CN113346994A - Big data credibility verification method and system based on random sampling detection - Google Patents

Big data credibility verification method and system based on random sampling detection Download PDF

Info

Publication number
CN113346994A
CN113346994A CN202110704038.7A CN202110704038A CN113346994A CN 113346994 A CN113346994 A CN 113346994A CN 202110704038 A CN202110704038 A CN 202110704038A CN 113346994 A CN113346994 A CN 113346994A
Authority
CN
China
Prior art keywords
data
module
component
decryption code
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110704038.7A
Other languages
Chinese (zh)
Inventor
阮安邦
王佳帅
魏明
陈旭明
翟东雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Octa Innovations Information Technology Co Ltd
Original Assignee
Beijing Octa Innovations Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Octa Innovations Information Technology Co Ltd filed Critical Beijing Octa Innovations Information Technology Co Ltd
Priority to CN202110704038.7A priority Critical patent/CN113346994A/en
Publication of CN113346994A publication Critical patent/CN113346994A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a big data credible verification method and a big data credible verification system based on random sampling detection, and the big data credible verification method and the big data credible verification system based on random sampling detection comprise a communication module, a data sending module, a data receiving module, a control module, a processing module, a verification module and a power supply module, wherein the communication module is electrically connected with the control module, and the control module is respectively electrically connected with the data sending module and the data receiving module; the method mainly includes the steps that a preset key is edited at a data receiving module to generate a random key protocol, the received data are processed through the data receiving module, the processed data are matched with the random key protocol to generate decryption codes, the decryption codes are transmitted to a data sending module to be fed back to generate feedback decryption codes, and finally the generated decryption codes and the feedback decryption codes are simultaneously transmitted to a verification module through a data processing module to be verified trustinely without calculating the transmitted data, so that the data processing speed is improved to a certain extent.

Description

Big data credibility verification method and system based on random sampling detection
Technical Field
The invention belongs to the technical field of information processing, and particularly relates to a big data credibility verification method and system based on random sampling detection.
Background
Big data is a data set which cannot be captured, managed and processed by a conventional software tool within a certain time range, and is a massive, high-growth rate and diversified information asset which can have stronger decision making power, insight discovery power and flow optimization capability only by a new processing mode.
However, when verifying the credibility of the big data, a sender generally connects the data and the data verification code and then sends the data and the data verification code to a receiver, and characters in the data verification code are agreed in a protocol and are fixed characters, and during data transmission, even very sensitive data also needs to perform the processes of calculating, generating, sending, receiving and processing the data verification code, so that the calculation amount of equipment is increased, the data processing speed is reduced, and the data transmission rate is delayed, so that a big data credibility verification method and a big data credibility verification system based on random sampling detection are needed.
Disclosure of Invention
The invention aims to provide a big data credible verification method and a big data credible verification system based on random sampling detection, which solve the problems in the background technology by matching a data sending module, a data receiving module, a control module, a processing module and a verification module, so that characters in a data verification code are generated randomly without calculating data and by transmitting and verifying the randomly generated characters.
In order to achieve the purpose, the invention adopts the following technical scheme:
the big data credible verification system based on random sampling detection comprises a communication module, a data sending module, a data receiving module, a control module, a processing module, a verification module and a power supply module, the communication module is electrically connected with the control module, the control module is respectively electrically connected with the data sending module and the data receiving module, the data receiving module is electrically connected with the processing module, the processing module is electrically connected with the verification module, the power supply module is respectively and electrically connected with the communication module, the data sending module, the data receiving module, the control module, the processing module and the verification module, the data receiving module comprises a preset key component, a data receiving component, a data storage component and a data transmission component, the processing module comprises an automatic matching component, a decryption code generating component, a decryption code transmitting component and a response component.
Preferably, the preset key component and the data receiving component are both electrically connected to the data storage component, the data storage component is electrically connected to the data transmission component, the data receiving component is electrically connected to the data sending module, and the preset key component is used for preset key editing, key protocol generation and key management classification.
Preferably, the automatic matching component is electrically connected with the decryption code generating component, the decryption code generating component is electrically connected with the decryption code transmitting component, the decryption code transmitting component is electrically connected with the decryption code receiving and feedback unit, and the response component is electrically connected with the data sending module and the verification module respectively.
Preferably, the communication module includes a network signal receiving component and a network signal sending component, the network signal receiving component is electrically connected to the network signal sending module, the network signal receiving component is set as a network signal receiver, the network signal sending component is set as a network signal transmitter, and both the network signal receiving component and the network signal receiving component are electrically connected to the data sending module and the data receiving module for network connection between the data sending module and the data receiving module.
Preferably, the data sending module comprises a big data sending component and a decryption code receiving and feedback component, and the decryption code receiving and feedback component is electrically connected with the response component.
Preferably, the control module comprises a raspberry pi main board, and the raspberry pi main board is electrically connected with the data sending component and the data receiving component through control switches respectively.
Preferably, the verification module includes a credibility calculation component and a verification component, the credibility calculation component is electrically connected to the verification component, and the credibility calculation component includes a credible chip and a credible management center.
Preferably, the trusted chip is used for storing and supporting keys and key information of trusted measurement, trusted storage and trusted reports and cryptographic operation, and the trusted management center is used for controlling unified management and trusted interconnection of each computing node, and performing unified policy making and issuing, unified resource management and unified audit information collection and analysis.
Preferably, the verification component is used for comparing the data information fed back by the receiving and feedback component of the decryption code with the data information in the component for generating the decryption code, and when the comparison result is consistent, the trusted verification is successful, and when the comparison result is inconsistent, the verification is failed.
A big data credibility verification method based on random sampling detection comprises the following steps:
s1, the data sending module and the data receiving module are connected through the communication module by a network and are used for communication between the data receiving module and the data sending module;
s2, editing a preset key in the data receiving module to generate a random key protocol, and storing the random key protocol in a classified manner;
s3, the data sending module transmits the data to the data receiving module, the received data and the stored key protocol are automatically matched through the processing module, a decryption code is generated, and the decryption code is returned to the data sending module through the control module for feedback;
s4, the data sending module generates a feedback decryption code after receiving the shrinkability code, transmits the feedback decryption code to the data processing module again, and transmits the generated decryption code and the feedback decryption code to the verification module through the data processing module;
s5, performing trusted verification on the generated decryption code and the feedback decryption code through the verification module, where the following two situations may exist:
a1, when the generated decryption code and the feedback decryption code are consistent, the data are credible;
and A2, when the generated decryption code and the feedback decryption code data are not consistent, the data are not credible.
Compared with the prior art, the big data credibility verification method and the big data credibility verification system based on random sampling detection provided by the invention have the following advantages:
the invention mainly carries out network connection between the data sending module and the data receiving module through the communication module, is used for the communication between the data receiving module and the data sending module, the data receiving module carries out preset key editing to generate a random key protocol, and the random key protocol is classified and stored, when the data sending module sends data to the data receiving module, the data receiving module processes the received data, the processed data is matched with a random key protocol to generate a decryption code, the decryption code is transmitted to the data sending module to be fed back to generate a feedback decryption code, and finally the generated decryption code and the feedback decryption code are simultaneously transmitted to the verification module through the data processing module to be verified trustinely without calculating the transmitted data, so that the data processing speed is improved to a certain extent, and the data transmission rate is improved.
Drawings
FIG. 1 is a block diagram of the system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The specific embodiments described herein are merely illustrative of the invention and do not delimit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a big data credibility verification system based on random sampling detection, which comprises a communication module, a data sending module, a data receiving module, a control module, a processing module, a verification module and a power supply module, wherein the communication module is electrically connected with the control module, the control module is respectively electrically connected with the data sending module and the data receiving module, the data receiving module is electrically connected with the processing module, the processing module is electrically connected with the verification module, the power supply module is respectively electrically connected with the communication module, the data sending module, the data receiving module, the control module, the processing module and the verification module, the data receiving module comprises a preset secret key component, a data receiving component, a data storage component and a data transmission component, and the processing module comprises an automatic matching component, a decryption code generating component, a decryption code transmitting component and a response component;
the preset key assembly and the data receiving assembly are electrically connected with the data storage assembly, the data storage assembly is electrically connected with the data transmission assembly, the data receiving assembly is electrically connected with the data sending module, and the preset key assembly is used for preset key editing, key protocol generation and key management classification;
the automatic matching component is electrically connected with the decryption code generating component, the decryption code generating component is electrically connected with the decryption code transmitting component, the decryption code transmitting component is electrically connected with the decryption code receiving and feedback unit, and the response component is electrically connected with the data sending module and the verification module respectively;
the communication module comprises a network signal receiving component and a network signal sending component, the network signal receiving component is electrically connected with the network signal sending module, the network signal receiving component is set as a network signal receiver, the network signal sending component is set as a network signal emitter, and the network signal receiving component are both electrically connected with the data sending module and the data receiving module and are used for network connection of the data sending module and the data receiving module;
the data sending module comprises a big data sending component and a decryption code receiving and feedback component, the decryption code receiving and feedback component is electrically connected with the response component, feedback information of the data sending module is received through the response component, when the response component receives feedback data of the data sending module, the generated decryption code and the feedback decryption code are simultaneously transmitted to the verification module for credible verification, when the response component does not receive the feedback data sent by the data sending module, the response component transmits an abnormal signal to the control module, the data sending module is controlled again through the control module to carry out data transmission verification on the data receiving module again until the response component receives the feedback data sent by the data sending module, and the data are transmitted to the verification module for credible verification;
the control module comprises a raspberry pi main board which is electrically connected with the data sending component and the data receiving component through control switches respectively, and the control module controls data transmission between the data sending module and the data receiving module;
the verification module comprises a credibility calculation component and a verification component, the credibility calculation component is electrically connected with the verification component, and the credibility calculation component comprises a credible chip and a credible management center;
the trusted chip is used for storing keys and key information for supporting trusted measurement, trusted storage and trusted reports and carrying out cryptographic operation, and the trusted management center is used for controlling unified management and trusted interconnection of each computing node, and carrying out unified strategy formulation and issuing, unified resource management and unified audit information collection and analysis;
the verification component is used for receiving the data information fed back by the decryption code receiving and feedback component and comparing the data information with the data information in the decryption code generating component, and when the comparison result is consistent, the credible verification is successful, and when the comparison result is inconsistent, the verification is failed;
a big data credibility verification method based on random sampling detection comprises the following steps:
s1, the data sending module and the data receiving module are connected through the communication module by a network and are used for communication between the data receiving module and the data sending module;
s2, editing a preset key in the data receiving module to generate a random key protocol, and storing the random key protocol in a classified manner;
s3, the data sending module transmits the data to the data receiving module, the received data and the stored key protocol are automatically matched through the processing module, a decryption code is generated, and the decryption code is returned to the data sending module through the control module for feedback;
s4, the data sending module generates a feedback decryption code after receiving the shrinkability code, transmits the feedback decryption code to the data processing module again, and transmits the generated decryption code and the feedback decryption code to the verification module through the data processing module;
s5, performing trusted verification on the generated decryption code and the feedback decryption code through the verification module, where the following two situations may exist:
a1, when the generated decryption code and the feedback decryption code are consistent, the data are credible;
and A2, when the generated decryption code and the feedback decryption code data are not consistent, the data are not credible.
The data sending module and the data receiving module are connected through a network signal receiver and a network signal transmitter of the communication module in a network manner, a preset key is firstly edited on the data receiving module to generate a random key protocol, the random key protocol is stored in a classified manner, when the data sending module sends data to the data receiving module, the control module controls the data sending module to transmit the data to the data receiving module, the data receiving module transmits the received data to the processing module for data processing, the processed data is matched with the random key protocol to generate decryption codes, the decryption codes are transmitted back to a decryption code receiving and feedback component of the data sending module for feedback and generating feedback decryption codes, the data sending module transmits the feedback decryption codes back to the processing module again, and finally the generated decryption codes and the feedback decryption codes are transmitted to the verification module through the data processing module for credible verification, when the comparison result between the feedback decryption code information fed back by the decryption code receiving and feedback assembly and the generated decryption code information in the generated decryption code assembly is consistent, the credibility verification is successful, and the credibility is reliable, otherwise, the credibility verification is failed, and the credibility verification is not reliable, so that the transmitted data is not required to be calculated, the data processing speed is improved to a certain extent, and the data transmission rate is improved.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments or portions thereof without departing from the spirit and scope of the invention.

Claims (10)

1. Big data credible verification system based on random sampling detects, including communication module, data transmission module, data receiving module, control module, processing module, verification module and power module, its characterized in that: the communication module is electrically connected with the control module, the control module is respectively electrically connected with the data sending module and the data receiving module, the data receiving module is electrically connected with the processing module, the processing module is electrically connected with the verification module, the power supply module is respectively electrically connected with the communication module, the data sending module, the data receiving module, the control module, the processing module and the verification module, the data receiving module comprises a preset secret key assembly, a data receiving assembly, a data storage assembly and a data transmission assembly, and the processing module comprises an automatic matching assembly, a decryption code generating assembly, a decryption code transmission assembly and a response assembly.
2. The big data credible verification system based on random sampling detection as claimed in claim 1, wherein: the preset key assembly and the data receiving assembly are electrically connected with the data storage assembly, the data storage assembly is electrically connected with the data transmission assembly, the data receiving assembly is electrically connected with the data sending module, and the preset key assembly is used for preset key editing, key protocol generation and key management classification.
3. The big data credible verification system based on random sampling detection as claimed in claim 2, wherein: the automatic matching component is electrically connected with the decryption code generating component, the decryption code generating component is electrically connected with the decryption code transmitting component, the decryption code transmitting component is electrically connected with the decryption code receiving and feedback unit, and the response component is electrically connected with the data sending module and the verification module respectively.
4. The big data credible verification system based on random sampling detection as claimed in claim 3, wherein: the communication module comprises a network signal receiving component and a network signal sending component, the network signal receiving component is electrically connected with the network signal sending module, the network signal receiving component is set as a network signal receiver, the network signal sending component is set as a network signal transmitter, and the network signal receiving component are both electrically connected with the data sending module and the data receiving module and used for network connection of the data sending module and the data receiving module.
5. The big data credible verification system based on random sampling detection as claimed in claim 4, wherein: the data sending module comprises a big data sending component and a decryption code receiving and feedback component, and the decryption code receiving and feedback component is electrically connected with the response component.
6. The big data credible verification system based on random sampling detection as claimed in claim 5, wherein: the control module comprises a raspberry pi main board, and the raspberry pi main board is electrically connected with the data sending component and the data receiving component through the control switch respectively.
7. The big data credible verification system based on random sampling detection as claimed in claim 6, wherein: the verification module comprises a credibility calculation component and a verification component, the credibility calculation component is electrically connected with the verification component, and the credibility calculation component comprises a credible chip and a credible management center.
8. The big data credible verification system based on random sampling detection as claimed in claim 7, wherein: the trusted chip is used for storing and supporting keys and key information of trusted measurement, trusted storage and trusted reports and cryptographic operation, and the trusted management center is used for controlling unified management and trusted interconnection of each computing node, performing strategy unified formulation and issuing, resource unified management and audit information unified collection and analysis.
9. The big data credible verification system based on random sampling detection as claimed in claim 8, wherein: the verification component is used for receiving the data information fed back by the decryption code receiving and feedback component and comparing the data information with the data information in the decryption code generating component, and when the comparison result is consistent, the credible verification is successful, and when the comparison result is inconsistent, the verification is failed.
10. A big data credibility verification method based on random sampling detection is characterized in that: the method comprises the following steps:
s1, the data sending module and the data receiving module are connected through the communication module by a network and are used for communication between the data receiving module and the data sending module;
s2, editing a preset key in the data receiving module to generate a random key protocol, and storing the random key protocol in a classified manner;
s3, the data sending module transmits the data to the data receiving module, the received data and the stored key protocol are automatically matched through the processing module, a decryption code is generated, and the decryption code is returned to the data sending module through the control module for feedback;
s4, the data sending module generates a feedback decryption code after receiving the shrinkability code, transmits the feedback decryption code to the data processing module again, and transmits the generated decryption code and the feedback decryption code to the verification module through the data processing module;
s5, performing trusted verification on the generated decryption code and the feedback decryption code through the verification module, where the following two situations may exist:
a1, when the generated decryption code and the feedback decryption code are consistent, the data are credible;
and A2, when the generated decryption code and the feedback decryption code data are not consistent, the data are not credible.
CN202110704038.7A 2021-06-24 2021-06-24 Big data credibility verification method and system based on random sampling detection Pending CN113346994A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110704038.7A CN113346994A (en) 2021-06-24 2021-06-24 Big data credibility verification method and system based on random sampling detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110704038.7A CN113346994A (en) 2021-06-24 2021-06-24 Big data credibility verification method and system based on random sampling detection

Publications (1)

Publication Number Publication Date
CN113346994A true CN113346994A (en) 2021-09-03

Family

ID=77478443

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110704038.7A Pending CN113346994A (en) 2021-06-24 2021-06-24 Big data credibility verification method and system based on random sampling detection

Country Status (1)

Country Link
CN (1) CN113346994A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030159036A1 (en) * 2000-02-15 2003-08-21 Walmsley Simon Robert Validation protocol and system
US20100082987A1 (en) * 2008-09-30 2010-04-01 Microsoft Corporation Transparent trust validation of an unknown platform
US20110197075A1 (en) * 2010-02-05 2011-08-11 Ever Light Technology Limited Electronic device and power adapter thereof and method for identifying power adapter
CN104518880A (en) * 2014-12-17 2015-04-15 中国船舶重工集团公司第七0九研究所 Big data reliability validation method and system based on random sampling detection
CN105959111A (en) * 2016-07-01 2016-09-21 何钟柱 Information security big-data resource access control system based on cloud computing and credible computing
US20200177381A1 (en) * 2018-11-30 2020-06-04 Alibaba Group Holding Limited Trusted measuring method, apparatus, system, storage medium, and computing device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030159036A1 (en) * 2000-02-15 2003-08-21 Walmsley Simon Robert Validation protocol and system
US20100082987A1 (en) * 2008-09-30 2010-04-01 Microsoft Corporation Transparent trust validation of an unknown platform
US20110197075A1 (en) * 2010-02-05 2011-08-11 Ever Light Technology Limited Electronic device and power adapter thereof and method for identifying power adapter
CN104518880A (en) * 2014-12-17 2015-04-15 中国船舶重工集团公司第七0九研究所 Big data reliability validation method and system based on random sampling detection
CN105959111A (en) * 2016-07-01 2016-09-21 何钟柱 Information security big-data resource access control system based on cloud computing and credible computing
US20200177381A1 (en) * 2018-11-30 2020-06-04 Alibaba Group Holding Limited Trusted measuring method, apparatus, system, storage medium, and computing device

Similar Documents

Publication Publication Date Title
CN100581102C (en) Data safety transmission method for wireless sensor network
CN101465735B (en) Network user identification verification method, server and client terminal
EP1343345B1 (en) Mobile authentication system with reduced authentication delay
EP1906622B1 (en) Alarm/event encryption in an industrial environment
CN113765713B (en) Data interaction method based on Internet of things equipment acquisition
CN102752269B (en) Based on the method for the authentication of cloud computing, system and cloud server
CN105610984A (en) Method for remotely controlling vehicle
WO2013012543A2 (en) Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier
CN212486798U (en) Electric power sensing equipment based on block chain technology
CN102130802A (en) Internet of things home appliance management system and management method
CN111277610A (en) Gateway control system, method, intelligent device and intelligent device server
CN112910100B (en) Credible power supply and receiving device and control method thereof
CN108429820A (en) A kind of communication means of internet of things application layer, system and terminal device
CN111212105B (en) Remote safe transmission method and system for wind and light storage data
CN112818056A (en) Log security sharing method, system and device of block chain
Sun et al. Research on distributed feeder automation communication based on XMPP and GOOSE
CN113346994A (en) Big data credibility verification method and system based on random sampling detection
CN111769952A (en) Data processing system of block chain sensor
CN115941252A (en) MQTT dynamic access control method based on trust calculation
CN114362997A (en) Data transmission method and device for intelligent equipment of transformer substation, intelligent equipment and medium
CN111065091A (en) Wireless data acquisition system and data transmission method based on lora
CN116389032B (en) SDN architecture-based power information transmission link identity verification method
CN115529340B (en) Data management method of VPX chassis CHMC module based on soft bus
CN112507269B (en) Website background risk assessment system
CN112202709B (en) Security management system and method for full scene networking equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210903

RJ01 Rejection of invention patent application after publication