CN116436888A - Schedule management and transmission method, system and storage medium of schedule mail - Google Patents

Schedule management and transmission method, system and storage medium of schedule mail Download PDF

Info

Publication number
CN116436888A
CN116436888A CN202310432899.3A CN202310432899A CN116436888A CN 116436888 A CN116436888 A CN 116436888A CN 202310432899 A CN202310432899 A CN 202310432899A CN 116436888 A CN116436888 A CN 116436888A
Authority
CN
China
Prior art keywords
user
schedule data
schedule
information
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310432899.3A
Other languages
Chinese (zh)
Other versions
CN116436888B (en
Inventor
邵建强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yitoa Digital Technology Co ltd
Original Assignee
Shenzhen Yitoa Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yitoa Digital Technology Co ltd filed Critical Shenzhen Yitoa Digital Technology Co ltd
Priority to CN202310432899.3A priority Critical patent/CN116436888B/en
Publication of CN116436888A publication Critical patent/CN116436888A/en
Application granted granted Critical
Publication of CN116436888B publication Critical patent/CN116436888B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method, a system and a storage medium for sending schedule management and schedule mail. For example to colleagues, friends and family. Thereby achieving the purposes of convenient communication and reducing the repeated workload.

Description

Schedule management and transmission method, system and storage medium of schedule mail
Technical Field
The present invention relates to the field of data processing and data transmission, and more particularly, to a method, a system, and a storage medium for schedule management and transmission of schedule mail.
Background
With the continuous development of society, people pay more attention to time management, users often use schedule management information, but if the schedule management information of the users wants to be synchronized with the schedule management information of other users, the users need to do a piece of schedule management information again, and great inconvenience is brought to the use of the users.
The prior art has defects and needs to be improved.
Disclosure of Invention
In view of the above problems, it is an object of the present invention to provide a schedule management and transmission method, system and storage medium of schedule mail.
The first aspect of the present invention provides a method for schedule management and sending of schedule mail, including:
acquiring first user input mailbox account and password information, and sending the first user input mailbox account and password information to an STMP server;
judging whether login is successful or not according to the mail account number and the password information input by the first user, if yes, establishing a new mail, selecting schedule data of the first user, and carrying out encryption processing on the schedule data of the first user according to preset rules to obtain encryption information of the schedule data of the first user;
sending the encryption information of the schedule data of the first user to an STMP server, judging whether the encryption information of the schedule data of the first user is sent to the STMP server successfully, if so, sending the encryption information of the schedule data of the first user to a second user mailbox through the STMP server, and decrypting the encryption information of the schedule data of the first user according to a preset rule to obtain the schedule data of the first user;
Judging whether the schedule data of the first user is updated to the schedule data of the second user, if yes, updating the schedule data of the first user to the schedule data of the second user, and obtaining updated schedule data of the second user.
In this scheme, whether the login is successful is judged according to the mailbox account and the password information input by the first user, including:
if not, the login fails, and whether the time difference between the last login failure time and the login failure time is within a preset time threshold value range is judged;
if yes, sending the login failure information to a device end bound by the first user input mailbox account;
if not, not transmitting.
In this solution, before sending the encryption information of the schedule data of the first user to the STMP server, the method further includes:
judging whether the schedule data of the first user exist in the STMP server or not;
if yes, the schedule data of the first user are sent to an STMP server;
if not, deleting the schedule data of the first user.
In this scheme, before obtaining the first user input mailbox account and password information, still include:
Receiving information that the current user forgets the password;
sending a verification code to the equipment end bound by the first user input mailbox account to carry out identity verification, and carrying out password changing treatment after verification is successful;
if the current user does not have the device end bound by the first user input mailbox account,
sending a plurality of accounts associated with the first user input mailbox account to perform auxiliary verification;
the plurality of mailbox accounts associated with the first user input mailbox account comprise a pre-bound friend mailbox account, a pre-bound family mailbox account and a pre-bound colleague mailbox account.
In this scheme, judge whether the calendar data of the said first user is updated to the calendar data of the second user, if yes, update the calendar data of the said first user to the calendar data of the second user, after obtaining the calendar data of the second user after updating, still include:
when the second user sends schedule data of the second user to the third user, judging whether the second user sends updated schedule data of the second user to the third user;
if yes, sending updated schedule data of the second user to a third user;
If not, selecting to send the schedule data of the first user or the schedule data of the second user before updating.
In this scheme, after obtaining updated schedule data of the second user, further includes:
acquiring current scene data;
keyword data are carried out according to the current scene data, and a current event is obtained;
judging whether the event currently performed is identical with updated schedule data of the second user or not;
if yes, marking the currently performed event is completed.
The second aspect of the present invention provides a system for sending various schedule management and schedule mails, comprising a memory and a processor, wherein the memory comprises a method program for sending various schedule management and schedule mails, and the method program for sending various schedule management and schedule mails realizes the following steps when being executed by the processor:
acquiring first user input mailbox account and password information, and sending the first user input mailbox account and password information to an STMP server;
judging whether login is successful or not according to the mail account number and the password information input by the first user, if yes, establishing a new mail, selecting schedule data of the first user, and carrying out encryption processing on the schedule data of the first user according to preset rules to obtain encryption information of the schedule data of the first user;
Sending the encryption information of the schedule data of the first user to an STMP server, judging whether the encryption information of the schedule data of the first user is sent to the STMP server successfully, if so, sending the encryption information of the schedule data of the first user to a second user mailbox through the STMP server, and decrypting the encryption information of the schedule data of the first user according to a preset rule to obtain the schedule data of the first user;
judging whether the schedule data of the first user is updated to the schedule data of the second user, if yes, updating the schedule data of the first user to the schedule data of the second user, and obtaining updated schedule data of the second user.
In this scheme, whether the login is successful is judged according to the mailbox account and the password information input by the first user, including:
if not, the login fails, and whether the time difference between the last login failure time and the login failure time is within a preset time threshold value range is judged;
if yes, sending the login failure information to a device end bound by the first user input mailbox account;
if not, not transmitting.
In this solution, before sending the encryption information of the schedule data of the first user to the STMP server, the method further includes:
Judging whether the schedule data of the first user exist in the STMP server or not;
if yes, the schedule data of the first user are sent to an STMP server;
if not, deleting the schedule data of the first user.
In this scheme, before obtaining the first user input mailbox account and password information, still include:
receiving information that the current user forgets the password;
sending a verification code to the equipment end bound by the first user input mailbox account to carry out identity verification, and carrying out password changing treatment after verification is successful;
if the current user does not have the device end bound by the first user input mailbox account,
sending a plurality of accounts associated with the first user input mailbox account to perform auxiliary verification;
the plurality of mailbox accounts associated with the first user input mailbox account comprise a pre-bound friend mailbox account, a pre-bound family mailbox account and a pre-bound colleague mailbox account.
In this scheme, judge whether the calendar data of the said first user is updated to the calendar data of the second user, if yes, update the calendar data of the said first user to the calendar data of the second user, after obtaining the calendar data of the second user after updating, still include:
When the second user sends schedule data of the second user to the third user, judging whether the second user sends updated schedule data of the second user to the third user;
if yes, sending updated schedule data of the second user to a third user;
if not, selecting to send the schedule data of the first user or the schedule data of the second user before updating.
In this scheme, after obtaining updated schedule data of the second user, further includes:
acquiring current scene data;
keyword data are carried out according to the current scene data, and a current event is obtained;
judging whether the event currently performed is identical with updated schedule data of the second user or not;
if yes, marking the currently performed event is completed.
A third aspect of the present invention provides a computer-readable storage medium including therein a schedule management and schedule mail transmission method program which, when executed by a processor, implements the steps of a schedule management and schedule mail transmission method as described in any one of the above.
The invention discloses a method, a system and a storage medium for schedule management and transmission of schedule mail,
According to the invention, the schedule data of the user is sent to the STMP server, and then the schedule data of the user is sent to the mailbox of other users through the STMP server, so that the schedule data of the user and the schedule data of other users are synchronized to the same schedule data, and the user can conveniently send some schedule information to other users. For example to colleagues, friends and family. Thereby achieving the purposes of convenient communication and reducing the repeated workload.
Drawings
FIG. 1 is a flow chart showing a method of schedule management and transmission of schedule mail according to the present invention;
FIG. 2 is a flow chart of a login security verification method of the present invention;
FIG. 3 is a flow chart of a method of deduplication in accordance with the present invention;
fig. 4 shows a block diagram of a transmission system of schedule management and schedule mail of the present invention.
Detailed Description
In order that the above-recited objects, features and advantages of the present invention will be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those described herein, and therefore the scope of the present invention is not limited to the specific embodiments disclosed below.
Fig. 1 is a flowchart showing a method of schedule management and transmission of schedule mail according to the present invention.
As shown in fig. 1, the present invention discloses a method for managing schedules and sending schedule mails, which comprises the following steps:
s102, acquiring mailbox account and password information input by a first user, and sending the mailbox account and password information input by the first user to an STMP server;
s104, judging whether login is successful according to the mailbox account and the password information input by the first user, if yes, establishing a new mail, selecting schedule data of the first user, and carrying out encryption processing on the schedule data of the first user according to a preset rule to obtain encryption information of the schedule data of the first user;
s106, sending the encryption information of the schedule data of the first user to an STMP server, judging whether the encryption information of the schedule data of the first user is sent to the STMP server successfully, if so, sending the encryption information of the schedule data of the first user to a second user mailbox through the STMP server, and decrypting the encryption information of the schedule data of the first user according to a preset rule to obtain the schedule data of the first user;
S108, judging whether the schedule data of the first user is updated to the schedule data of the second user, if so, updating the schedule data of the first user to the schedule data of the second user, and obtaining updated schedule data of the second user.
According to the embodiment of the invention, firstly, a first user inputs a mailbox account and password information, the first user inputs the mailbox account and password information to an STMP server for login, a new mail is created and schedule data is selected after login is successful, encryption processing is carried out on the schedule data to ensure the safety of the schedule data, the encryption information of the schedule data of the first user is sent to the STMP server, whether the encryption information of the schedule data of the first user is sent to the STMP server is successful or not is judged, if yes, the encryption information of the schedule data of the first user is sent to a second user mailbox through the STMP server, decryption processing is carried out on the encryption information of the schedule data of the first user according to preset rules, the schedule data of the first user is obtained, the schedule data of the first user is updated to the schedule data of the second user, and the updated schedule data of the second user is obtained. Therefore, the user can conveniently send schedule information to colleagues, friends and family, communication is convenient, and repeated workload is reduced. The schedule information is not required to be rewritten, and the selection is directly related.
According to the embodiment of the invention, judging whether the login is successful according to the mailbox account and the password information input by the first user comprises the following steps:
s202, if not, the login fails, and whether the time difference between the last login failure time and the login failure time is within a preset time threshold value range is judged;
s204, if yes, sending the login failure information to a device end bound by the first user input mailbox account;
s206, if not, not transmitting.
It should be noted that, if there is a login failure condition, whether the time difference between the last login failure time and the login failure time is within a preset time threshold value range is determined. If yes, the login failure information is sent to the equipment end bound with the first user input mailbox account, and if not, the login failure information is not sent. In order to prevent the user from inputting the mailbox account through the high-frequency input password, the password input time is limited by judging whether the time difference between the last login failure time and the login failure time is in a preset time threshold range, so that the situation is prevented, and the login failure information is sent to the equipment end bound by the first user input mailbox account and the current mailbox account is limited to log in the preset time threshold range, so that the safety of the user mailbox account is improved, wherein the equipment end bound by the first user input mailbox account can be electronic equipment such as a mobile phone, a computer and a smart watch, and the preset time threshold range is a user-defined time threshold range.
According to an embodiment of the present invention, before sending the encrypted information of the schedule data of the first user to the STMP server, the method further includes:
s302, judging whether the schedule data of the first user exist in the STMP server or not;
s304, if yes, the schedule data of the first user are sent to an STMP server;
and S306, if not, deleting the schedule data of the first user.
The present invention is to prevent repeated transmission of schedule data of a first user and increase the pressure of an STMP server. The invention judges whether the schedule data of the first user exist in the STMP server or not, if yes, the schedule data of the first user is sent to the STMP server, and if no, the schedule data of the first user is deleted. To achieve a reduction in STMP server stress.
According to the embodiment of the invention, before acquiring the mailbox account and the password information input by the first user, the method further comprises the following steps:
receiving information that the current user forgets the password;
sending a verification code to the equipment end bound by the first user input mailbox account to carry out identity verification, and carrying out password changing treatment after verification is successful;
If the current user does not have the device end bound by the first user input mailbox account,
sending a plurality of accounts associated with the first user input mailbox account to perform auxiliary verification;
the plurality of mailbox accounts associated with the first user input mailbox account comprise a pre-bound friend mailbox account, a pre-bound family mailbox account and a pre-bound colleague mailbox account.
It should be noted that, if the current user forgets the password information, a verification code is sent to the device end bound by the first user input mailbox account to perform identity verification, after verification is successful, password changing processing is performed, if the current user does not have the device end bound by the first user input mailbox account, a plurality of accounts associated with the first user input mailbox account are sent to perform auxiliary verification, and the plurality of mailbox accounts associated with the first user input mailbox account include a pre-bound friend mailbox account, a pre-bound family mailbox account and a pre-bound colleague mailbox account. The password recovery method and the password recovery device help the user to recover the password through the two types of verification, and greatly improve the safety of the user account.
According to the embodiment of the invention, whether the schedule data of the first user is updated to the schedule data of the second user is judged, if yes, the schedule data of the first user is updated to the schedule data of the second user, and after the updated schedule data of the second user is obtained, the method further comprises the steps of:
When the second user sends schedule data of the second user to the third user, judging whether the second user sends updated schedule data of the second user to the third user;
if yes, sending updated schedule data of the second user to a third user;
if not, selecting to send the schedule data of the first user or the schedule data of the second user before updating.
In order to prevent leakage of the schedule data of the first user and the updated schedule data of the second user. And after the updated schedule data of the second user are obtained, judging whether the second user sends the updated schedule data of the second user to the third user or not when the second user sends the updated schedule data of the second user to the third user, if so, sending the updated schedule data of the second user to the third user, and if not, selecting to send the schedule data of the first user or the schedule data of the second user before updating. Therefore, the second user can only send the own schedule data, and can also select to send the updated schedule data of the second user, so that the privacy of the schedule data of the first user and the updated schedule data of the second user is ensured.
According to the embodiment of the invention, after obtaining updated calendar information of the second user, the method further comprises the following steps:
acquiring current scene data;
keyword data are carried out according to the current scene data, and a current event is obtained;
judging whether the event currently performed is consistent with updated calendar information of the second user;
if yes, marking the currently performed event is completed.
It should be noted that, current scene data is obtained, keyword data is performed according to the current scene data, a current event is obtained, whether the current event is identical to updated calendar information of a second user is judged, if yes, the current event is marked. The current scene data can be a photo or a video, and keyword data is performed on the current scene data through artificial intelligence, so as to obtain the current event, such as meeting, climbing mountain, swimming, and the like. And judging whether the currently performed event is matched with updated calendar information of the second user, wherein the matched information comprises time information, place information and event information, and if yes, marking the currently performed event is completed.
According to the embodiment of the invention, the schedule data of the first user is encrypted according to the preset rule to obtain the encryption information of the schedule data of the first user, which comprises the following steps:
obtaining public key information;
calculating according to the public key information and a self-defined algorithm to obtain private key information;
encrypting the schedule data of the first user through the private key information;
and obtaining encryption information of the schedule data of the first user.
It should be noted that, the public key information is a binary number generated by the first user in a self-definition way, the public key information is calculated according to a self-defined symmetrical encryption algorithm adopted by the self-defined algorithm to obtain private key information, and the schedule data of the first user is encrypted by the private key information to obtain the encrypted information of the schedule data of the first user.
According to the embodiment of the invention, the STMP server sends the encryption information of the schedule data of the first user to the second user mailbox and decrypts the encryption information of the schedule data of the first user according to the preset rule to obtain the schedule data of the first user, and the method comprises the following steps:
acquiring the public key information;
The second user decrypts according to the public key information and the self-defined algorithm to obtain the private key information;
decrypting the encrypted information of the schedule data of the first user according to the private key information;
obtaining the encryption information of the schedule data of the first user.
The public key information is acquired, the second user decrypts according to the public key information and the self-defined algorithm to obtain the private key information, and decrypts the encryption information of the schedule data of the first user according to the private key information to obtain the encryption information of the schedule data of the first user. The public key information is transmitted through the STMP server, the custom algorithm of the first user and the second user is the same algorithm, and the custom algorithm is not transmitted through the TMP server but stored on terminal equipment of the user, such as a mobile phone and a computer. The method has the advantages that the safety of schedule data can be greatly improved, and in addition, the decryption time can be reduced by adopting an asymmetric algorithm, so that the transmission efficiency is improved.
According to an embodiment of the present invention, further comprising:
acquiring a terminal account number for receiving third party schedule data;
Judging whether the terminal account number for receiving the third party schedule data is a commonly used preset terminal account number or not;
if yes, receiving is allowed;
if not, sending warning information to the user side.
In order to reduce the influence of unrelated users, the method includes, before acquiring schedule data
And acquiring a terminal account number for receiving the third-party schedule data, and judging whether the terminal account number for receiving the third-party schedule data is a common preset terminal account number or not. If yes, the reception is allowed. If not, sending warning information to the user side. The commonly used preset terminals comprise a pre-bound friend mailbox account, a pre-bound family mailbox account and a pre-bound colleague mailbox account.
According to an embodiment of the present invention, further comprising:
acquiring meeting information in updated calendar information of the second user;
transmitting the conference information to conference participants;
acquiring file information of a current meeting, judging whether the file information of the current meeting is a confidential file or a daily file, if so, acquiring time information in the meeting information, and sending the time information according to the time information in the meeting information, if so, sending the meeting information and the daily file to meeting participants simultaneously.
It should be noted that, the invention sends the meeting information to the meeting participants by reading the meeting information in the calendar information, then obtains the file information of the current meeting, judges whether the file information of the current meeting is a confidential file or a daily file, if so, obtains the time information in the meeting information, and sends the time information in the meeting information, thus the risk of disclosure of the confidential file can be reduced by sending the confidential file according to the meeting time. If the meeting information is the daily file, the meeting information and the daily file are simultaneously sent to meeting participants. The daily files are sent in advance, so that meeting participants can know meeting contents in advance, and the working efficiency is improved. The confidential documents and daily documents may be ppt, word, excel, and the like.
According to an embodiment of the present invention, further comprising:
acquiring face information of a current user;
judging whether the face information of the current user is consistent with the face information of the conference participants;
if yes, the conference is allowed to be entered, and if not, the conference is forbidden to be entered.
In order to protect confidentiality of the meeting, the invention participates in the meeting. Firstly, face information of a current user is firstly obtained, whether the face information of the current user is consistent with the face information of the personnel participating in the conference is judged, if so, the conference is allowed to be entered, and if not, the conference is forbidden to be entered.
Therefore, irrelevant people are prevented from entering the conference, and the security of the conference is improved.
According to an embodiment of the present invention, further comprising:
acquiring the grade information of the confidential file;
if the grade information of the confidential file is the first grade file, adopting a first preset method to process;
if the grade information of the confidential file is the secondary file, adopting a second preset method to process;
if the level information of the confidential file is the third level file, a third preset method is adopted for processing.
It should be noted that, the level information of the confidential document exists in the document information of the conference currently, which is user-defined, and the processing of the first preset method allows the user who receives the confidential document to copy, paste and forward. Since the level information of the confidential document is higher if it is the secondary document,
and adopting a second preset method to process the message to inhibit forwarding. If the grade information of the confidential file is the third grade file, the confidential file is the confidential file, and the third preset method is used for processing the confidential file into burn after reading.
According to an embodiment of the present invention, further comprising:
acquiring a key authority of a first user, and acquiring an authority value level corresponding to the key authority;
Encrypting the schedule log by a key according to the authority value level of the first user;
threshold comparison is carried out according to the authority value level of the first user and the preset authority level of the second user, and whether the authority level of the second user meets the threshold comparison requirement of the authority value level of the first user is judged;
if yes, the key decryption information of the first user is sent to the second user, and the second user carries out algorithm decryption according to the received key decryption information to obtain the encryption schedule information of the first user.
It should be noted that, in order to protect confidentiality of a schedule plan of a user, and a moat protection protocol exists for schedule information among users with different levels of different authorities, therefore, authorities of the users need to be clarified, schedule information sharing is not performed for other users with low authorities, information of the schedule log of the first user is encrypted according to authority value levels corresponding to key authorities of the first user, then a target second user level sharing the schedule log is subjected to threshold comparison with the authority value levels of the first user, if the authority levels of the second user do not meet threshold comparison requirements of the authority value levels of the first user, the analysis schedule fails, key decryption information of the first user is not allowed to be transmitted to the second user for sharing, otherwise, if the threshold comparison requirements meet the requirements, the key decryption information of the second user is transmitted to the second user, and the second user carries out algorithm decryption according to the received key decryption information to obtain encrypted schedule information of the first user.
FIG. 4 is a block diagram of a system for managing schedules and sending schedule mail according to the present invention.
As shown in fig. 4, a second aspect of the present invention provides a transmission method system 4 for managing schedules and schedule mails, comprising a memory 41 and a processor 42, wherein the memory includes a transmission method program for managing schedules and schedule mails, and the transmission method program for managing schedules and schedule mails, when executed by the processor, implements the following steps:
acquiring first user input mailbox account and password information, and sending the first user input mailbox account and password information to an STMP server;
judging whether login is successful or not according to the mail account number and the password information input by the first user, if yes, establishing a new mail, selecting schedule data of the first user, and carrying out encryption processing on the schedule data of the first user according to preset rules to obtain encryption information of the schedule data of the first user;
sending the encryption information of the schedule data of the first user to an STMP server, judging whether the encryption information of the schedule data of the first user is sent to the STMP server successfully, if so, sending the encryption information of the schedule data of the first user to a second user mailbox through the STMP server, and decrypting the encryption information of the schedule data of the first user according to a preset rule to obtain the schedule data of the first user;
Judging whether the schedule data of the first user is updated to the schedule data of the second user, if yes, updating the schedule data of the first user to the schedule data of the second user, and obtaining updated schedule data of the second user.
According to the embodiment of the invention, firstly, a first user inputs a mailbox account and password information, the first user inputs the mailbox account and password information to an STMP server for login, a new mail is created and schedule data is selected after login is successful, encryption processing is carried out on the schedule data to ensure the safety of the schedule data, the encryption information of the schedule data of the first user is sent to the STMP server, whether the encryption information of the schedule data of the first user is sent to the STMP server is successful or not is judged, if yes, the encryption information of the schedule data of the first user is sent to a second user mailbox through the STMP server, decryption processing is carried out on the encryption information of the schedule data of the first user according to preset rules, the schedule data of the first user is obtained, the schedule data of the first user is updated to the schedule data of the second user, and the updated schedule data of the second user is obtained. Therefore, the user can conveniently send schedule information to colleagues, friends and family, communication is convenient, and repeated workload is reduced. The schedule information is not required to be rewritten, and the selection is directly related.
According to the embodiment of the invention, judging whether the login is successful according to the mailbox account and the password information input by the first user comprises the following steps:
if not, the login fails, and whether the time difference between the last login failure time and the login failure time is within a preset time threshold value range is judged;
if yes, sending the login failure information to a device end bound by the first user input mailbox account;
if not, not transmitting.
It should be noted that, if there is a login failure condition, whether the time difference between the last login failure time and the login failure time is within a preset time threshold value range is determined. If yes, the login failure information is sent to the equipment end bound with the first user input mailbox account, and if not, the login failure information is not sent. In order to prevent the user from inputting the mailbox account through the high-frequency input password, the password input time is limited by judging whether the time difference between the last login failure time and the login failure time is in a preset time threshold range, so that the situation is prevented, and the login failure information is sent to the equipment end bound by the first user input mailbox account and the current mailbox account is limited to log in the preset time threshold range, so that the safety of the user mailbox account is improved, wherein the equipment end bound by the first user input mailbox account can be electronic equipment such as a mobile phone, a computer and a smart watch, and the preset time threshold range is a user-defined time threshold range.
According to an embodiment of the present invention, before sending the encrypted information of the schedule data of the first user to the STMP server, the method further includes:
judging whether the schedule data of the first user exist in the STMP server or not;
if yes, the schedule data of the first user are sent to an STMP server;
if not, deleting the schedule data of the first user.
The present invention is to prevent repeated transmission of schedule data of a first user and increase the pressure of an STMP server. The invention judges whether the schedule data of the first user exist in the STMP server or not, if yes, the schedule data of the first user is sent to the STMP server, and if no, the schedule data of the first user is deleted. To achieve a reduction in STMP server stress.
According to the embodiment of the invention, before acquiring the mailbox account and the password information input by the first user, the method further comprises the following steps:
receiving information that the current user forgets the password;
sending a verification code to the equipment end bound by the first user input mailbox account to carry out identity verification, and carrying out password changing treatment after verification is successful;
If the current user does not have the device end bound by the first user input mailbox account,
sending a plurality of accounts associated with the first user input mailbox account to perform auxiliary verification;
the plurality of mailbox accounts associated with the first user input mailbox account comprise a pre-bound friend mailbox account, a pre-bound family mailbox account and a pre-bound colleague mailbox account.
It should be noted that, if the current user forgets the password information, a verification code is sent to the device end bound by the first user input mailbox account to perform identity verification, after verification is successful, password changing processing is performed, if the current user does not have the device end bound by the first user input mailbox account, a plurality of accounts associated with the first user input mailbox account are sent to perform auxiliary verification, and the plurality of mailbox accounts associated with the first user input mailbox account include a pre-bound friend mailbox account, a pre-bound family mailbox account and a pre-bound colleague mailbox account. The password recovery method and the password recovery device help the user to recover the password through the two types of verification, and greatly improve the safety of the user account.
According to the embodiment of the invention, whether the schedule data of the first user is updated to the schedule data of the second user is judged, if yes, the schedule data of the first user is updated to the schedule data of the second user, and after the updated schedule data of the second user is obtained, the method further comprises the steps of:
When the second user sends schedule data of the second user to the third user, judging whether the second user sends updated schedule data of the second user to the third user;
if yes, sending updated schedule data of the second user to a third user;
if not, selecting to send the schedule data of the first user or the schedule data of the second user before updating.
In order to prevent leakage of the schedule data of the first user and the updated schedule data of the second user. And after the updated schedule data of the second user are obtained, judging whether the second user sends the updated schedule data of the second user to the third user or not when the second user sends the updated schedule data of the second user to the third user, if so, sending the updated schedule data of the second user to the third user, and if not, selecting to send the schedule data of the first user or the schedule data of the second user before updating. Therefore, the second user can only send the own schedule data, and can also select to send the updated schedule data of the second user, so that the privacy of the schedule data of the first user and the updated schedule data of the second user is ensured.
According to the embodiment of the invention, after obtaining updated calendar information of the second user, the method further comprises the following steps:
acquiring current scene data;
keyword data are carried out according to the current scene data, and a current event is obtained;
judging whether the event currently performed is consistent with updated calendar information of the second user;
if yes, marking the currently performed event is completed.
It should be noted that, current scene data is obtained, keyword data is performed according to the current scene data, a current event is obtained, whether the current event is identical to updated calendar information of a second user is judged, if yes, the current event is marked. The current scene data can be a photo or a video, and keyword data is performed on the current scene data through artificial intelligence, so as to obtain the current event, such as meeting, climbing mountain, swimming, and the like. And judging whether the currently performed event is matched with updated calendar information of the second user, wherein the matched information comprises time information, place information and event information, and if yes, marking the currently performed event is completed.
According to the embodiment of the invention, the schedule data of the first user is encrypted according to the preset rule to obtain the encryption information of the schedule data of the first user, which comprises the following steps:
obtaining public key information;
calculating according to the public key information and a self-defined algorithm to obtain private key information;
encrypting the schedule data of the first user through the private key information;
and obtaining encryption information of the schedule data of the first user.
It should be noted that, the public key information is a binary number generated by the first user in a self-definition way, the public key information is calculated according to a self-defined symmetrical encryption algorithm adopted by the self-defined algorithm to obtain private key information, and the schedule data of the first user is encrypted by the private key information to obtain the encrypted information of the schedule data of the first user.
According to the embodiment of the invention, the STMP server sends the encryption information of the schedule data of the first user to the second user mailbox and decrypts the encryption information of the schedule data of the first user according to the preset rule to obtain the schedule data of the first user, and the method comprises the following steps:
acquiring the public key information;
The second user decrypts according to the public key information and the self-defined algorithm to obtain the private key information;
decrypting the encrypted information of the schedule data of the first user according to the private key information;
obtaining the encryption information of the schedule data of the first user.
The public key information is acquired, the second user decrypts according to the public key information and the self-defined algorithm to obtain the private key information, and decrypts the encryption information of the schedule data of the first user according to the private key information to obtain the encryption information of the schedule data of the first user. The public key information is transmitted through the STMP server, the custom algorithm of the first user and the second user is the same algorithm, and the custom algorithm is not transmitted through the TMP server but stored on terminal equipment of the user, such as a mobile phone and a computer. The method has the advantages that the safety of schedule data can be greatly improved, and in addition, the decryption time can be reduced by adopting an asymmetric algorithm, so that the transmission efficiency is improved.
According to an embodiment of the present invention, further comprising:
acquiring a terminal account number for receiving third party schedule data;
Judging whether the terminal account number for receiving the third party schedule data is a commonly used preset terminal account number or not;
if yes, receiving is allowed;
if not, sending warning information to the user side.
In order to reduce the influence of unrelated users, the method includes, before acquiring schedule data
And acquiring a terminal account number for receiving the third-party schedule data, and judging whether the terminal account number for receiving the third-party schedule data is a common preset terminal account number or not. If yes, the reception is allowed. If not, sending warning information to the user side. The commonly used preset terminals comprise a pre-bound friend mailbox account, a pre-bound family mailbox account and a pre-bound colleague mailbox account.
According to an embodiment of the present invention, further comprising:
acquiring meeting information in updated calendar information of the second user;
transmitting the conference information to conference participants;
acquiring file information of a current meeting, judging whether the file information of the current meeting is a confidential file or a daily file, if so, acquiring time information in the meeting information, and sending the time information according to the time information in the meeting information, if so, sending the meeting information and the daily file to meeting participants simultaneously.
It should be noted that, the invention sends the meeting information to the meeting participants by reading the meeting information in the calendar information, then obtains the file information of the current meeting, judges whether the file information of the current meeting is a confidential file or a daily file, if so, obtains the time information in the meeting information, and sends the time information in the meeting information, thus the risk of disclosure of the confidential file can be reduced by sending the confidential file according to the meeting time. If the meeting information is the daily file, the meeting information and the daily file are simultaneously sent to meeting participants. The daily files are sent in advance, so that meeting participants can know meeting contents in advance, and the working efficiency is improved. The confidential documents and daily documents may be ppt, word, excel, and the like.
According to an embodiment of the present invention, further comprising:
acquiring face information of a current user;
judging whether the face information of the current user is consistent with the face information of the conference participants;
if yes, the conference is allowed to be entered, and if not, the conference is forbidden to be entered.
In order to protect confidentiality of the meeting, the invention participates in the meeting. Firstly, face information of a current user is firstly obtained, whether the face information of the current user is consistent with the face information of the personnel participating in the conference is judged, if so, the conference is allowed to be entered, and if not, the conference is forbidden to be entered.
Therefore, irrelevant people are prevented from entering the conference, and the security of the conference is improved.
According to an embodiment of the present invention, further comprising:
acquiring the grade information of the confidential file;
if the grade information of the confidential file is the first grade file, adopting a first preset method to process;
if the grade information of the confidential file is the secondary file, adopting a second preset method to process;
if the level information of the confidential file is the third level file, a third preset method is adopted for processing.
It should be noted that, the level information of the confidential document exists in the document information of the conference currently, which is user-defined, and the processing of the first preset method allows the user who receives the confidential document to copy, paste and forward. Since the level information of the confidential document is higher if it is the secondary document,
and adopting a second preset method to process the message to inhibit forwarding. If the grade information of the confidential file is the third grade file, the confidential file is the confidential file, and the third preset method is used for processing the confidential file into burn after reading.
According to an embodiment of the present invention, further comprising:
acquiring a key authority of a first user, and acquiring an authority value level corresponding to the key authority;
Encrypting the schedule log by a key according to the authority value level of the first user;
threshold comparison is carried out according to the authority value level of the first user and the preset authority level of the second user, and whether the authority level of the second user meets the threshold comparison requirement of the authority value level of the first user is judged;
if yes, the key decryption information of the first user is sent to the second user, and the second user carries out algorithm decryption according to the received key decryption information to obtain the encryption schedule information of the first user.
It should be noted that, in order to protect confidentiality of a schedule plan of a user, and a moat protection protocol exists for schedule information among users with different levels of different authorities, therefore, authorities of the users need to be clarified, schedule information sharing is not performed for other users with low authorities, information of the schedule log of the first user is encrypted according to authority value levels corresponding to key authorities of the first user, then a target second user level sharing the schedule log is subjected to threshold comparison with the authority value levels of the first user, if the authority levels of the second user do not meet threshold comparison requirements of the authority value levels of the first user, the analysis schedule fails, key decryption information of the first user is not allowed to be transmitted to the second user for sharing, otherwise, if the threshold comparison requirements meet the requirements, the key decryption information of the second user is transmitted to the second user, and the second user carries out algorithm decryption according to the received key decryption information to obtain encrypted schedule information of the first user.
A third aspect of the present invention provides a computer-readable storage medium including therein a schedule management and schedule mail transmission method program which, when executed by a processor, implements the steps of a schedule management and schedule mail transmission method as described in any one of the above.
The invention discloses a method, a system and a storage medium for schedule management and transmission of schedule mail,
according to the invention, the schedule data of the user is sent to the STMP server, and then the schedule data of the user is sent to the mailbox of other users through the STMP server, so that the schedule data of the user and the schedule data of other users are synchronized to the same schedule data, and the user can conveniently send some schedule information to other users. For example to colleagues, friends and family. Thereby achieving the purposes of convenient communication and reducing the repeated workload.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above described device embodiments are only illustrative, e.g. the division of the units is only one logical function division, and there may be other divisions in practice, such as: multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or units, whether electrically, mechanically, or otherwise.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units; can be located in one place or distributed to a plurality of network units; some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present invention may be integrated in one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated in one unit; the integrated units may be implemented in hardware or in hardware plus software functional units.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to program instructions, and the foregoing program may be stored in a computer readable storage medium, where the program, when executed, performs steps including the above method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk or an optical disk, or the like, which can store program codes.
Alternatively, the above-described integrated units of the present invention may be stored in a computer-readable storage medium if implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solutions of the embodiments of the present invention may be embodied in essence or a part contributing to the prior art in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, ROM, RAM, magnetic or optical disk, or other medium capable of storing program code.

Claims (10)

1. A schedule management and schedule mail transmission method, comprising:
acquiring first user input mailbox account and password information, and sending the first user input mailbox account and password information to an STMP server;
judging whether login is successful or not according to the mail account number and the password information input by the first user, if yes, establishing a new mail, selecting schedule data of the first user, and carrying out encryption processing on the schedule data of the first user according to preset rules to obtain encryption information of the schedule data of the first user;
Sending the encryption information of the schedule data of the first user to an STMP server, judging whether the encryption information of the schedule data of the first user is sent to the STMP server successfully, if so, sending the encryption information of the schedule data of the first user to a second user mailbox through the STMP server, and decrypting the encryption information of the schedule data of the first user according to a preset rule to obtain the schedule data of the first user;
judging whether the schedule data of the first user is updated to the schedule data of the second user, if yes, updating the schedule data of the first user to the schedule data of the second user, and obtaining updated schedule data of the second user.
2. The method for managing schedules and sending schedule mail as set forth in claim 1, wherein determining whether the login is successful according to the first user input mailbox account and password information comprises:
if not, the login fails, and whether the time difference between the last login failure time and the login failure time is within a preset time threshold value range is judged;
if yes, sending the login failure information to a device end bound by the first user input mailbox account;
If not, not transmitting.
3. The method for managing schedules and sending schedule mail as claimed in claim 1, wherein before sending the encrypted information of the schedule data of the first user to the STMP server, further comprising:
judging whether the schedule data of the first user exist in the STMP server or not;
if yes, the schedule data of the first user are sent to an STMP server;
if not, deleting the schedule data of the first user.
4. The method for managing schedules and sending schedule mail as set forth in claim 2, further comprising, before obtaining the first user input of the mailbox account and the password information:
receiving information that the current user forgets the password;
sending a verification code to the equipment end bound by the first user input mailbox account to carry out identity verification, and carrying out password changing treatment after verification is successful;
if the current user does not have the device end bound by the first user input mailbox account,
sending a plurality of accounts associated with the first user input mailbox account to perform auxiliary verification;
the plurality of mailbox accounts associated with the first user input mailbox account comprise a pre-bound friend mailbox account, a pre-bound family mailbox account and a pre-bound colleague mailbox account.
5. The method for managing schedules and sending schedule mails according to claim 1, wherein determining whether the schedule data of the first user is updated to the schedule data of the second user, if yes, updating the schedule data of the first user to the schedule data of the second user, and after obtaining the updated schedule data of the second user, further comprises:
when the second user sends schedule data of the second user to the third user, judging whether the second user sends updated schedule data of the second user to the third user;
if yes, sending updated schedule data of the second user to a third user;
if not, selecting to send the schedule data of the first user or the schedule data of the second user before updating.
6. The method for managing schedules and sending schedule mail as claimed in claim 1, wherein after obtaining updated schedule data of the second user, further comprising:
acquiring current scene data;
keyword data are carried out according to the current scene data, and a current event is obtained;
judging whether the event currently performed is identical with updated schedule data of the second user or not;
If yes, marking the currently performed event is completed.
7. The system is characterized by comprising a memory and a processor, wherein the memory comprises a method program for sending the schedule management and the schedule mail, and the method program for sending the schedule management and the schedule mail realizes the following steps when being executed by the processor:
acquiring first user input mailbox account and password information, and sending the first user input mailbox account and password information to an STMP server;
judging whether login is successful or not according to the mail account number and the password information input by the first user, if yes, establishing a new mail, selecting schedule data of the first user, and carrying out encryption processing on the schedule data of the first user according to preset rules to obtain encryption information of the schedule data of the first user;
sending the encryption information of the schedule data of the first user to an STMP server, judging whether the encryption information of the schedule data of the first user is sent to the STMP server successfully, if so, sending the encryption information of the schedule data of the first user to a second user mailbox through the STMP server, and decrypting the encryption information of the schedule data of the first user according to a preset rule to obtain the schedule data of the first user;
Judging whether the schedule data of the first user is updated to the schedule data of the second user, if yes, updating the schedule data of the first user to the schedule data of the second user, and obtaining updated schedule data of the second user.
8. The system according to claim 7, wherein the determining whether the login is successful according to the first user input mailbox account and password information comprises:
if not, the login fails, and whether the time difference between the last login failure time and the login failure time is within a preset time threshold value range is judged;
if yes, sending the login failure information to a device end bound by the first user input mailbox account;
if not, not transmitting.
9. The system according to claim 7, wherein the determining whether the calendar data of the first user is updated to the calendar data of the second user, if yes, updates the calendar data of the first user to the calendar data of the second user, and after obtaining the updated calendar data of the second user, further comprises:
When the second user sends schedule data of the second user to the third user, judging whether the second user sends updated schedule data of the second user to the third user;
if yes, sending updated schedule data of the second user to a third user;
if not, selecting to send the schedule data of the first user or the schedule data of the second user before updating.
10. A computer-readable storage medium, characterized in that a program of a transmission method of schedule management and schedule mail is included in the computer-readable storage medium, which when executed by a processor, implements the steps of a transmission method of schedule management and schedule mail according to any one of claims 1 to 6.
CN202310432899.3A 2023-04-21 2023-04-21 Schedule management and transmission method, system and storage medium of schedule mail Active CN116436888B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310432899.3A CN116436888B (en) 2023-04-21 2023-04-21 Schedule management and transmission method, system and storage medium of schedule mail

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310432899.3A CN116436888B (en) 2023-04-21 2023-04-21 Schedule management and transmission method, system and storage medium of schedule mail

Publications (2)

Publication Number Publication Date
CN116436888A true CN116436888A (en) 2023-07-14
CN116436888B CN116436888B (en) 2023-11-21

Family

ID=87090659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310432899.3A Active CN116436888B (en) 2023-04-21 2023-04-21 Schedule management and transmission method, system and storage medium of schedule mail

Country Status (1)

Country Link
CN (1) CN116436888B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106331104A (en) * 2016-08-25 2017-01-11 上海葡萄纬度科技有限公司 Method and system for pushing schedule information among multiple accounts
KR101934649B1 (en) * 2017-09-21 2019-01-02 숭실대학교산학협력단 Calendar Integration of Various Platforms and Meeting Filtering Method, Recording Medium and Device thereof
CN114095510A (en) * 2020-07-31 2022-02-25 腾讯科技(深圳)有限公司 Multi-calendar account synchronization and processing method and device, electronic equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008210268A (en) * 2007-02-27 2008-09-11 Oki Electric Ind Co Ltd Schedule management system, schedule management method and schedule management server
CN103440571B (en) * 2013-09-03 2016-10-26 盈世信息科技(北京)有限公司 A kind of mail schedule assistant processing method
CN103729758A (en) * 2013-12-26 2014-04-16 杭州电子科技大学 Schedule management device based on E-mail and implementation method thereof
CN106375186A (en) * 2016-08-26 2017-02-01 深圳市金立通信设备有限公司 Schedule sharing method and terminal
CN108038658A (en) * 2017-11-10 2018-05-15 深圳市金立通信设备有限公司 A kind of group group member schedule coordination approach and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106331104A (en) * 2016-08-25 2017-01-11 上海葡萄纬度科技有限公司 Method and system for pushing schedule information among multiple accounts
KR101934649B1 (en) * 2017-09-21 2019-01-02 숭실대학교산학협력단 Calendar Integration of Various Platforms and Meeting Filtering Method, Recording Medium and Device thereof
CN114095510A (en) * 2020-07-31 2022-02-25 腾讯科技(深圳)有限公司 Multi-calendar account synchronization and processing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN116436888B (en) 2023-11-21

Similar Documents

Publication Publication Date Title
US7412487B2 (en) Method and system for tracking receipt of electronic message
US9866591B1 (en) Enterprise messaging platform
CN110138754B (en) Multi-cloud-end information processing system and resource sharing method thereof
US20050025291A1 (en) Method and system for information distribution management
CN108471404A (en) File sharing method, device, computer equipment and storage medium
US20200145389A1 (en) Controlling Access to Data
CN111914291A (en) Message processing method, device, equipment and storage medium
CN109729000B (en) Instant messaging method and device
CN107666395A (en) One population file management method, user terminal, group chat system
CN114205084B (en) Quantum key-based electronic mail multi-operation encryption method and device
CN106027530A (en) Instant message encryption system based on smartphone and implementation method thereof
CN114239072B (en) Block chain node management method and block chain network
CN108199866B (en) Social network system with strong privacy protection
CN116436888B (en) Schedule management and transmission method, system and storage medium of schedule mail
KILIÇ Encryption methods and comparison of popular chat applications
CN108540374B (en) Information processing method, device, equipment and storage medium based on instant messaging
CN111401888A (en) Method and device for generating multiple signature wallets
CN111090887A (en) Conversation content destroying method and device based on instant chat tool
CN106254226A (en) A kind of information synchronization method and device
CN105812251A (en) Instant messaging encryption system based on domestic commercial cryptography algorithms and implementation method of instant messaging encryption system based on domestic commercial cryptography algorithms
CN116132037A (en) Safety hidden communication method
CN112508482B (en) Logistics express signing management method, system and storage medium based on block chain
CN114329559A (en) External important data protection system and protection method thereof
CN115102694A (en) Sensitive information sharing method and system based on centralized storage
CN102938882A (en) Method and system changing contact information of mobile phone terminals of others by sending messages

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant