CN110768786A - Information segmentation encryption and decryption combination system and method based on AES algorithm - Google Patents

Information segmentation encryption and decryption combination system and method based on AES algorithm Download PDF

Info

Publication number
CN110768786A
CN110768786A CN201911037946.4A CN201911037946A CN110768786A CN 110768786 A CN110768786 A CN 110768786A CN 201911037946 A CN201911037946 A CN 201911037946A CN 110768786 A CN110768786 A CN 110768786A
Authority
CN
China
Prior art keywords
file
encryption
encrypted
key
hash code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911037946.4A
Other languages
Chinese (zh)
Inventor
喻延
陈昊鹏
文炫达
陈锴嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CN201911037946.4A priority Critical patent/CN110768786A/en
Publication of CN110768786A publication Critical patent/CN110768786A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Abstract

The invention provides an information segmentation encryption and decryption combination system and method based on an AES algorithm, which comprises the steps of segmenting a file to be encrypted into a plurality of subfiles with specified sizes; performing AES algorithm encryption on each subfile as an encrypted file, and performing hash coding on the file name of each subfile to obtain a hash code; storing the file name, the encryption key and the hash code of the encrypted file into a key database; decrypting all subfiles under the folder by using an AES algorithm based on an encryption key; and merging the decrypted sub-files to obtain the original file. The file content is segmented and encrypted based on the AES algorithm, the AES algorithm is high in operation speed, high in safety and low in resource consumption, meanwhile, a folder containing the encrypted subfile is hidden through a hash code corresponding to the file name of the encrypted file, and the file content is more reliable in the aspect of protecting the safety of information through the two safety protection mechanisms.

Description

Information segmentation encryption and decryption combination system and method based on AES algorithm
Technical Field
The invention relates to the field of information security, in particular to an information segmentation encryption and decryption combination system and method based on an AES algorithm.
Background
Today, our society has already entered the information age, and information will always be of vital importance to the rapidly developing society. Information is an important resource, and how to ensure the safety of the information is always a hot spot researched by researchers. In the field of information security technology, encryption technology for information is an important research direction.
Encryption is the most common technique for securing information. The method utilizes a specific technical means to convert the information into the messy code, once the encrypted information is transmitted to a destination, the encrypted information can be decrypted only by a specific key, and through the mode, the safety of the information can be effectively ensured.
The key system of the encryption technology is divided into a symmetric key system and an asymmetric key system. Accordingly, techniques for encrypting information are classified into two categories, including symmetric encryption techniques and asymmetric encryption techniques. Symmetric encryption is typically represented by a DES algorithm, and includes algorithms such as 3DES and AES, while asymmetric encryption is typically represented by an RSA algorithm, and includes algorithms such as DSA and ECC.
At present, many encryption and decryption software have slow operation speed, high resource consumption and low security. Patent document 104284208A discloses a method and system for parallel encryption by the AES-CBC algorithm. The parallel encryption method comprises the following steps: a, cutting the transmission stream video file into n sub-video blocks; b, selecting a key; c, determining the least common multiple b of the length 188 bytes and the length a; d, inserting a filling part; e, independently encrypting each sub video block in parallel; and f, forming a ciphertext block. The tail part of the filling part is used as a prefix part of one sub-video block to serve as an initialization vector IV, and the head part of the filling part is used as a suffix part of the previous sub-video block, so that the length of each sub-video block after filling is kb. Each sub-video block does not depend on the previous sub-video block to generate the initialization vector IV, so that the sub-video blocks can be separately and independently encrypted in parallel. And merging the encrypted sub-video blocks into a complete encrypted file, thereby completing the encryption of the TS video file. However, this encryption method uses only a specific video transmission and does not involve decryption.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide an information segmentation encryption and decryption combination system and method based on an AES algorithm.
The invention provides an information segmentation encryption and decryption combination method based on an AES algorithm, which comprises the following steps:
and (3) checking: checking whether the file name of the file to be encrypted exists in a key database;
a segmentation step: dividing a file to be encrypted into a plurality of subfiles with specified sizes;
an encryption step: performing AES algorithm encryption on each subfile as an encrypted file, and performing hash coding on the file name of each subfile to obtain a hash code;
a key management step: storing the file name, the encryption key and the hash code of the file to be encrypted into a key database;
and (3) decryption: acquiring an encryption key and a hash code corresponding to a file to be decrypted from a key database, finding a folder containing an encrypted subfile according to the hash code, and decrypting all subfiles under the folder by using an AES algorithm based on the encryption key;
and (3) merging steps: and merging the decrypted sub-files to obtain the file to be decrypted.
Preferably, the key database is established by a relational database server; the fields of the key database include a file name, an encryption key, and a hash code.
Preferably, the specified size is a multiple satisfying 16 bytes.
Preferably, the encrypting step comprises:
AES encryption step: setting an encryption key, and encrypting the subfiles obtained by dividing the file to be encrypted;
and a hash code encryption step: and carrying out hash coding on the file name of the file to be encrypted, and taking the obtained hash code as the folder name, wherein the folder name is the name of the folder containing the subfile.
Preferably, the decrypting step comprises:
and a key reading step: according to the file name of the file to be decrypted, inquiring in a key database to obtain an encryption key and a hash code required for decrypting the file;
ASE decryption step: and finding a folder containing the encrypted subfiles according to the obtained hash codes, and then sequentially decrypting all the encrypted subfiles in the folder according to the obtained encryption key.
The invention provides an information segmentation encryption and decryption combination system based on an AES algorithm, which comprises:
an inspection module: checking whether the file name of the file to be encrypted exists in a key database;
a segmentation module: dividing a file to be encrypted into a plurality of subfiles with specified sizes;
an encryption module: performing AES algorithm encryption on each subfile as an encrypted file, and performing hash coding on the file name of each subfile to obtain a hash code;
a key management module: storing the file name, the encryption key and the hash code of the file to be encrypted into a key database;
a decryption module: acquiring an encryption key and a hash code corresponding to a file to be decrypted from a key database, finding a folder containing an encrypted subfile according to the hash code, and decrypting all subfiles under the folder by using an AES algorithm based on the encryption key;
a merging module: and merging the decrypted sub-files to obtain the file to be decrypted.
Preferably, the encryption module includes:
AES encryption module: setting an encryption key, and encrypting the subfiles obtained by dividing the file to be encrypted;
the hash code encryption module: and carrying out hash coding on the file name of the file to be encrypted, and taking the obtained hash code as the folder name, wherein the folder name is the name of the folder containing the subfile.
Preferably, the decryption module comprises:
a key reading module: according to the file name of the file to be decrypted, inquiring in a key database to obtain an encryption key and a hash code required for decrypting the file;
and an ASE decryption module: and finding a folder containing the encrypted subfiles according to the obtained hash codes, and then sequentially decrypting all the encrypted subfiles in the folder according to the obtained encryption key.
Compared with the prior art, the invention has the following beneficial effects:
the file content is divided and encrypted based on the AES algorithm, the AES algorithm is high in operation speed, high in safety and low in resource consumption, meanwhile, a folder containing the encrypted subfiles is hidden through the hash code corresponding to the file name, and the file content is more reliable in information safety and has good application value for information safety through the two safety protection modes.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
FIG. 1 is a schematic block diagram of the present invention;
FIG. 2 is a schematic diagram of a split encryption process according to the present invention;
FIG. 3 is a schematic diagram of a decryption combining process according to the present invention;
FIG. 4 is a diagram of a key database design of the present invention, wherein the fields include, but are not limited to, a file name, an encryption key, and a hash code.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will assist those skilled in the art in further understanding the invention, but are not intended to limit the invention in any way. It should be noted that it would be obvious to those skilled in the art that various changes and modifications can be made without departing from the spirit of the invention. All falling within the scope of the present invention.
As shown in fig. 1, in the specific implementation, the present invention is an AES algorithm based information partitioning, encrypting, decrypting and merging software, including:
and (3) checking: checking whether the file name of the file to be encrypted exists in the key database shown in FIG. 4, and if not, performing the following steps; if the file exists, the file name of the file needs to be modified until the file does not exist;
a segmentation step: dividing a file to be encrypted into a plurality of subfiles with specified sizes, reflecting the sequence of the subfiles in the file names of the subfiles, wherein the specified sizes must meet the multiple of 16 bytes;
an encryption step: setting an encryption key, sequentially encrypting each subfile of a file to be encrypted by using an AES algorithm, and simultaneously taking a hash code of the file name of the encrypted file as the folder name of a folder containing the encrypted subfiles;
a key management step: storing the file name, the encryption key and the hash code of the encrypted file into a key database;
and (3) decryption: acquiring a corresponding encryption key and a hash code from a key database according to the file name of a file to be decrypted, finding a folder which corresponds to the file to be decrypted and contains an encrypted subfile according to the hash code, and finally sequentially decrypting all the encrypted subfiles under the folder by using an AES algorithm based on the encryption key;
and (3) merging steps: and sequentially combining the decrypted sub-files to obtain the original file.
Specifically, the encrypting step includes:
encryption substep based on AES algorithm: setting an encryption key (also a decryption key), and sequentially encrypting subfiles obtained by dividing a file to be encrypted;
a hash code encryption substep: and carrying out hash coding on the file name of the file to be encrypted, and taking the hash code as the folder name of the folder containing the encrypted subfile.
Specifically, the key database: the establishment will be performed using a relational database server with fields including, but not limited to, file name, encryption key, hash code.
Specifically, the decrypting step includes:
reading the encryption key and the hash code: according to the file name of the file to be decrypted, inquiring in a key database to obtain an encryption key and a hash code required for decrypting the file;
decryption sub-step based on ASE algorithm: and finding a folder containing the encrypted subfiles according to the hash codes obtained in the substep, and then sequentially decrypting all the encrypted subfiles in the folder according to the encryption key obtained in the substep.
Fig. 2 is a schematic diagram of a split encryption flow. After a file to be encrypted passes the checking step, segmenting the file according to the requirements of the segmenting step to obtain n sub-files; then, sequentially encrypting the n sub-files by using an AES algorithm, and putting all the encrypted sub-files into a folder named by the hash code corresponding to the file; and finally, storing the folder containing the encrypted subfiles into a file warehouse, and storing the file name, the encryption key and the hash code into a key database.
Fig. 3 is a schematic diagram of a decryption merging flow. In the decryption step, firstly, inquiring a key database according to the file name of a file to be decrypted, and if the value of a file name field in certain information is found to be consistent with the file name of the file to be decrypted, extracting the value of an encryption key field and the value of a hash code field in the information; then, finding a corresponding folder in the file warehouse by using the value of the hash code field; and finally, decrypting all the encrypted subfiles in the folder by using the value of the encryption key field based on an AES algorithm. In the merging step, the subfiles are merged in sequence according to the file name order of the subfiles, so as to obtain a file to be decrypted, which is called as an original file.
On the basis of the technical scheme of the embodiment, the corresponding software prototype is realized for verification, and testing and evaluation are performed through experiments. Experiments prove that the information segmentation encryption and decryption combination software based on the AES algorithm can efficiently perform the tasks of segmentation encryption and decryption combination on the information, and simultaneously, besides an information protection mechanism of the AES algorithm, the information segmentation encryption and decryption combination software further improves the information security by utilizing the hash code. In the actual task of information encryption and decryption, especially for information with huge information quantity, the software not only has better encryption and decryption efficiency, but also has stronger information security protection.
Those skilled in the art will appreciate that, in addition to implementing the systems, apparatus, and various modules thereof provided by the present invention in purely computer readable program code, the same procedures can be implemented entirely by logically programming method steps such that the systems, apparatus, and various modules thereof are provided in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Therefore, the system, the device and the modules thereof provided by the present invention can be considered as a hardware component, and the modules included in the system, the device and the modules thereof for implementing various programs can also be considered as structures in the hardware component; modules for performing various functions may also be considered to be both software programs for performing the methods and structures within hardware components.
The foregoing description of specific embodiments of the present invention has been presented. It is to be understood that the present invention is not limited to the specific embodiments described above, and that various changes or modifications may be made by one skilled in the art within the scope of the appended claims without departing from the spirit of the invention. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.

Claims (10)

1. An AES algorithm-based information partitioning, encrypting, decrypting and combining method is characterized by comprising the following steps:
and (3) checking: checking whether the file name of the file to be encrypted exists in a key database;
a segmentation step: dividing a file to be encrypted into a plurality of subfiles with specified sizes;
an encryption step: performing AES algorithm encryption on each subfile as an encrypted file, and performing hash coding on the file name of each subfile to obtain a hash code;
a key management step: storing the file name, the encryption key and the hash code of the file to be encrypted into a key database;
and (3) decryption: acquiring an encryption key and a hash code corresponding to a file to be decrypted from a key database, finding a folder containing an encrypted subfile according to the hash code, and decrypting all subfiles under the folder by using an AES algorithm based on the encryption key;
and (3) merging steps: and merging the decrypted sub-files to obtain the file to be decrypted.
2. The AES algorithm based information split encryption and decryption combining method of claim 1, wherein the key database is established by a relational database server; the fields of the key database include a file name, an encryption key, and a hash code.
3. The AES algorithm-based information splitting encryption and decryption combining method of claim 1, wherein the specified size is a multiple of 16 bytes.
4. The AES algorithm based information split encryption and decryption combining method of claim 1, wherein the encrypting step includes:
AES encryption step: setting an encryption key, and encrypting the subfiles obtained by dividing the file to be encrypted;
and a hash code encryption step: and carrying out hash coding on the file name of the file to be encrypted, and taking the obtained hash code as the folder name, wherein the folder name is the name of the folder containing the subfile.
5. The AES algorithm based information split encryption and decryption combining method of claim 1, wherein the decryption step includes:
and a key reading step: according to the file name of the file to be decrypted, inquiring in a key database to obtain an encryption key and a hash code required for decrypting the file;
ASE decryption step: and finding a folder containing the encrypted subfiles according to the obtained hash codes, and then sequentially decrypting all the encrypted subfiles in the folder according to the obtained encryption key.
6. An information partitioning, encrypting, decrypting and combining system based on an AES algorithm is characterized by comprising:
an inspection module: checking whether the file name of the file to be encrypted exists in a key database;
a segmentation module: dividing a file to be encrypted into a plurality of subfiles with specified sizes;
an encryption module: performing AES algorithm encryption on each subfile as an encrypted file, and performing hash coding on the file name of each subfile to obtain a hash code;
a key management module: storing the file name, the encryption key and the hash code of the file to be encrypted into a key database;
a decryption module: acquiring an encryption key and a hash code corresponding to a file to be decrypted from a key database, finding a folder containing an encrypted subfile according to the hash code, and decrypting all subfiles under the folder by using an AES algorithm based on the encryption key;
a merging module: and merging the decrypted sub-files to obtain the file to be decrypted.
7. The AES algorithm based information splitting encryption and decryption combining system of claim 6, wherein the key database is established by a relational database server; the fields of the key database include a file name, an encryption key, and a hash code.
8. The AES algorithm based information splitting encryption and decryption combining system of claim 6, wherein the specified size is a multiple of 16 bytes.
9. The AES algorithm based information segmentation encryption and decryption combination system of claim 6, wherein the encryption module comprises:
AES encryption module: setting an encryption key, and encrypting the subfiles obtained by dividing the file to be encrypted;
the hash code encryption module: and carrying out hash coding on the file name of the file to be encrypted, and taking the obtained hash code as the folder name, wherein the folder name is the name of the folder containing the subfile.
10. The AES algorithm based information partitioning, encryption and decryption combining system of claim 6, wherein the decryption module comprises:
a key reading module: according to the file name of the file to be decrypted, inquiring in a key database to obtain an encryption key and a hash code required for decrypting the file;
and an ASE decryption module: and finding a folder containing the encrypted subfiles according to the obtained hash codes, and then sequentially decrypting all the encrypted subfiles in the folder according to the obtained encryption key.
CN201911037946.4A 2019-10-29 2019-10-29 Information segmentation encryption and decryption combination system and method based on AES algorithm Pending CN110768786A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911037946.4A CN110768786A (en) 2019-10-29 2019-10-29 Information segmentation encryption and decryption combination system and method based on AES algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911037946.4A CN110768786A (en) 2019-10-29 2019-10-29 Information segmentation encryption and decryption combination system and method based on AES algorithm

Publications (1)

Publication Number Publication Date
CN110768786A true CN110768786A (en) 2020-02-07

Family

ID=69334224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911037946.4A Pending CN110768786A (en) 2019-10-29 2019-10-29 Information segmentation encryption and decryption combination system and method based on AES algorithm

Country Status (1)

Country Link
CN (1) CN110768786A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113378200A (en) * 2021-06-28 2021-09-10 江苏翔晟信息技术股份有限公司 Electronic contract file grouping encryption system and method based on separated storage
CN113378206A (en) * 2021-07-09 2021-09-10 中诚信征信有限公司 Software authorization encryption method, software authorization decryption method, software authorization encryption device, software authorization decryption device and software authorization decryption system
CN117579617A (en) * 2024-01-10 2024-02-20 深圳市众志天成科技有限公司 Data transmission method and device based on information security

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060002549A1 (en) * 2004-06-17 2006-01-05 Prasad Avasarala Generating keys having one of a number of key sizes
CN101488860B (en) * 2009-02-20 2011-07-27 四川长虹电器股份有限公司 File ciphering, deciphering method
CN102594548A (en) * 2012-03-22 2012-07-18 山东泰信电子有限公司 Method capable of achieving data sectional encryption and decryption
CN104732163A (en) * 2015-04-03 2015-06-24 宁波工程学院 Folder encryption method and encrypted file use method
CN104794243A (en) * 2015-05-12 2015-07-22 西安电子科技大学 Third-party ciphertext retrieval method based on file name
US10193690B1 (en) * 2017-09-29 2019-01-29 U.S. Bancorp, National Association Systems and methods to secure data using computer system attributes
CN109996215A (en) * 2019-03-31 2019-07-09 南京信息工程大学 A kind of multi-path communications method based on privacy sharing under vehicular ad hoc network network environment
CN110008888A (en) * 2019-03-29 2019-07-12 上海交通大学 Comprehensive characteristics object detection method and system in intelligent monitoring network
CN110163007A (en) * 2019-04-23 2019-08-23 西安邮电大学 Data integrity verification method, equipment and storage medium based on block chain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060002549A1 (en) * 2004-06-17 2006-01-05 Prasad Avasarala Generating keys having one of a number of key sizes
CN101488860B (en) * 2009-02-20 2011-07-27 四川长虹电器股份有限公司 File ciphering, deciphering method
CN102594548A (en) * 2012-03-22 2012-07-18 山东泰信电子有限公司 Method capable of achieving data sectional encryption and decryption
CN104732163A (en) * 2015-04-03 2015-06-24 宁波工程学院 Folder encryption method and encrypted file use method
CN104794243A (en) * 2015-05-12 2015-07-22 西安电子科技大学 Third-party ciphertext retrieval method based on file name
US10193690B1 (en) * 2017-09-29 2019-01-29 U.S. Bancorp, National Association Systems and methods to secure data using computer system attributes
CN110008888A (en) * 2019-03-29 2019-07-12 上海交通大学 Comprehensive characteristics object detection method and system in intelligent monitoring network
CN109996215A (en) * 2019-03-31 2019-07-09 南京信息工程大学 A kind of multi-path communications method based on privacy sharing under vehicular ad hoc network network environment
CN110163007A (en) * 2019-04-23 2019-08-23 西安邮电大学 Data integrity verification method, equipment and storage medium based on block chain

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113378200A (en) * 2021-06-28 2021-09-10 江苏翔晟信息技术股份有限公司 Electronic contract file grouping encryption system and method based on separated storage
CN113378206A (en) * 2021-07-09 2021-09-10 中诚信征信有限公司 Software authorization encryption method, software authorization decryption method, software authorization encryption device, software authorization decryption device and software authorization decryption system
CN113378206B (en) * 2021-07-09 2023-11-28 中诚信征信有限公司 Software authorization encryption method, software authorization decryption method, device and system
CN117579617A (en) * 2024-01-10 2024-02-20 深圳市众志天成科技有限公司 Data transmission method and device based on information security
CN117579617B (en) * 2024-01-10 2024-03-22 深圳市众志天成科技有限公司 Data transmission method and device based on information security

Similar Documents

Publication Publication Date Title
US10439804B2 (en) Data encrypting system with encryption service module and supporting infrastructure for transparently providing encryption services to encryption service consumer processes across encryption service state changes
CN110768786A (en) Information segmentation encryption and decryption combination system and method based on AES algorithm
US11335213B2 (en) Method and apparatus for encrypting data, method and apparatus for decrypting data
CN109344631B (en) Data modification and block verification method, device, equipment and medium for block chain
US20140355754A1 (en) Partial CipherText Updates Using Variable-Length Segments Delineated by Pattern Matching and Encrypted by Fixed-Length Blocks
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
CN106231346B (en) Distributed encryption method for offline video
CN103647636B (en) The method and device of security access data
CN103345609A (en) Method and device for text encryption and decryption
US10560260B2 (en) Outputting a key based on an authorized sequence of operations
CN115878629B (en) GPU tracking data service system, electronic equipment and storage medium
CN111432287A (en) Slicing encryption method and system and decryption method and system for audio and video files
CN108055585A (en) Data processing method, set top box upgrading method, terminal and set-top box
CN110147653B (en) Application program security reinforcing method and device
US20160203032A1 (en) Series data parallel analysis infrastructure and parallel distributed processing method therefor
CN108154042B (en) File system encryption method and device
CN116800535A (en) Method and device for avoiding secret between multiple servers
US20220345292A1 (en) Method and device for encryption of video stream, communication equipment, and storage medium
CN104486441B (en) Long-range control method based on FTP
US20160277181A1 (en) Method and System for High-Efficiency Self-Adaptive Modular Data Encryption
CN116204903A (en) Financial data security management method and device, electronic equipment and storage medium
CN114116710A (en) Data processing method, device and equipment based on block chain and storage medium
CN114666624A (en) Video file encryption and decryption method
WO2017183832A1 (en) Method for creating column-oriented layout file
US9800401B2 (en) Initialization vectors generation from encryption/decryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200207

RJ01 Rejection of invention patent application after publication