CN117155711A - Data security transmission method, system, medium and equipment based on serial port - Google Patents

Data security transmission method, system, medium and equipment based on serial port Download PDF

Info

Publication number
CN117155711A
CN117155711A CN202311419482.XA CN202311419482A CN117155711A CN 117155711 A CN117155711 A CN 117155711A CN 202311419482 A CN202311419482 A CN 202311419482A CN 117155711 A CN117155711 A CN 117155711A
Authority
CN
China
Prior art keywords
data
private key
serial port
module
protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311419482.XA
Other languages
Chinese (zh)
Inventor
吴昊天
王巍
张锦
张大伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Unita Information Technology Co ltd
Original Assignee
Beijing Unita Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Unita Information Technology Co ltd filed Critical Beijing Unita Information Technology Co ltd
Priority to CN202311419482.XA priority Critical patent/CN117155711A/en
Publication of CN117155711A publication Critical patent/CN117155711A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/04Network layer protocols, e.g. mobile IP [Internet Protocol]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/06Transport layer protocols, e.g. TCP [Transport Control Protocol] over wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Communication Control (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a serial port-based data security transmission method, a system, a medium and equipment, wherein the system comprises a serial port protocol conversion module, a system management service module, a private key index generation module, a secret key module, a security transmission module, a data receiving module and a data sending module, and the system management service module is respectively in communication connection with the serial port protocol conversion module, the private key index generation module, the secret key module, the security transmission module, the data sending module and the data receiving module. The invention ensures the security, integrity and encryption transmission of the serial data by adopting the private key index matching mechanism encryption and decryption of the serial data by respectively installing the serial data security transmission system or device on two sides of the serial to protect the network layer.

Description

Data security transmission method, system, medium and equipment based on serial port
Technical Field
The invention relates to the technical field of network security, in particular to a serial port-based data security transmission method, a serial port-based data security transmission system, a serial port-based data security transmission medium and serial port-based data security transmission equipment.
Background
With the development of the age, serial ports are used for transmitting data in many industries, the data can easily acquire contents in the data, and serious potential safety hazards exist for malicious damage and modification.
Disclosure of Invention
Therefore, the technical problem to be solved by the invention is to provide a serial port-based data security transmission method, system, medium and equipment, which ensure the security, integrity and encryption transmission of serial port data by adopting a private key index matching mechanism encryption and decryption of serial port data by respectively installing serial port data security transmission systems or devices on two sides of the serial port to protect a network layer.
In order to solve the technical problems, the invention provides the following technical scheme:
a serial port-based data security transmission method comprises the following steps:
s1) after receiving serial port protocol data, the first equipment converts the serial port protocol data into TCP/IP protocol data;
s2) acquiring a private key index according to a predefined strategy, recording the private key index, and then finding a corresponding private key in a shared private key library according to the private key index; the predefined policy is a manner, scheme or method for obtaining the private key index set by the user according to the user's own needs, for example, if 100 private keys in the common private key library are used, the private key index is set to (date 3)% 100);
s3) encrypting the TCP/IP protocol data obtained by conversion by utilizing an encryption algorithm according to the private key;
s4) the first device fills the private key index into the encrypted TCP/IP protocol data, and then the encrypted TCP/IP protocol data filled with the private key index is sent to the second device; the first device fills the private key index into the encrypted TCP/IP protocol data, wherein the private key index used when the first device fills the private key index into the encrypted TCP/IP protocol data is the private key index obtained according to the predefined strategy in the step S2);
s5) after receiving the private key index and the TCP/IP protocol data, the second equipment finds a corresponding private key in the shared private key library according to the received private key index, and decrypts the encrypted TCP/IP protocol data by using the found private key;
s6) the second device converts the decrypted TCP/IP protocol data into serial port data.
In the above serial port-based data security transmission method, in step S6), the second device performs format judgment on serial port data converted from decrypted TCP/IP protocol data, if the serial port data has a Modbus RTU format, it is necessary to update CRC of 2 bytes on the serial port data, if the serial port data has a Modbus ASCII format, it is necessary to update LRC of 2 bytes on the serial port data, and if the serial port data has a Modbus TCP format, it is unnecessary to verify the serial port data.
According to the serial port-based data security transmission method, the private key is an asymmetric private key.
According to the serial port-based data security transmission method, the first equipment and the second equipment are connected through wired or wireless communication.
According to the serial port-based data security transmission method, the shared private key library is a prefabricated private key library.
The system for carrying out data security transmission by using the serial port-based data security transmission method is arranged in the first equipment and the second equipment, and comprises:
the serial port protocol conversion module is used for mutually converting the serial port protocol and the TCP/IP protocol;
the system management service module is used for starting a data receiving service, a data sending service and a safety protection service; the data receiving service is used for receiving data sent by the serial port, the data sending service is used for sending the serial port data, and the safety protection service is used for sending or receiving safe transmission of data of the opposite terminal by using a TCP/IP protocol after encryption;
the private key index generation module is used for generating a private key index; the private key index generation module is internally provided with a predefined strategy;
a key module for providing a private key; the secret key module is internally provided with a shared secret key library;
the safety transmission module is used for encrypting the data processed by the serial port protocol conversion module by using the private key;
the data transmitting module is used for transmitting data;
the data receiving module is used for receiving data;
the system management service module is respectively in communication connection with the serial port protocol conversion module, the private key index generation module, the secret key module, the security transmission module, the data sending module and the data receiving module.
According to the system, the security transmission module encrypts the data processed by the serial port protocol conversion module by using the SM4 algorithm according to the private key.
The system is characterized in that the shared private key library is a prefabricated key library.
A computer readable storage medium having stored thereon a computer program which when executed by a processor implements the above method.
Computer device comprising a readable storage medium, a processor and a computer program stored on the readable storage medium and executable on the processor, which computer program, when executed by the processor, implements the method described above.
The technical scheme of the invention has the following beneficial technical effects:
1. the invention adopts an asymmetric encryption algorithm to provide serial port data safety protection so as to achieve the aims of preventing interception, counterfeiting and replacement of serial port data, thereby ensuring the safety of serial port data transmission.
2. The invention only encrypts or converts serial data without modifying the original data content or the original protocol.
3. If the two devices adopt wireless communication, the wireless network can be a wireless local area network or a mobile network, and the transmission materials and labor cost can be greatly saved.
4. The security, the integrity and the encryption transmission of the serial data are ensured by adopting a private key index matching mechanism encryption and decryption to the serial data by respectively installing a serial data security transmission system or device on two sides of the serial to protect a network layer.
Drawings
FIG. 1 is a schematic diagram of the operation of a serial port based data security transmission system according to the present invention;
FIG. 2 is a flow chart of serial port based data security transmission of serial port data in the present invention;
fig. 3 is a schematic diagram of a computer capable of serial port based secure data transmission.
Detailed Description
The invention is further described below with reference to examples.
As shown in fig. 1, the serial port-based data security transmission system in the invention comprises a serial port protocol conversion module, a system management service module, a private key index generation module, a secret key module, a security transmission module, a data receiving module and a data sending module, wherein the system management service module is respectively in communication connection with the serial port protocol conversion module, the private key index generation module, the secret key module, the security transmission module, the data sending module and the data receiving module.
The serial port protocol conversion module is used for mutually converting the serial port protocol and the TCP/IP protocol; the system management service module is used for starting a data receiving service, a data sending service and a safety protection service; the data receiving service is used for receiving data sent by the serial port, the data sending service is used for sending the serial port data, and the safety protection service is used for sending or receiving safe transmission of data of the opposite terminal by using a TCP/IP protocol after encryption; the private key index generation module is used for generating a private key index; the private key index generation module is internally provided with a predefined strategy; the secret key module is used for providing a secret key, and the provided secret key is an asymmetric secret key; the secret key module is internally provided with a shared secret key library, and the shared secret key library is a prefabricated secret key library; the security transmission module is used for encrypting the data processed by the serial port protocol conversion module by using an SM4 algorithm according to the private key; the data transmitting module is used for transmitting data; and the data receiving module is used for receiving the data.
In this embodiment, the characteristic that the Modbus device supports the ethernet interface is utilized, and an ethernet-to-serial gateway is used to connect the Modbus device to the local area network of the PC. And then, interaction is carried out with Modbus equipment through Ethernet communication based on a Modbus library or an API of the TCP/IP, so that the serial port protocol of RS-232/485 is the TCP/IP protocol and can be mutually converted. The prefabricated private key library is adopted as the shared private key library, so that a user can conveniently select a corresponding predefined strategy according to own needs, the safety of data transmission can be improved, and the user can conveniently update the prefabricated private key library.
The serial-port-based data security transmission system is arranged in the first equipment and the second equipment, and the first equipment and the second equipment communicate by utilizing the serial-port-based data security transmission system.
As shown in fig. 2, the first device and the second device implement secure data transmission by:
s1) after receiving serial port protocol data, the first equipment converts the serial port protocol data into TCP/IP protocol data;
s2) acquiring a private key index according to a predefined strategy, recording the private key index, and then finding a corresponding private key in a shared private key library according to the private key index;
s3) encrypting the TCP/IP protocol data obtained through conversion according to a private key encryption algorithm;
s4) the first device fills the private key index into the encrypted TCP/IP protocol data, and then the encrypted TCP/IP protocol data filled with the private key index is sent to the second device; the first device fills the private key index into the encrypted TCP/IP protocol data, wherein the private key index used when the first device fills the private key index into the encrypted TCP/IP protocol data is the private key index obtained according to the predefined strategy in the step S2);
s5) after receiving the private key index and the TCP/IP protocol data, the second equipment finds a corresponding private key in the shared private key library according to the received private key index, and decrypts the encrypted TCP/IP protocol data by using the found private key;
s6) the second device converts the decrypted TCP/IP protocol data into serial port data.
In step S6), the second device performs format judgment on serial port data converted from decrypted TCP/IP protocol data, if the serial port data has a Modbus RTU format, it is necessary to update CRC of 2 bytes for the serial port data, if the serial port data has a Modbus ASCII format, it is necessary to update LRC of 2 bytes for the serial port data, and if the serial port data has a Modbus TCP format, it is unnecessary to verify the serial port data.
When the serial port-based data security transmission system is used for serial port data transmission, the serial port-based data security transmission system at the transmitting end encrypts data to be transmitted by using an SM4 algorithm according to a private key, and the serial port-based data security transmission system at the receiving end decrypts the data to be transmitted by using the SM4 algorithm according to the private key, and in the data transmission process, the SM4 algorithm ensures the integrity, tamper resistance and the like of the data to ensure security transmission.
In practical application, the serial port-based data security transmission system can be manufactured into a hardware device, then two devices needing serial port data transmission are connected in a communication mode through the two hardware devices, and then serial port data transmission is carried out, so that the security, the integrity and the confidentiality of data transmission of a field controller and control equipment/sensing equipment can be realized.
Based on the serial port-based data security transmission method, correspondingly, in this example, there is also provided a computer readable storage medium storing a computer program, where the computer program when executed by a processor implements the following steps: when the serial port data is used as a serial port data transmitting end, serial port protocol data is converted into TCP/IP protocol data, then a private key index is obtained according to a predefined strategy, the private key index is recorded, a corresponding private key is found in a shared private key library according to the private key index, then the TCP/IP protocol data obtained through conversion is encrypted according to the private key by utilizing an encryption algorithm, the private key index is filled in the encrypted TCP/IP protocol data, and then the TCP/IP protocol data which is encrypted and is filled with the private key index is transmitted to a serial port data receiving end; when the system is used as a serial port data receiving end, a corresponding private key is found in a shared private key library according to the received private key index, encrypted TCP/IP protocol data is decrypted by utilizing an encryption algorithm according to the private key, and then the decrypted TCP/IP protocol data is converted into serial port protocol data.
As shown in fig. 3, based on the above unknown threat discovery method of the industrial control system and the computer readable storage medium, in this embodiment, there is further provided a computer device, which includes a readable storage medium, a processor, and a computer program stored on the readable storage medium and executable on the processor, where the readable storage medium and the processor are both disposed on a bus, and when the processor executes the computer program, the processor implements the following steps: when the serial port data is used as a serial port data transmitting end, serial port protocol data is converted into TCP/IP protocol data, then a private key index is obtained according to a predefined strategy, the private key index is recorded, a corresponding private key is found in a shared private key library according to the private key index, then the TCP/IP protocol data obtained through conversion is encrypted according to the private key by utilizing an encryption algorithm, the private key index is filled in the encrypted TCP/IP protocol data, and then the TCP/IP protocol data which is encrypted and is filled with the private key index is transmitted to a serial port data receiving end; when the system is used as a serial port data receiving end, a corresponding private key is found in a shared private key library according to the received private key index, encrypted TCP/IP protocol data is decrypted by utilizing an encryption algorithm according to the private key, and then the decrypted TCP/IP protocol data is converted into serial port protocol data.
It is apparent that the above examples are given by way of illustration only and are not limiting of the embodiments. Other variations or modifications of the above teachings will be apparent to those of ordinary skill in the art. It is not necessary here nor is it exhaustive of all embodiments. While the obvious variations or modifications which are extended therefrom remain within the scope of the claims of this patent application.

Claims (10)

1. The serial port-based data security transmission method is characterized by comprising the following steps:
s1) after receiving serial port protocol data, the first equipment converts the serial port protocol data into TCP/IP protocol data;
s2) acquiring a private key index according to a predefined strategy, recording the private key index, and then finding a corresponding private key in a shared private key library according to the private key index;
s3) encrypting the TCP/IP protocol data obtained by conversion by utilizing an encryption algorithm according to the private key;
s4) the first device fills the private key index into the encrypted TCP/IP protocol data, and then the encrypted TCP/IP protocol data filled with the private key index is sent to the second device; the first device fills the private key index into the encrypted TCP/IP protocol data, wherein the private key index used when the first device fills the private key index into the encrypted TCP/IP protocol data is the private key index obtained according to the predefined strategy in the step S2);
s5) after receiving the private key index and the TCP/IP protocol data, the second equipment finds a corresponding private key in the shared private key library according to the received private key index, and decrypts the encrypted TCP/IP protocol data by using the found private key;
s6) the second device converts the decrypted TCP/IP protocol data into serial port protocol data.
2. The serial port-based data security transmission method according to claim 1, wherein in step S6), the second device performs format determination on serial port data converted from decrypted TCP/IP protocol data, if the serial port data is in Modbus RTU format, it is necessary to update CRC of 2 bytes on the serial port data, if the serial port data is in Modbus ASCII format, it is necessary to update LRC of 2 bytes on the serial port data, and if the serial port data is in Modbus TCP format, it is unnecessary to verify the serial port data.
3. The serial-based data security transmission method of claim 1, wherein the private key is an asymmetric private key.
4. The serial-based data security transmission method of claim 1, wherein the first device and the second device are connected by wired or wireless communication.
5. The serial port-based data security transmission method according to any one of claims 1 to 4, wherein the shared private key library is a prefabricated private key library.
6. A system for performing data security transmission by using the serial port-based data security transmission method according to any one of claims 1 to 5, wherein the system is provided in each of the first device and the second device, and the system comprises:
the serial port protocol conversion module is used for mutually converting the serial port protocol and the TCP/IP protocol;
the system management service module is used for starting a data receiving service, a data sending service and a safety protection service; the data receiving service is used for receiving data sent by the serial port, the data sending service is used for sending the serial port data, and the safety protection service is used for sending or receiving safe transmission of data of the opposite terminal by using a TCP/IP protocol after encryption;
the private key index generation module is used for generating a private key index; the private key index generation module is internally provided with a predefined strategy;
a key module for providing a private key; the secret key module is internally provided with a shared secret key library;
the safety transmission module is used for encrypting the data processed by the serial port protocol conversion module by using the private key;
the data transmitting module is used for transmitting data;
the data receiving module is used for receiving data;
the system management service module is respectively in communication connection with the serial port protocol conversion module, the private key index generation module, the secret key module, the security transmission module, the data sending module and the data receiving module.
7. The system of claim 6, wherein the secure transmission module encrypts the data processed by the serial protocol conversion module using SM4 algorithm based on the private key.
8. The system of claim 6, wherein the shared secret key store is a pre-made key store.
9. A computer readable storage medium having stored thereon a computer program, characterized in that the computer program, when executed by a processor, implements the method of any of claims 1-5.
10. Computer device comprising a readable storage medium, a processor and a computer program stored on the readable storage medium and executable on the processor, characterized in that the computer program when executed by the processor implements the method according to any of claims 1-5.
CN202311419482.XA 2023-10-30 2023-10-30 Data security transmission method, system, medium and equipment based on serial port Pending CN117155711A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311419482.XA CN117155711A (en) 2023-10-30 2023-10-30 Data security transmission method, system, medium and equipment based on serial port

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311419482.XA CN117155711A (en) 2023-10-30 2023-10-30 Data security transmission method, system, medium and equipment based on serial port

Publications (1)

Publication Number Publication Date
CN117155711A true CN117155711A (en) 2023-12-01

Family

ID=88910478

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311419482.XA Pending CN117155711A (en) 2023-10-30 2023-10-30 Data security transmission method, system, medium and equipment based on serial port

Country Status (1)

Country Link
CN (1) CN117155711A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1653743A (en) * 2002-05-17 2005-08-10 诺基亚有限公司 Method and system in a digital wireless data communication network for arranging data encryption and corresponding server
CN105635227A (en) * 2014-11-05 2016-06-01 北京东土科技股份有限公司 Point to point communication method and system on the basis of serial server
CN106817358A (en) * 2015-12-02 2017-06-09 阿里巴巴集团控股有限公司 The encryption and decryption method and equipment of a kind of user resources
CN106989771A (en) * 2017-06-06 2017-07-28 贵州大学 A kind of method that power distribution cabinet oil machine state parameter is monitored in real time
KR20210053235A (en) * 2019-10-30 2021-05-11 주식회사 대림 Communication System based on LoRa Protocol with Improved Security and Communication Method using the same

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1653743A (en) * 2002-05-17 2005-08-10 诺基亚有限公司 Method and system in a digital wireless data communication network for arranging data encryption and corresponding server
CN105635227A (en) * 2014-11-05 2016-06-01 北京东土科技股份有限公司 Point to point communication method and system on the basis of serial server
CN106817358A (en) * 2015-12-02 2017-06-09 阿里巴巴集团控股有限公司 The encryption and decryption method and equipment of a kind of user resources
CN106989771A (en) * 2017-06-06 2017-07-28 贵州大学 A kind of method that power distribution cabinet oil machine state parameter is monitored in real time
KR20210053235A (en) * 2019-10-30 2021-05-11 주식회사 대림 Communication System based on LoRa Protocol with Improved Security and Communication Method using the same

Similar Documents

Publication Publication Date Title
US6965992B1 (en) Method and system for network security capable of doing stronger encryption with authorized devices
EP3590242B1 (en) Communication interface for a low power wide area network, wireless device and server using such communication interface
CN102685119A (en) Data transmitting/receiving method, data transmitting/receiving device, transmission method, transmission system and server
CN102196375A (en) Securing out-of-band messages
KR101575862B1 (en) Security association system between heterogeneous power devices
CN102932350B (en) A kind of method and apparatus of TLS scanning
CN213403064U (en) Industrial network security communication system based on identification password
CN101707767B (en) Data transmission method and devices
CN202759475U (en) Data transmission device, data reception device, data transmission system and server
CN110166489B (en) Data transmission method, system, equipment and computer medium in Internet of things
CN103986582A (en) Data encryption transmission method, device and system based on dynamic encryption technology
CN111224974A (en) Method, system, electronic device and storage medium for network communication content encryption
CN114143068A (en) Electric power internet of things gateway equipment container safety protection system and method thereof
CN115242392A (en) Method and system for realizing industrial information safety transmission based on safety transmission protocol
CN103269301A (en) Desktop type IPSecVPN cryptographic machine and networking method
CN114363024A (en) Data encryption transmission method and device, terminal equipment and storage medium
CN107431691A (en) A kind of data pack transmission method, device, node device and system
CN107819778A (en) A kind of electric energy meter credential initialization method using tls protocol
CN117155711A (en) Data security transmission method, system, medium and equipment based on serial port
CN110557383A (en) Network security data processing method, device, equipment and medium for power monitoring system
CN113905108B (en) Custom protocol analysis device and system for USB communication and operation method thereof
EP4020875A1 (en) Method, first server, second server, and system for transmitting securely a key
CN113765900B (en) Protocol interaction information output transmission method, adapter device and storage medium
WO2005057842A1 (en) A wireless lan system
CN111641646A (en) Safety enhancement type communication positioning terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20231201

RJ01 Rejection of invention patent application after publication