CN110611566A - Anti-counterfeiting method of homing pigeon foot ring based on NFC - Google Patents
Anti-counterfeiting method of homing pigeon foot ring based on NFC Download PDFInfo
- Publication number
- CN110611566A CN110611566A CN201910872093.XA CN201910872093A CN110611566A CN 110611566 A CN110611566 A CN 110611566A CN 201910872093 A CN201910872093 A CN 201910872093A CN 110611566 A CN110611566 A CN 110611566A
- Authority
- CN
- China
- Prior art keywords
- foot ring
- pigeon foot
- nfc
- carrier pigeon
- carrier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 241000272201 Columbiformes Species 0.000 title claims abstract description 42
- 238000000034 method Methods 0.000 title claims abstract description 17
- 241000272205 Columba livia Species 0.000 claims abstract description 57
- 238000012795 verification Methods 0.000 claims abstract description 14
- 238000004377 microelectronic Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive or capacitive transmission systems
- H04B5/70—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
- H04B5/77—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/47—Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
An anti-counterfeiting method of a homing pigeon foot ring based on NFC comprises a homing pigeon foot ring initialization stage and a homing pigeon foot ring authenticity verification stage; enabling each unique UID of the carrier pigeon foot ring to correspond to a secret key, and storing a database of the secret keys in a cloud server; in the initialization stage of the carrier pigeon foot ring, the cloud server sends the corresponding key to the corresponding carrier pigeon foot ring, and the key is stored by the carrier pigeon foot ring; in the stage of verifying the authenticity of the carrier pigeon foot ring, a user receives a primary effective ciphertext sent by the carrier pigeon foot ring through NFC equipment and uploads the primary effective ciphertext to a cloud server, and the cloud server decrypts the ciphertext by using a unique secret key corresponding to the carrier pigeon foot ring and verifies the authenticity. The safety anti-counterfeiting level can reach the bank financial level, even if the NFC chip in the foot ring is read and copied, the copied chip cannot be verified through the real and false homing pigeon foot ring, and the safety anti-counterfeiting level is greatly helpful for the fairness and fairness of the homing pigeon competition.
Description
Technical Field
The invention relates to the technical field of carrier pigeon competition, in particular to an anti-counterfeiting method of a carrier pigeon foot ring based on NFC.
Background
The nature of the nest-identifying of the pigeons is utilized by people to develop into the sports activities of racing pigeons, and in order to keep the fairness and fairness of the competition, foot rings are generally adopted to identify the identity of the pigeons. With the development of the internet of things technology, a foot ring in the prior art completes the writing and reading verification of homing pigeon information through a near field communication technology, a 125 KHz-134 KHz frequency band RFID chip is commonly used in an electronic foot ring at present, the storage capacity is dozens of bytes, and energy and data are transmitted in a wireless mode. Although the electronic foot ring can be used by adding random passwords and other means as an anti-counterfeiting mode, the security anti-counterfeiting level of the random passwords is too low, the passwords are easy to be broken, data are read to copy the electronic foot ring, the fairness and the fairness of domestic homing pigeon competitions can be influenced, and serious economic loss is caused to numerous pigeon friends.
Disclosure of Invention
The invention aims to provide an anti-counterfeiting method of a homing pigeon foot ring based on NFC.
The technical scheme adopted by the invention for solving the technical problems in the prior art is as follows:
the invention relates to an anti-counterfeiting method of a homing pigeon foot ring based on NFC, wherein the homing pigeon foot ring comprises a foot ring body, an NFC chip and an antenna, the NFC chip stores information of the homing pigeon, the antenna is connected with the NFC chip, and the anti-counterfeiting method comprises a homing pigeon foot ring initialization stage and a homing pigeon foot ring authenticity verification stage; a key generator in the cloud server generates a corresponding key corresponding to the unique UID of each carrier pigeon foot ring, and a database of the keys is stored in the cloud server; in the initialization stage of the carrier pigeon foot ring, the cloud server sends the corresponding key to the corresponding carrier pigeon foot ring; in the stage of verifying the authenticity of the carrier pigeon foot ring, based on a key encryption algorithm, the carrier pigeon foot ring generates a primary effective cipher text aiming at the key, a user receives the primary effective cipher text sent by the carrier pigeon foot ring and the UID of the carrier pigeon foot ring through NFC equipment and uploads the primary effective cipher text and the UID to a cloud server, the cloud server decrypts the cipher text through a decryption algorithm by using a unique key corresponding to the carrier pigeon foot ring and verifies the authenticity, and the verification is finished.
The invention can also adopt the following technical measures:
the NFC chip is an F8019SC series NFC chip of Shanghai Feiyi microelectronics, Inc.
The homing pigeon foot ring generates a primary effective cipher text through encryption of algorithms such as gain-128 stream encryption and the like, and sends the primary effective cipher text to the NFC equipment; and when the NFC equipment receives the ciphertext and uploads the ciphertext to the server cloud, the server cloud decrypts the ciphertext to verify the authenticity of the pigeon foot ring.
After the authenticity verification of the cloud end of the server, the NFC equipment normally accesses the carrier pigeon information data files corresponding to the carrier pigeon foot rings.
The invention has the advantages and positive effects that:
in the anti-counterfeiting method of the homing pigeon foot ring based on NFC, the secret key is generated corresponding to the unique UID of each homing pigeon foot ring, the ciphertext is effective once, the security anti-counterfeiting level can reach the bank financial level, even if the NFC chip in the foot ring is read and copied, the copied chip can not pass the verification of the true and false homing pigeon foot ring, and the method is greatly helpful for the fairness and fairness of the homing pigeon match. Any equipment with the NFC function can perform wireless communication with the NFC carrier pigeon foot ring through communication protocols such as ISO/IEC15693 protocols, but can access data information of the corresponding carrier pigeon of the NFC carrier pigeon foot ring only after identity authenticity verification, and the unique identity card of the carrier pigeon is achieved.
Drawings
Fig. 1 is a flow chart of the operation of the anti-counterfeiting method of the homing pigeon foot ring based on NFC according to the present invention.
Detailed Description
The technical solution of the present invention will be described in detail below with reference to specific examples.
As shown in fig. 1, the anti-counterfeiting method of the homing pigeon foot ring based on NFC of the present invention includes a foot ring body, an NFC chip and an antenna, wherein the NFC chip stores information of the homing pigeon, the antenna is connected to the NFC chip, and the anti-counterfeiting method includes a homing pigeon foot ring initialization stage and a homing pigeon foot ring authenticity verification stage; a key generator in the cloud server generates a corresponding key corresponding to the unique UID of each carrier pigeon foot ring, and a database of the keys is stored in the cloud server; in the initialization stage of the carrier pigeon foot ring, the cloud server sends the corresponding key to the corresponding carrier pigeon foot ring; in the stage of verifying the authenticity of the carrier pigeon foot ring, based on a key encryption algorithm, the carrier pigeon foot ring generates a primary effective cipher text aiming at the key, a user receives the primary effective cipher text sent by the carrier pigeon foot ring and the UID of the carrier pigeon foot ring through NFC equipment and uploads the primary effective cipher text and the UID to a cloud server, the cloud server decrypts the cipher text through a decryption algorithm by using a unique key corresponding to the carrier pigeon foot ring and verifies the authenticity, and the verification is finished.
The NFC chip is an F8019SC series NFC chip of Shanghai Feiyi microelectronics, Inc.
The homing pigeon foot ring generates a primary effective cipher text through encryption of algorithms such as gain-128 stream encryption and the like, and sends the primary effective cipher text to the NFC equipment; and when the NFC equipment receives the ciphertext and uploads the ciphertext to the server cloud, the server cloud decrypts the ciphertext to verify the authenticity of the pigeon foot ring.
After the authenticity verification of the cloud end of the server, the NFC equipment normally accesses the carrier pigeon information data files corresponding to the carrier pigeon foot rings.
The step of initializing the carrier pigeon foot ring comprises the following steps:
1. the homing pigeon foot ring is close to the NFC reader-writer, and the reader-writer reads the homing pigeon foot ring UID;
uploading the UID to a server by PC side software, generating random keys by a key generator based on a key generation algorithm by the server, and synchronously storing the databases generated by the keys in a cloud server;
3. the card reader sends the key and corresponding data to the carrier pigeon foot ring.
The step of verifying the truth of the foot ring of the carrier pigeon comprises the following steps:
1. opening a homing pigeon foot ring APP by the mobile phone, and starting the NFC function of the mobile phone;
2. the NFC of the mobile phone is close to the foot ring of the carrier pigeon, and the content of the foot ring of the carrier pigeon is read;
3. the homing pigeon foot ring generates a 16-bit true random number, a counter value and a check value (of the true random number and the counter value), obtains a primary effective ciphertext through algorithms such as gain-128 stream encryption and the like, and sends the primary effective ciphertext to the mobile phone homing pigeon foot ring APP;
4. the mobile phone carrier pigeon foot ring APP sends the ciphertext to a cloud server through a wireless communication network, the cloud server decrypts the ciphertext, a calculated check value is consistent with a decrypted check value, the verification is passed, and the mobile phone carrier pigeon foot ring APP displays a data information file of the carrier pigeon; otherwise, the examination is not passed, and the cell phone carrier pigeon foot ring APP shows that the foot ring is a forged foot ring.
Although the present invention has been described with reference to the preferred embodiments, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (4)
1. An anti-counterfeiting method of a homing pigeon foot ring based on NFC, wherein the homing pigeon foot ring comprises a foot ring body, an NFC chip and an antenna, the NFC chip stores the information of the homing pigeon, and the antenna is connected with the NFC chip, and is characterized in that: the anti-counterfeiting method comprises a carrier pigeon foot ring initialization stage and a carrier pigeon foot ring authenticity verification stage; based on a key encryption algorithm, a key generator in the cloud server generates a corresponding key corresponding to the unique UID of each carrier pigeon foot ring, and a database of the keys is stored in the cloud server; in the initialization stage of the carrier pigeon foot ring, the cloud server sends the corresponding key to the corresponding carrier pigeon foot ring; in the stage of verifying the authenticity of the carrier pigeon foot ring, based on a key encryption algorithm, the carrier pigeon foot ring generates a primary effective cipher text aiming at the key, a user receives the primary effective cipher text sent by the carrier pigeon foot ring and the UID of the carrier pigeon foot ring through NFC equipment and uploads the primary effective cipher text and the UID to a cloud server, the cloud server decrypts the cipher text through a decryption algorithm by using a unique key corresponding to the carrier pigeon foot ring and verifies the authenticity, and the verification is finished.
2. The NFC-based carrier pigeon foot-ring anti-counterfeiting method according to claim 1, wherein: the NFC chip is an F8019SC series NFC chip of Shanghai Feiyi microelectronics, Inc.
3. The NFC-based carrier pigeon foot-ring anti-counterfeiting method according to claim 2, wherein: the homing pigeon foot ring generates a primary effective cipher text through encryption of algorithms such as gain-128 stream encryption and the like, and sends the primary effective cipher text to the NFC equipment; and when the NFC equipment receives the ciphertext and uploads the ciphertext to the server cloud, the server cloud decrypts the ciphertext to verify the authenticity of the pigeon foot ring.
4. The NFC-based carrier pigeon foot-ring anti-counterfeiting method according to claim 2, wherein: after the authenticity verification of the cloud end of the server, the NFC equipment normally accesses the carrier pigeon information data files corresponding to the carrier pigeon foot rings.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910872093.XA CN110611566A (en) | 2019-09-16 | 2019-09-16 | Anti-counterfeiting method of homing pigeon foot ring based on NFC |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910872093.XA CN110611566A (en) | 2019-09-16 | 2019-09-16 | Anti-counterfeiting method of homing pigeon foot ring based on NFC |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110611566A true CN110611566A (en) | 2019-12-24 |
Family
ID=68891257
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910872093.XA Pending CN110611566A (en) | 2019-09-16 | 2019-09-16 | Anti-counterfeiting method of homing pigeon foot ring based on NFC |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110611566A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113537404A (en) * | 2021-08-20 | 2021-10-22 | 上海龙前数字科技有限公司 | Anti-cheating reminding system for racing pigeons |
CN115760136A (en) * | 2022-11-09 | 2023-03-07 | 佛山市郴通线束科技有限公司 | Method, device, system and medium for authenticating authenticity of automobile wire harness |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107634833A (en) * | 2017-08-01 | 2018-01-26 | 上海飞聚微电子有限公司 | A kind of identity identifying method of RFID chip |
CN107886333A (en) * | 2016-09-29 | 2018-04-06 | 珠海晶通科技有限公司 | A kind of Antiforge system and its method for anti-counterfeit with dynamic anti-fake information |
CN109450915A (en) * | 2018-11-28 | 2019-03-08 | 天津滨海新区盛源科技发展有限公司 | A kind of homing pigeon foot ring and its recognition methods based on NFC |
EP3496049A1 (en) * | 2017-12-06 | 2019-06-12 | Gantner Pigeon Systems GmbH | Method for the exercise races in carrier pigeon sport |
-
2019
- 2019-09-16 CN CN201910872093.XA patent/CN110611566A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107886333A (en) * | 2016-09-29 | 2018-04-06 | 珠海晶通科技有限公司 | A kind of Antiforge system and its method for anti-counterfeit with dynamic anti-fake information |
CN107634833A (en) * | 2017-08-01 | 2018-01-26 | 上海飞聚微电子有限公司 | A kind of identity identifying method of RFID chip |
EP3496049A1 (en) * | 2017-12-06 | 2019-06-12 | Gantner Pigeon Systems GmbH | Method for the exercise races in carrier pigeon sport |
CN109450915A (en) * | 2018-11-28 | 2019-03-08 | 天津滨海新区盛源科技发展有限公司 | A kind of homing pigeon foot ring and its recognition methods based on NFC |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113537404A (en) * | 2021-08-20 | 2021-10-22 | 上海龙前数字科技有限公司 | Anti-cheating reminding system for racing pigeons |
CN115760136A (en) * | 2022-11-09 | 2023-03-07 | 佛山市郴通线束科技有限公司 | Method, device, system and medium for authenticating authenticity of automobile wire harness |
CN117556849A (en) * | 2022-11-09 | 2024-02-13 | 佛山市郴通线束科技有限公司 | Automobile wire harness detection method, device, system and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104579649B (en) | Personal identification method and system | |
JP6882254B2 (en) | Safety verification methods based on biological characteristics, client terminals, and servers | |
CN107077670B (en) | Method and apparatus for transmitting and processing transaction message, computer readable storage medium | |
CN106161359A (en) | The method and device of certification user, the method and device of registration wearable device | |
US20140093144A1 (en) | More-Secure Hardware Token | |
US20190165947A1 (en) | Signatures for near field communications | |
CN105117910B (en) | Electronic consumption method | |
CN106157025A (en) | The mobile terminal safety method of payment of identity-based card and system | |
CN106533687A (en) | Identity authentication method and device | |
WO2016037415A1 (en) | Mobile payment method, system and device, and computer storage medium | |
CN101577917A (en) | Safe dynamic password authentication method based on mobile phone | |
CN102186169A (en) | Identity authentication method, device and system | |
CN103413109A (en) | Bidirectional authentication method of radio frequency identification system | |
CN113169973B (en) | System and method for enhancing strength of encryption algorithm | |
CN104079581A (en) | Identity authentication method and device | |
KR20180003113A (en) | Server, device and method for authenticating user | |
CN104363097B (en) | The RFID inter-authentication methods of lightweight on elliptic curve | |
CN107566360B (en) | A kind of generation method of data authentication code | |
CN103530785A (en) | Double anti-counterfeiting system and method based on near field communication (NFC) function | |
CN104820814A (en) | Second-generation ID card anti-counterfeiting verification system | |
US11805111B2 (en) | Secure RFID tag identification | |
CN109450915A (en) | A kind of homing pigeon foot ring and its recognition methods based on NFC | |
CN110611566A (en) | Anti-counterfeiting method of homing pigeon foot ring based on NFC | |
CN110190966A (en) | A kind of wireless radio frequency identification mark ownership transfer method based on cloud storage | |
CN103971245B (en) | A kind of combined ciphering system false proof for electronic article |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Bottom floor, S3, building 20, yifengyuan, Dongjiang Road, Binhai New Area, Tianjin Applicant after: Hanchen Technology Co.,Ltd. Address before: 300000 Hongda apartment 1-701, Tanggu, Binhai New Area, Tianjin Applicant before: TIANJIN BINHAI NEW DISTRICT SHENGYUAN TECHNOLOGY DEVELOPMENT CO.,LTD. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191224 |
|
RJ01 | Rejection of invention patent application after publication |