypted.
Preferably, the deciphering module includes:
Key converting unit, for the key array by the key with reference to ACCII codes standard handovers into char types;
Date Conversion Unit, for the data of the encryption to be changed into the array of data of String types;
Variable-definition unit, for defining one and the array of data length identical StringBuffer class character strings Variable buf;
Arithmetic element is decrypted, for obtaining the length L of the key array, the array of data is circulated, by the data T*L+i element of array and i-th of cycling of elements of the key array are numerical value, then carry out additive operation, by phase The result for subtracting computing is changed into string types deposit buf, until being finished to the length cycles of the array of data;
Data conversion unit, for buf to be changed into character string, the character string obtained after being converted using buf is used as decryption Data afterwards.
The invention provides a kind of encryption method, decryption method, encryption device and decryption device, in AES and decryption In algorithm, using same key, key is integrated in algorithm by whole process, is ensureing the unlikely too high influence efficiency of algorithm complex Under the premise of, ensure that the security of algorithm, solve the problems, such as existing cipher mode can not take into account efficiency with it is safe.Using close When key is encrypted or decrypted, conversion process is carried out to key by ASCII character, further improves the security of algorithm, increase Crack difficulty.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages can be by specification, rights Specifically noted structure is realized and obtained in claim and accompanying drawing.
Brief description of the drawings
Accompanying drawing is used for providing further understanding technical solution of the present invention, and a part for constitution instruction, with this The embodiment of application is used to explain technical scheme together, does not form the limitation to technical solution of the present invention.
Fig. 1 is a kind of schematic flow sheet for encryption method that embodiments of the invention one provide;
Fig. 2 is a kind of schematic flow sheet for decryption method that embodiments of the invention two provide;
Fig. 3 is a kind of structural representation for encryption device that embodiments of the invention three provide;
Fig. 4 is the structural representation of encrypting module 302 in Fig. 3;
Fig. 5 is a kind of structural representation for decryption device that embodiments of the invention three provide;
Fig. 6 is the structural representation of deciphering module 502 in Fig. 5.
Embodiment
For the object, technical solutions and advantages of the present invention are more clearly understood, below in conjunction with accompanying drawing to the present invention Embodiment be described in detail.It should be noted that in the case where not conflicting, in the embodiment and embodiment in the application Feature can mutually be combined.
Can be in the computer system of such as one group computer executable instructions the flow of accompanying drawing illustrates the step of Perform.Also, although logical order is shown in flow charts, in some cases, can be with suitable different from herein Sequence performs shown or described step.
There are the DEA of many comparative maturities, such as MD5, AES scheduling algorithm at present.As long as some algorithms are known Its corresponding AES of road, it is possible to crack encryption data easily;Also although some algorithms can be realized and data are added It is close, and crack that difficulty is very big, it is possible that causing the data of encryption can not normally decrypt.
In order to solve the above problems, the embodiment provides a kind of encryption method, decryption method, encryption device and Device is decrypted, same key is used in encryption and decryption.In encryption, using the key of personal settings, based on ACCII codes Standard, special conversion first is carried out to key and data, then carry out Data Synthesis, be also required to key, Ran Houjin when decryption Row encryption data is decrypted.When encryption key and inconsistent decruption key, data will not be decrypted normally, and this adds increased data Security, even if encryption data is stolen, no key does not parse data yet.
First with reference to accompanying drawing, embodiments of the invention one are illustrated.
The embodiments of the invention provide a kind of encryption method, and the flow of encryption is completed as shown in figure 1, bag using this method Include:
Step 101, read key used during decryption;
In the embodiment of the present invention, it is preferred that the key can be placed in such as USB-Key hardware storage devices.In this step When being read out, read from the hardware storage device.
In the embodiment of the present invention, encryption uses identical key with decrypting process.
Step 102, it is encrypted according to the key, data, the data after being encrypted;
In this step, ACCII code conversions first are carried out to key and data, then realize that data add using special addition algorithm Close, decrypting process first carries out ACCII code conversions to key, then carries out data deciphering using inverse operation corresponding to encryption.
This step specifically includes:
(1) key and data are obtained into the key array and data number of char types with reference to ACCII code standard handovers Group;
(2) one and the array of data length identical StringBuffer class string variables buf are defined;
(3) the length L of the key array is obtained, circulates the length of the array of data, by the of the array of data T*L+i element and i-th of element of the key array are transformed into int types and then carry out addition, and addition is obtained Numerical value changes into the character string that initial character is comma, the character string after buf splicing conversions, until the length to the array of data Circulation finishes;
(4) buf is changed into character string, the character string for converting to obtain using buf is used as the data after encryption.
Below in conjunction with the accompanying drawings, embodiments of the invention two are illustrated.
It is corresponding with the ciphering process in embodiments of the invention one the embodiments of the invention provide a kind of decryption method, Complete decryption computing to encryption data using identical key, idiographic flow as shown in Fig. 2 including:
Step 201, read key used during encryption;
Key used during the encryption can be still read from special hardware storage device.
Step 202, according to the key, the data of encryption are decrypted, the data after being decrypted;
This step specifically includes:
(1) the key array by the key with reference to ACCII codes standard handovers into char types;
(2) data of the encryption are changed into the array of data of String types;
(3) one and the array of data length identical StringBuffer class string variables buf are defined;
(4) the length L of the key array is obtained, circulates the array of data, by the t*L+i of the array of data Element and i-th of cycling of elements of the key array are numerical value, then carry out additive operation, and the result of additive operation is converted It is stored in into string types in buf, until being finished to the length cycles of the array of data;
(5) buf is changed into character string, the character string obtained after being converted using buf is used as the data after decryption.
Below in conjunction with the accompanying drawings, embodiments of the invention three are illustrated.
The embodiments of the invention provide a kind of encryption device, its structure as shown in figure 3, including:
Decruption key acquisition module 301, key used when being decrypted for reading;
Encrypting module 302, for being encrypted according to the key, data, the data after being encrypted.
Preferably, the encrypting module 302 structure as shown in figure 4, including:
Date Conversion Unit 3021, for reference to ACCII code standard handovers, the key and data to be obtained into char types Key array and data array;
Variable-definition unit 3022, for defining one and the array of data length identical StringBuffer class words Accord with string variable buf;
Cryptographic calculation unit 3023, for obtaining the length L of the key array, the length of the array of data is circulated, I-th of element of the t*L+i element of the array of data and the key array is transformed into int types and then carried out Addition, the numerical value that addition is obtained change into the character string that initial character is comma, the character string after buf splicing conversions, until right The length cycles of the array of data finish;
Data conversion unit 3024, for buf to be changed into character string, the character string for converting to obtain using buf is used as encryption Data afterwards.
The embodiment of the present invention additionally provides a kind of decryption device, its structure as shown in figure 5, including:
Encryption key acquisition module 501, key used when being encrypted for reading;
Deciphering module 502, for according to the key, the data of encryption being decrypted, the data after being decrypted.
Preferably, the deciphering module 502 structure as shown in fig. 6, including:
Key converting unit 5021, for the key array by the key with reference to ACCII codes standard handovers into char types;
Date Conversion Unit 5022, for the data of the encryption to be changed into the array of data of String types;
Variable-definition unit 5023, for defining one and the array of data length identical StringBuffer class words Accord with string variable buf;
Arithmetic element 5024 is decrypted, for obtaining the length L of the key array, the array of data is circulated, by described in T*L+i element of array of data and i-th of cycling of elements of the key array are numerical value, then carry out additive operation, The result of additive operation is changed into string types deposit buf, until being finished to the length cycles of the array of data;
Data conversion unit 5025, for buf to be changed into character string, the character string that is obtained after being converted using buf as Data after decryption.
The embodiment provides a kind of encryption method, decryption method, encryption device and decryption device, calculated in encryption In method and decipherment algorithm, using same key, key is integrated in algorithm by whole process, is ensureing the unlikely too high shadow of algorithm complex Ring efficiency on the premise of, ensure that the security of algorithm, solve the problems, such as existing cipher mode can not take into account efficiency with it is safe. When being encrypted or being decrypted using key, conversion process is carried out to key by ASCII character, further improves the safety of algorithm Property, add and crack difficulty.
The technical scheme that embodiments of the invention provide is based on ACCII code standards, and data ciphering and deciphering is reversible, but entirely Encrypting and decrypting process key needs to participate in the overall process, and because key only has user oneself to know, encryption data cracks difficulty ratio It is larger, it is high to the safety guarantee of data.It can be integrated into various softwares, strengthen the protection to important data message.
Although disclosed herein embodiment as above, described content be only readily appreciate the present invention and use Embodiment, it is not limited to the present invention.Technical staff in any art of the present invention, taken off not departing from the present invention On the premise of the spirit and scope of dew, any modification and change, but the present invention can be carried out in the form and details of implementation Scope of patent protection, still should be subject to the scope of the claims as defined in the appended claims.

Claims (10)

  1. A kind of 1. encryption method, it is characterised in that including:
    Read key used during decryption;
    According to the key, data are encrypted, the data after being encrypted.
  2. 2. encryption method according to claim 1, it is characterised in that key used is specially during the reading decryption:
    Key used during the decryption is read from special hardware storage device.
  3. 3. encryption method according to claim 1, it is characterised in that according to the key, data are encrypted, and are added The step of data after close, includes:
    By the key and data with reference to ACCII code standard handovers, the key array and data array of char types are obtained;
    Define one and the array of data length identical StringBuffer class string variables buf;
    The length L of the key array is obtained, circulates the length of the array of data, by the t*L+i of the array of data Element and i-th of element of the key array are transformed into int types and then carry out addition, and the numerical value that addition is obtained converts Into the character string that initial character is comma, the character string after buf splicing conversions, until complete to the length cycles of the array of data Finish;
    Buf is changed into character string, the character string for converting to obtain using buf is used as the data after encryption.
  4. A kind of 4. decryption method, it is characterised in that including:
    Read key used during encryption;
    According to the key, the data of encryption are decrypted, the data after being decrypted.
  5. 5. decryption method according to claim 4, it is characterised in that key used is specially when reading encryption:
    Key used during the encryption is read from special hardware storage device.
  6. 6. decryption method according to claim 4, it is characterised in that according to the key, the data of encryption are solved It is close, include the step of data after being decrypted:
    Key array by the key with reference to ACCII codes standard handovers into char types;
    The data of the encryption are changed into the array of data of String types;
    Define one and the array of data length identical StringBuffer class string variables buf;
    Obtain the length L of the key array, circulate the array of data, by t*L+i element of the array of data and I-th of cycling of elements of the key array is numerical value, then carries out additive operation, and the result of additive operation is changed into In string types deposit buf, until being finished to the length cycles of the array of data;
    Buf is changed into character string, the character string obtained after being converted using buf is used as the data after decryption.
  7. A kind of 7. encryption device, it is characterised in that including:
    Decruption key acquisition module, key used when being decrypted for reading;
    Encrypting module, for being encrypted according to the key, data, the data after being encrypted.
  8. 8. encryption device according to claim 17, it is characterised in that the encrypting module includes:
    Date Conversion Unit, for reference to ACCII code standard handovers, the key and data to be obtained into the key array of char types And array of data;
    Variable-definition unit, for defining one and the array of data length identical StringBuffer class string variables buf;
    Cryptographic calculation unit, for obtaining the length L of the key array, the length of the array of data is circulated, by the number Int types are transformed into according to the t*L+i element of array and i-th of element of the key array and then carry out addition, will The numerical value that addition obtains changes into the character string that initial character is comma, the character string after buf splicing conversions, until to the data The length cycles of array finish;
    Data conversion unit, for buf to be changed into character string, the character string for converting to obtain using buf is used as the data after encryption.
  9. 9. one kind decryption device, it is characterised in that including:
    Encryption key acquisition module, key used when being encrypted for reading;
    Deciphering module, for according to the key, the data of encryption being decrypted, the data after being decrypted.
  10. 10. decryption device according to claim 9, it is characterised in that the deciphering module includes:
    Key converting unit, for the key array by the key with reference to ACCII codes standard handovers into char types;
    Date Conversion Unit, for the data of the encryption to be changed into the array of data of String types;
    Variable-definition unit, for defining one and the array of data length identical StringBuffer class string variables buf;
    Arithmetic element is decrypted, for obtaining the length L of the key array, the array of data is circulated, by the array of data T*L+i element and i-th of cycling of elements of the key array be numerical value, then carry out additive operation, fortune will be subtracted each other The result of calculation is changed into string types deposit buf, until being finished to the length cycles of the array of data;
    Data conversion unit, for buf to be changed into character string, the character string obtained after being converted using buf is as after decrypting Data.
CN201710767447.5A 2017-08-31 2017-08-31 A kind of encryption method, decryption method, encryption device and decryption device Pending CN107483193A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710767447.5A CN107483193A (en) 2017-08-31 2017-08-31 A kind of encryption method, decryption method, encryption device and decryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710767447.5A CN107483193A (en) 2017-08-31 2017-08-31 A kind of encryption method, decryption method, encryption device and decryption device

Publications (1)

Publication Number Publication Date
CN107483193A true CN107483193A (en) 2017-12-15

Family

ID=60603110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710767447.5A Pending CN107483193A (en) 2017-08-31 2017-08-31 A kind of encryption method, decryption method, encryption device and decryption device

Country Status (1)

Country Link
CN (1) CN107483193A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111192187A (en) * 2018-08-27 2020-05-22 优信数享(北京)信息技术有限公司 Decryption method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120233468A1 (en) * 2011-03-10 2012-09-13 Samsung Electronics Co., Ltd. Authenticating method of communicating connection, gateway apparatus using authenticating method, and communication system using authenticating method
CN102904711A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Information encrypting method
CN103326851A (en) * 2013-07-03 2013-09-25 西京学院 Compass encryption and decryption method based on single chip microcomputer
CN104113410A (en) * 2014-07-04 2014-10-22 北京思特奇信息技术股份有限公司 Method and device for data encryption transmission based on multi-table encryption method
CN105406960A (en) * 2015-12-20 2016-03-16 河南思维自动化设备股份有限公司 Information encrypting and decrypting method
US20160253515A1 (en) * 2013-10-28 2016-09-01 Sepior Aps A System and a Method for Management of Confidential Data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120233468A1 (en) * 2011-03-10 2012-09-13 Samsung Electronics Co., Ltd. Authenticating method of communicating connection, gateway apparatus using authenticating method, and communication system using authenticating method
CN102904711A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Information encrypting method
CN103326851A (en) * 2013-07-03 2013-09-25 西京学院 Compass encryption and decryption method based on single chip microcomputer
US20160253515A1 (en) * 2013-10-28 2016-09-01 Sepior Aps A System and a Method for Management of Confidential Data
CN104113410A (en) * 2014-07-04 2014-10-22 北京思特奇信息技术股份有限公司 Method and device for data encryption transmission based on multi-table encryption method
CN105406960A (en) * 2015-12-20 2016-03-16 河南思维自动化设备股份有限公司 Information encrypting and decrypting method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111192187A (en) * 2018-08-27 2020-05-22 优信数享(北京)信息技术有限公司 Decryption method and system
CN111192187B (en) * 2018-08-27 2023-10-24 优信数享(北京)信息技术有限公司 Decryption method and system

Similar Documents

Publication Publication Date Title
CN101043326B (en) Dynamic information encrypting system and method
CN107005415A (en) For encrypting/decrypting the block encryption method of message and realize the encryption device of this method
CN103780391B (en) Hand-written electronic signature data protection method based on signature content
CN104408356B (en) A kind of fingerprint verification method and system, fingerprint template encryption device
CN106533663B (en) Data ciphering method, encryption method, apparatus and data decryption method, decryption method, apparatus
CN104866784B (en) A kind of safe hard disk, data encryption and decryption method based on BIOS encryptions
CN105184181B (en) File encryption method, file decryption method and file encryption device
CN105743645A (en) PUF (Physical Unclonable Function)-based stream key generation device and method and data encryption and decryption method
CN111010266B (en) Message encryption and decryption, reading and writing method and device, computer equipment and storage medium
TW201546648A (en) Dynamic encryption keys for use with XTS encryption systems employing reduced-round ciphers
Gafsi et al. High securing cryptography system for digital image transmission
CN101706854A (en) USB information security equipment and method for communication between USB information security equipment and mainframe
CN105337742B (en) LFSR file encryption and decryption method based on facial image feature and GPS information
Zhou et al. Implementation of cryptographic algorithm in dynamic QR code payment system and its performance
CN105554038A (en) Control method for data security during on-line system and off-line system data interaction
Soni et al. Key generation using genetic algorithm for image encryption
CN107483193A (en) A kind of encryption method, decryption method, encryption device and decryption device
CN107483187A (en) A kind of data guard method and device based on credible password module
JP7046424B2 (en) Data encryption / decryption method and equipment using white box encryption
CN111314270A (en) Data encryption and decryption method based on validity period uniform distribution symmetric algorithm
CN106161000A (en) The method and system that data file is encrypted and decrypted
CN103491384A (en) Encrypting method and device of video and decrypting method and device of video
CN103763097A (en) Security encryption method for password or secret key
CN111314052B (en) Data encryption and decryption method
CN111314053B (en) Data encryption and decryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171215

RJ01 Rejection of invention patent application after publication