CN111898114A - Intelligent early warning type intellectual property monitoring management platform - Google Patents
Intelligent early warning type intellectual property monitoring management platform Download PDFInfo
- Publication number
- CN111898114A CN111898114A CN202010679553.XA CN202010679553A CN111898114A CN 111898114 A CN111898114 A CN 111898114A CN 202010679553 A CN202010679553 A CN 202010679553A CN 111898114 A CN111898114 A CN 111898114A
- Authority
- CN
- China
- Prior art keywords
- cloud computing
- ccs
- computing server
- security authentication
- intellectual property
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 36
- 238000004891 communication Methods 0.000 claims abstract description 42
- 230000002452 interceptive effect Effects 0.000 claims description 12
- 238000000034 method Methods 0.000 claims description 11
- 229910002056 binary alloy Inorganic materials 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 5
- 230000000694 effects Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
- G06Q50/184—Intellectual property management
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Tourism & Hospitality (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to the technical field of intellectual property monitoring and management, and discloses an intelligent early warning type intellectual property monitoring and management platform, which comprises: cloud computing server CCS (computer communications System) running intellectual property monitoring and management system softwareiCloud authentication server CAS running security authentication system softwareiCloud computing server CCS running with intelligent early warning system software and safety certification system softwarej(ii) a Cloud authentication server CASiThe security authentication system is used for operating the CCS of the cloud computing server with intelligent early warning system softwarejThe identity of the cloud computing server is subjected to security authentication, and only the cloud computing server CCSjPasses through the CASiThe security authentication system of (2) allows the cloud computing server CCSjAnd accessing the intellectual property monitoring and managing system. The invention solves the problems of intelligent early warning system and monitoring management system in the intellectual property monitoring management platformCommunication security problems.
Description
Technical Field
The invention relates to the technical field of intellectual property monitoring and management, in particular to an intelligent early warning type intellectual property monitoring and management platform.
Background
Under the background of the era of intellectual economy, with the innovation of technology, patent achievements are numerous, and intellectual property rights become the core competitiveness of enterprises, public institutions and colleges as an intangible asset. The high-speed development of intellectual property is very urgent to the requirement of modern management. The intellectual property monitoring management platform constructed by adopting the Internet plus technology can fundamentally overcome the defects of single management, one-sided management and the like of the traditional intellectual property, realize accurate monitoring management on the intellectual property, grasp the current situation of the intellectual property and promote innovation of the intellectual property.
The early warning of the abnormal state of the intellectual property can further promote the improvement of the actual monitoring and management level of the intellectual property, but the intelligent early warning system and the monitoring and management system are necessarily in communication connection, and under the system architecture, if an effective identity authentication mechanism is not adopted for the intelligent early warning system, the risk that a third-party substitute impersonates the intelligent early warning system and privately accesses the intellectual property monitoring and management system under an unauthorized illegal condition is undoubtedly increased.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides an intelligent early warning type intellectual property monitoring and managing platform, which is used for solving the communication safety problem of an intelligent early warning system and a monitoring and managing system in the intellectual property monitoring and managing platform.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme:
an intelligent early warning type intellectual property monitoring management platform, comprising: cloud computing server CCS (computer communications System) running intellectual property monitoring and management system softwareiCloud authentication server CAS running security authentication system softwareiCloud computing server CCS running with intelligent early warning system software and safety certification system softwarej;
Cloud computing server CCSjCloud authentication server CAS on security authentication system through network communication equipmentiPerforming communication connection between them, cloud authentication server CASiThrough network communication equipment and cloud computing server CCSiCarry out communication connection between each other, and the cloud computing server CCSiThrough network communication equipment and cloud computing server CCSjPerforming communication connection between each other;
cloud authentication server CASiThe security authentication system of (1) to the cloud computing server CCSjThe identity of (2) is securely authenticated, and the authentication method comprises the following steps:
the method comprises the following steps: cloud computing server CCSjAt cloud authentication server CASiThe user registration is performed on the security authentication system, specifically:
s1, popping up a security authentication system on a registration page and performing with a Cloud Computing Server (CCS)jA dialog box for interactive communication;
s2, the security authentication system is in a binary system domainOn the selected curve Dp(a, b) in the curve Dp(a, b) randomly selecting a point g as a base point, and displaying the base point g in a dialog box, namely returning the base point g to the CCSj;
S3, cloud computing server CCSjIn the binary field D2 nLast one private key kiComputing the public key Ki=kiX g, and the public key KiInputting the data into a dialog box, namely transmitting the data to a security authentication system;
step two: security authentication system to cloud computing server CCSjThe identity of the user is subjected to security authentication, and the specific authentication process is as follows:
s1, popping up a security authentication system on a verification page and a Cloud Computing Server (CCS)jA dialog box for interactive communication;
s2. cloud computing server CCSjIn the binary fieldRandom number m is selectediCalculate g1=miX g, let g1At curve DpOn (a, b), adding g1Inputting the data into a dialog box;
s3, the security authentication system is randomly generated in a binary system domainRandom number r ofiA random number riDisplayed in a dialog box, i.e. returned to the cloud computing server CCSj;
S4, cloud computing server CCSjCalculating Q ═ mi+ri×kiInputting Q into the dialog box;
s5, the verification equation Q multiplied by g of the security authentication system is g1+ri×KiWhether the result is true or not;
if the equation Q × g is g1+ri×KiEstablishing, proving cloud computing server CCSjKnowing the private key, the security authentication system passes through the CCSjThe identity authentication of (1).
Further, the private key kiFor a unique legal certification key, for a cloud computing server CCSjOwned separately, i.e. the security authentication system does not know the private key ki。
Further, the interactive communication dialog box has traceless communication function, that is, all interactive communication contents in the dialog box have no backup record.
Further, the cloud authentication server CASiThe security authentication system is used for operating the CCS of the cloud computing server with intelligent early warning system softwarejThe identity of the cloud computing server is subjected to security authentication, and only the cloud computing server CCSjPasses through the CASiThe security authentication system of (2) allows the cloud computing server CCSjAnd accessing the intellectual property monitoring and managing system.
(III) advantageous technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
1. cloud authentication server CAS of the inventioniThe security authentication system is used for operating the CCS of the cloud computing server with intelligent early warning system softwarejThe identity of the cloud computing server is subjected to security authentication, and only the cloud computing server CCSjPasses through the CASiThe security authentication system of (2) allows the cloud computing server CCSjThe security authentication mechanism is connected into an intellectual property monitoring and management system, and not only is the third-party substitute prevented from impersonating the CCS of the cloud computing serverjPrivately accesses the intellectual property monitoring and management system under the unauthorized illegal condition, and improves the intellectual property monitoring and managementThe safety protection capability of the system obtains the guarantee of the CCS of the cloud computing serveriWith cloud computing server CCSjThe technical effect of secure communication between the two.
2. The invention relates to a cloud computing server CCS in a security authentication systemjAfter the identity is subjected to security authentication, the security authentication system only knows the CCS of the cloud computing serverjIs legitimate and does not know the cloud computing server CCSjThat is to say the cloud computing server CCSjThe identity security authentication is completed on the premise of not revealing the private key of the identity, and the authentication mode remarkably improves the CCS of the cloud computing serverjThe security performance of the identity authentication process of (1).
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An intelligent early warning type intellectual property monitoring management platform, comprising: cloud computing server CCS (computer communications System) running intellectual property monitoring and management system softwareiCloud authentication server CAS running security authentication system softwareiCloud computing server CCS running with intelligent early warning system software and safety certification system softwarej;
Cloud computing server CCSjCloud authentication server CAS on security authentication system through network communication equipmentiPerforming communication connection between them, cloud authentication server CASiThrough network communication equipment and cloud computing server CCSiCarry out communication connection between each other, and the cloud computing server CCSiThrough network communication equipment and cloud computing server CCSjPerforming communication connection between each other;
smart pre-staging to prevent third party substitutes from impersonating operationsCloud computing server CCS of alarm system softwarejPrivate access runs on cloud computing server CCS under unauthorized illegal conditionsiIn the intellectual property monitoring and management system, the CAS is a cloud authentication serveriThe security authentication system is used for operating the CCS of the cloud computing server with intelligent early warning system softwarejThe identity of the cloud computing server is subjected to security authentication, and only the cloud computing server CCSjPasses through the CASiThe security authentication system of (2) allows the cloud computing server CCSjAccessing into an intellectual property monitoring and management system, otherwise, refusing the CCS of the cloud computing serverjWith cloud computing server CCSiCarrying out communication;
cloud authentication server CASiThe security authentication system of (1) to the cloud computing server CCSjThe identity of (2) is securely authenticated, and the authentication method comprises the following steps:
the method comprises the following steps: cloud computing server CCSjAt cloud authentication server CASiThe user registration is performed on the security authentication system, specifically:
s1, popping up a security authentication system on a registration page and performing with a Cloud Computing Server (CCS)jA dialog box for interactive communication;
s2, the security authentication system is in a binary system domainOn the selected curve Dp(a, b) in the curve Dp(a, b) randomly selecting a point g as a base point, and displaying the base point g in a dialog box, namely returning the base point g to the CCSj;
S3, cloud computing server CCSjIn the binary fieldLast one private key kiComputing the public key Ki=kiX g, and the public key KiInputting the data into a dialog box, namely transmitting the data to a security authentication system;
the private key kiAs a unique legal certification key, as a cloud meterComputation server CCSjOwned separately, i.e. the security authentication system does not know the private key ki;
Step two: security authentication system to cloud computing server CCSjThe identity of the user is subjected to security authentication, and the specific authentication process is as follows:
s1, popping up a security authentication system on a verification page and a Cloud Computing Server (CCS)jA dialog box for interactive communication;
s2. cloud computing server CCSjIn the binary fieldRandom number m is selectediCalculate g1=miX g, let g1At curve DpOn (a, b), adding g1Inputting the data into a dialog box;
s3, the security authentication system is randomly generated in a binary system domainRandom number r ofiA random number riDisplayed in a dialog box, i.e. returned to the cloud computing server CCSj;
S4, cloud computing server CCSjCalculating Q ═ mi+ri×kiInputting Q into the dialog box;
s5, if the equation Q multiplied by g is g1+ri×KiEstablishing, proving cloud computing server CCSjKnowing the private key, the security authentication system passes through the CCSjThe identity authentication of (2);
the safety authentication mechanism not only prevents a third-party substitute from impersonating a cloud computing server CCS running with intelligent early warning system softwarejPrivate access runs on cloud computing server CCS under unauthorized illegal conditionsiIn the intellectual property monitoring and management system, the safety protection capability of the intellectual property monitoring and management system is improved, and the CCS of the cloud computing server is ensurediWith cloud computing server CCSjThe technical effect of safe communication between the two devices;
at cloud authentication server CASiThe security authentication system of (1) to the cloud computing server CCSjAfter the identity is subjected to security authentication, the security authentication system only knows the CCS of the cloud computing serverjIs legitimate and does not know the cloud computing server CCSjIs a private key kiThat is to say the cloud computing server CCSjWithout revealing its private key kiOn the premise of finishing the safety authentication of the identity, the authentication mode obviously improves the CCS of the cloud computing serverjThe security performance of the identity authentication process of (1);
the interactive communication dialog box has traceless communication function, namely all interactive communication contents in the dialog box do not have any backup record.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (4)
1. The utility model provides an intelligence early warning formula intellectual property monitoring management platform which characterized in that includes: cloud computing server CCS (computer communications System) running intellectual property monitoring and management system softwareiCloud authentication server CAS running security authentication system softwareiCloud computing server CCS running with intelligent early warning system software and safety certification system softwarej;
Cloud computing server CCSjCloud authentication server CAS on security authentication system through network communication equipmentiPerforming communication connection between them, cloud authentication server CASiThrough network communication equipment and cloud computing server CCSiCarry out communication connection between each other, and the cloud computing server CCSiThrough network communication equipment and cloud computing server CCSjPerforming communication connection between each other;
cloud authentication server CASiThe security authentication system of (2) is in charge of cloudComputation server CCSjThe identity of (2) is securely authenticated, and the authentication method comprises the following steps:
the method comprises the following steps: cloud computing server CCSjAt cloud authentication server CASiThe user registration is performed on the security authentication system, specifically:
s1, popping up a security authentication system on a registration page and performing with a Cloud Computing Server (CCS)jA dialog box for interactive communication;
s2, the security authentication system is in a binary system domainOn the selected curve Dp(a, b) in the curve Dp(a, b) randomly selecting a point g as a base point, and displaying the base point g in a dialog box, namely returning the base point g to the CCSj;
S3, cloud computing server CCSjIn the binary fieldLast one private key kiComputing the public key Ki=kiX g, and the public key KiInputting the data into a dialog box, namely transmitting the data to a security authentication system;
step two: security authentication system to cloud computing server CCSjThe identity of the user is subjected to security authentication, and the specific authentication process is as follows:
s1, popping up a security authentication system on a verification page and a Cloud Computing Server (CCS)jA dialog box for interactive communication;
s2. cloud computing server CCSjIn the binary fieldRandom number m is selectediCalculate g1=miX g, let g1At curve DpOn (a, b), adding g1Inputting the data into a dialog box;
s3, the security authentication system is randomly generated in a binary system domainRandom number r ofiA random number riDisplayed in a dialog box, i.e. returned to the cloud computing server CCSj;
S4, cloud computing server CCSjCalculating Q ═ mi+ri×kiInputting Q into the dialog box;
s5, the verification equation Q multiplied by g of the security authentication system is g1+ri×KiWhether the result is true or not;
if the equation Q × g is g1+ri×KiEstablishing, proving cloud computing server CCSjKnowing the private key, the security authentication system passes through the CCSjThe identity authentication of (1).
2. The intelligent pre-warning intellectual property monitoring and management platform as claimed in claim 1, wherein the private key k isiFor a unique legal certification key, for a cloud computing server CCSjOwned separately, i.e. the security authentication system does not know the private key ki。
3. The intelligent pre-warning intellectual property monitoring and management platform according to claim 2, wherein the interactive communication dialog box has traceless communication function, that is, all interactive communication contents in the dialog box have no backup record.
4. The intelligent pre-warning intellectual property monitoring and management platform as claimed in claim 3, wherein the cloud authentication server CAS is configured to perform a CAS operationiThe security authentication system is used for operating the CCS of the cloud computing server with intelligent early warning system softwarejThe identity of the cloud computing server is subjected to security authentication, and only the cloud computing server CCSjPasses through the CASiThe security authentication system of (2) allows the cloud computing server CCSjAnd accessing the intellectual property monitoring and managing system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010679553.XA CN111898114A (en) | 2020-07-15 | 2020-07-15 | Intelligent early warning type intellectual property monitoring management platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010679553.XA CN111898114A (en) | 2020-07-15 | 2020-07-15 | Intelligent early warning type intellectual property monitoring management platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111898114A true CN111898114A (en) | 2020-11-06 |
Family
ID=73192720
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010679553.XA Pending CN111898114A (en) | 2020-07-15 | 2020-07-15 | Intelligent early warning type intellectual property monitoring management platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111898114A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112565241A (en) * | 2020-12-01 | 2021-03-26 | 杭州思源信息技术股份有限公司 | Community Internet of things perception system based on smart skynet and construction method |
CN112865974A (en) * | 2021-01-20 | 2021-05-28 | 杨雯雯 | Safety protection system based on edge computing access equipment |
CN112860934A (en) * | 2021-01-29 | 2021-05-28 | 浙江知多多网络科技有限公司 | Trademark retrieval system based on machine learning |
CN113610433A (en) * | 2021-08-23 | 2021-11-05 | 浙江九烁光电工程技术有限公司 | Smart city lighting system lean management system and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103095459A (en) * | 2013-01-17 | 2013-05-08 | 广东数字证书认证中心有限公司 | Operation method, device and server of modular exponentiation in public key cryptosystem |
CN103152178A (en) * | 2013-02-04 | 2013-06-12 | 浪潮(北京)电子信息产业有限公司 | Cloud computing verification method and system |
CN108933761A (en) * | 2017-05-25 | 2018-12-04 | 深圳市鑫科蓝电子科技有限公司 | A kind of the control flow encryption method and system of Intelligent hardware product |
CN111222176A (en) * | 2020-01-08 | 2020-06-02 | 中国人民解放军国防科技大学 | Block chain-based cloud storage possession proving method, system and medium |
CN111259352A (en) * | 2020-01-13 | 2020-06-09 | 熊国华 | Cloud storage data access control system based on zero-knowledge proof |
-
2020
- 2020-07-15 CN CN202010679553.XA patent/CN111898114A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103095459A (en) * | 2013-01-17 | 2013-05-08 | 广东数字证书认证中心有限公司 | Operation method, device and server of modular exponentiation in public key cryptosystem |
CN103152178A (en) * | 2013-02-04 | 2013-06-12 | 浪潮(北京)电子信息产业有限公司 | Cloud computing verification method and system |
CN108933761A (en) * | 2017-05-25 | 2018-12-04 | 深圳市鑫科蓝电子科技有限公司 | A kind of the control flow encryption method and system of Intelligent hardware product |
CN111222176A (en) * | 2020-01-08 | 2020-06-02 | 中国人民解放军国防科技大学 | Block chain-based cloud storage possession proving method, system and medium |
CN111259352A (en) * | 2020-01-13 | 2020-06-09 | 熊国华 | Cloud storage data access control system based on zero-knowledge proof |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112565241A (en) * | 2020-12-01 | 2021-03-26 | 杭州思源信息技术股份有限公司 | Community Internet of things perception system based on smart skynet and construction method |
CN112865974A (en) * | 2021-01-20 | 2021-05-28 | 杨雯雯 | Safety protection system based on edge computing access equipment |
CN112860934A (en) * | 2021-01-29 | 2021-05-28 | 浙江知多多网络科技有限公司 | Trademark retrieval system based on machine learning |
CN113610433A (en) * | 2021-08-23 | 2021-11-05 | 浙江九烁光电工程技术有限公司 | Smart city lighting system lean management system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111898114A (en) | Intelligent early warning type intellectual property monitoring management platform | |
CN107682331B (en) | Block chain-based Internet of things identity authentication method | |
WO2018032372A1 (en) | Trusted power grid transaction platform based on block chain technology | |
CN114915476B (en) | Attack deduction chart generation method and system based on network security assessment process | |
WO2014004412A1 (en) | Identity risk score generation and implementation | |
CN103259663A (en) | User unified authentication method in cloud computing environment | |
CN102223420A (en) | Digital content distribution method for multimedia social network | |
CN106899561B (en) | TNC (network node controller) authority control method and system based on ACL (Access control List) | |
CN111294796A (en) | Smart phone login management system based on zero-knowledge proof | |
CN111901118A (en) | Port enterprise security authentication system based on mobile internet | |
Lim et al. | Chain veri: blockchain-based firmware verification system for IoT environment | |
WO2019052469A1 (en) | Network request processing method and apparatus, electronic device, and storage medium | |
CN111241562A (en) | Purchase, sales and inventory management system based on micro-service architecture | |
CN118300814A (en) | Cross-platform login method and system | |
CN108347426B (en) | Teaching system information security management system based on big data and access method | |
Liu et al. | A blockchain-based verification for sharing data securely | |
CN105790935A (en) | Independent-software-and-hardware-technology-based trusted authentication server | |
CN112035853B (en) | Storage data access control system based on enterprise cloud disk | |
CN111600838A (en) | Authority management system based on network database | |
Ziyi | International Law Protection of Cross‐Border Transmission of Personal Information Based on Cloud Computing and Big Data | |
CN111563274B (en) | Security guarantee system based on government affair big data | |
CN111581610A (en) | Login management system based on database security | |
Benjula Anbu Malar et al. | A distributed collaborative trust service recommender system for secure cloud computing | |
CN113068188A (en) | External user identity authentication system based on wireless sensor node | |
CN111898113A (en) | Intelligent interactive enterprise knowledge management platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201106 |
|
RJ01 | Rejection of invention patent application after publication |