CN109872103A - A kind of method and system of intellectual access - Google Patents

A kind of method and system of intellectual access Download PDF

Info

Publication number
CN109872103A
CN109872103A CN201910053498.0A CN201910053498A CN109872103A CN 109872103 A CN109872103 A CN 109872103A CN 201910053498 A CN201910053498 A CN 201910053498A CN 109872103 A CN109872103 A CN 109872103A
Authority
CN
China
Prior art keywords
access
user
data
server
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910053498.0A
Other languages
Chinese (zh)
Inventor
田鑫
庄嘉泽
王建
何强兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUZHOU YOUBOX ELECTRONIC TECHNOLOGY Co Ltd
Original Assignee
FUZHOU YOUBOX ELECTRONIC TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUZHOU YOUBOX ELECTRONIC TECHNOLOGY Co Ltd filed Critical FUZHOU YOUBOX ELECTRONIC TECHNOLOGY Co Ltd
Priority to CN201910053498.0A priority Critical patent/CN109872103A/en
Publication of CN109872103A publication Critical patent/CN109872103A/en
Pending legal-status Critical Current

Links

Abstract

A kind of method and system of intellectual access provided by the invention generate access information by terminal, and are sent to server-side;Server-side receives the access information, carries out signature to the access information by private key and generates corresponding first data, and is back to terminal;Access device obtains second data from terminal, second data are verified by public key corresponding with the private key, if verifying successfully, then execute corresponding accessing operation, improve the safety of access, and user need to can only be accessed by terminal, and easy to use, user experience is good.

Description

A kind of method and system of intellectual access
Technical field
The present invention relates to internet of things field, in particular to a kind of method and system of intellectual access.
Background technique
In recent years, as the rapid development of shopping online, logistics express delivery and delivery industry are rapidly developed and grown.For Mitigate delivery industry pressure, improve delivery efficiency and adapt to the demand that people's rhythm of life is constantly accelerated, self-service access system It comes into being, this largely alleviates logistics distribution pressure, brings convenience to the autonomous pickup of people.
Disclosed in Chinese patent application No. is 201310663740 it is a kind of based on two dimensional code management manipulation intelligence deposit Method and system are taken, is access terminal, smart phone special-purpose software and the data service center for manipulating medium including two dimensional code, deposits Take GPRS long-distance radio communication interaction between terminal, smart phone special-purpose software, data service center.Although the program solves Application No. is the electronic systems of access terminal present in the Chinese patent of 201120452419 .2 and 201210486159 .X The service life that cost is higher, is difficult to adapt to severe outdoor environment, liquid crystal touch screen and keyboard button is short easy to damage and be difficult to Maintenance is not suitable for the drawbacks of multi-user operates simultaneously, but due to introducing GPRS long-distance radio communication, which is needed Good network communications environment is wanted, in the case where encountering network signal interference or network jitter occur in Network Operator networks, It is easy to appear access failure problem, leads to poor user experience, and there is also safeties for the access method of existing intelligent cabinet Poor problem.
Summary of the invention
The technical problems to be solved by the present invention are: providing a kind of method and system of intellectual access, access can be improved Safety and user experience.
In order to solve the above-mentioned technical problem, a kind of technical solution that the present invention uses are as follows:
A kind of method of intellectual access, comprising steps of
S1, terminal generate access information, and are sent to server-side;
S2, server-side receive the access information, carry out signature to the access information by private key and generate corresponding first number According to, and it is back to terminal;
S3, access device obtain the second data from terminal, are carried out by public key corresponding with the private key to second data Verification, if verifying successfully, executes corresponding accessing operation.
In order to solve the above-mentioned technical problem, the another technical solution that the present invention uses are as follows:
A kind of system of intellectual access, including terminal, server-side and access device, the terminal include first memory, first Processor and storage on the first memory and the first computer program that can be run on first processor, the server-side packet It includes second memory, second processor and is stored in the second computer that can be run on second memory and in second processor Program, the access device include third memory, third processor and are stored on third memory and can handle in third The third computer program run on device, the first processor perform the steps of when executing first computer program
S1, access information is generated, and is sent to server-side;
The second processor performs the steps of when executing the second computer program
S2, the access information is received, signature is carried out to the access information by private key and generates corresponding first data, and is returned It is back to terminal;
The third processor performs the steps of when executing the third computer program
S3, second data are obtained from terminal, second data are verified by public key corresponding with the private key, If verifying successfully, corresponding accessing operation is executed.
The beneficial effects of the present invention are: access information is generated by terminal, and is sent to server-side;Server-side receives institute Access information is stated, signature is carried out to the access information by private key and generates corresponding first data, and is back to terminal;Access Device obtains second data from terminal, is verified by public key corresponding with the private key to second data, if It verifies successfully, then executes corresponding accessing operation, improve the safety of access, and user need to can only carry out by terminal Access, easy to use, user experience is good.
Detailed description of the invention
Fig. 1 is the method flow diagram of the intellectual access of the embodiment of the present invention;
Fig. 2 is the structural schematic diagram of the system of the intellectual access of the embodiment of the present invention;
Label declaration:
1, the system of intellectual access;2, terminal;3, server-side;4, access device;5, first memory;6, the first processing Device;7, second memory;8, second processor;9, third memory;10, fourth processor.
Specific embodiment
To explain the technical content, the achieved purpose and the effect of the present invention in detail, below in conjunction with embodiment and cooperate attached Figure is explained.
The most critical design of the present invention is: carrying out signature to access information using private key by server-side generates first Data, when access device from terminal obtain the second data after, by public key corresponding with the private key to second data into Row verification, if verifying successfully, executes corresponding accessing operation, ensure that the safety of access.
Please refer to Fig. 1, a kind of method of intellectual access, comprising steps of
S1, terminal generate access information, and are sent to server-side;
S2, server-side receive the access information, carry out signature to the access information by private key and generate corresponding first number According to, and it is back to terminal;
S3, access device obtain the second data from terminal, are carried out by public key corresponding with the private key to second data Verification, if verifying successfully, executes corresponding accessing operation.
As can be seen from the above description, the beneficial effects of the present invention are: access information is generated by terminal, and is sent to service End;Server-side receives the access information, carries out signature to the access information by private key and generates corresponding first data, and It is back to terminal;Access device obtains second data from terminal, by public key corresponding with the private key to described second Data are verified, if verifying successfully, are executed corresponding accessing operation, are improved the safety of access, and user only needs It can be accessed by terminal, easy to use, user experience is good.
Further, it is further comprised the steps of: before step S1
S01, terminal obtain the contact method of the first user information and the first user, and are sent to server-side and are registered and stepped on Record;
S02, terminal obtain the unique identification information of access device, and it is idle in the access device to obtain to be sent to server-side The size and cell number of cabinet are equipped with multiple cabinets of different sizes in the access device.
Seen from the above description, by obtaining the unique identification information of access device, and server-side is sent to obtain The size and cell number of idle cabinet in access device are stated, multiple cabinets of different sizes is equipped in the access device, is convenient for User selects cabinet of corresponding size according to demand, easy to use, can meet the needs of different users.
Further, the access information include second user contact method and dispatching odd numbers, first data and Second data are two dimensional code.
It seen from the above description, is two dimensional code by setting first data and the second data, convenient for improving user Access efficiency improves user experience.
Further, it further comprises the steps of:
Server-side judges whether exception or changing process occur, if so, the contact method of the second user is replaced with The contact method of one user, and corresponding back pieces information is sent according to the contact method of first user.
Seen from the above description, by judging whether exception or changing process occur, if so, by the second user Contact method replaces with the contact method of the first user, and sends corresponding back pieces according to the contact method of first user and believe Breath, can prevent from causing express mail to be lost due to exception.
Further, after step S3 further include:
S4, server-side receive third data, and send pickup success according to the contact method of the third data and the first user Information.
Seen from the above description, by receiving third data, and according to the correspondent party of the third data and the first user Formula sends pickup successful information, and the state of express mail is understood convenient for the first user, improves user experience.
Referring to figure 2., a kind of system of intellectual access, including terminal, server-side and access device, the terminal include the One memory, first processor and storage are on the first memory and the first computer journey that can run on first processor Sequence, the server-side include second memory, second processor and are stored on second memory and can be in second processor The second computer program of operation, the access device include third memory, third processor and are stored in third memory Third computer program that is upper and can running on third processor, the first processor execute first computer program When perform the steps of
S1, access information is generated, and is sent to server-side;
The second processor performs the steps of when executing the second computer program
S2, the access information is received, signature is carried out to the access information by private key and generates corresponding first data, and is returned It is back to terminal;
The third processor performs the steps of when executing the third computer program
S3, second data are obtained from terminal, second data are verified by public key corresponding with the private key, If verifying successfully, corresponding accessing operation is executed.
As can be seen from the above description, the beneficial effects of the present invention are: access information is generated by terminal, and is sent to service End;Server-side receives the access information, carries out signature to the access information by private key and generates corresponding first data, and It is back to terminal;Access device obtains second data from terminal, by public key corresponding with the private key to described second Data are verified, if verifying successfully, are executed corresponding accessing operation, are improved the safety of access, and user only needs It can be accessed by terminal, easy to use, user experience is good.
Further, performed the steps of when the first processor executes first computer program step S1 it Before further comprise the steps of:
S01, the contact method for obtaining the first user information and the first user, and be sent to server-side and carry out registering and logging;
S02, the unique identification information for obtaining access device, and server-side is sent to obtain idle cabinet in the access device Size and cell number, multiple cabinets of different sizes are equipped in the access device.
Seen from the above description, by obtaining the unique identification information of access device, and server-side is sent to obtain The size and cell number of idle cabinet in access device are stated, multiple cabinets of different sizes is equipped in the access device, is convenient for User selects cabinet of corresponding size according to demand, easy to use, can meet the needs of different users.
Further, the access information include second user contact method and dispatching odd numbers, first data and Second data are two dimensional code.
It seen from the above description, is two dimensional code by setting first data and the second data, convenient for improving user Access efficiency improves user experience.
Further, performing the steps of when the second processor executes the second computer program further includes step It is rapid:
Judge whether exception or changing process occur, if so, the contact method of the second user is replaced with the first user Contact method, and corresponding back pieces information is sent according to the contact method of first user.
Seen from the above description, by judging whether exception or changing process occur, if so, by the second user Contact method replaces with the contact method of the first user, and sends corresponding back pieces according to the contact method of first user and believe Breath, can prevent from causing express mail to be lost due to exception.
Further, performed the steps of when the second processor executes the second computer program step S3 it Afterwards further include:
S4, third data are received, and pickup successful information is sent according to the contact method of the third data and the first user.
Seen from the above description, by receiving third data, and according to the correspondent party of the third data and the first user Formula sends pickup successful information, and the state of express mail is understood convenient for the first user, improves user experience.
Embodiment one
Please refer to Fig. 1, a kind of method of intellectual access, comprising steps of
S01, terminal obtain the contact method of the first user information and the first user, and are sent to server-side and are registered and stepped on Record;
S02, terminal obtain the unique identification information of access device, and it is idle in the access device to obtain to be sent to server-side The size and cell number of cabinet are equipped with multiple cabinets of different sizes in the access device;
S1, terminal generate access information, and are sent to server-side, and the access information includes the contact method of second user and matches Send odd numbers;
S2, server-side receive the access information, carry out signature to the access information by private key and generate corresponding first number According to, and it is back to terminal;
Server-side judges whether exception or changing process occur, if so, the contact method of the second user is replaced with The contact method of one user, and corresponding back pieces information is sent according to the contact method of first user;
S3, access device obtain the second data from terminal, are carried out by public key corresponding with the private key to second data Verification, if verifying successfully, executes corresponding accessing operation, first data and the second data are two dimensional code;
S4, server-side receive third data, and send pickup success according to the contact method of the third data and the first user Information.
Embodiment two
The present embodiment will be in conjunction with specific application scenarios, and the method for further illustrating the above-mentioned intellectual access of the present invention is how to realize :
1, terminal obtains the contact method of the first user information and the first user, and is sent to server-side and carries out registering and logging;
Specifically, can voluntarily be filled in after posting the relevant personal information of part by the first user (sender) by special-purpose software or website It is uploaded to server;
2, terminal obtains the unique identification two dimensional code of access device, and it is idle in the access device to obtain to be sent to server-side The size and cell number of cabinet are equipped with multiple cabinets of different sizes in the access device;
Specifically, the unique identification two dimension on the two dimensional code identification module scan access device in terminal can be passed through by the first user Code to obtain the size and cell number of idle cabinet in access device, and selects idle case of corresponding size according to actual needs Body;
3, terminal generates access information, and is sent to server-side, and the access information includes the connection of second user (addressee) Mode and dispatching odd numbers;
4, server-side receives the access information, carries out signature to the access information by RSA private key and generates corresponding two dimension Code, and it is back to terminal;
Specifically, requesting the RSA private key of encryption equipment to sign the access information when server-side receives the access information Name;
Server-side judges whether exception or changing process occur, if so, the contact method of the second user is replaced with The contact method of one user, and corresponding back pieces information is sent according to the contact method of first user;
5, the two dimensional code that access device is shown by dimensional code scanner end of scan passes through RSA corresponding with the RSA private key Public key verifies the two dimensional code, if verifying successfully, executes corresponding accessing operation, passes through the side scanned the two-dimensional code Formula, it is not necessary that GPRS wireless communication module is arranged on the access device, to effectively prevent from encountering network signal interference Or in the case that network jitter occur in Network Operator networks, there is the problem of access failure;
Specifically, whether verification is to judge signature in two dimensional code really to be corresponding with the RSA public key by RSA public key Otherwise the signature of RSA private key, returns to access failure if so, executing corresponding accessing operation;
6, server-side receives pickup success, and sends pickup according to the contact method of pickup success and the first user and successfully believe Breath.
Embodiment three
Referring to figure 2., the system 1 of a kind of intellectual access, including terminal 2, server-side 3 and access device 4, the terminal 2 include What first memory 5, first processor 6 and being stored in can be run on first memory 5 and on first processor 6 first calculates Machine program, the server-side 3 include second memory 7, second processor 8 and are stored on second memory 7 and can be second The second computer program run on processor 8, the access device 4 include third memory 9, third processor 10 and storage On third memory 9 and the third computer program that can run on third processor 10, the first processor 6 execute institute It is performed the steps of when stating the first computer program
S01, the contact method for obtaining the first user information and the first user, and be sent to server-side and carry out registering and logging;
S02, the unique identification information for obtaining access device, and server-side is sent to obtain idle cabinet in the access device Size and cell number, multiple cabinets of different sizes are equipped in the access device;
S1, access information is generated, and is sent to server-side, the access information includes the contact method and dispatching list of second user Number;
The second processor 8 performs the steps of when executing the second computer program
S2, the access information is received, signature is carried out to the access information by private key and generates corresponding first data, and is returned It is back to terminal;
Judge whether exception or changing process occur, if so, the contact method of the second user is replaced with the first user Contact method, and corresponding back pieces information is sent according to the contact method of first user
S4, third data are received, and pickup successful information is sent according to the contact method of the third data and the first user;
The third processor 9 performs the steps of when executing the third computer program
S3, second data are obtained from terminal, second data are verified by public key corresponding with the private key, If verifying successfully, corresponding accessing operation is executed, first data and the second data are two dimensional code.
In conclusion a kind of method and system of intellectual access provided by the invention, generate access information by terminal, and It is sent to server-side;Server-side receives the access information, carries out signature to the access information by private key and generates accordingly First data, and it is back to terminal;Access device obtains second data from terminal, passes through public key corresponding with the private key Second data are verified, if verifying successfully, execute corresponding accessing operation, improve the safety of access, and And user need to can only be accessed by terminal, easy to use, user experience is good, by the unique identification for obtaining access device Information, and server-side is sent to obtain in the access device size and cell number of idle cabinet, in the access device Equipped with multiple cabinets of different sizes, cabinet of corresponding size is selected according to demand convenient for user, it is easy to use, difference can be met User demand, by judging whether exception or changing process occur, if so, the contact method of the second user is replaced For the contact method of the first user, and corresponding back pieces information is sent according to the contact method of first user, can prevent by Express mail is caused to be lost in exception.
The above description is only an embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalents made by bright specification and accompanying drawing content are applied directly or indirectly in relevant technical field, similarly include In scope of patent protection of the invention.

Claims (10)

1. a kind of method of intellectual access, which is characterized in that comprising steps of
S1, terminal generate access information, and are sent to server-side;
S2, server-side receive the access information, carry out signature to the access information by private key and generate corresponding first number According to, and it is back to terminal;
S3, access device obtain the second data from terminal, are carried out by public key corresponding with the private key to second data Verification, if verifying successfully, executes corresponding accessing operation.
2. the method for intellectual access according to claim 1, which is characterized in that further comprised the steps of: before step S1
S01, terminal obtain the contact method of the first user information and the first user, and are sent to server-side and are registered and stepped on Record;
S02, terminal obtain the unique identification information of access device, and it is idle in the access device to obtain to be sent to server-side The size and cell number of cabinet are equipped with multiple cabinets of different sizes in the access device.
3. the method for intellectual access according to claim 1, which is characterized in that the access information includes second user Contact method and dispatching odd numbers, first data and the second data are two dimensional code.
4. the method for intellectual access according to claim 3, which is characterized in that further comprise the steps of:
Server-side judges whether exception or changing process occur, if so, the contact method of the second user is replaced with The contact method of one user, and corresponding back pieces information is sent according to the contact method of first user.
5. the method for intellectual access according to claim 2, which is characterized in that after step S3 further include:
S4, server-side receive third data, and send pickup success according to the contact method of the third data and the first user Information.
6. a kind of system of intellectual access, including terminal, server-side and access device, the terminal includes first memory, One processor and storage on the first memory and the first computer program that can be run on first processor, the server-side Including second memory, second processor and it is stored in the can run on second memory and in second processor second calculating Machine program, the access device include third memory, third processor and are stored on third memory and can be at third The third computer program run on reason device, which is characterized in that when the first processor executes first computer program It performs the steps of
S1, access information is generated, and is sent to server-side;
The second processor performs the steps of when executing the second computer program
S2, the access information is received, signature is carried out to the access information by private key and generates corresponding first data, and is returned It is back to terminal;
The third processor performs the steps of when executing the third computer program
S3, second data are obtained from terminal, second data are verified by public key corresponding with the private key, If verifying successfully, corresponding accessing operation is executed.
7. the system of intellectual access according to claim 6, which is characterized in that the first processor executes described first It is further comprised the steps of: before performing the steps of step S1 when computer program
S01, the contact method for obtaining the first user information and the first user, and be sent to server-side and carry out registering and logging;
S02, the unique identification information for obtaining access device, and server-side is sent to obtain idle cabinet in the access device Size and cell number, multiple cabinets of different sizes are equipped in the access device.
8. the system of intellectual access according to claim 6, which is characterized in that the access information includes second user Contact method and dispatching odd numbers, first data and the second data are two dimensional code.
9. the system of intellectual access according to claim 8, which is characterized in that the second processor executes described second It performs the steps of and further comprises the steps of: when computer program
Judge whether exception or changing process occur, if so, the contact method of the second user is replaced with the first user Contact method, and corresponding back pieces information is sent according to the contact method of first user.
10. the system of intellectual access according to claim 7, which is characterized in that the second processor executes described the After performing the steps of step S3 when two computer programs further include:
S4, third data are received, and pickup successful information is sent according to the contact method of the third data and the first user.
CN201910053498.0A 2019-01-21 2019-01-21 A kind of method and system of intellectual access Pending CN109872103A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910053498.0A CN109872103A (en) 2019-01-21 2019-01-21 A kind of method and system of intellectual access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910053498.0A CN109872103A (en) 2019-01-21 2019-01-21 A kind of method and system of intellectual access

Publications (1)

Publication Number Publication Date
CN109872103A true CN109872103A (en) 2019-06-11

Family

ID=66917906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910053498.0A Pending CN109872103A (en) 2019-01-21 2019-01-21 A kind of method and system of intellectual access

Country Status (1)

Country Link
CN (1) CN109872103A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100027788A1 (en) * 2007-07-02 2010-02-04 Freescale Semiconductor, Inc. Asymmetric Cryptographic Device With Local Private Key Generation and Method Therefor
CN103617680A (en) * 2013-12-10 2014-03-05 刘兵辉 Intelligent storage and pickup method and system based on two-dimension code management and control
CN105096086A (en) * 2015-08-20 2015-11-25 杭州天丽科技有限公司 Express delivery storing and withdrawing system and express delivery storing and withdrawing method
CN107358279A (en) * 2017-07-17 2017-11-17 哈尔滨学院 A kind of express delivery receive-transmit system and receiving/transmission method based on RFID
CN108510669A (en) * 2018-03-20 2018-09-07 广东邮政邮件快件服务有限公司 A kind of Intelligent Package cabinet of the babinet without interface operation
CN108566378A (en) * 2018-03-14 2018-09-21 福建天泉教育科技有限公司 A kind of method and system for preventing MITM from attacking
CN108805640A (en) * 2017-04-27 2018-11-13 北京京东尚科信息技术有限公司 Mthods, systems and devices for defining the competence

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100027788A1 (en) * 2007-07-02 2010-02-04 Freescale Semiconductor, Inc. Asymmetric Cryptographic Device With Local Private Key Generation and Method Therefor
CN103617680A (en) * 2013-12-10 2014-03-05 刘兵辉 Intelligent storage and pickup method and system based on two-dimension code management and control
CN105096086A (en) * 2015-08-20 2015-11-25 杭州天丽科技有限公司 Express delivery storing and withdrawing system and express delivery storing and withdrawing method
CN108805640A (en) * 2017-04-27 2018-11-13 北京京东尚科信息技术有限公司 Mthods, systems and devices for defining the competence
CN107358279A (en) * 2017-07-17 2017-11-17 哈尔滨学院 A kind of express delivery receive-transmit system and receiving/transmission method based on RFID
CN108566378A (en) * 2018-03-14 2018-09-21 福建天泉教育科技有限公司 A kind of method and system for preventing MITM from attacking
CN108510669A (en) * 2018-03-20 2018-09-07 广东邮政邮件快件服务有限公司 A kind of Intelligent Package cabinet of the babinet without interface operation

Similar Documents

Publication Publication Date Title
CN104834839B (en) A kind of code generating method, method for authenticating and associated terminal based on bar code
CN104660481A (en) Instant messaging processing method and device
CN107194688A (en) In payment system and its method of the offline scenario based on Quick Response Code
CN103368913A (en) Account login method, apparatus and system, and network server
CN103747001A (en) Audio-access mobile payment terminal based on security algorithm and communication method based on security algorithm
CN108683667A (en) Account protection method, device, system and storage medium
CN107666470B (en) Verification information processing method and device
CN103905457B (en) Server, client, Verification System and user authentication and data access method
CN110324815A (en) Activating method, server, terminal and the block chain network system that No.1 is blocked more
CN104092653B (en) Data processing method and system
CN102231716A (en) Instant communication service login method
CN106781070B (en) A kind of self-service express delivery cabinet service system
CN105577651A (en) Service providing method and apparatus
CN106470200A (en) A kind of auth method and relevant apparatus
CN112150252A (en) Credit-based service processing method and device
CN108961034A (en) System and method, storage medium based on user behavior certification
CN104184652B (en) Method and system for information interaction between terminals
CN111669744B (en) Information processing method and device and electronic equipment
CN109285000A (en) A kind of campus self-help payment method and system
CN109872103A (en) A kind of method and system of intellectual access
CN114390452B (en) Message sending method and related equipment
CN106888207A (en) Authentication method, system and SIM
CN110990821A (en) Identity type verification method, device and storage medium
CN112446508A (en) Method and device for recovering package in logistics transportation, storage medium and electronic equipment
CN102868981B (en) Based on the network service push method of mobile terminal, equipment and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination