CN110084931A - A kind of electronic lock authorization method - Google Patents

A kind of electronic lock authorization method Download PDF

Info

Publication number
CN110084931A
CN110084931A CN201910324764.9A CN201910324764A CN110084931A CN 110084931 A CN110084931 A CN 110084931A CN 201910324764 A CN201910324764 A CN 201910324764A CN 110084931 A CN110084931 A CN 110084931A
Authority
CN
China
Prior art keywords
electronic lock
authorization
licensee
lock
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910324764.9A
Other languages
Chinese (zh)
Inventor
温志明
程峰
叶子凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shake Intelligent Technology Co Ltd
Original Assignee
Beijing Shake Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shake Intelligent Technology Co Ltd filed Critical Beijing Shake Intelligent Technology Co Ltd
Priority to CN201910324764.9A priority Critical patent/CN110084931A/en
Publication of CN110084931A publication Critical patent/CN110084931A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Abstract

The present invention provides a kind of electronic lock authorization methods.It solves in existing electronic lock authorization the technical problems such as user's operation is inconvenient, and safety is poor.This electronic lock authorization method, lock administrator generate authorization code in authorization location;Licensee inputs authorization code on electronic lock;Electronic lock verifies authorization code;Licensee inputs user information on electronic lock;Electronic lock is licensee's creation, modification or deletes files on each of customers.The present invention has the advantages that tight security and convenience.

Description

A kind of electronic lock authorization method
Technical field
The present invention relates to electronic lock technical fields, in particular to a kind of electronic lock authorization method.
Background technique
Current electronic lock authorization method can be substantially divided into three categories:
The first kind is that electronic lock is not networked, and authorizes or cancels authorization and require lock administrator and operates locking.
Unlocking etc. that electronic lock unlocking mode in this way generally has password unlocking, fingerprint to unlock, induction is swiped the card.When When being authorized or cancelling the operation of authorization, certain specific instruction is generally inputted on electronic lock, is locked into configuration mould Then formula can be added, be modified, deleting cryptographic consumer, fingerprint user or incude the user that swipes the card.
This authorization safety is higher, and electronic lock not long-distance on-line, all authorization sensitive informations are all only in electronic lock Upper appearance;The different types of users such as cryptographic consumer, fingerprint user, induction card user can authorize and cancel authorization.Disadvantage Have:
(1) user's operation trouble.No matter which kind of unlocking mode, require lock manager user is added on electronic lock in advance It is added in lock, then could use.
(2) under general scenario, it is desirable that lock administrator and licensee are beside lock.
(3) user management is coarse.This authorization general authority period can not modify, that is, be added to some User (cryptographic consumer, fingerprint user, card user), the user can unlock any time before deleting this user, nothing Method accomplishes finer management.
Second class is that lock administrator is locking closely through cell phone application or soft ware authorization or cancellation authorization.
Electronic lock in this way can be networking, be also possible to not network, unlocking mode generally has password Unlocking, fingerprint are unlocked, induction is swiped the card unlocking, bluetooth unlocking etc..
This authorization safety is higher, and all authorization sensitive informations all only occur on electronic lock;Cryptographic consumer refers to The different types of users such as line user, induction card user, bluetooth users can authorize and cancel authorization.But user's operation is also Be it is more troublesome, can overcome the problems, such as that the human-computer interaction of lock is inconvenient using mobile phone or computer, but authorize and cancel authorization It needs to carry out in lock seaming, is not improved the convenience of operation.
Third class is that authorization or cancellation authorization are not all needed in lock local operation, and electric lockset is for network savvy, lock tube Reason person remotely can authorize or cancel authorization on mobile phone or on computer;It is also possible to lock administrator and passes through cell phone application, electricity The modes open portion permission such as brain software or web page oneself can pass through cell phone application, computer to licensee, licensee The modes such as software or web page realize authorization or cancel authorization.
This authorization user's operation is convenient, it can be achieved that fine-grained management, disadvantage have:
(1) safety is poor, and lock administrator is the available sensitive user information to licensee, and this is believed Breath is all propagated by server or on network, might have system risk.
(2) this authorization is suitble to password unlocking, swipes the card if it is fingerprint or induction, it is also necessary to configure additional fingerprint Acquire equipment or card maker.
(3) it authorizes or cancels authorization and depend on network, if network breaks down, operate unsuccessful.
Summary of the invention
The purpose of the present invention is there is the above problem in view of the prior art, a kind of electronic lock authorization method is proposed, is somebody's turn to do Authorization method technical problems to be solved are: improving safety and the convenience of the authorization method of electronic lock system.
Object of the invention can be realized by the following technical scheme:
It locks administrator and generates authorization code in authorization location;Licensee inputs authorization code on electronic lock;Electronic lock verifying is awarded Weighted code;Licensee inputs user information on electronic lock;Electronic lock is licensee's creation, modification or deletes files on each of customers.
Lock administrator does not need to operate on door lock side, and it is raw can remotely to pass through cell phone application, computer software or web page At authorization code.
Administrator is locked when generating authorization code, the authorization message of settable licensee.
Preferably, authorization message includes the user type of licensee, and user type can be human body biological characteristics, close One of code, contactless card are a variety of.
Preferably, authorization message further includes the effective period of time of licensee.
Authorization location or server end will distribute a unique identification information in the electronic lock for licensee.
Preferably, at least by electronic lock mark, licensee, unique identity passes through certain to authorization code in electronic lock Kind algorithm generates.
Preferably, authorization code includes authorization message.
Preferably, authorization code is random digit password.
Licensee receives authorization code, and authorization code is inputted on electronic lock, and electronic lock verifies authorization code.
Preferably, when electronic lock verifying authorization code, according to the method validation consensus with authorization location, the electricity is not required Son lock networking.
After electronic lock is verified, according to authorization message, the corresponding user information of licensee's typing is prompted.
When the user type of licensee is human body biological characteristics, licensee needs the corresponding people of typing on electronic lock Body biological characteristic;When the user type of licensee is password, licensee's needs typing needs on electronic lock are arranged close Code;When the user type of licensee is contactless card, licensee needs the typing on electronic lock to need contactless card to be used.
After licensee completes user information typing, electronic lock will be licensee's creation, modification or deletion files on each of customers.
Preferably, when electronic lock is not networked, the effective period of time of files on each of customers be according to the consensus determination of authorization location 's;When electronic lock is networked, the finer effective time segment information of licensee is obtained from server end.
Compared with prior art, this electronic lock authorization method has the advantage that
1, user's operation is convenient, and authorization or cancellation authorization all do not need not needing lock administrator in lock local operation yet It is close locking.
2, safety is higher, all authorization sensitive informations all only occur on electronic lock, not over server or It is propagated on network.
3, it is suitable for the different types of users such as cryptographic consumer, fingerprint user, induction card user, does not need to configure additionally Fingerprint collecting equipment or card maker.
4, independent of network, if network breaks down, Authorized operation can also succeed.
Detailed description of the invention
Fig. 1 is the schematic diagram of embodiment one in the present invention.
Fig. 2 is the authorization flow figure of embodiment one in the present invention.
Fig. 3 is the schematic diagram of embodiment two in the present invention.
Fig. 4 is the authorization flow figure of embodiment one in the present invention.
Fig. 5 is the schematic diagram of embodiment three in the present invention.
Fig. 6 is the authorization flow figure of embodiment three in the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments to the present invention It is further elaborated.It should be appreciated that specific embodiment described herein be used only for explain the present invention rather than Limit the present invention.In addition, technical characteristic involved in described each embodiment does not constitute a conflict with each other just Can be combined with each other composition other embodiments, alternatively, can also according to circumstances delete certain technical characteristics in each embodiment and Constitute other embodiments.
Embodiment one:
As shown in Figs. 1-2, in the present embodiment, electronic lock system includes authorization location 1001, server 1002, licensee 1003 and electronic lock 1004.Wherein, authorization location 1001 is cell phone application;Electronic lock supports fingerprint to unlock, password unlocking and induction Card is unlocked;Electronic lock is connect by wifi with server, is not to connect in real time the considerations of for low-power consumption, only when meeting When setting condition, electronic lock just can be communicated actively with server;Server is not communicated with electronic lock actively.
Before use, needing for electronic lock to be added in management system, locking administrator can be to this electricity in cell phone application Son lock is managed.
When needing to authorize a fingerprint enabling permission to certain licensee, steps are as follows:
(1) lock administrator finds the lock in cell phone application, fills in authorization message, including licensee's identification information, The initial time that the user type of licensee is fingerprint user, licensee uses, end time etc.;By cell phone application to Server, which issues, calculates authorization code request.
(2) server receives user's request, is requested according to the electronic lock current grant, distributes a body for the licensee Part mark, i.e., the licensee is in the Customs Assigned Number S0 of the electronic lock, which is some value in 0-99, with 2 bit digital words Symbol indicates;
The user type of licensee is encoded, 1 bit digital character S1 is obtained;
Server identifies electronic lock, 0 point of 0 second 0 minute timestamp, licensee on date exist where the current grant time Customs Assigned Number S0, user type coding S1 of licensee of the electronic lock etc. carry out MD5 hash operations, generate hashed result;
Every 2 bytes of hashed result are changed into integer data, and to 10 remainders, obtain 8 bit digital character R0;
R0 and S0, S1 are combined into 11 bit digital passwords, i.e. authorization code.
(3) authorization code is returned to the cell phone application of lock administrator by server, which is sent to by lock administrator is awarded Weigh people.
(4) licensee receives authorization code, and the authorization code is inputted on electronic lock;
(5) electronic lock parses corresponding R0, S0, S1 according to the authorization code that licensee inputs;To electronic lock mark, when 0 point of 0 second 0 minute timestamp, S0, S1 on date etc. carry out MD5 hash operations where the preceding time, generate hashed result;It will hash As a result every 2 bytes change into integer data, and to 10 remainders, obtain 8 bit digital character R0 ';If R0==R0 ', then it represents that Authorization code verifying is correct;Otherwise, authorization code verifying is incorrect.
(6) electronic lock voice prompting " typing fingerprint ", licensee's typing fingerprint;
(7) after completing fingerprint typing, for electronic lock by the files on each of customers of newly-built fingerprint user serial number S0, the user's is effective Time is defaulted as from the authorization three days effectively;Then electronic lock voice prompting " operating successfully ";
(8) it authorizes successfully, licensee is that the fingerprint of available typing just now is unlocked;
(9) when electronic lock and server communicate, the tell the server Authorized operation successful execution, and obtain lock administrator The initial time that the licensee of setting uses, the information such as end time;If three day validity period was already expired, electronic lock again without It can be communicated with server, then the Authorized operation of the licensee is expired in electronic lock, need to authorize again.
Embodiment two:
As shown in Figure 3-4, in the present embodiment, electronic lock system includes authorization location 2001, licensee 2002 and electricity Son lock 2003.Wherein, authorization location 2001 is cell phone application;Electronic lock supports fingerprint to unlock, and password unlocking and contactless card are unlocked;Such as For the cell phone application of fruit administrator near electronic lock, the two can pass through bluetooth communication.
Before use, needing to bind electronic lock and the APP of administrator, lock administrator could be in cell phone application to this electricity Son lock is managed.
When needing to authorize a contactless card enabling permission to certain licensee, steps are as follows:
(1) lock administrator finds the lock in cell phone application, fills in authorization message, including licensee's identification information, The user type of licensee is the initial time for incuding card user, licensee and using, end time etc.;
(2) cell phone application program is requested according to the electronic lock current grant, distributes an identity for the licensee, I.e. the licensee is in the Customs Assigned Number S0 of the electronic lock, which is some value in 0-99, with 2 bit digital character representations;
The user type of licensee is encoded, 1 bit digital character S1 is obtained;
The end time that licensee is used subtracts initial time, obtains validity period number of days S2, and maximum is supported 999 days, With 3 bit digital character representations;
Cell phone application program identifies electronic lock, 0 point of the date where the initial time that uses of licensee 0 second 0 minute when Between stamp, licensee the Customs Assigned Number S0 of the electronic lock, licensee user type coding S1, validity period number of days S2 etc. into Row MD5 hash operations generate hashed result;
Every 2 bytes of hashed result are changed into integer data, and to 10 remainders, obtain 8 bit digital character R0;
R0 and S0, S1, S2 are combined into 14 bit digital passwords, i.e. authorization code.
(3) authorization code is sent to licensee by lock administrator.
(4) licensee receives authorization code, and the authorization code is inputted on electronic lock;
(5) electronic lock parses corresponding R0, S0, S1, S2 according to the authorization code that licensee inputs;To electronic lock mark Know, 0 point of 0 second 0 minute timestamp, S0, S1, S2 on date etc. where current time carry out MD5 hash operations, generation hash knot Fruit;Every 2 bytes of hashed result are changed into integer data, and to 10 remainders, obtain 8 bit digital character R0 ';If R0== R0 ', then it represents that authorization code verifying is correct;Otherwise, authorization code verifying is incorrect.
(6) on the day before electronic lock takes current time, a few days ago, one day after, two days time afterwards, recalculate step (5), It as long as any one R0==R0 ' calculated, can indicate that authorization code verifying is correct, and can obtain when calculating correct Time, i.e. the effective initial time of user;
(7) electronic lock voice prompting " asking fabrication ", licensee are contactless card fabrication on electronic lock;
(8) complete contactless card fabrication after, electronic lock by it is newly-built induction card user serial number S0 files on each of customers, the user's The effective end time can obtain according to effective initial time and S2;Then electronic lock voice prompting " operating successfully ";
(9) licensee is that the available contactless card for completing fabrication just now is unlocked.
Embodiment three:
As seen in figs. 5-6, in the present embodiment, electronic lock system includes authorization location 3001, and server end 3002 is authorized to People 3003 and electronic lock 3004.Wherein, authorization location 3001 is web page;Electronic lock supports password unlocking;Electronic lock passes through Wifi and server communicate, it is contemplated that power consumption, wifi cannot be connected always, using connecting primary strategy per hour.
Before use, needing for electronic lock to be registered in management system, lock administrator could be on web page to this electronics Lock is managed.
When needing to authorize a secret number permission to certain licensee, steps are as follows:
(1) lock administrator finds the lock on web page, fills in authorization message, including licensee's cell-phone number, is authorized to The initial time that the user type of people is cryptographic consumer, licensee uses, end time etc.;It is issued by network to server Calculate authorization code request.
(2) cell phone application program is requested according to the electronic lock current grant, distributes an identity for the licensee, I.e. the licensee is in the Customs Assigned Number S0 of the electronic lock, which is some value in 0-99, with 2 bit digital character representations;
The user type of licensee is encoded, 1 bit digital character S1 is obtained;
The end time that licensee is used subtracts initial time, obtains validity period number of days S2, and maximum is supported 999 days, With 3 bit digital character representations;
Cell phone application program identifies electronic lock, 0 point of the date where the initial time that uses of licensee 0 second 0 minute when Between stamp, licensee the Customs Assigned Number S0 of the electronic lock, licensee user type coding S1, validity period number of days S2 etc. into Row MD5 hash operations generate hashed result;
Every 2 bytes of hashed result are changed into integer data, and to 10 remainders, obtain 8 bit digital character R0;
R0 and S0, S1, S2 are combined into 14 bit digital passwords, i.e. authorization code.
(3) server is sent the authorization code on the mobile phone of licensee in a manner of short message.
(4) licensee receives authorization code, and the authorization code is inputted on electronic lock;
(5) electronic lock parses corresponding R0, S0, S1, S2 according to the authorization code that licensee inputs;To electronic lock mark Know, 0 point of 0 second 0 minute timestamp, S0, S1, S2 on date etc. where current time carry out MD5 hash operations, generation hash knot Fruit;Every 2 bytes of hashed result are changed into integer data, and to 10 remainders, obtain 8 bit digital character R0 ';If R0== R0 ', then it represents that authorization code verifying is correct;Otherwise, authorization code verifying is incorrect.
(6) on the day before electronic lock takes current time, a few days ago, one day after, two days time afterwards, recalculate step (5), It as long as any one R0==R0 ' calculated, can indicate that authorization code verifying is correct, and can obtain when calculating correct Time, i.e. the effective initial time of user;
(7) electronic lock voice prompting " please input password ", password is arranged in licensee on electronic lock;
(8) after completing addition password, for electronic lock by the files on each of customers of newly-built cryptographic consumer serial number S0, the user's is effective End time can be obtained according to effective initial time and S2;Then electronic lock voice prompting " operating successfully ";
(9) licensee is the available password unlocking being arranged just now.

Claims (8)

1. a kind of electronic lock authorization method, it is characterised in that: lock administrator generates authorization code in authorization location;Licensee is in electronics Lock input authorization code;Electronic lock verifies authorization code;Licensee's typing user information on electronic lock;Electronic lock is authorized Files on each of customers is deleted in people's creation, modification.
2. a kind of electronic lock authorization method according to claim 1, which is characterized in that the authorization code is at least by the electricity Son lock mark, the licensee unique identity in the electronic lock are generated by certain algorithm.
3. any electronic lock authorization method according to claim 1 to 2, which is characterized in that the authorization code includes described The authorization message of licensee.
4. a kind of electronic lock authorization method according to claim 3, which is characterized in that the authorization message includes the quilt User type of the donor in the electronic lock, the user type include human body biological characteristics, password, in contactless card at least It is a kind of.
5. a kind of electronic lock authorization method according to claim 3, which is characterized in that the authorization message further includes described The effective period of time of licensee.
6. a kind of electronic lock authorization method according to claim 3, which is characterized in that the authorization code is that random digit is close Code.
7. a kind of electronic lock authorization method according to claim 1, which is characterized in that the electronic lock verifies authorization code When, according to the method validation consensus with authorization location, the electronic lock is not required to network.
8. a kind of electronic lock authorization method according to claim 1, which is characterized in that when the electronic lock is not networked, institute State files on each of customers effective period of time be according to the consensus determination of authorization location;When the electronic lock is networked, from server End obtains the finer effective time segment information of licensee.
CN201910324764.9A 2019-04-22 2019-04-22 A kind of electronic lock authorization method Pending CN110084931A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910324764.9A CN110084931A (en) 2019-04-22 2019-04-22 A kind of electronic lock authorization method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910324764.9A CN110084931A (en) 2019-04-22 2019-04-22 A kind of electronic lock authorization method

Publications (1)

Publication Number Publication Date
CN110084931A true CN110084931A (en) 2019-08-02

Family

ID=67416044

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910324764.9A Pending CN110084931A (en) 2019-04-22 2019-04-22 A kind of electronic lock authorization method

Country Status (1)

Country Link
CN (1) CN110084931A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110660147A (en) * 2019-09-27 2020-01-07 江苏亨通问天量子信息研究院有限公司 Multi-party matched unlocking safe and unlocking method thereof
CN112785757A (en) * 2020-12-31 2021-05-11 九牧厨卫股份有限公司 Intelligent lock authorization authentication method and intelligent lock

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105931337A (en) * 2016-05-09 2016-09-07 杭州摇光科技有限公司 Electronic lock device and system and authorizing method of electronic lock system
CN107093228A (en) * 2016-02-17 2017-08-25 腾讯科技(深圳)有限公司 Authorization method, apparatus and system applied to electric lockset
CN108682063A (en) * 2018-05-11 2018-10-19 戴天智能科技(上海)有限公司 A kind of authoring system of smart lock
CN108921986A (en) * 2018-06-15 2018-11-30 上海移为通信技术股份有限公司 Hotel house intelligent door lock management system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107093228A (en) * 2016-02-17 2017-08-25 腾讯科技(深圳)有限公司 Authorization method, apparatus and system applied to electric lockset
CN105931337A (en) * 2016-05-09 2016-09-07 杭州摇光科技有限公司 Electronic lock device and system and authorizing method of electronic lock system
CN108682063A (en) * 2018-05-11 2018-10-19 戴天智能科技(上海)有限公司 A kind of authoring system of smart lock
CN108921986A (en) * 2018-06-15 2018-11-30 上海移为通信技术股份有限公司 Hotel house intelligent door lock management system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110660147A (en) * 2019-09-27 2020-01-07 江苏亨通问天量子信息研究院有限公司 Multi-party matched unlocking safe and unlocking method thereof
CN112785757A (en) * 2020-12-31 2021-05-11 九牧厨卫股份有限公司 Intelligent lock authorization authentication method and intelligent lock

Similar Documents

Publication Publication Date Title
CN105976466B (en) Automobile entrance guard door opening method
CN109272606B (en) Intelligent lock supervision equipment and method based on block chain and storage medium
US7770212B2 (en) System and method for privilege delegation and control
KR101296863B1 (en) Entry authentication system using nfc door lock
CN107274532A (en) The temporary password gate control system that encryption parameter dynamically updates
WO2020185388A1 (en) Locking device biometric access
CN207409010U (en) The newer temporary password access control system of encryption parameter dynamic
CN106023360A (en) Intelligent system management method of Bluetooth intelligent lock
CN108711209A (en) dynamic password generation and verification method and system
US20140329497A1 (en) Smartdevices Enabled Secure Access to Multiple Entities (SESAME)
WO2013175901A1 (en) Authorization server and client apparatus, server cooperative system, and token management method
JP2012212211A (en) Authentication cooperation system and authentication cooperation method
CN108701384B (en) Method for monitoring access to electronically controllable devices
WO2009101549A2 (en) Method and mobile device for registering and authenticating a user at a service provider
CN107146307A (en) A kind of method of securely unlocking of intelligent lock system
WO2020170976A1 (en) Authorization system, management server, and authorization method
CN107989514A (en) There is the safety box of dynamic password
CN108712389A (en) A kind of intelligent lock system
CN109936552A (en) A kind of cipher key authentication method, server and system
CN109035499A (en) A kind of electronic password lock authentication method based on dynamic password
CN110084931A (en) A kind of electronic lock authorization method
CN109147103A (en) dynamic password intelligent unlocking system and method
MX2014010117A (en) Information processing apparatus, information processing system, information processing method and computer program.
CN110910544A (en) Dynamic password door opening method and door lock
CN106790138A (en) A kind of method of government affairs cloud application User logs in double factor checking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190802

RJ01 Rejection of invention patent application after publication