CN111800266A - Off-line sharing equipment control system and method based on real-time reference - Google Patents

Off-line sharing equipment control system and method based on real-time reference Download PDF

Info

Publication number
CN111800266A
CN111800266A CN202010835079.5A CN202010835079A CN111800266A CN 111800266 A CN111800266 A CN 111800266A CN 202010835079 A CN202010835079 A CN 202010835079A CN 111800266 A CN111800266 A CN 111800266A
Authority
CN
China
Prior art keywords
module
real
time
password
dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010835079.5A
Other languages
Chinese (zh)
Inventor
魏云龙
何玮杰
刘国立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou University
Original Assignee
Fuzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou University filed Critical Fuzhou University
Priority to CN202010835079.5A priority Critical patent/CN111800266A/en
Publication of CN111800266A publication Critical patent/CN111800266A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/125Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to an offline sharing equipment control system based on real-time reference, which consists of a sharing equipment terminal, a user mobile phone terminal and a server terminal; the shared equipment terminal comprises an input keyboard module, an embedded processor, a hardware encryption module, an equipment locking module and a real-time clock module; the embedded processing module is respectively connected with the input keyboard module, the hardware encryption module, the equipment locking module and the real-time clock module. The invention can effectively reduce the cost and the system power consumption and simultaneously improve the safety.

Description

Off-line sharing equipment control system and method based on real-time reference
Technical Field
The invention relates to the field of shared device control, in particular to an offline shared device control system and method based on a real-time reference.
Background
At present, the application of shared devices in China is quite extensive, most of the shared devices inevitably need to communicate with a server due to the consideration of management and security, and even need to support multiple communication modes, so that the shared devices must carry communication modules, the device cost is high, and enterprises must pay for communication fees between the shared devices and the server. The existing control method of the off-line sharing equipment is based on a static serial number, has insufficient safety, and has a complex encryption process in order to obtain a random password, so that the off-line sharing equipment is not applied in a large scale.
Disclosure of Invention
In view of the above, the present invention provides a system and a method for controlling an offline sharing device based on a real-time reference, which can reduce the cost and the system power consumption and improve the security.
In order to achieve the purpose, the invention adopts the following technical scheme:
an off-line sharing equipment control system based on real-time reference is composed of a sharing equipment terminal, a user mobile phone terminal and a server terminal; the shared equipment terminal comprises an input keyboard module, an embedded processor, a hardware encryption module, an equipment locking module and a real-time clock module; the embedded processing module is respectively connected with the input keyboard module, the hardware encryption module, the equipment locking module and the real-time clock module.
Furthermore, the hardware encryption module is a coprocessor special for encryption, and performs encryption operation on information by receiving a dynamic key sent by the embedded processor module to obtain a dynamic password and send the dynamic password to the embedded processor module;
the input keyboard module is used for inputting a digital password;
the equipment locking module is an electronic module determined according to a specific application scene;
the real-time clock module is used for providing real-time, the real-time value is used as a seed to generate a random number according to a preset algorithm, and the random number and the equipment serial number jointly form a dynamic key.
Furthermore, the embedded processing module adopts a single chip processor, takes the time value of the time when the user uses the shared device as the random number generated by the seed, and combines the random number with the fixed serial number of the device to obtain a dynamic key.
Furthermore, in order to avoid clock errors, the embedded processing module obtains a group of different dynamic keys in a plurality of intervals before and after the processing time, the keys are calculated by the hardware encryption module to obtain a group of a plurality of dynamic passwords, if the password input by the user is the same as one of the dynamic password group, the password is considered to be correct, and the device locking module is controlled to perform corresponding unlocking/locking actions.
A control method of an offline sharing device based on a real-time reference comprises the following steps:
step S1, the embedded processor of the device is in a dormant state at ordinary times, and when the embedded processor is used by a user, the mobile terminal scans the two-dimensional code to obtain the serial number of the device and sends the serial number to the server to apply for the password;
step S2, the server calculates the password according to the serial number and the real-time and sends the password to the mobile terminal;
step S3, the user inputs the password from the server into the sharing device through the input keyboard module;
step S4, when the embedded processor is awakened by the key, a group of time values are obtained before and after the time value at the moment at a certain interval, and the group of time values are used as random number seeds to obtain a group of dynamic keys which are sent to the hardware encryption module together with the set static keys for encryption operation to obtain a group of corresponding dynamic passwords;
and step S5, the embedded processor compares the password input by the user with the dynamic password group, if the input password is consistent with a certain password in the password group, the password is considered to be correct, and the device locking module is controlled to unlock.
Furthermore, the step S4 uses the real-time and the local serial number to jointly form a dynamic key, uses the time slider intersection algorithm, uses the real-time and a plurality of moments before and after the real-time and combines with the local serial number to obtain a group of a plurality of dynamic keys, and obtains a group of a plurality of dynamic passwords by the plurality of dynamic keys through encryption operation, thereby avoiding the problem of inconsistent passwords at two ends caused by the time error between the shared device and the server.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention requires that the shared device terminal and the server terminal adopt the same encryption parameters and encryption algorithm, so that the shared device terminal and the server terminal do not need to communicate, and the shared device can be used in an off-line state;
2. the invention adopts real-time and equipment serial number as parameters to carry out encryption operation to obtain dynamic passwords, so that the passwords of equipment used each time are different, and the passwords of different equipment at the same time are also different, thereby avoiding the problem of exhaustive password cracking, improving the system safety, and simultaneously avoiding the repeated use of the same password under the offline condition;
3. the invention adopts the sliding block algorithm, and solves the problem of inconsistent real-time of generating dynamic passwords by the sharing equipment and the server due to system time error and user operation time difference;
4. the special coprocessor for encryption is adopted, so that the problem that an embedded processor runs a complex encryption algorithm at a low speed is solved.
Drawings
FIG. 1 is a schematic block diagram of a system in one embodiment of the invention;
FIG. 2 is a flow diagram of an embodiment of the present invention;
FIG. 3 is a block diagram of shared device side software in an embodiment of the invention;
fig. 4 is a block diagram of software at a mobile phone end of a user according to an embodiment of the present invention;
fig. 5 is a block diagram of server side software according to an embodiment of the present invention.
Detailed Description
The invention is further explained below with reference to the drawings and the embodiments.
Referring to fig. 1, the present invention provides an offline sharing device control system based on real-time reference, wherein the system comprises a sharing device terminal, a user mobile phone terminal and a server terminal; the shared equipment terminal comprises an input keyboard module, an embedded processor, a hardware encryption module, an equipment locking module and a real-time clock module; the embedded processing module is respectively connected with the input keyboard module, the hardware encryption module, the equipment locking module and the real-time clock module.
In this embodiment, preferably, the hardware encryption module is a coprocessor dedicated for encryption, and performs encryption operation on information by receiving a dynamic key sent by the embedded processor module to obtain a dynamic password and send the dynamic password to the embedded processor module;
the input keyboard module is used for inputting a digital password and has a plurality of functional keys for a user to select functions;
the equipment locking module is an electronic module determined according to a specific application scene; if the electronic lock is applied to the shared bicycle, the power management module is applied to the shared charger baby;
the real-time clock module is used for providing real-time, the real-time value is used as a seed to generate a random number according to a preset algorithm, and the random number and the equipment serial number jointly form a dynamic key.
In this embodiment, the embedded processing module uses a single-chip processor, and uses a time value of a time when a user uses the shared device as a seed to generate a random number, and combines the random number with a fixed serial number of the device to obtain a dynamic key.
Preferably, in this embodiment, the hardware encryption module may adopt a dedicated encryption coprocessor, which is a dedicated encryption chip and is internally provided with a high-level encryption algorithm such as DES or other complex encryption algorithms.
Preferably, in this embodiment, in order to avoid a clock error, the embedded processing module adopts a time slider intersection algorithm, which specifically includes: and obtaining a group of different dynamic keys in a plurality of intervals before and after the moment, calculating the keys through a hardware encryption module to obtain a group of a plurality of dynamic passwords, and if the password input by the user is the same as one of the dynamic password groups, determining that the password is correct and controlling the equipment locking module to perform corresponding unlocking/locking actions.
Referring to fig. 2, in this embodiment, a method for controlling an offline sharing device based on a real-time reference is further provided, where the method includes the following steps:
step S1, the embedded processor of the device is in a dormant state at ordinary times, and the user uses the mobile terminal to scan the two-dimensional code to obtain the serial number of the device and sends the serial number to the server to apply for the password;
step S2, the server calculates the password according to the serial number and the real-time and sends the password to the mobile terminal;
step S3, the user inputs the password from the server into the sharing device through the input keyboard module;
step S4, when the embedded processor is awakened by the key, a group of a plurality of real-time values are obtained before and after the time value at the moment at a certain interval, and the real-time values are used as random number seeds to obtain a group of dynamic keys which are sent to the hardware encryption module together with the set static keys for encryption operation to obtain a group of corresponding dynamic passwords;
and step S5, the embedded processor compares the password input by the user with the dynamic password group, if the input password is consistent with a certain password in the password group, the password is considered to be correct, and the device locking module is controlled to unlock.
Preferably, in the present embodiment, in the step S2 and the step S4, the server and the shared device terminal use the same key and encryption method, and although the server and the shared device terminal do not communicate, the generated dynamic passwords are completely consistent.
Preferably, in this embodiment, the step S4 uses real-time and the local serial number to form a dynamic key, uses a time slider intersection algorithm, uses real-time and a plurality of moments before and after the real-time and combines with the local serial number to obtain a group of a plurality of dynamic keys, and uses the plurality of dynamic keys to obtain a group of a plurality of dynamic passwords through encryption operation, thereby avoiding the problem of inconsistent passwords at both ends due to time error between the shared device and the server.
The above description is only a preferred embodiment of the present invention, and all equivalent changes and modifications made in accordance with the claims of the present invention should be covered by the present invention.

Claims (6)

1. An off-line sharing equipment control system based on real-time reference is characterized in that the system is composed of a sharing equipment terminal, a user mobile phone terminal and a server terminal; the shared equipment terminal comprises an input keyboard module, an embedded processor, a hardware encryption module, an equipment locking module and a real-time clock module; the embedded processing module is respectively connected with the input keyboard module, the hardware encryption module, the equipment locking module and the real-time clock module.
2. The real-time reference based offline shared device control system of claim 1,
the hardware encryption module is a coprocessor special for encryption, and performs encryption operation on information by receiving a dynamic key sent by the embedded processor module to obtain a dynamic password and send the dynamic password to the embedded processor module;
the input keyboard module is used for inputting a digital password;
the equipment locking module is an electronic module determined according to a specific application scene;
the real-time clock module is used for providing real-time, the real-time value is used as a seed to generate a random number according to a preset algorithm, and the random number and the equipment serial number jointly form a dynamic key.
3. The offline sharing device control system according to claim 1, wherein the embedded processing module employs a single-chip processor, and uses a time value of a time when the user uses the sharing device as a seed to generate a random number, and combines the random number with the fixed serial number of the device to obtain a dynamic key.
4. The system of claim 1, wherein the embedded processing module obtains a set of different dynamic keys at intervals before and after a processing time to avoid clock errors, the keys are calculated by the hardware encryption module to obtain a set of dynamic passwords, and if a password input by a user is the same as one of the set of dynamic passwords, the password is considered to be correct, and the device locking module is controlled to perform corresponding unlocking/locking actions.
5. A control method of an offline sharing device based on a real-time reference is characterized by comprising the following steps:
step S1, the embedded processor of the device is in a dormant state at ordinary times, and when the embedded processor is used by a user, the mobile terminal scans the two-dimensional code to obtain the serial number of the device and sends the serial number to the server to apply for the password;
step S2, the server calculates the password according to the serial number and the real-time and sends the password to the mobile terminal;
step S3, the user inputs the password from the server into the sharing device through the input keyboard module;
step S4, when the embedded processor is awakened by the key, a group of time values are obtained before and after the time value at the moment at a certain interval and are used as random number seeds to obtain a group of dynamic keys which are sent to the hardware encryption module together with the set static keys for encryption operation to obtain a group of corresponding dynamic passwords;
and step S5, the embedded processor compares the password input by the user with the dynamic password group, if the input password is consistent with a certain password in the password group, the password is considered to be correct, and the device locking module is controlled to unlock.
6. The offline shared device control method based on real-time reference according to claim 4,
and step S4, a dynamic key is formed by using the real-time and the local serial number, a time slider intersection algorithm is used, the real-time and a plurality of moments before and after the real-time are respectively combined with the local serial number to obtain a group of a plurality of dynamic keys, and a plurality of dynamic keys are respectively subjected to encryption operation to obtain a group of a plurality of dynamic passwords, so that the problem that passwords at two ends are inconsistent due to time errors between shared equipment and a server is avoided.
CN202010835079.5A 2020-08-19 2020-08-19 Off-line sharing equipment control system and method based on real-time reference Pending CN111800266A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010835079.5A CN111800266A (en) 2020-08-19 2020-08-19 Off-line sharing equipment control system and method based on real-time reference

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010835079.5A CN111800266A (en) 2020-08-19 2020-08-19 Off-line sharing equipment control system and method based on real-time reference

Publications (1)

Publication Number Publication Date
CN111800266A true CN111800266A (en) 2020-10-20

Family

ID=72833765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010835079.5A Pending CN111800266A (en) 2020-08-19 2020-08-19 Off-line sharing equipment control system and method based on real-time reference

Country Status (1)

Country Link
CN (1) CN111800266A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113329008A (en) * 2021-05-26 2021-08-31 深圳聚创致远科技有限公司 Intelligent power grid environment computing and protection parallel trusted computing platform
CN113938884A (en) * 2021-06-29 2022-01-14 北京玛泰科技有限公司 Control method, server, system and computer readable storage medium for intelligent device
CN115277027A (en) * 2022-09-26 2022-11-01 广州万协通信息技术有限公司 Security chip charging attack detection method, security chip device, equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130102335A1 (en) * 2011-10-25 2013-04-25 Sony Corporation Mobile device, information processing device, location information acquisition method, location information acquisition system, and program
CN107103676A (en) * 2017-06-06 2017-08-29 张永穆 A kind of shared equipment dynamic puzzle-lock system
CN107248918A (en) * 2017-06-14 2017-10-13 徐华静 Offline internet-based control device and its control system and method
CN107493561A (en) * 2017-08-07 2017-12-19 北京小米移动软件有限公司 Shared equipment unlocking method, apparatus and system
CN107835239A (en) * 2017-10-31 2018-03-23 柠创科技(深圳)有限公司 A kind of shared equipment unlocking method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130102335A1 (en) * 2011-10-25 2013-04-25 Sony Corporation Mobile device, information processing device, location information acquisition method, location information acquisition system, and program
CN107103676A (en) * 2017-06-06 2017-08-29 张永穆 A kind of shared equipment dynamic puzzle-lock system
CN107248918A (en) * 2017-06-14 2017-10-13 徐华静 Offline internet-based control device and its control system and method
CN107493561A (en) * 2017-08-07 2017-12-19 北京小米移动软件有限公司 Shared equipment unlocking method, apparatus and system
CN107835239A (en) * 2017-10-31 2018-03-23 柠创科技(深圳)有限公司 A kind of shared equipment unlocking method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈小平等: "《无线传感器网络原理及应用》", 30 April 2017 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113329008A (en) * 2021-05-26 2021-08-31 深圳聚创致远科技有限公司 Intelligent power grid environment computing and protection parallel trusted computing platform
CN113329008B (en) * 2021-05-26 2022-04-08 深圳聚创致远科技有限公司 Intelligent power grid environment computing and protection parallel trusted computing platform
CN113938884A (en) * 2021-06-29 2022-01-14 北京玛泰科技有限公司 Control method, server, system and computer readable storage medium for intelligent device
CN115277027A (en) * 2022-09-26 2022-11-01 广州万协通信息技术有限公司 Security chip charging attack detection method, security chip device, equipment and medium
CN115277027B (en) * 2022-09-26 2022-12-20 广州万协通信息技术有限公司 Security chip charging attack detection method, security chip device, equipment and medium

Similar Documents

Publication Publication Date Title
CN111800266A (en) Off-line sharing equipment control system and method based on real-time reference
Li et al. Privacy-preserving federated learning framework based on chained secure multiparty computing
Shi et al. Approximation attacks on strong PUFs
US11652816B1 (en) Biometric knowledge extraction for mutual and multi-factor authentication and key exchange
CN104506313B (en) A kind of quantum key distribution secrecy Enhancement Method for supporting extensive dynamic change
CN109102607A (en) Method for unlocking coded lock, system, equipment, coded lock and server
CN106952378A (en) Method for unlocking and device, electronic lock
US20180019997A1 (en) Authentication method and system by garbled circuit
CN110572265B (en) Terminal security access gateway method, device and system based on quantum communication
CN107181600A (en) A kind of password login authentication method, system and user equipment and certificate server
CN102307093A (en) Method for generating two-factor dynamic password
CN117097489B (en) Lightweight double-factor agriculture Internet of things equipment continuous authentication method and system
CN111431841B (en) Internet of things security sensing system and Internet of things data security transmission method
CN108288314A (en) It is a kind of intelligence lock cipher generate and verification method
CN109714760A (en) A kind of right access control method suitable for smart machine under direct-connected communication environment
Panchal et al. Comparable features and same cryptography key generation using biometric fingerprint image
CN107248914B (en) Novel symmetric encryption system and encryption method on iOS device
CN108959898B (en) Graph unlocking password authentication method based on graph addition algorithm
Cheng et al. Research on privacy protection technology in face identity authentication system based on edge computing
CN104103107A (en) Time-varying password and time-varying password lock
CN109936530B (en) Secret key sharing method based on cloud outsourcing and access control system thereof
CN112507366B (en) Method and system for efficiently aggregating multidimensional data in smart power grid
CN103297240B (en) Towards secure password input system and the implementation method of intelligent terminal
CN113904779B (en) Identity authentication method, system, equipment and storage medium based on super-secret code
CN112995939B (en) Wireless sensor network transmission and cloud service access control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201020

RJ01 Rejection of invention patent application after publication