CN108243161A - A kind of terminal speech encryption method and voice encryption system - Google Patents
A kind of terminal speech encryption method and voice encryption system Download PDFInfo
- Publication number
- CN108243161A CN108243161A CN201611220191.8A CN201611220191A CN108243161A CN 108243161 A CN108243161 A CN 108243161A CN 201611220191 A CN201611220191 A CN 201611220191A CN 108243161 A CN108243161 A CN 108243161A
- Authority
- CN
- China
- Prior art keywords
- voice data
- terminal
- encrypted
- instant messaging
- modulated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of terminal speech encryption method and voice encryption systems, by before voice data is sent to the instant messaging application that the terminal is installed by terminal, voice data is encrypted, it ensure that the safety of voice data transmission, and also effectively prevent the appearance that application developers crack encrypted voice data situation.
Description
Technical field
The present invention relates to field of communication technology, more specifically, being related to a kind of terminal speech encryption method and voice encryption
System.
Background technology
With flourishing for communications industry, the terminals such as mobile phone are widely used in by people in daily life and study.
For convenience of the contact between people, many instant messaging applications are produced immediately, such as wechat, WhatsApp, QQ, skype
Instant messaging application would generally be used to send speech message Deng, many users.
However, the present inventor passes through the study found that existing major part instant messaging applies and sending voice number
According to when voice data can't be encrypted, there is leakage or the risk that is intercepted so as to cause voice data;Though
Some right instant messaging applications can realize the encryption to voice data, but may be to voice number there are application developers
According to the situation retained or cracked, revealed so as to cause the voice data of user.
To sum up, how a kind of terminal speech encryption method and system are provided, is with the safety for improving voice data transmission
The technical issues of those skilled in the art's urgent need to resolve.
Invention content
In view of this, the invention discloses a kind of terminal speech encryption method and voice encryption system, to realize to voice
The raising of data transmission security.
A kind of terminal speech encryption method, including:
First terminal obtains voice data input by user from the audio system frame of the first terminal;
The voice data is encrypted, obtains encrypted voice data;
The encrypted voice data is modulated;
Modulated encrypted voice data is sent to second terminal by preassembled instant messaging application.
Preferably, it is described that the voice data is encrypted, it obtains encrypted voice data and includes:
Compress the voice data;
Compressed voice data is encrypted, obtains the encrypted voice data.
Preferably, the voice data is pulse code modulation PCM voice data.
A kind of terminal speech encryption method, including:
Second terminal by preassembled instant messaging application, receive first terminal by with the instant messaging application
The modulated encrypted voice data that identical instant messaging application is sent;
The modulated encrypted voice data is demodulated;
Encrypted voice data after demodulation is decrypted, the voice data after being decrypted;
The audio system frame that voice data after the decryption is sent to the second terminal plays out.
Preferably, the voice data by after the decryption is sent to the audio system frame progress of the second terminal
Broadcasting includes:
Decompress the voice data after the decryption;
The audio system frame that voice data after decompression is sent to the second terminal plays out.
A kind of voice encryption system, including:First terminal and second terminal, wherein,
The first terminal is used for, and voice data input by user is obtained from the audio system frame of the first terminal;
The voice data is encrypted, obtains encrypted voice data;The encrypted voice data is modulated;It will be modulated
Encrypted voice data is sent to second terminal by preassembled instant messaging application
The second terminal is used for, by preassembled instant messaging application, receive the first terminal by with institute
State the modulated encrypted voice data that instant messaging is sent using identical instant messaging application;To the modulated encryption
Voice data is demodulated;Encrypted voice data after demodulation is decrypted, the voice data after being decrypted;By the solution
The audio system frame that voice data after close is sent to the second terminal plays out.
From above-mentioned technical solution it is found that the invention discloses a kind of terminal speech encryption method and voice encryption system,
By before voice data is sent to the instant messaging application that the terminal is installed by terminal, being encrypted, protecting to voice data
The safety of voice data transmission has been demonstrate,proved, and has also effectively prevented application developers and situation is cracked to encrypted voice data
Appearance.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention, for those of ordinary skill in the art, without creative efforts, can also basis
Disclosed attached drawing obtains other attached drawings.
Fig. 1 is a kind of method flow diagram of terminal speech encryption method disclosed by the embodiments of the present invention;
Fig. 2 is the method flow diagram of terminal speech encryption method in traditional scheme;
Fig. 3 is the method flow diagram of another terminal speech encryption method disclosed by the embodiments of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work
Embodiment shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a kind of terminal speech encryption method and voice encryption system, to realize to voice data
The raising of transmission security.
Referring to Fig. 1, a kind of method flow diagram of terminal speech encryption method disclosed by the embodiments of the present invention, this method includes
Step:
Step S101, first terminal obtains voice data input by user from the audio system frame of the first terminal;
Specifically, the voice data in the present embodiment is PCM (Pulse Code Modulation, pulse code modulation)
Voice data.In practice, each terminal is both provided with audio hardware (audio hw), which obtains input by user
Primary voice data, and PCM voice data is generated according to the primary voice data;Audio hardware passes through hardware abstraction layer
PCM voice data is passed to audio system frame by (Hardware Abstraction Layer, HAL).
Hardware abstraction layer is the interface layer between operating system nucleus and hardware circuit, and its object is to take out hardware
As changing, operating system is allowed to be interacted in logical layer rather than hardware layer with hardware device.Hardware abstraction layer conceals particular platform
Hardware interface details, operating system provide virtual hardware platform, make it have hardware independence, can be carried out in kinds of platform
Transplanting.Wherein, the operating system in the present invention uses Android operation system.
It should be noted that in the present embodiment, first in first terminal is used to identify the terminal, is not used to limit
Quantity.Terminal includes but not limited to smart mobile phone, IPAD.
Step S102, the voice data is encrypted, obtains encrypted voice data;
Specifically, bit encryption can be carried out to voice data, encrypted voice data is obtained, it is of course also possible to according to reality
Border needs, using other cipher modes.
Step S103, the encrypted voice data is modulated;
Specifically, baseband signal is modulated to be transformed into transmission signal.After it quantifies analog signal sampling, with two into
Digital signal " 1 " processed or " 0 " carry out break-make modulation, and carry out pulse code (PCM) to light carrier.
In the present embodiment, by being modulated to encrypted voice data, the voice signal that can be transmitted is obtained.
Step S104, modulated encrypted voice data is sent to second eventually by preassembled instant messaging application
End.
Specifically, instant messaging application:Refer to instant messages (Instant Messaging, IM), it is current popular
Have wechat, WhatsApp, QQ, skype.
In the present embodiment, first terminal and second terminal pass through identical instant messaging using the friendship for carrying out voice data
Mutually.
It should be noted that in the present embodiment, second in second terminal is used to identify the terminal, is not used to limit
Quantity.Terminal includes but not limited to smart mobile phone, IPAD.
Wherein, second terminal needs in advance and first terminal is matched namely second terminal can send out first terminal
The encrypted voice data sent is decrypted, correctly to play the voice data of first terminal transmission;If second terminal is not with first
Terminal is matched, i.e., the voice data that second terminal can not send first terminal is decrypted, then second terminal is receiving
After the voice data sent to first terminal, what second terminal played is busy tone, such as the sound of " too beep ".
For convenience of description the present invention it is different to the encryption of voice data in traditional scheme to the ciphering process of voice data,
The present invention also provides terminal speech encryption methods in traditional scheme.
Referring to Fig. 2, a kind of method flow diagram of terminal speech encryption method in traditional scheme is disclosed, including step:
Step S201, first terminal obtains voice data input by user from the audio system frame of the first terminal;
Step S202, voice data is passed to by preassembled instant messaging application by audio system frame;
Step S203, it is applied by instant messaging and voice data is encrypted and encoded;
Step S204, the voice data after encryption and coding is sent to second terminal.
From the present embodiment, it can be seen that conventional terminal speech ciphering method is to be applied by instant messaging to voice number
According to being encrypted, therefore, for application developers, encrypted voice data can be cracked at any time, so as to easily lead
Apply family voice data leakage.
In summary, terminal speech encryption method disclosed by the invention, by the way that voice data is sent to the end in terminal
Before the instant messaging application of end installation, voice data is encrypted, ensure that the safety of voice data transmission, and also
Effectively prevent the appearance that application developers crack encrypted voice data situation.
It is understood that when voice data content is more, to improve voice between first terminal and second terminal
Transmission speed before voice data is encrypted, can also carry out compression processing to voice data.
Therefore, to advanced optimize Fig. 1 disclosed embodiments, step S102 is specifically included:
Compress the voice data;
Compressed voice data is encrypted, obtains encrypted voice data.
Referring to Fig. 3, a kind of method flow diagram of terminal speech encryption method disclosed by the embodiments of the present invention, this method includes
Step:
Step S301, second terminal receives first terminal by being with described by preassembled instant messaging application
When communication applications it is identical instant messaging application send modulated encrypted voice data;
It is understood that only first terminal and second terminal install identical instant messaging application, two terminals are
Can voice messaging interaction be carried out by instant messaging application, it is wechat that the instant messaging installed such as first terminal, which is applied, at this
In the case of kind, the instant messaging application of second terminal installation is also required to as wechat;If first terminal and second terminal installation are different
Instant messaging application, two terminals will be unable to by instant messaging application carry out voice messaging interaction, such as when first terminal pacify
The instant messaging of dress is applied as wechat, when the instant messaging of second terminal installation is applied as WhatsApp, first terminal and second
Terminal will be unable to carry out voice messaging interaction by instant messaging application.
Step S302, the modulated encrypted voice data is demodulated;
Specifically, demodulation is to restore the process of message from the modulated signal for carrying message, it is the inverse process of modulation.This reality
It applies in example, second terminal is demodulated the modulated encrypted voice data that first terminal is sent.
Step S303, the encrypted voice data after demodulation is decrypted, the voice data after being decrypted;
It should be noted that first terminal encrypts voice data encryption key used and second terminal to voice number
It is corresponding according to decryption decruption key used.
Step S304, the audio system frame that the voice data after the decryption is sent to the second terminal is broadcast
It puts.
Specifically, in this step, the voice data that second terminal is sent to the audio system frame of second terminal is PCM languages
Sound data.In practice, each terminal is both provided with audio hardware and hardware abstraction layer, and audio system frame receives PCM languages
After sound data, PCM voice data can be passed to audio hardware by hardware abstraction layer, by audio hardware by PCM voice data
Corresponding voice is converted into play out.
In summary, terminal speech encryption method disclosed by the invention, by the way that voice data is sent to the end in terminal
Before the instant messaging application of end installation, voice data is encrypted, ensure that the safety of voice data transmission, and also
Effectively prevent the appearance that application developers crack encrypted voice data situation.
It should be noted that first terminal and second terminal can be encrypted and decrypted voice data.
When first terminal is sent to the voice data of second terminal as compression voice data, to advanced optimize above-mentioned reality
Example is applied, step S304 is specifically included:
Decompress the voice data after the decryption;
The audio system frame that voice data after decompression is sent to the second terminal plays out.
In summary, terminal speech encryption method disclosed by the invention, by the way that voice data is sent to the end in terminal
Before the instant messaging application of end installation, voice data is encrypted, ensure that the safety of voice data transmission, and also
Effectively prevent the appearance that application developers crack encrypted voice data situation.
Corresponding with above method embodiment, the invention also discloses a kind of voice encryption systems.
Voice encryption system disclosed by the invention includes:First terminal and second terminal, wherein,
The first terminal is used for, and voice data input by user is obtained from the audio system frame of the first terminal;
The voice data is encrypted, obtains encrypted voice data;The encrypted voice data is modulated;It will be modulated
Encrypted voice data is sent to second terminal by preassembled instant messaging application
The second terminal is used for, by preassembled instant messaging application, receive the first terminal by with institute
State the modulated encrypted voice data that instant messaging is sent using identical instant messaging application;To the modulated encryption
Voice data is demodulated;Encrypted voice data after demodulation is decrypted, the voice data after being decrypted;By the solution
The audio system frame that voice data after close is sent to the second terminal plays out.
It should be noted that the operation principle of voice encryption system refers to embodiment of the method corresponding part, herein no longer
It repeats.
In summary, voice data is being sent to first by terminal speech encryption system disclosed by the invention, first terminal
Before the instant messaging application of terminal installation, voice data can be encrypted, it then will be encrypted by instant messaging application
Voice data is sent to second terminal, and second terminal after encryption voice decryption to playing out.For traditional scheme, this hair
Before the bright instant messaging application by the way that voice data being sent to, the terminal is installed in terminal, voice data is encrypted,
It ensure that the safety of voice data transmission, and also effectively prevent application developers and feelings are cracked to encrypted voice data
The appearance of condition.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, term " comprising ", "comprising" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or equipment including a series of elements not only include that
A little elements, but also including other elements that are not explicitly listed or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except also there are other identical elements in the process, method, article or apparatus that includes the element.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with other
The difference of embodiment, just to refer each other for identical similar portion between each embodiment.
The foregoing description of the disclosed embodiments enables professional and technical personnel in the field to realize or use the present invention.
A variety of modifications of these embodiments will be apparent for those skilled in the art, it is as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention
The embodiments shown herein is not intended to be limited to, and is to fit to and the principles and novel features disclosed herein phase one
The most wide range caused.
Claims (6)
1. a kind of terminal speech encryption method, which is characterized in that including:
First terminal obtains voice data input by user from the audio system frame of the first terminal;
The voice data is encrypted, obtains encrypted voice data;
The encrypted voice data is modulated;
Modulated encrypted voice data is sent to second terminal by preassembled instant messaging application.
2. terminal speech encryption method according to claim 1, which is characterized in that described to add to the voice data
It is close, it obtains encrypted voice data and includes:
Compress the voice data;
Compressed voice data is encrypted, obtains the encrypted voice data.
3. terminal speech encryption method according to claim 1, which is characterized in that the voice data is pulse code tune
PCM voice data processed.
4. a kind of terminal speech encryption method, which is characterized in that including:
It is identical by being applied with the instant messaging to receive first terminal by preassembled instant messaging application for second terminal
Instant messaging application send modulated encrypted voice data;
The modulated encrypted voice data is demodulated;
Encrypted voice data after demodulation is decrypted, the voice data after being decrypted;
The audio system frame that voice data after the decryption is sent to the second terminal plays out.
5. terminal speech encryption method according to claim 4, which is characterized in that the voice number by after the decryption
According to the audio system frame for being sent to the second terminal play out including:
Decompress the voice data after the decryption;
The audio system frame that voice data after decompression is sent to the second terminal plays out.
6. a kind of voice encryption system, which is characterized in that including:First terminal and second terminal, wherein,
The first terminal is used for, and voice data input by user is obtained from the audio system frame of the first terminal;To institute
It states voice data to be encrypted, obtains encrypted voice data;The encrypted voice data is modulated;By modulated encryption
Voice data is sent to second terminal by preassembled instant messaging application
The second terminal is used for, by preassembled instant messaging application, receive the first terminal by with it is described i.e.
When communication applications it is identical instant messaging application send modulated encrypted voice data;To the modulated encryption voice
Data are demodulated;Encrypted voice data after demodulation is decrypted, the voice data after being decrypted;After the decryption
Voice data be sent to the audio system frame of the second terminal and play out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611220191.8A CN108243161A (en) | 2016-12-26 | 2016-12-26 | A kind of terminal speech encryption method and voice encryption system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611220191.8A CN108243161A (en) | 2016-12-26 | 2016-12-26 | A kind of terminal speech encryption method and voice encryption system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108243161A true CN108243161A (en) | 2018-07-03 |
Family
ID=62702070
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611220191.8A Pending CN108243161A (en) | 2016-12-26 | 2016-12-26 | A kind of terminal speech encryption method and voice encryption system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108243161A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112054905A (en) * | 2020-08-21 | 2020-12-08 | 郑州信大捷安信息技术股份有限公司 | Secure communication method and system of mobile terminal |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101287274A (en) * | 2007-04-11 | 2008-10-15 | 深圳市维信联合科技有限公司 | Voice encryption system for mobile communication and encryption method thereof |
CN101394248A (en) * | 2008-05-13 | 2009-03-25 | 北京大秦兴宇电子有限公司 | Data ciphering and deciphering communication terminal |
CN101997954A (en) * | 2009-08-10 | 2011-03-30 | 北京大秦兴宇电子有限公司 | Encryption and decryption accessory for communication terminal |
CN102916869A (en) * | 2012-10-24 | 2013-02-06 | 鹤山世达光电科技有限公司 | Instant messaging method and system |
CN104507080A (en) * | 2014-11-19 | 2015-04-08 | 广东欧珀移动通信有限公司 | File processing method and terminal |
CN104618397A (en) * | 2015-03-04 | 2015-05-13 | 北京深思数盾科技有限公司 | Encryption method and system for instant messaging software |
CN104980397A (en) * | 2014-04-03 | 2015-10-14 | 腾讯科技(深圳)有限公司 | Instant messaging method, system and terminal |
-
2016
- 2016-12-26 CN CN201611220191.8A patent/CN108243161A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101287274A (en) * | 2007-04-11 | 2008-10-15 | 深圳市维信联合科技有限公司 | Voice encryption system for mobile communication and encryption method thereof |
CN101394248A (en) * | 2008-05-13 | 2009-03-25 | 北京大秦兴宇电子有限公司 | Data ciphering and deciphering communication terminal |
CN101997954A (en) * | 2009-08-10 | 2011-03-30 | 北京大秦兴宇电子有限公司 | Encryption and decryption accessory for communication terminal |
CN102916869A (en) * | 2012-10-24 | 2013-02-06 | 鹤山世达光电科技有限公司 | Instant messaging method and system |
CN104980397A (en) * | 2014-04-03 | 2015-10-14 | 腾讯科技(深圳)有限公司 | Instant messaging method, system and terminal |
CN104507080A (en) * | 2014-11-19 | 2015-04-08 | 广东欧珀移动通信有限公司 | File processing method and terminal |
CN104618397A (en) * | 2015-03-04 | 2015-05-13 | 北京深思数盾科技有限公司 | Encryption method and system for instant messaging software |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112054905A (en) * | 2020-08-21 | 2020-12-08 | 郑州信大捷安信息技术股份有限公司 | Secure communication method and system of mobile terminal |
CN112054905B (en) * | 2020-08-21 | 2022-02-11 | 郑州信大捷安信息技术股份有限公司 | Secure communication method and system of mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105162886A (en) | Voice control method and device | |
CN104393994B (en) | Audio data secure transmission method, system and terminal | |
CN104158816A (en) | Authentication method and device as well as server | |
CN102308562A (en) | Mobile terminal and method, device, system for controlling mobile terminal | |
CN104767746A (en) | Push message receiving method, message pushing method, client and server | |
CN107438137A (en) | A kind of system and method hidden based on mobile call equipment telephone number | |
CN105471899A (en) | End-to-end voice encryption communication method and device for mobile terminals | |
CN107276884A (en) | A kind of autonomous encrypting and deciphering system of social software based on intelligent terminal | |
CN103248553A (en) | Mail encryption method, mail decryption method and clients | |
CN106027560A (en) | Intelligent terminal oriented security transmission method and system | |
CN105049201A (en) | Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography | |
CN1707993A (en) | Universal microphone for secure radio communication | |
CN108243161A (en) | A kind of terminal speech encryption method and voice encryption system | |
CN104954951A (en) | Bluetooth headset with voice encryption function and voice encryption method of Bluetooth headset | |
CN105763330A (en) | Light weight certificate suitable for encryption communication of circuit domain and encryption communication method | |
US9467428B2 (en) | Information security attachment device for voice communication and information security method for voice communication using the same | |
CN105072094B (en) | A kind of method and car-mounted terminal of voice data encryption | |
CN104299128B (en) | Utilize the method for payment of smart television, mobile terminal and smart television | |
TW200815986A (en) | Audio data transmission system and audio data transmission method | |
CN102404730A (en) | Bluetooth-protocol-based encryption device and encryption method for mobile phone communication | |
CN101997954A (en) | Encryption and decryption accessory for communication terminal | |
CN105045368A (en) | Mobile terminal and secure communication device thereof | |
CN104581711A (en) | Mobile terminal with communication encryption function as well as communication encryption method thereof | |
CN108668273A (en) | A kind of satellite speech scrambling device | |
CN202307121U (en) | Communication data information broadcasting system based on voice synthesis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180703 |
|
RJ01 | Rejection of invention patent application after publication |