CN112907790A - Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code - Google Patents
Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code Download PDFInfo
- Publication number
- CN112907790A CN112907790A CN202110168064.2A CN202110168064A CN112907790A CN 112907790 A CN112907790 A CN 112907790A CN 202110168064 A CN202110168064 A CN 202110168064A CN 112907790 A CN112907790 A CN 112907790A
- Authority
- CN
- China
- Prior art keywords
- door lock
- digital identity
- bluetooth
- dimensional code
- bluetooth door
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000004891 communication Methods 0.000 claims abstract description 4
- 238000004590 computer program Methods 0.000 claims description 7
- 238000012795 verification Methods 0.000 claims description 7
- 238000004519 manufacturing process Methods 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000010408 sweeping Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention relates to a method for unlocking a Bluetooth door lock by a trusted digital identity two-dimensional code, which comprises the following steps: step S1, the user connects the credible digital identity server through the client, downloads the credible digital identity two-dimensional code, and generates a credible digital identity two-dimensional code icon in the client; step S2, distributing a Bluetooth door lock list with unlocking authority by a background manager according to the information of the user; step S3, the user obtains the authority list through the client, selects the Bluetooth door lock to be unlocked, and the client establishes communication connection with the Bluetooth door lock through the Bluetooth SDK; and step S4, the user slides the credible digital identity two-dimensional code icon on the client interface to trigger the client to execute data sending operation, the data stream of the credible digital identity two-dimensional code is sent to the Bluetooth door lock through a Bluetooth data channel, and the Bluetooth door lock verifies the data stream to complete unlocking or report errors.
Description
Technical Field
The invention relates to a method, equipment and a medium for unlocking a Bluetooth door lock by a trusted digital identity two-dimensional code, and belongs to the technical field of software management.
Background
At present, the Bluetooth door lock directly opens the door by clicking a button or sending a door opening instruction close to the button. With the development of smart phones, the bigger the mobile phone screen is, the lower the operation experience of clicking buttons is, and the clicking difficulty is increased; the problems of mistaken opening, lack of unlocking feedback and the like exist when the door is opened close to the door.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a method, equipment and a medium for unlocking a Bluetooth door lock by using a trusted digital identity two-dimensional code, which can be used for unlocking the Bluetooth door lock in a mode of sliding the trusted digital identity two-dimensional code so as to protect the privacy of a user.
The technical scheme of the invention is as follows:
the first technical scheme is as follows:
the method for unlocking the Bluetooth door lock by the trusted digital identity two-dimensional code comprises the following steps:
step S1, the user connects the credible digital identity server through the client, downloads the credible digital identity two-dimensional code, and generates a credible digital identity two-dimensional code icon in the client;
step S2, distributing a Bluetooth door lock list with unlocking authority by a background manager according to the information of the user;
step S3, the user obtains the authority list through the client, selects the Bluetooth door lock to be unlocked, and the client establishes communication connection with the Bluetooth door lock through the Bluetooth SDK;
and step S4, the user slides the credible digital identity two-dimensional code icon on the client interface to trigger the client to execute data sending operation, the data stream of the credible digital identity two-dimensional code is sent to the Bluetooth door lock through a Bluetooth data channel, and the Bluetooth door lock verifies the data stream to complete unlocking or report errors.
Further, in step S1, the user connects to the trusted digital identity server through the client, and the step of downloading the trusted digital identity two-dimensional code specifically includes:
the user uploads personal information to the credible digital identity server through the client, the credible digital identity server obtains a digital BID value of the user according to the personal information, generates credible digital identity two-dimensional codes from data containing the personal information and the BID value according to the credible digital identity two-dimensional code manufacturing standard, and sends the generated credible digital identity two-dimensional codes to the client.
Further, in step S2, according to the BID value of the user, all bluetooth locks bound to the BID value are obtained and integrated into the bluetooth lock list to be sent to the client;
the Bluetooth door lock is used for the first time, the BID value of a user needs to be bound, and bound information is uploaded to a background management server.
Further, in step S3, the bluetooth lock list further includes MAC address information of the bluetooth module in the corresponding bluetooth lock; after the user selects the Bluetooth door lock to be unlocked, the client searches the corresponding Bluetooth door lock according to the MAC address information of the Bluetooth door lock, and if the MAC address information is matched, connection is established with the Bluetooth door lock.
Further, in step S4, the step of verifying the data stream by the bluetooth door lock to complete unlocking or error reporting includes:
the Bluetooth door lock decrypts the received data stream of the credible digital identity two-dimensional code through the internal credible digital identity two-dimensional code decoding module, acquires the personal information and the BID value of the user, verifies the personal information and the BID value with the data stored locally in the Bluetooth door lock, drives the lock cylinder to unlock if the verification is successful, and reports errors if the verification is failed.
The second technical scheme is as follows:
the device for unlocking the Bluetooth door lock by sliding the trusted digital identity two-dimensional code comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to realize the method according to the first technical scheme.
The third technical scheme is as follows:
a medium for unlocking a bluetooth door lock by sliding a trusted digital identity two-dimensional code, on which a computer program is stored, wherein the program, when executed by a processor, implements the method according to the first aspect.
The invention has the following beneficial effects:
1. according to the method for unlocking the Bluetooth door lock by the credible digital identity two-dimensional code, a user can use the credible digital identity two-dimensional code image flow to match with the credible digital identity two-dimensional code special module to safely deliver and analyze the digital identity by sliding the credible digital identity two-dimensional code, the Bluetooth door lock is opened, the operation experience of the unlocking process is improved by the sliding mode, the unlocking feedback effect is improved, and the use comfort of the user is improved.
2. According to the method for unlocking the Bluetooth door lock by the trusted digital identity two-dimensional code, the Bluetooth door lock is bound with the user information, all the Bluetooth door locks of which the users have unlocking authority are displayed in the client, and therefore the user management and unlocking are facilitated.
Drawings
FIG. 1 is a flow chart of a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating interaction between an APP client and a Bluetooth door lock according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating operation of sliding two-dimensional code according to an embodiment of the present invention;
FIG. 4 is an exemplary diagram of a trusted digital identity two-dimensional code icon in an embodiment of the present invention;
fig. 5 is a flowchart illustrating establishment of a connection between an APP client and a bluetooth door lock according to an embodiment of the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and the specific embodiments.
The first embodiment is as follows:
referring to fig. 1 and 2, the method for unlocking the bluetooth door lock by using the trusted digital identity two-dimensional code comprises the following steps:
step S1, the user connects the credible digital identity server through the APP client, downloads the credible digital identity two-dimensional code, and generates a credible digital identity two-dimensional code icon in the APP client;
step S2, distributing a Bluetooth door lock list with unlocking authority by a background manager according to the information of the user;
step S3, the user obtains the authority list through the APP client, selects the Bluetooth door lock to be unlocked, and the APP client establishes communication connection with the Bluetooth door lock through the Bluetooth SDK;
and step S4, the user slides the credible digital identity two-dimensional code icon on the APP client interface to trigger the APP client to execute data sending operation, the credible digital identity two-dimensional code is converted into byte array data stream, the data stream is transmitted to the Bluetooth door lock through a Bluetooth data channel, and the Bluetooth door lock verifies the data stream to finish unlocking or report errors.
Referring to fig. 3 and 4, the specific operation of sliding the trusted digital identity two-dimensional code icon is that a user enters a trusted digital identity two-dimensional code page in the APP client to obtain the trusted digital identity two-dimensional code icon, presses the trusted digital identity two-dimensional code icon and slides upwards (or slides leftwards, rightwards and downwards), the size of the trusted digital identity two-dimensional code icon gradually decreases in the sliding process, and finally slides out of the page range upwards to represent that the trusted digital identity two-dimensional code icon is sent out.
Further, in step S1, the user connects to the trusted digital identity server through the APP client, and the step of downloading the trusted digital identity two-dimensional code specifically includes:
a user uploads personal information to the credible digital identity server through an APP client, the credible digital identity server generates a BID value according to the identity information (an identity card and face information) in user data, the identity information and the BID value are encrypted through a national secret SM4 key, then a data whole containing the identity information and the BID value is digitally signed through a national secret SM2 key, and then a two-dimensional code layout diagram of a credible digital identity is generated according to a credible digital identity two-dimensional code coding specification and sent to the APP client;
further, in step S2, according to the BID value of the user, all bluetooth locks bound to the BID value are obtained and integrated into the bluetooth lock list to be sent to the APP client;
the Bluetooth door lock is used for the first time, the BID value of a user needs to be bound, and bound information is uploaded to a background management server.
Further, referring to fig. 5, in step S3, the bluetooth lock list further includes MAC address information of the bluetooth module in the corresponding bluetooth lock; after the user selects the Bluetooth door lock to be unlocked, the APP client side searches the corresponding Bluetooth door lock according to the MAC address information of the Bluetooth door lock, and if the MAC address information is matched, connection is established with the Bluetooth door lock.
Further, in step S4, the step of verifying the data stream by the bluetooth door lock to complete unlocking or error reporting includes:
after the Bluetooth door lock receives the byte array data stream, the data stream is restored into an ASCII code character text string, a national secret key in a security chip arranged in the Bluetooth door lock is called for signature verification and decryption, identity information and a BID value are obtained, the identity information and the BID value are verified with identity information and the BID value of a user capable of opening the door, which are stored in a Bluetooth door lock body, the electronic lock cylinder is driven to unlock if verification is successful, and error is reported if verification is failed (for example, code scanning fails or no authority limit is provided) through voice prompt.
Example two:
the difference between this embodiment and the first embodiment lies in that, when the bluetooth lock that needs the unblock has and sweeps a yard module, not only can be through the mode of credible digital identity two-dimensional code icon with data stream transmission to bluetooth lock, can also be through sweeping a yard module transmission to bluetooth lock inside with the data of credible digital identity two-dimensional code through the mode of sweeping yard module department demonstration credible digital identity two-dimensional code icon at bluetooth lock.
Example three:
an apparatus for unlocking a bluetooth door lock by sliding a trusted digital identity two-dimensional code comprises a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the program to implement the method according to the first embodiment.
Example four:
a medium for unlocking a bluetooth door lock by sliding a trusted digital identity two-dimensional code, the medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements a method as in one embodiment.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (7)
1. The method for unlocking the Bluetooth door lock by the trusted digital identity two-dimensional code is characterized by comprising the following steps of:
step S1, the user connects the credible digital identity server through the client, downloads the credible digital identity two-dimensional code, and generates a credible digital identity two-dimensional code icon in the client;
step S2, distributing a Bluetooth door lock list with unlocking authority by a background manager according to the information of the user;
step S3, the user obtains the authority list through the client, selects the Bluetooth door lock to be unlocked, and the client establishes communication connection with the Bluetooth door lock through the Bluetooth SDK;
and step S4, the user slides the credible digital identity two-dimensional code icon on the client interface to trigger the client to execute data sending operation, the data stream of the credible digital identity two-dimensional code is sent to the Bluetooth door lock through a Bluetooth data channel, and the Bluetooth door lock verifies the data stream to complete unlocking or report errors.
2. The method for unlocking a bluetooth door lock by using the trusted digital identity two-dimensional code according to claim 1, wherein in step S1, the user connects to the trusted digital identity server through the client, and the step of downloading the trusted digital identity two-dimensional code specifically comprises:
the user uploads personal information to the credible digital identity server through the client, the credible digital identity server obtains a digital BID value of the user according to the personal information, generates credible digital identity two-dimensional codes from data containing the personal information and the BID value according to the credible digital identity two-dimensional code manufacturing standard, and sends the generated credible digital identity two-dimensional codes to the client.
3. The method for unlocking the Bluetooth door lock by the trusted digital identity two-dimensional code according to claim 2, wherein the method comprises the following steps: in step S2, according to the BID value of the user, all bluetooth locks bound to the BID value are obtained, integrated into the bluetooth lock list, and sent to the client;
the Bluetooth door lock is used for the first time, the BID value of a user needs to be bound, and bound information is uploaded to a background management server.
4. The method for unlocking the Bluetooth door lock by the trusted digital identity two-dimensional code according to claim 2, wherein the method comprises the following steps: in step S3, the bluetooth lock list further includes MAC address information of the bluetooth module in the corresponding bluetooth lock; after the user selects the Bluetooth door lock to be unlocked, the client searches the corresponding Bluetooth door lock according to the MAC address information of the Bluetooth door lock, and if the MAC address information is matched, connection is established with the Bluetooth door lock.
5. The method for unlocking a bluetooth door lock according to the trusted digital identity two-dimensional code of claim 2, wherein in step S4, the specific steps of the bluetooth door lock verifying the data stream and completing unlocking or reporting an error are as follows:
the Bluetooth door lock decrypts the received data stream of the credible digital identity two-dimensional code through the internal credible digital identity two-dimensional code decoding module, acquires the personal information and the BID value of the user, verifies the personal information and the BID value with the data stored locally in the Bluetooth door lock, drives the lock cylinder to unlock if the verification is successful, and reports errors if the verification is failed.
6. Device for unlocking a bluetooth door lock by sliding a trusted digital identity two-dimensional code, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any one of claims 1 to 5 when executing the program.
7. Medium for unlocking a bluetooth door lock by sliding a trusted digital identity two-dimensional code, on which a computer program is stored, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110168064.2A CN112907790A (en) | 2021-02-07 | 2021-02-07 | Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110168064.2A CN112907790A (en) | 2021-02-07 | 2021-02-07 | Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112907790A true CN112907790A (en) | 2021-06-04 |
Family
ID=76123657
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110168064.2A Pending CN112907790A (en) | 2021-02-07 | 2021-02-07 | Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112907790A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116703300A (en) * | 2023-06-15 | 2023-09-05 | 苏州冠礼科技有限公司 | Fool-proof control system and method for replacing acid bucket for semiconductor manufacturing process |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201023825A (en) * | 2008-12-24 | 2010-07-01 | Jin-Jing Zhang | Movable network terminal device and method for electric physiology data and pathology vision-monitoring |
CN102478986A (en) * | 2010-11-30 | 2012-05-30 | 汉王科技股份有限公司 | Portable electronic equipment and information sharing method thereof |
CN104378416A (en) * | 2014-10-29 | 2015-02-25 | 乐视网信息技术(北京)股份有限公司 | Method and device for main control equipment to control controlled equipment |
US20150061843A1 (en) * | 2013-08-27 | 2015-03-05 | Hon Hai Precision Industry Co., Ltd. | Remote key for control of vehicles |
CN104573608A (en) * | 2015-01-23 | 2015-04-29 | 苏州海博智能系统有限公司 | Coded message scanning method and device |
CN204423463U (en) * | 2015-01-13 | 2015-06-24 | 刘鑫 | The intelligent control system of banister is opened with mobile phone |
CN106327637A (en) * | 2016-08-25 | 2017-01-11 | 青岛亿联信息科技股份有限公司 | Bluetooth door opening system based on community management and method |
CN106530454A (en) * | 2016-10-10 | 2017-03-22 | 俞毅 | House-renting management system capable of opening locks based on Bluetooth or two-dimensional codes and method thereof |
CN107646127A (en) * | 2015-06-02 | 2018-01-30 | 索尼公司 | Lock control control equipment, information processing method, program and communication equipment |
CN107741783A (en) * | 2017-10-01 | 2018-02-27 | 上海量科电子科技有限公司 | electronic transfer method and system |
CN109243012A (en) * | 2018-07-24 | 2019-01-18 | 上海帝图信息科技有限公司 | Access control system |
CN109903447A (en) * | 2019-04-16 | 2019-06-18 | 北京景未和笋科技有限公司 | A kind of solution lock control method, system and intelligent entrance guard based on multiple instruction |
CN112200949A (en) * | 2020-12-02 | 2021-01-08 | 北京紫光青藤微系统有限公司 | Entrance guard starting method and device and identity verification system |
CN112243233A (en) * | 2020-11-06 | 2021-01-19 | 新大陆(福建)公共服务有限公司 | CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol |
-
2021
- 2021-02-07 CN CN202110168064.2A patent/CN112907790A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201023825A (en) * | 2008-12-24 | 2010-07-01 | Jin-Jing Zhang | Movable network terminal device and method for electric physiology data and pathology vision-monitoring |
CN102478986A (en) * | 2010-11-30 | 2012-05-30 | 汉王科技股份有限公司 | Portable electronic equipment and information sharing method thereof |
US20150061843A1 (en) * | 2013-08-27 | 2015-03-05 | Hon Hai Precision Industry Co., Ltd. | Remote key for control of vehicles |
CN104378416A (en) * | 2014-10-29 | 2015-02-25 | 乐视网信息技术(北京)股份有限公司 | Method and device for main control equipment to control controlled equipment |
CN204423463U (en) * | 2015-01-13 | 2015-06-24 | 刘鑫 | The intelligent control system of banister is opened with mobile phone |
CN104573608A (en) * | 2015-01-23 | 2015-04-29 | 苏州海博智能系统有限公司 | Coded message scanning method and device |
CN107646127A (en) * | 2015-06-02 | 2018-01-30 | 索尼公司 | Lock control control equipment, information processing method, program and communication equipment |
CN106327637A (en) * | 2016-08-25 | 2017-01-11 | 青岛亿联信息科技股份有限公司 | Bluetooth door opening system based on community management and method |
CN106530454A (en) * | 2016-10-10 | 2017-03-22 | 俞毅 | House-renting management system capable of opening locks based on Bluetooth or two-dimensional codes and method thereof |
CN107741783A (en) * | 2017-10-01 | 2018-02-27 | 上海量科电子科技有限公司 | electronic transfer method and system |
CN109243012A (en) * | 2018-07-24 | 2019-01-18 | 上海帝图信息科技有限公司 | Access control system |
CN109903447A (en) * | 2019-04-16 | 2019-06-18 | 北京景未和笋科技有限公司 | A kind of solution lock control method, system and intelligent entrance guard based on multiple instruction |
CN112243233A (en) * | 2020-11-06 | 2021-01-19 | 新大陆(福建)公共服务有限公司 | CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol |
CN112200949A (en) * | 2020-12-02 | 2021-01-08 | 北京紫光青藤微系统有限公司 | Entrance guard starting method and device and identity verification system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116703300A (en) * | 2023-06-15 | 2023-09-05 | 苏州冠礼科技有限公司 | Fool-proof control system and method for replacing acid bucket for semiconductor manufacturing process |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11669465B1 (en) | Secure storage of data through a multifaceted security scheme | |
CN112596802B (en) | Information processing method and device | |
US9262616B2 (en) | Simplified multi-factor authentication | |
US20190268770A1 (en) | Method and apparatus for remote portable wireless device authentication | |
US20130237190A1 (en) | Method and apparatus for remote portable wireless device authentication | |
US9198036B2 (en) | Method for providing application service | |
WO2015014691A1 (en) | System and method for securing a credential vault on a trusted computing base | |
CN1893713A (en) | Mobile terminal device, program and method for biometric encrypted personal identification number | |
CN104424409A (en) | Application unlocking method and device | |
WO2007076275A2 (en) | Method and apparatus for creating and entering a pin code | |
CN104933343A (en) | Secrecy method and apparatus of application program, and electronic device | |
US7913096B2 (en) | Method and system for the cipher key controlled exploitation of data resources, related network and computer program products | |
CN109815666B (en) | Identity authentication method and device based on FIDO protocol, storage medium and electronic equipment | |
CN105325021B (en) | Method and apparatus for remote portable wireless device authentication | |
CN105610873A (en) | Identity authentication method and device | |
CN112907790A (en) | Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code | |
CN106971436A (en) | A kind of fingerprint control method for intelligent door lock | |
CN111405550B (en) | WhatsApp key file extraction method and WhatsApp key file extraction equipment | |
CN104574615A (en) | Electronic door lock control method and control device | |
CN110909366A (en) | Anti-flashing method and system based on software end encryption | |
JP2015008462A (en) | Multifunctional mcu implementation method and multifunctional mcu | |
CN112950817B (en) | Encryption communication method of split type intelligent lock and split type intelligent lock | |
CN111935709B (en) | Application program login method and device of terminal and electronic equipment | |
WO2012081968A1 (en) | A system and method for quantum mobile access verification | |
KR20050096577A (en) | Security system using mobile phone and method therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210604 |
|
RJ01 | Rejection of invention patent application after publication |