[go: up one dir, main page]

CN104462896A - Reliable video data acquisition and certification method with security certification function - Google Patents

Reliable video data acquisition and certification method with security certification function Download PDF

Info

Publication number
CN104462896A
CN104462896A CN201410665326.6A CN201410665326A CN104462896A CN 104462896 A CN104462896 A CN 104462896A CN 201410665326 A CN201410665326 A CN 201410665326A CN 104462896 A CN104462896 A CN 104462896A
Authority
CN
China
Prior art keywords
pixel
certification
information
picture
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410665326.6A
Other languages
Chinese (zh)
Inventor
倪时龙
苏江文
池少宁
李强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Yirong Information Technology Co Ltd
Original Assignee
Fujian Yirong Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Yirong Information Technology Co Ltd filed Critical Fujian Yirong Information Technology Co Ltd
Priority to CN201410665326.6A priority Critical patent/CN104462896A/en
Publication of CN104462896A publication Critical patent/CN104462896A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A reliable video data acquisition and certification method with a security certification function includes a video file acquisition stage and a secondary certification stage, wherein in the video file acquisition stage, safety information acquisition equipment is used for acquiring safety information of operators while being used for acquiring videos, comprehensive security certification calculation is carried out on the acquired videos according to predefined certification policies to obtain image file feature codes of the videos, the image file feature codes of the videos are combined with source security certification information of the operators, and information of the image file feature codes of the videos and information of the source security certification information of the operators are bound and combined one to one and stored in a system; in the secondary certification stage, a picture needing security certification is calculated again by adopting the same certification policies used during acquisition to obtain an image file feature code of the picture, security certification information of a file of the picture is determined by comparing feature codes, security certification information stored in the system is found out, if the security certification information is legal, reliability of the source of the picture file can be proved, and otherwise, the picture file is unreliable.

Description

With reliable image acquisitions and the authentication method of safety certification
[technical field]
The invention belongs to technical field of information management, specifically refer to a kind of reliable image acquisitions with safety certification and authentication method.
[background technology]
Along with the development of infotech, with the widespread use of robot calculator, increasing traditional field starts to electronization, digitized future development, promotes original operation system and constantly changes and develop.Especially, in recent years in financial field, finance electronization has become a new business transition trend.Electronization from the electronization of financial information to financial process, infotech becomes more and more important in traditional financial field.Along with carrying out of finance electronization, the functional positioning of finance changes from single accounting to value overall management, the management of accounting operations also changes from adjusting the support of record to analysis decision, and this transformation has promoted going deep into further of financial electronization conversely.
In the process of finance electronization, financial information electronization, is a ring on basis the most, has had the electronization of financial information, can accomplish the electronization of financial process, just can accomplish financial accounting, the electronization of financial analysis and financial decision.And in the process of financial information electronization, the various bill required for financial affair work and the electronization of original certificate information, become a ring the most important and the most key undoubtedly.Only achieve the electronization of financial original certificate, financial electronization can be carried out completely, can set up the financial electronic system really meeting user's needs.Therefore, how to realize original certificate electronization, how to ensure the from the horse's mouth of voucher electronic data, how to ensure the safety of voucher electronic data, just become the problem that must solve.
Similar with financial affairs receipt electronization, in other some business scopes, as: document management, the business scopes such as logistic information management, also exist the demand of electronization comprehensively, too in these business scopes, equally also exist and the electronic same problem of voucher, how can be reliable for emphasis and responsive source document, safe and effectively carry out electronization, become in these electronic systems the problem all needing to solve.
In the existing voucher electronization that come into operation and be about to come into operation or document electronic system; most use scanner; the equipment such as high bat instrument carry out the conversion between paper document and electronic document; and by system user name; password, image encryption, the modes such as data encryption protect the safety of image file; the support to Subsequent electronic process and electronic flow process is provided, so that the carrying out of next step business with this.
The mode commonly used at present in information computerization field uses scanning device or capture apparatus to realize the electronization of original paper file, realizes the collection of paper-bill digitized information.And in the follow-up security adopting encryption or file content authentication techniques to ensure the information of electronization, avoid data to be abused and distort.But for the gatherer process of digitized information itself, but lack the certification had enough and protection mechanism, neither one effectively ensures from source to ensure the reliability that data acquisition information is originated and security.Common way is, be responsible for the collector that digitized information gathers, by same name in an account book, the mode of password signs in information acquisition system, and then operating system gathers.And the mode that this user name adds password exists certain risk, the digitized information of guarantee collection that can not be real is exactly the information that trusted users is uploaded.Even if some systems add the mode of document certificate or Ukey certification, the problem avoiding user right to be abused, usurp that can not be real.The more important thing is, in the process that business is carried out, the checking cannot carrying out again to the reliability of document source.Thus cause the generation cannot avoiding problem from source, thus produce the possibility may bringing loss to user.Especially, in sensitive traffic fields such as finance, the bill digitized information that cannot trust, the risk brought is very huge.
[summary of the invention]
Technical matters to be solved by this invention is to provide a kind of reliable image acquisitions with safety certification and Verification System.
The present invention is achieved in that
With reliable image acquisitions and the authentication method of safety certification, comprise the steps:
Image file acquisition phase: by safety information acquisition equipment while collection image, the security information of operating personnel is also gathered simultaneously, according to the certification policy pre-defined, comprehensive safety certification calculating is carried out to the image collected, draw the image file condition code of this image, and combine with the safe source authentication information of operating personnel, man-to-man binding and merging are carried out to the information of the two, is saved in system;
The re-authentication stage: when gathering needing the picture employing carrying out safety certification, identical certification policy calculates again, obtain the image file condition code of this picture, by the secure authenticated information relatively determining file of condition code, find the secure authenticated information of preserving in system, if secure authenticated information is legal, then can prove the reliability that this picture file is originated, otherwise this picture file is unreliable.
Further, described certification policy, is local digest authentication method, specifically comprises:
Set the sensitizing range needing to carry out certification by user in advance, then taken out the information of all pixels in this region by system, be i.e. Point (x, y, c), wherein x, y is respectively x coordinate and the y coordinate of pixel, and c is color value 0≤c≤255 of this pixel, and Point is the algorithm of predefined, adopt MD5 digest encryption HASH value, or SHA algorithm summary calculates, by by x, y, c carries out computing, obtains the eigenwert of this pixel; Then by certain algorithm, these pixel information are calculated, wherein n representative participates in the number of the pixel calculated, and C is data summarization algorithm, and by n character pixel is carried out summary computing, draw F value, F value is the file eigenvalue of picture.
Further, described certification policy, is overall digest authentication method, specifically comprises:
System scans whole pictures, draws the characteristic information Point (x, y, c) of all picture points of whole pictures, then, is merged by all characteristic informations, by computing, draw the file eigenvalue of picture, F = C ( Σ 1 n Po int ( x , y , c ) ) , N=picture pixels sum now.
Further, described certification policy, is local full figure vegetarian refreshments authenticating method, specifically comprises:
Gather the eigenwert of H × W pixel in summary region, wherein H is the pixel value height of pickup area, W is the pixel value width of pickup area, for eigenwert and the Point (x of whole each pixel of authentication region, y, c), wherein x, y is respectively x coordinate and the y coordinate of pixel, c is color value 0≤c≤255 of this pixel, Point is the algorithm of predefined, adopt MD5 digest encryption HASH value, or SHA algorithm summary calculates, then the eigenwert of all pixels is pressed the mode of Row Column, order is stored in database, as the eigenwert of image.
Further, described certification policy, is whole pixel authenticating method, specifically comprises:
Gather the eigenwert of H × W pixel in summary region, wherein H is the pixel value height of picture, W is the pixel value width of picture, for all pixels of whole pictures, take out eigenwert and the Point (x of each pixel, y, c), wherein x, y is respectively x coordinate and the y coordinate of pixel, c is color value 0≤c≤255 of this pixel, Point is the algorithm of predefined, adopt MD5 digest encryption HASH value, or SHA algorithm summary calculates, then the eigenwert of all pixels is pressed the mode of Row Column, order is stored in database, as the eigenwert of image.
The invention has the advantages that: adopt method of the present invention effectively can promote the reliability in original electronic data source, maximum possible avoid the fraud of data and the unreliability in source from source.The secondary safety certification of data can be provided simultaneously, ensure the security of data in whole operation process, providing reliable guarantee for needing the system of paper document electronization.
[accompanying drawing explanation]
The invention will be further described in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the general flowchart of the inventive method.
[embodiment]
As shown in Figure 1, with reliable image acquisitions and the authentication method of safety certification, comprise the steps:
Image file acquisition phase: by safety information acquisition equipment while collection image, the security information of operating personnel is also gathered simultaneously, according to the certification policy pre-defined, comprehensive safety certification calculating is carried out to the image collected, draw the image file condition code of this image, and combine with the safe source authentication information of operating personnel, man-to-man binding and merging are carried out to the information of the two, is saved in system;
The re-authentication stage: when gathering needing the picture employing carrying out safety certification, identical certification policy calculates again, obtain the image file condition code of this picture, by the secure authenticated information relatively determining file of condition code, find the secure authenticated information of preserving in system, if secure authenticated information is legal, then can prove the reliability that this picture file is originated, otherwise this picture file is unreliable.
The safety certification account form adopted due to this method is relevant with the content of image file, therefore when image is tampered or after replacing or forging by other means, all cannot obtain identical result of calculation, thus cannot pass through certification.
Operating process is as follows: first collector enters into safety information acquisition system by username-password by the first certification of system, then selects information collection function.By needing the source document gathered to put in digitized information collecting device, carry out acquisition operations.Meanwhile, system according to the safety certification strategy realizing configuring, can require that collector presses fingerprint or puts into I.D. on fingerprint collecting equipment, or the photo of automatic shooting, collecting personnel simultaneously.Digitized information and secure authenticated information all gather successfully, mail to background system, after background system obtains the data of being correlated with, according to the strategy of configured in advance, carry out the calculating of secure authenticated information, the method for certification is different according to degree of safety, can be divided into: local digest authentication, overall situation digest authentication, local full figure vegetarian refreshments certification, whole pixel certification four kinds.Verify data will be saved in database after generating.After other system to get the image file that native system collects by certain channel, image file can be submitted to by open authentication interface, system can calculate the authentication information of the image file collected again, and compare with the verify data in database, if have found the information of coupling, then the security information collected is returned, comprise finger print data, the information such as I.D. data, photo, to help the confidence level of Third party system determination image sources.The security information that also can directly be provided by Third party system directly carries out computing, provides the whether believable judgement of image file.
Safety certification account form, according to the difference of efficiency and security, is divided into four ranks: local digest authentication, overall digest authentication, local full figure vegetarian refreshments certification, whole pixel certification; Wherein, the verifying speed of local digest authentication is the fastest, but security is lower comparatively speaking.Whole pixel authentication verification speed is the slowest, but security is higher.Which kind of identifying algorithm of concrete use, can be set in advance by user.
If user selects local digest authentication, then realized setting the sensitizing range needing to carry out certification, as the amount of money region etc. in invoice image by user, then the information of all pixels in this region is taken out by system, i.e. Point (x, y, c), wherein, x, y are respectively X-coordinate and the Y-coordinate of pixel, C is color value 0≤c≤255 of this pixel, Point is the algorithm realizing definition, by by x, y, c carries out computing, obtains the eigenwert of this pixel.Then calculated facing to a little pixel information by certain rule.Concrete computing method can be set by system user.Usually available algorithm comprises MD5 and picks the calculating of encryption HASH value, SHA algorithm summary etc.Which kind of method of concrete employing can be carried out according to the setting of user.
F = C ( Σ 1 n Po int ( x , y , c ) )
Wherein n representative participates in the number of the pixel calculated, and C is data summarization algorithm (usually adopting SAH1 algorithm to realize), and by n character pixel is carried out summary computing, draw F value, the F value calculated is the eigenwert of picture.Because picture feature value and each need the information of the pixel of certification relevant, so once revise the pixel of authentication region, the authentication feature value F obtained will change, thus cannot pass through certification.
Overall situation digest authentication method, specifically comprises:
System scans whole pictures, draws the characteristic information Point (x, y, c) of all picture points of whole pictures, then, is merged by all characteristic informations, by computing, draw the file eigenvalue of picture, F = C ( Σ 1 n Po int ( x , y , c ) ) , N=picture pixels sum now.
Local full figure vegetarian refreshments authenticating method, specifically comprises:
Gather the eigenwert of H × W pixel in summary region, wherein H is the pixel value height of pickup area, W is the pixel value width of pickup area, take out the eigenwert of all pixels in whole region subsequently, i.e. Point (x, y, c), wherein x, y is respectively x coordinate and the y coordinate of pixel, c is color value 0≤c≤255 of this pixel, Point is the algorithm of predefined, adopt MD5 digest encryption HASH value, or SHA algorithm summary calculates, then the eigenwert of all pixels is pressed the mode of Row Column, order is stored in database, as the eigenwert of image.
Whole pixel authenticating method, specifically comprises:
Gather the eigenwert of H × W pixel in summary region, wherein H is the pixel value height of picture, W is the pixel value width of picture, take out the eigenwert of all pixels of whole picture region subsequently, i.e. Point (x, y, c), wherein x, y is respectively x coordinate and the y coordinate of pixel, c is color value 0≤c≤255 of this pixel, Point is the algorithm of predefined, adopt MD5 digest encryption HASH value, or SHA algorithm summary calculates, then the eigenwert of all pixels is pressed the mode of Row Column, order is stored in database, as the eigenwert of image.
Adopt method of the present invention effectively can promote the reliability in original electronic data source, maximum possible avoid the fraud of data and the unreliability in source from source.The secondary safety certification of data can be provided simultaneously, ensure the security of data in whole operation process, providing reliable guarantee for needing the system of paper document electronization.
The foregoing is only better enforcement use-case of the present invention, be not intended to limit protection scope of the present invention.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (5)

1., with reliable image acquisitions and the authentication method of safety certification, it is characterized in that: comprise the steps:
Image file acquisition phase: by safety information acquisition equipment while collection image, the security information of operating personnel is also gathered simultaneously, according to the certification policy pre-defined, comprehensive safety certification calculating is carried out to the image collected, draw the image file condition code of this image, and combine with the safe source authentication information of operating personnel, man-to-man binding and merging are carried out to the information of the two, is saved in system;
The re-authentication stage: when gathering needing the picture employing carrying out safety certification, identical certification policy calculates again, obtain the image file condition code of this picture, by the secure authenticated information relatively determining file of condition code, find the secure authenticated information of preserving in system, if secure authenticated information is legal, then can prove the reliability that this picture file is originated, otherwise this picture file is unreliable.
2., as claimed in claim 1 with reliable image acquisitions and the authentication method of safety certification, it is characterized in that: described certification policy, be local digest authentication method, specifically comprise:
Set the sensitizing range needing to carry out certification by user in advance, then taken out the information of all pixels in this region by system, be i.e. Point (x, y, c), wherein x, y is respectively x coordinate and the y coordinate of pixel, and c is color value 0≤c≤255 of this pixel, and Point is the algorithm of predefined, adopt MD5 digest encryption HASH value, or SHA algorithm summary calculates, by by x, y, c carries out computing, obtains the eigenwert of this pixel; Then by certain algorithm, these pixel information are calculated, wherein n representative participates in the number of the pixel calculated, and C is data summarization algorithm, and by n character pixel is carried out summary computing, draw F value, F value is the file eigenvalue of picture.
3., as claimed in claim 1 with reliable image acquisitions and the authentication method of safety certification, it is characterized in that: described certification policy, be overall digest authentication method, specifically comprise:
System scans whole pictures, draws the characteristic information Point (x, y, c) of all picture points of whole pictures, then, is merged by all characteristic informations, by computing, draw the file eigenvalue of picture, F = C ( Σ 1 n Point ( x , y , c ) ) , N=picture pixels sum now.
4., as claimed in claim 1 with reliable image acquisitions and the authentication method of safety certification, it is characterized in that: described certification policy, be local full figure vegetarian refreshments authenticating method, specifically comprise:
Gather the eigenwert of H × W pixel in summary region, wherein H is the pixel value height of pickup area, W is the pixel value width of pickup area, take out the eigenwert of all pixels in H × W region, i.e. Point (x, y, c), wherein x, y is respectively x coordinate and the y coordinate of pixel, c is color value 0≤c≤255 of this pixel, Point is the algorithm of predefined, adopt MD5 digest encryption HASH value, or SHA algorithm summary calculates, then the eigenwert of all pixels is pressed the mode of Row Column, order is stored in database, as the eigenwert of image.
5., as claimed in claim 1 with reliable image acquisitions and the authentication method of safety certification, it is characterized in that: described certification policy, be whole pixel authenticating method, specifically comprise:
Gather the eigenwert of H × W pixel in summary region, wherein H is the pixel value height of picture, W is the pixel value width of picture, take out the eigenwert of the pixel in image Zone Full, i.e. Point (x, y, c), wherein x, y is respectively x coordinate and the y coordinate of pixel, c is color value 0≤c≤255 of this pixel, Point is the algorithm of predefined, adopt MD5 digest encryption HASH value, or SHA algorithm summary calculates, then the eigenwert of all pixels is pressed the mode of Row Column, order is stored in database, as the eigenwert of image.
CN201410665326.6A 2014-11-19 2014-11-19 Reliable video data acquisition and certification method with security certification function Pending CN104462896A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410665326.6A CN104462896A (en) 2014-11-19 2014-11-19 Reliable video data acquisition and certification method with security certification function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410665326.6A CN104462896A (en) 2014-11-19 2014-11-19 Reliable video data acquisition and certification method with security certification function

Publications (1)

Publication Number Publication Date
CN104462896A true CN104462896A (en) 2015-03-25

Family

ID=52908923

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410665326.6A Pending CN104462896A (en) 2014-11-19 2014-11-19 Reliable video data acquisition and certification method with security certification function

Country Status (1)

Country Link
CN (1) CN104462896A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138873A (en) * 2015-08-20 2015-12-09 浪潮(北京)电子信息产业有限公司 Image-based safety certification method and device
TWI650672B (en) * 2017-04-12 2019-02-11 玉山商業銀行股份有限公司 Authentication method of electronic document
CN116721489A (en) * 2023-08-11 2023-09-08 南京财经大学 Intelligent lock control data processing method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145198A (en) * 2007-09-21 2008-03-19 清华大学 Deterministic coding method and system in fingerprint recognition
CN102663131A (en) * 2012-05-02 2012-09-12 谢建全 Credible accounting original evidence electronic image inquiring system
CN103345703A (en) * 2013-06-17 2013-10-09 上海方付通商务服务有限公司 Banking transaction authentication method and system based on image authentication
CN103714270A (en) * 2012-09-29 2014-04-09 中国银联股份有限公司 Electronic bill picture generation method and device, and electronic bill picture verification method and device
CN103793990A (en) * 2012-11-02 2014-05-14 航天信息股份有限公司 Invoice verification method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145198A (en) * 2007-09-21 2008-03-19 清华大学 Deterministic coding method and system in fingerprint recognition
CN102663131A (en) * 2012-05-02 2012-09-12 谢建全 Credible accounting original evidence electronic image inquiring system
CN103714270A (en) * 2012-09-29 2014-04-09 中国银联股份有限公司 Electronic bill picture generation method and device, and electronic bill picture verification method and device
CN103793990A (en) * 2012-11-02 2014-05-14 航天信息股份有限公司 Invoice verification method and system
CN103345703A (en) * 2013-06-17 2013-10-09 上海方付通商务服务有限公司 Banking transaction authentication method and system based on image authentication

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138873A (en) * 2015-08-20 2015-12-09 浪潮(北京)电子信息产业有限公司 Image-based safety certification method and device
TWI650672B (en) * 2017-04-12 2019-02-11 玉山商業銀行股份有限公司 Authentication method of electronic document
CN116721489A (en) * 2023-08-11 2023-09-08 南京财经大学 Intelligent lock control data processing method and device
CN116721489B (en) * 2023-08-11 2023-10-13 南京财经大学 Intelligent lock control data processing method and device

Similar Documents

Publication Publication Date Title
US12175002B2 (en) Cloud-based system for protecting sensitive information in shared content
CN112819475A (en) Information processing method, information processing device, electronic equipment, server and medium
US10291611B2 (en) Confidential information storing method, information processing terminal, and computer-readable recording medium
EP3543891B1 (en) A computer implemented method and a system for tracking of certified documents lifecycle and computer programs thereof
SA110310576B1 (en) Device, System, and Method for Registering and Authetnticating Handwritten ‎Signatures and Archiving Handwritten Information
US20180288040A1 (en) System and Method for Biometric Authentication-Based Electronic Notary Public
US12272166B2 (en) System, method and computer program product for mitigating customer onboarding risk
CN105225155A (en) A kind of insurance risk management-control method based on biological identification technology
CN105260677A (en) Multiple-attribute-based electronic data fixing system and method
CN116109275A (en) Multi-data account checking method and system
KR20220061919A (en) Method and server for providing service of disital signature based on face recognition
CN113239339A (en) Certificate shooting method and device, computer equipment and storage medium
CN104462896A (en) Reliable video data acquisition and certification method with security certification function
CN115481426A (en) Block chain-based electronic archive management method, system, terminal device and medium
RU2701088C1 (en) Method and system for trusted paperless presentation of documents
US20120136788A1 (en) System and method for secure transfer of funds
KR20210017308A (en) Method for providing secondary authentication service using device registration and distributed storage of data
KR102743977B1 (en) Method for certification of contents of electiric document and and apparatus for performing the method
US20230205933A1 (en) Verification method, non-transitory computer-readable recording medium storing verification program, and information processing device
AU2009227510B2 (en) Method and system for confirming the identity of a user
EP3748905B1 (en) Method of verifying partial data based on collective certificate
EP3671503B1 (en) Graphometric document signing method and system
US20250124172A1 (en) Cloud-based system for protecting sensitive information in shared content
KR20130007110A (en) System and method of card issue using electronic pen
TWM653714U (en) Automated review system with carbon emission calculation function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150325