CN110379052A - Unlocking method, method, authorization method and the management system of application unlock - Google Patents

Unlocking method, method, authorization method and the management system of application unlock Download PDF

Info

Publication number
CN110379052A
CN110379052A CN201910593075.8A CN201910593075A CN110379052A CN 110379052 A CN110379052 A CN 110379052A CN 201910593075 A CN201910593075 A CN 201910593075A CN 110379052 A CN110379052 A CN 110379052A
Authority
CN
China
Prior art keywords
intelligent key
unlocking
client service
encoded information
duration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910593075.8A
Other languages
Chinese (zh)
Inventor
戴昊
吴海涛
薛志成
崔志文
欧旋
谢欢欢
陈鲲
谢志毅
高文江
邵心元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Power Supply Bureau Co Ltd
Original Assignee
Shenzhen Power Supply Bureau Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Power Supply Bureau Co Ltd filed Critical Shenzhen Power Supply Bureau Co Ltd
Priority to CN201910593075.8A priority Critical patent/CN110379052A/en
Publication of CN110379052A publication Critical patent/CN110379052A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations

Abstract

This application involves a kind of unlocking methods, method, authorization method and the management system of application unlock.Unlocking method includes: the identity code that Intelligent key receives applicant, and judges whether the identity code is effective;If the identity code is effective, whether the Intelligent key detects itself in the unlocked state;If being not at the unlocked state, then the request of the encoded information of the Intelligent key and the Intelligent key is sent to after client service using duration and generates test application of unlocking by the Intelligent key, and is tested application according to the unlocking by controlling terminal and generated authorization message;The Intelligent key enters unlocked state after receiving the authorization message, and executes the unlocking operation to equipment, and records the unlocking operation simultaneously and generate the unlocking record of the Intelligent key.The problem of method provided by the present application can solve the misoperation fault that traditional scheme easily causes equipment in the method presence unlocked using Intelligent key, endanger power grid operation.

Description

Unlocking method, method, authorization method and the management system of application unlock
Technical field
Field is managed this application involves power equipment, and special standby is to be related to a kind of unlocking method, the method for application unlock, authorization Method and management system.
Background technique
Substation equipment in use, commonly using microcomputer anti-misoperation system prevent inoperative personnel operate substation set It is standby.And an equipment being commonly used in microcomputer anti-misoperation system is exactly Intelligent key, i.e., installation and Intelligent key in equipment Matched lockset.When needing the equipment using substation, operations staff needs to open lockset using Intelligent key.In order to Matching and debugging is carried out when equipment is installed, and also facilitates installation and debugging and the equipment-patrolling of lockset, therefore Intelligent key Unlocking test function is all had in conventional func, staff only needs to input simple fixed password on Intelligent key Unlock unlocking test function.
However, in the actual use of Intelligent key, often there is operations staff and directly adopt the mode of input password making Unlocking operation is carried out with Intelligent key, and to the equipment of substation.This has been resulted in operations staff and has arbitrarily been opened using Intelligent key Lock device.This way easily causes the misoperation fault of equipment departing from the control of microcomputer anti-misoperation system, gives power grid operation Bring security risk.
Therefore, there is the misoperation fault for easily causing equipment in traditional scheme using the method that Intelligent key is unlocked, The problem of endangering power grid operation.
Summary of the invention
There is the misoperation fault for easily causing equipment, harm electricity in traditional scheme using the method that Intelligent key is unlocked The problem of net stable operation.Based on this, the application provides method, authorization method and the management of a kind of unlocking method, application unlock System.
A kind of unlocking method, for unlocking Intelligent key characterized by comprising
S100, Intelligent key receive the identity code of applicant, and judge whether the identity code is effective;
S120, if the identity code is effective, whether the Intelligent key detects itself in the unlocked state;
S130, if in the unlocked state, the Intelligent key matches corresponding equipment, and the unlocking executed to equipment is grasped Make;
S140, if being not at the unlocked state, the Intelligent key is by the encoded information of the Intelligent key and institute The request for stating Intelligent key is sent to after client service using duration generates test application of unlocking, and by controlling terminal according to institute It states unlocking test application and generates authorization message, the authorization message makes at the Intelligent key for activating the Intelligent key In the unlocked state;
S150, the Intelligent key enters unlocked state after receiving the authorization message, and the unlocking executed to equipment is grasped Make, and records the unlocking operation simultaneously and generate the unlocking record of the Intelligent key.
The unlocking method provided by the present application, is executed by Intelligent key.Firstly, if what the Intelligent key received Whether the identity code of applicant is effective, then start to detect the Intelligent key itself in the unlocked state.If the intelligence Key is in the unlocked state, then the Intelligent key executes the unlocking operation to equipment.If the Intelligent key is not at described Unlocked state, then by the Intelligent key send the Intelligent key encoded information and the Intelligent key request use when Length is generated test application of unlocking by the client service to client service.Then, controlling terminal can survey the unlocking Examination application is audited, if unlocking test application, by audit, the controlling terminal generates the authorization message.It is described Intelligent key enters unlocked state after receiving the authorization message, and executes the unlocking operation to equipment.
The unlocking method provided by the present application can verify the identity of applicant, and audit institute by controlling terminal The encoded information of Intelligent key is stated, and after adjusting the up time of the Intelligent key, generates authorization message.There is described award After weighing information, the Intelligent key can just carry out the unlocking operation to equipment.So the unlocking method can prevent non-work Make personnel arbitrarily to unlock using the Intelligent key, in turn results in the maloperation of equipment, endanger power grid operation.Cause This, the unlocking method provided by the present application can solve to be existed in scheme using the method that Intelligent key is unlocked and easily cause The misoperation fault of equipment, the problem of endangering power grid operation.
In one of them embodiment, after the S150, the method also includes:
Unlocking record is sent to the controlling terminal by S160, and removes the unlocking record of itself.
In one of them embodiment, the S140 includes:
S141 generates image using duration and believes according to the encoded information of the Intelligent key and the request of the Intelligent key Breath, and described image information is sent to after the client service and generates the unlocking test application, and eventually by the control End tests application according to the unlocking and generates the authorization message.
In one of them embodiment, the S150 further include:
S151, while judging whether there is violation operation in unlocking record, the violation operation refer to unlock again by The equipment of unlocking;
S152 executes alarm operation by the Intelligent key if having violation operation in unlocking record.
In one of them embodiment, after the S100, the method also includes:
S101 does not execute any operation if the identity code is invalid.
A kind of authorization method, for unlocking Intelligent key, comprising:
S300 receives test application of unlocking, and the test application of unlocking includes the encoded information of Intelligent key ready for use, And the request of the Intelligent key uses duration;
S310 audits the unlocking test application, and whether the encoded information for verifying the Intelligent key ready for use is correct, And judge whether the request of the Intelligent key using duration is more than limitation duration;
S320, if the encoded information of the Intelligent key is correct, and the request of the Intelligent key is no more than using duration The limitation duration, then generate authorization message, and the authorization message is used to unlock the access right of the Intelligent key;
S330, if the encoded information of the Intelligent key is correct, but the request of the Intelligent key is more than institute using duration Limitation duration is stated, then adjusts the request of the Intelligent key using generating the authorization message after duration, and feed back to client's clothes It is engaged in end, feeding back to the Intelligent key by the client service;
S340 generates not authorization message if the encoded information of the Intelligent key is incorrect, and feeds back to the client Server-side feeds back to the Intelligent key by the client service.
The application also provides a kind of authorization method, is executed by controlling terminal.The authorization method includes receiving test of unlocking Apply, audit the unlocking test application, and generates authorization message.Wherein, auditing the unlocking test application includes verifying Whether the encoded information of Intelligent key ready for use is correct, and judges whether the request of the Intelligent key using duration is more than limit Duration processed.If the encoded information of the Intelligent key is correct, and the use duration of the Intelligent key be no more than the limitation when It is long, then it is immediately generated authorization message and the Intelligent key is fed back to by the client service.If the Intelligent key Encoded information is correct but the request using duration is more than limitation duration, then adjusts request use by the controlling terminal Duration, and then authorization message is generated, and the Intelligent key is fed back to by the client service.
The authorization method provided by the present application can audit the encoded information of the Intelligent key, and control The use duration of the Intelligent key.After using duration, it need to apply again using the Intelligent key, and by the control Terminal processed is audited again.Therefore, the authorization method provided by the present application can prevent the unlimited use of the Intelligent key, And application can be tested to the unlocking and be audited and adjusted, enhance the safety in utilization of the Intelligent key.Therefore, originally The authorization method that application provides can solve to be existed in traditional scheme using the method that Intelligent key is unlocked and easily cause The misoperation fault of equipment, the problem of endangering power grid operation.
In one of them embodiment, after the S330, the method also includes:
S331, receives the unlocking record of the Intelligent key, and stores the unlocking record of the Intelligent key, the intelligence The unlocking record of key includes all unlocking operations of the Intelligent key for equipment.
A method of application unlock, comprising:
S200, client service receives the encoded information of Intelligent key and the request of the Intelligent key uses duration, and Judge whether the encoded information of the Intelligent key is correct;;
S210, if the encoded information of the Intelligent key is correct, according to the encoded information of the Intelligent key and described The request of Intelligent key uses duration, generates test application of unlocking;
Unlocking test application is sent to controlling terminal by S220, the client service, and by the controlling terminal Application is tested according to the unlocking and generates authorization message, and the authorization message makes the intelligence for activating the Intelligent key Key is in the unlocked state;
S230, the client service receives the authorization message, and the authorization message is fed back to the intelligent key Spoon.
The application also provides a kind of method of application unlock, is executed by client service.The client service receives intelligence The encoded information of energy key and the request of the Intelligent key use duration, and confirm that the encoded information of the Intelligent key is correct Afterwards, test application of unlocking is generated.Unlocking test application is sent to controlling terminal by the client service, and eventually by control End tests application according to the unlocking and generates authorization message, and feeds back to the client service.The client service receives The Intelligent key is fed back to after to the authorization message, so that the Intelligent key enters the solution according to the authorization message Lock status.It is provided by the present application it is described application unlock method can the encoded information to Intelligent key carry out audit confirmation, because This, can prevent the random use of the Intelligent key.Therefore, the method for the application unlock provided by the present application can solve There is the misoperation fault for easily causing equipment in traditional scheme using the method that Intelligent key is unlocked, endangers stabilization of power grids fortune Capable problem.
In one of them embodiment, the method also includes:
S240, the client service receive the unlocking record of the Intelligent key, and by the unlocking of the Intelligent key Record is sent to the controlling terminal.
In one of them embodiment, the S210 includes:
S211, the client service generate test information of unlocking according to image information, wherein described image information is by institute Intelligent key is stated to be generated according to the request of the encoded information and the Intelligent key of the Intelligent key using duration.
In one of them embodiment, the S200 includes:
S201, the client service obtain the encoded information of the Intelligent key after analyzing described image information;
S202, whether the client service verifies the encoded information correct.
S203, if the encoded information is correct, the client service generation has accepted information;
S205, if the encoded information is incorrect, the client service generation does not accept information.
A kind of management system, for managing Intelligent key, comprising:
Controlling terminal tests application for receiving and auditing test application of unlocking, and according to by the unlocking of audit Generate authorization message;
Client service is communicated to connect with the controlling terminal, and whether the encoded information for judging Intelligent key is correct, And the unlocking is generated using duration according to the request of the encoded information of the correct Intelligent key and Intelligent key and tests Shen Please, and to the controlling terminal unlocking test application is sent, and,
The authorization message is sent to the Intelligent key;
Intelligent key is communicated to connect with the client service, for sending the intelligent key to the client service The encoded information of spoon and the request of the Intelligent key use duration;
Communications adapter, with the Intelligent key be wirelessly connected, and with the client service wired connection, for receiving The unlocking of the Intelligent key records, and unlocking record is sent to the client service.
The application also provides a kind of management system, including the controlling terminal, the client service, the Intelligent key With the communications adapter.The Intelligent key sends the encoded information of the Intelligent key and described to the client service The request of Intelligent key uses duration.The client service can judge the encoded information of the Intelligent key, and The unlocking test application is generated using duration according to the request of the encoded information of the correct Intelligent key and Intelligent key. The controlling terminal is applied for receiving and auditing the unlocking test, and is given birth to according to the unlocking test application by audit At authorization message.The authorization message can be fed back to the intelligent key by the client service by the controlling terminal Spoon, the Intelligent key enter unlocked state according to the authorization message.
The management system provided by the present application can manage the Intelligent key, prevent the Intelligent key Behaviour in service lack of standardization.Therefore, the management system provided by the present application can solve in traditional scheme using Intelligent key into The problem of there is the misoperation fault for easily causing equipment in the method that row is unlocked, endanger power grid operation.
Detailed description of the invention
Fig. 1 is the flow diagram for the unlocking method that one embodiment of the application provides.
Fig. 2 is the flow diagram for the authorization method that one embodiment of the application provides.
Fig. 3 is the flow diagram of the method for the application unlock that one embodiment of the application provides.
Fig. 4 is the flow diagram of the method for the application unlock that another embodiment of the application provides.
Fig. 5 is the flow diagram for the authorization method that one embodiment of the application provides.
Drawing reference numeral explanation
Management system 10
Controlling terminal 100
Client service 200
Intelligent key 300
Communications adapter 400
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing to the application Specific embodiment be described in detail.Many details are explained in the following description in order to fully understand this Shen Please.But the application can be implemented with being much different from other way described herein, those skilled in the art can be not Similar improvement is done in the case where violating the application intension, therefore the application is not limited by following public specific implementation.
It should be noted that it can directly on the other element when element is referred to as " being fixed on " another element Or there may also be elements placed in the middle.When an element is considered as " connection " another element, it, which can be, is directly connected to To another element or it may be simultaneously present centering elements.
Unless otherwise defined, all technical and scientific terms used herein and the technical field for belonging to the application The normally understood meaning of technical staff is identical.The term used in the description of the present application is intended merely to description tool herein The purpose of the embodiment of body, it is not intended that in limitation the application.Term " and or " used herein includes one or more phases Any and all combinations of the listed item of pass.
Referring to FIG. 1, the application provides a kind of unlocking method, for unlocking Intelligent key, comprising:
S100, Intelligent key receive the identity code of applicant, and judge whether the identity code is effective.
Staff can shift to an earlier date inputs all applicants that the Intelligent key can be used on the Intelligent key Identity code, form the information bank of applicant.When some applicant needs using the Intelligent key, first have to The identity code of applicant is inputted on the Intelligent key.After the Intelligent key identifies the identity code, body is judged Whether part identification code is effective.The identity code effectively refers to that the Intelligent key can be in the information bank of the applicant In be matched to the same identity code.
S120, if the identity code is effective, whether the Intelligent key detects itself in the unlocked state.
Wherein, the unlocked state refers to that the Intelligent key is in the state that can be used, it can to equipment into Row unlocking operation.
S130, if in the unlocked state, the Intelligent key matches corresponding equipment, and the unlocking executed to equipment is grasped Make.
The Intelligent key can be with corresponding equipment physical connection, to realize the unlocking operation to equipment.
S140, if being not at the unlocked state, the Intelligent key is by the encoded information of the Intelligent key and institute The request for stating Intelligent key is sent to after client service using duration generates test application of unlocking, and by controlling terminal according to institute It states unlocking test application and generates authorization message, the authorization message makes at the Intelligent key for activating the Intelligent key In the unlocked state;
When the Intelligent key is not at unlocked state, at this time applicant cannot use the Intelligent key to equipment into Row unlocking operation.Applicant needs to send the request of the encoded information of the Intelligent key and the Intelligent key using duration Test of unlocking is generated using duration according to the encoded information and the request to client service, and by the client service Application.
S150, the Intelligent key enters unlocked state after receiving the authorization message, and the unlocking executed to equipment is grasped Make, and records the unlocking operation simultaneously and generate the unlocking record of the Intelligent key.
After the Intelligent key receives the authorization message, into unlocked state.At this point, the Intelligent key can with set Standby upper lock physical connection, to open the equipment.
It the present embodiment provides a kind of unlocking method, is executed by Intelligent key.Firstly, if what the Intelligent key received Whether the identity code of applicant is effective, then start to detect the Intelligent key itself in the unlocked state.If the intelligence Key is in the unlocked state, then the Intelligent key executes the unlocking operation to equipment.If the Intelligent key is not at described Unlocked state, then by the Intelligent key send the Intelligent key encoded information and the Intelligent key request use when Length is generated test application of unlocking by the client service to client service.Then, controlling terminal can survey the unlocking Examination application is audited, if unlocking test application, by audit, the controlling terminal generates the authorization message.It is described Intelligent key enters unlocked state after receiving the authorization message, and executes the unlocking operation to equipment.
The unlocking method provided in this embodiment can verify the identity of applicant, and be audited by controlling terminal The encoded information of the Intelligent key, and after adjusting the up time of the Intelligent key, generate authorization message.Have described After authorization message, the Intelligent key can just carry out the unlocking operation to equipment.So the unlocking method can prevent it is non- Staff is arbitrarily unlocked using the Intelligent key, is in turn resulted in the maloperation of equipment, is endangered power grid operation.Cause This, the unlocking method provided in this embodiment can solve to be existed in scheme using the method that Intelligent key is unlocked and easily make The misoperation fault of forming apparatus, the problem of endangering power grid operation.
In one embodiment of the application, after the S150, the method also includes:
Unlocking record is sent to the controlling terminal by S160, and removes the unlocking record of itself.
The Intelligent key can by communications adapter or other can carry out the intermediary of information transmission, by the unlocking Record is sent to the controlling terminal.The record of unlocking includes the unlocking amount and Lock-Picking Devices number of the Intelligent key.Example Such as, there are three equipment that number is 1,2 and 3, the Intelligent key, which has been unlocked, numbers the equipment for being 1 and 2, then the intelligence key It is 2 that the unlocking record of spoon, which includes: unlocking amount, and Lock-Picking Devices number is 1 and 2.The i.e. described Intelligent key has been unlocked two equipment, institute The number for stating two equipment is 1 and 2.
The unlocking of the Intelligent key can be recorded and be sent to the control by the S160 provided in this embodiment Terminal is monitored and is recorded to unlocking record by the controlling terminal.Therefore, can be convenient staff check it is described It unlocks and records.And the Intelligent key removes the operation of the unlocking record of itself, can keep depositing for the Intelligent key Storage capacity is not reduced, and guarantees the speed of service of the Intelligent key.
In one embodiment of the application, the S140 includes:
S141 generates image using duration and believes according to the encoded information of the Intelligent key and the request of the Intelligent key Breath, and described image information is sent to after the client service and generates the unlocking test application, and eventually by the control End tests application according to the unlocking and generates the authorization message.
In one embodiment, described image information is image in 2 D code, and the client service is mobile terminal, such as Mobile phone.The client service can obtain encoded information and the institute of the Intelligent key by scanning the image in 2 D code The request for stating Intelligent key uses duration.In turn, the client service can according to the encoded information of the Intelligent key and The request of the Intelligent key generates the unlocking test application using duration.The controlling terminal can be surveyed according to the unlocking Examination application generates the authorization message.Specifically, the controlling terminal can verify the Intelligent key encoded information whether Correctly, and according to the actual situation the request of the Intelligent key is adjusted using duration.In one embodiment, if it is described The encoded information of Intelligent key is correct, but the request of the Intelligent key is more than limitation duration using duration, then by the control Terminal processed adjusts the request of the Intelligent key using after duration, exports the authorization message.The authorization message, which can be, awards Weighted code, after the authorization code is inputted on the Intelligent key, the Intelligent key can enter unlocked state.
In one embodiment of the application, the S150 includes:
S151, while judging whether the unlocking record has violation operation, the violation operation refers to unlock again is opened The equipment of lock.
S152 executes alarm operation by the Intelligent key if having violation operation in unlocking record.
For example, there is two equipment that number is 1 and 2, the equipment that the Intelligent key has been 1 to number understands Lock, but applicant used it is described number be 1 equipment after, when needing to be unlocked again using the Intelligent key, Just belong to the violation operation.The Intelligent key can record the Intelligent key when applicant operates simultaneously It unlocks and records, if there are violation operations in unlocking record, alarm operation is executed by the Intelligent key.The alarm behaviour Work may include acoustic alarm, light alarm or other alarm forms, can specifically select according to actual needs, the application does not limit It is fixed.The alarm operation can remind applicant in time, and to stop the current violation operation, therefore alarm operation can It is risk of damage to reducing to unlocker device or Intelligent key.
In one embodiment of the application, after the S100, the method also includes:
S101 does not execute any operation if the identity code is invalid.
If the Intelligent key is not matched to the identity code in the database of itself, assert that the identity is known Other code is invalid.Wherein, the database of the Intelligent key is all identity codes that staff has inputted.The identity is known Other code can not then make the Intelligent key enter operation in next step in vain, that is, detect whether the Intelligent key itself is in unlock State also just sends the step of unlocking test is applied to the client service without the Intelligent key.
Fig. 2 is referred to, the application also provides a kind of authorization method, for unlocking Intelligent key, comprising:
S300 receives test application of unlocking, and the test application of unlocking includes the encoded information of Intelligent key ready for use, And the request of the Intelligent key uses duration.
In one embodiment, the S300 is that controlling terminal receives the unlocking test application, and Shen is tested in the unlocking It please include that the encoded information of Intelligent key ready for use and the request of the Intelligent key use duration.In one embodiment In, the unlocking test application is sent to the controlling terminal by client service.And the Intelligent key ready for use Encoded information and the Intelligent key request use duration, the client service is sent to by the Intelligent key. The encoded information of the Intelligent key and the request of the Intelligent key are sent to the client service in the Intelligent key Before duration, the Intelligent key also needs to receive the identity code of applicant, and judges that the identity code is It is no effective.If the identity code is effective, whether the Intelligent key first detects itself in the unlocked state.If in solution Lock status, then the Intelligent key matches corresponding equipment, and executes the unlocking operation to equipment, at this time the client service The encoded information for the Intelligent key that the Intelligent key is sent and the use duration of the Intelligent key will not be received again.Into And the controlling terminal will not receive the unlocking test information.If the identity code is effective, but the intelligent key Spoon is not at the unlocked state, then the Intelligent key sends the coding of the Intelligent key to the client service The request of information and the Intelligent key uses duration.Encoded information and institute of the client service according to the Intelligent key The request for stating Intelligent key generates the unlocking test application using duration, and unlocking test application is sent to the control Terminal processed.
S310 audits the unlocking test application, and whether the encoded information for verifying the Intelligent key ready for use is correct, And judge whether the request of the Intelligent key using duration is more than limitation duration.
After the S300, the controlling terminal audits the unlocking test application, and verifies the intelligence ready for use Whether the encoded information of key is correct, and judges whether the request of the Intelligent key using duration is more than limitation duration.
If inputted identity code in the Intelligent key, all of Intelligent key are also had input in the controlling terminal Encoded information.Whether the encoded information of the verifying Intelligent key ready for use is correct, i.e., the described controlling terminal is in data The encoded information of the Intelligent key ready for use is matched in library.The controlling terminal can also judge the intelligence Whether the request of energy key is more than limitation duration using duration, this step can be in the volume for verifying the Intelligent key ready for use It is carried out before or after the whether correct step of code information, the application is without limitation.The limitation duration can be according to practical need It is set, the application is without limitation.
S320, if the encoded information of the Intelligent key is correct, and the request of the Intelligent key is no more than using duration The limitation duration, then generate authorization message, and the authorization message is used to unlock the access right of the Intelligent key.
If the encoded information of the Intelligent key of the controlling terminal verifying is correct, and the request of the Intelligent key makes It is no more than the limitation duration with duration, then the controlling terminal generates authorization message, and the authorization message is described for unlocking The access right of Intelligent key.The authorization message can be authorization code, applicant inputted on the Intelligent key described in award Weighted code can unlock the Intelligent key.The authorization message can also be the authorization message of other forms, as long as can make to apply People unlocks the Intelligent key according to the authorization message.It is understood that the authorization message is according to the intelligence What the encoded information of energy key and the request of the Intelligent key were generated using duration, therefore, the authorization message is including described in Intelligent key allows using duration, described to allow to be to be generated using duration according to the request of the Intelligent key using duration 's.
S330, if the encoded information of the Intelligent key is correct, but the request of the Intelligent key is more than institute using duration Limitation duration is stated, then adjusts the request of the Intelligent key using generating the authorization message after duration, and feed back to client's clothes It is engaged in end, feeding back to the Intelligent key by the client service.
In one embodiment, if it is more than the limitation duration that the request of the Intelligent key, which uses duration, by described Controlling terminal adjusts the request of the Intelligent key using generating the authorization message after duration.The authorization message includes described Intelligent key allows using duration.After the controlling terminal generates the authorization message, the authorization message is sent to institute Client service is stated, and the Intelligent key is fed back to by the client service.In one embodiment, the controlling terminal With the client service by network connection, the client service and the Intelligent key pass through wireless connection.The visitor Family server-side can also be by wired connection communications adapter, and then the communications adapter is wirelessly connected the Intelligent key, To achieve the purpose that the client service feeds back the authorization message to the Intelligent key.In one embodiment, described It can be carried out data transmission by bluetooth between communications adapter and the Intelligent key.
S340 generates not authorization message if the encoded information of the Intelligent key is incorrect, and feeds back to the client Server-side feeds back to the Intelligent key by the client service.
If the encoded information of the Intelligent key is incorrect, the controlling terminal generates not authorization message, and passes through institute It states client service and feeds back to the Intelligent key.In one embodiment, display interface, Shen are provided on the Intelligent key It asks someone that the authorization message or the not authorization message can be obtained from the display interface.
The authorization method provided in this embodiment, is executed by the controlling terminal.The authorization method includes receiving to open Lock test application audits the unlocking test application, and generates authorization message.Wherein, the unlocking test application packet is audited Include verify the Intelligent key ready for use encoded information it is whether correct, and judge that the request of the Intelligent key uses duration It whether is more than limitation duration.If the encoded information of the Intelligent key is correct, and the use duration of the Intelligent key is no more than The limitation duration is then immediately generated authorization message and feeds back to the Intelligent key by the client service.If described The encoded information of Intelligent key it is correct but it is described request using duration be more than limitation duration, then by the controlling terminal adjust institute Request is stated using duration, and then generates authorization message, and the Intelligent key is fed back to by the client service.
The authorization method provided in this embodiment can audit the encoded information of the Intelligent key, and control Make the use duration of the Intelligent key.After using duration, applicant need to apply again using the Intelligent key, and It is audited again by the controlling terminal.Therefore, the authorization method provided by the present application can prevent the Intelligent key by nothing Limit time use, and can to unlockings test apply be audited and be adjusted, enhance the Intelligent key using safe Property.Therefore, the authorization method provided in this embodiment can solve the side unlocked in traditional scheme using Intelligent key The problem of there is the misoperation fault for easily causing equipment in method, endanger power grid operation.
In one embodiment of the application, after the S330, the method also includes:
S331, receives the unlocking record of the Intelligent key, and stores the unlocking record of the Intelligent key, the intelligence The unlocking record of key includes all unlocking operations of the Intelligent key for equipment.
Such as the description of embodiment in step S160, in one embodiment, the unlocking record includes the Intelligent key Unlocking amount and Lock-Picking Devices number.When the Intelligent key is executed to the unlocking operation of equipment, the Intelligent key can be with It is synchronous to generate the unlocking record, and the unlocking recording synchronism is sent to eventually by the control by the client service End.The Intelligent key is removed described in the Intelligent key after unlocking record is sent to the controlling terminal It unlocks and records, to prevent the storage for unlocking record from the Intelligent key being caused to run slow problem.The controlling terminal connects Receive the unlocking record of the Intelligent key, and store the unlocking record of the Intelligent key, check so as to staff and Save the unlocking record.
Fig. 3 is referred to, the application also provides a kind of method of application unlock, comprising:
S200, client service receives the encoded information of Intelligent key and the request of the Intelligent key uses duration, and Judge whether the encoded information of the Intelligent key is correct.
It is understood that staff's also typing encoded information of the Intelligent key on the client service Database.The client service can carry out preliminary audit survey to the encoded information of the Intelligent key.
S210, if the encoded information of the Intelligent key is correct, according to the encoded information of the Intelligent key and described The request of Intelligent key uses duration, generates test application of unlocking.
If the client service detects that the encoded information of the Intelligent key is correct, the client service according to The request of the encoded information of the Intelligent key and the Intelligent key uses duration, generates test application of unlocking.
Unlocking test application is sent to controlling terminal by S220, the client service, and by the controlling terminal Application is tested according to the unlocking and generates authorization message, and the authorization message makes the intelligence for activating the Intelligent key Key is in the unlocked state.
In one embodiment, the client service and the controlling terminal pass through network connection.The controlling terminal Application can be tested the unlocking and carry out second of audit, that is, whether just to reaffirm the encoded information of the Intelligent key Really.The process that the client service and the controlling terminal verify the encoded information of the Intelligent key can increase The reliability of the encoded information verifying of the Intelligent key, prevents the Input of Data mistake of the controlling terminal, and leads to institute State the encoded information authentication error of Intelligent key.
S230, the client service receives the authorization message, and the authorization message is fed back to the intelligent key Spoon.
In one embodiment, the client service wired connection has a communications adapter, the communications adapter again with The Intelligent key wireless communication connection.The communications adapter can play the role of information flow, i.e., take from the client Business end receives the authorization message, and the authorization message is sent to the Intelligent key.
The present embodiment provides a kind of methods of application unlock, are executed by client service.The client service receives institute The encoded information of Intelligent key and the request of the Intelligent key are stated using duration, and confirms the encoded information of the Intelligent key After correct, test application of unlocking is generated.Unlocking test application is sent to controlling terminal by the client service, and by institute It states controlling terminal and application generation authorization message is tested according to the unlocking, and feed back to the client service.Client's clothes Business termination receive the authorization message after feed back to the Intelligent key so that the Intelligent key according to the authorization message into Enter the unlocked state.The method of the application unlock provided by the present application can audit the encoded information of Intelligent key Confirmation, accordingly it is possible to prevent the random use of the Intelligent key.Therefore, the side of the application unlock provided in this embodiment Method can solve the misoperation fault for existing in traditional scheme using the method that Intelligent key is unlocked and easily causing equipment, harm The problem of power grid operation.
In one embodiment of the application, the method also includes:
S240, the client service receive the unlocking record of the Intelligent key, and by the unlocking of the Intelligent key Record is sent to the controlling terminal.
In one embodiment, the communications adapter can receive the unlocking record that the Intelligent key is sent, The record of unlocking includes the unlocking amount and Lock-Picking Devices number of the Intelligent key.
In one embodiment of the application, the S210 further include:
S211, the client service generate test information of unlocking according to image information, wherein described image information is by institute Intelligent key is stated to be generated according to the request of the encoded information and the Intelligent key of the Intelligent key using duration.
In one embodiment, described image information is image in 2 D code, and the Intelligent key is according to the Intelligent key The request of encoded information and the Intelligent key generate the image in 2 D code using duration.
Fig. 5 is referred to, in one embodiment of the application, the S200 includes:
S201, the client service obtain the encoded information of the Intelligent key after analyzing described image information;
S202, whether the client service verifies the encoded information correct.
S203, if the encoded information is correct, the client service generation has accepted information;
S205, if the encoded information is incorrect, the client service generation does not accept information.
In one embodiment, described image information can be image in 2 D code, and the client service can be by sweeping When obtaining the encoded information of the Intelligent key after retouching described image information, and obtaining the request use of the Intelligent key It is long.Whether the client service can verify the encoded information correct, if the encoded information is correct, client's clothes Business end, which generates, has accepted information, and has accepted information by described and be sent to the Intelligent key by the communications adapter, by Display interface on the Intelligent key is shown.If the encoded information is incorrect, the client service is generated not It accepts information, and does not accept information by described the Intelligent key is sent to by the communications adapter, by the intelligent key Display interface on spoon is shown.The client service to the Intelligent key send it is described accepted information and it is described not Whether correct the encoded information that information can help applicant to obtain the Intelligent key in time is accepted, thus in time described in replacement Intelligent key.
Fig. 5 is referred to, the application also provides a kind of management system, and for managing Intelligent key, the management system 10 is wrapped Include controlling terminal 100, client service 200, Intelligent key 300 and communications adapter 400.
The controlling terminal 100 is surveyed for receiving and auditing unlocking test application, and according to by the unlocking of audit Examination application generates authorization message.The client service 200 is communicated to connect with the controlling terminal 100, for judging intelligent key Whether the encoded information of spoon is correct, and when being used according to the request of the encoded information of the correct Intelligent key and Intelligent key It is long to generate the unlocking test application, and the unlocking test application is sent to the controlling terminal 100, and, Xiang Suoshu intelligence It can the key transmission authorization message.The Intelligent key 300 is communicated to connect with the client service 200, is used for described Client service 200 sends the encoded information of the Intelligent key 300 and the request of the Intelligent key 300 uses duration.Institute Communications adapter 400 and the Intelligent key 300 is stated to be wirelessly connected, and with 200 wired connection of client service, for connecing The unlocking record of the Intelligent key 300 is received, and unlocking record is sent to the client service 200.
In one embodiment, staff can also inquire on the client service 200 and trace-back operation records, The operation note includes that the client service receives the unlocking test application, the customer service end receives the authorization The record of information etc..In one embodiment, the client service 200 can also will be received from the controlling terminal 100 The authorization message be sent to the communications adapter 400, and then the communications adapter 400 sends the authorization message To the Intelligent key 300.In one embodiment, pass through indigo plant between the communications adapter 400 and the Intelligent key 300 Tooth is communicatively coupled.In one embodiment, the communications adapter 400 is also used to fill the Intelligent key 300 Electricity.It should be noted that the controlling terminal 100 or mobile terminal, the client service 200 or movement Client service can specifically select according to actual needs, and the application is without limitation.
The management system 10 provided in this embodiment, including the controlling terminal 100, the client service 200, institute State Intelligent key 300 and the communications adapter 400.The Intelligent key 300 sends the intelligence to the client service 200 The encoded information of energy key and the request of the Intelligent key use duration.The client service 200 can be to the intelligence The encoded information of key is judged, and is used according to the encoded information of the correct Intelligent key and the request of Intelligent key Duration generates the unlocking test application.The controlling terminal 100 is used to receive and audit the unlocking test and applies, and according to Authorization message is generated by the unlocking test application of audit.The controlling terminal 100 can pass through the client service The authorization message is fed back to the Intelligent key by 200, and the Intelligent key 300 enters unlock shape according to the authorization message State.
The management system 10 provided by the present application can manage the Intelligent key 300, prevent the intelligence The behaviour in service lack of standardization of key 300.Therefore, the management system 10 provided by the present application, which can solve in traditional scheme, uses The problem of there is the misoperation fault for easily causing equipment in the method that Intelligent key is unlocked, endanger power grid operation.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously The limitation to claim therefore cannot be interpreted as.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (12)

1. a kind of unlocking method, for unlocking Intelligent key characterized by comprising
S100, Intelligent key receive the identity code of applicant, and judge whether the identity code is effective;
S120, if the identity code is effective, whether the Intelligent key detects itself in the unlocked state;
S130, if in the unlocked state, the Intelligent key matches corresponding equipment, and executes the unlocking operation to equipment;
S140, if being not at the unlocked state, the Intelligent key is by the encoded information of the Intelligent key and the intelligence The request of energy key is sent to after client service using duration and generates test application of unlocking, and is opened according to as controlling terminal Lock test application generates authorization message, and the authorization message makes the Intelligent key be in institute for activating the Intelligent key State unlocked state;
S150, the Intelligent key enters unlocked state after receiving the authorization message, and executes the unlocking operation to equipment, and The unlocking operation is recorded simultaneously and generates the unlocking record of the Intelligent key.
2. the method as described in claim 1, which is characterized in that after the S150, the method also includes:
Unlocking record is sent to the controlling terminal by S160, and removes the unlocking record of itself.
3. the method as described in claim 1, which is characterized in that the S140 includes:
S141 generates image information using duration according to the encoded information of the Intelligent key and the request of the Intelligent key, And described image information is sent to after the client service and generates the unlocking test application, and by the controlling terminal root Application, which is tested, according to the unlocking generates the authorization message.
4. the method as described in claim 1, which is characterized in that the S150 further include:
S151, while judging whether there is violation operation in the unlocking record, the violation operation, which refers to unlock again, to be unlocked Equipment;
S152 executes alarm operation by the Intelligent key if having violation operation in unlocking record.
5. the method as described in claim 1, which is characterized in that after the S100, the method also includes:
S101 does not execute any operation if the identity code is invalid.
6. a kind of authorization method, for unlocking Intelligent key characterized by comprising
S300 receives test application of unlocking, and the test application of unlocking includes the encoded information of Intelligent key ready for use, and The request of the Intelligent key uses duration;
S310 audits the unlocking test application, and whether the encoded information for verifying the Intelligent key ready for use is correct, and sentences Whether the request of the Intelligent key of breaking using duration is more than limitation duration;
S320, if the encoded information of the Intelligent key is correct, and the request of the Intelligent key uses duration no more than described Duration is limited, then generates authorization message, the authorization message is used to unlock the access right of the Intelligent key;
S330, if the encoded information of the Intelligent key is correct, but the request of the Intelligent key is more than the limit using duration Duration processed then adjusts the request of the Intelligent key using generating the authorization message after duration, and feeds back to client service, The Intelligent key is fed back to by the client service;
S340 generates not authorization message if the encoded information of the Intelligent key is incorrect, and feeds back to the customer service End, feeds back to the Intelligent key by the client service.
7. method as claimed in claim 6, which is characterized in that after the S330, the method also includes:
S331, receives the unlocking record of the Intelligent key, and stores the unlocking record of the Intelligent key, the Intelligent key Unlocking record include all unlocking operations of the Intelligent key for equipment.
8. a kind of method of application unlock characterized by comprising
S200, client service receives the encoded information of Intelligent key and the request of the Intelligent key uses duration, and judges Whether the encoded information of the Intelligent key is correct;
S210, if the encoded information of the Intelligent key is correct, according to the encoded information of the Intelligent key and the intelligence The request of key uses duration, generates test application of unlocking;
Unlocking test application is sent to controlling terminal by S220, the client service, and by the controlling terminal according to The unlocking test application generates authorization message, and the authorization message makes the Intelligent key for activating the Intelligent key In the unlocked state;
S230, the client service receives the authorization message, and the authorization message is fed back to the Intelligent key.
9. method according to claim 8, which is characterized in that the method also includes:
S240, the client service receive the unlocking record of the Intelligent key, and the unlocking of the Intelligent key is recorded It is sent to the controlling terminal.
10. method according to claim 8, which is characterized in that the S210 includes:
S211, the client service generate test information of unlocking according to image information, wherein described image information is by the intelligence Energy key is generated according to the request of the encoded information and the Intelligent key of the Intelligent key using duration.
11. method as claimed in claim 10, which is characterized in that the S200 includes:
S201, the client service obtain the encoded information of the Intelligent key after analyzing described image information;
S202, whether the client service verifies the encoded information correct;
S203, if the encoded information is correct, the client service generation has accepted information;
S205, if the encoded information is incorrect, the client service generation does not accept information.
12. a kind of management system, for managing Intelligent key characterized by comprising
Controlling terminal (100) tests application for receiving and auditing test application of unlocking, and according to by the unlocking of audit Generate authorization message;
Client service (200) is communicated to connect with the controlling terminal (100), for judging that the encoded information of Intelligent key is It is no correct, and the unlocking is generated using duration according to the correct encoded information of the Intelligent key and the request of Intelligent key Test application, and the unlocking test application is sent to the controlling terminal (100), and,
The authorization message is sent to the Intelligent key;
Intelligent key (300) is communicated to connect with the client service (200), for sending to the client service (200) The encoded information of the Intelligent key (300) and the request of the Intelligent key (300) use duration;
Communications adapter (400), with the Intelligent key (300) be wirelessly connected, and with the client service (200) wired company It connects, the unlocking for receiving the Intelligent key (300) records, and unlocking record is sent to the client service (200)。
CN201910593075.8A 2019-07-03 2019-07-03 Unlocking method, method, authorization method and the management system of application unlock Pending CN110379052A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910593075.8A CN110379052A (en) 2019-07-03 2019-07-03 Unlocking method, method, authorization method and the management system of application unlock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910593075.8A CN110379052A (en) 2019-07-03 2019-07-03 Unlocking method, method, authorization method and the management system of application unlock

Publications (1)

Publication Number Publication Date
CN110379052A true CN110379052A (en) 2019-10-25

Family

ID=68251720

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910593075.8A Pending CN110379052A (en) 2019-07-03 2019-07-03 Unlocking method, method, authorization method and the management system of application unlock

Country Status (1)

Country Link
CN (1) CN110379052A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114241639A (en) * 2021-12-22 2022-03-25 北京罗克维尔斯科技有限公司 Bluetooth key test method, device, robot, equipment and medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202003425U (en) * 2011-03-31 2011-10-05 上海圣兆信息技术有限公司 Central management system for monitoring intelligent lock
CN103475480A (en) * 2013-09-05 2013-12-25 北京星网锐捷网络技术有限公司 Certificate authority method and device
CN106097514A (en) * 2016-06-24 2016-11-09 杭州咸亨国际科研中心有限公司 The communication verification method of a kind of chargeable smart lock and unlocking apparatus thereof
CN106600794A (en) * 2016-12-28 2017-04-26 深圳市正拓盛世精密设备有限公司 Intelligent Bluetooth electronic lock
KR20170136902A (en) * 2016-06-02 2017-12-12 (주)가드텍 Controlling method for doorlock apparatus using mobile terminal
CN107492163A (en) * 2017-06-22 2017-12-19 阜阳万瑞斯电子锁业有限公司 Control method for electronic lock and system based on electron key and Quick Response Code under a kind of outage condition
CN107742339A (en) * 2017-09-30 2018-02-27 泉州国光软件开发有限责任公司 A kind of management method of the passive electronic lockset based on platform
CN107886601A (en) * 2017-09-27 2018-04-06 湖南文理学院 A kind of office door access control system and its open method
CN107945331A (en) * 2017-11-21 2018-04-20 广州思加特科技有限公司 A kind of access control method, apparatus and system
CN108512313A (en) * 2018-05-17 2018-09-07 长园共创电力安全技术股份有限公司 A kind of power distribution network temporary grounding wire management system and control method
CN108682063A (en) * 2018-05-11 2018-10-19 戴天智能科技(上海)有限公司 A kind of authoring system of smart lock
CN108884975A (en) * 2015-10-09 2018-11-23 沃尔玛阿波罗有限责任公司 Method and apparatus for being protected using optics lock & key commodity

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202003425U (en) * 2011-03-31 2011-10-05 上海圣兆信息技术有限公司 Central management system for monitoring intelligent lock
CN103475480A (en) * 2013-09-05 2013-12-25 北京星网锐捷网络技术有限公司 Certificate authority method and device
CN108884975A (en) * 2015-10-09 2018-11-23 沃尔玛阿波罗有限责任公司 Method and apparatus for being protected using optics lock & key commodity
KR20170136902A (en) * 2016-06-02 2017-12-12 (주)가드텍 Controlling method for doorlock apparatus using mobile terminal
CN106097514A (en) * 2016-06-24 2016-11-09 杭州咸亨国际科研中心有限公司 The communication verification method of a kind of chargeable smart lock and unlocking apparatus thereof
CN106600794A (en) * 2016-12-28 2017-04-26 深圳市正拓盛世精密设备有限公司 Intelligent Bluetooth electronic lock
CN107492163A (en) * 2017-06-22 2017-12-19 阜阳万瑞斯电子锁业有限公司 Control method for electronic lock and system based on electron key and Quick Response Code under a kind of outage condition
CN107886601A (en) * 2017-09-27 2018-04-06 湖南文理学院 A kind of office door access control system and its open method
CN107742339A (en) * 2017-09-30 2018-02-27 泉州国光软件开发有限责任公司 A kind of management method of the passive electronic lockset based on platform
CN107945331A (en) * 2017-11-21 2018-04-20 广州思加特科技有限公司 A kind of access control method, apparatus and system
CN108682063A (en) * 2018-05-11 2018-10-19 戴天智能科技(上海)有限公司 A kind of authoring system of smart lock
CN108512313A (en) * 2018-05-17 2018-09-07 长园共创电力安全技术股份有限公司 A kind of power distribution network temporary grounding wire management system and control method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114241639A (en) * 2021-12-22 2022-03-25 北京罗克维尔斯科技有限公司 Bluetooth key test method, device, robot, equipment and medium

Similar Documents

Publication Publication Date Title
CN103312676B (en) Terminal, server and terminal safety management method
CN108986278A (en) A kind of intelligent door lock off-line cipher authorization method and authoring system
CN103793960B (en) Method for mobile key service
CN107508619B (en) Mobile power based on Bluetooth technology rents self-help serving system
CN104125226B (en) A kind of method, apparatus and system for locking and unlocking application
CN109074682A (en) System and method for remotely accessing permission and verifying
CN104011612B (en) Control system for managing program and control the variation of program
CN106785146A (en) The charging method and system of the electric automobile charging pile with bluetooth
CN103473844A (en) Intelligent control method and intelligent control system for public rental housing
CN108470313A (en) A kind of operation operation overall process management-control method and system based on mobile internet
CN109272606A (en) A kind of smart lock monitoring equipment, method and storage medium based on block chain
CN104318650A (en) Dynamic coded lock management and control system
CN101127133A (en) Door access remote management method
CN105378804A (en) Secure electronic lock
CN103745536A (en) Cabinet management system based on dynamic passwords
US20110167477A1 (en) Method and apparatus for providing controlled access to a computer system/facility resource for remote equipment monitoring and diagnostics
CN204390320U (en) A kind of dynamic puzzle-lock system
CN110379052A (en) Unlocking method, method, authorization method and the management system of application unlock
CN106504370B (en) Plant stand security management and control system and control method
CN206224488U (en) Mobile terminal, server, controller based on device authorization management
CN106652233A (en) Control method of shared experimental apparatus
CN107370605A (en) One kind is based on SHA256 challenge response certification bluetooth lock management methods
CN111680978A (en) Unlocking key authorization method, using method and returning method
CN108460870B (en) Intelligent unlocking method and system
CN104103107A (en) Time-varying password and time-varying password lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191025

RJ01 Rejection of invention patent application after publication