CN109670840A - A kind of block chain terminal equipment control method based on cryptography - Google Patents
A kind of block chain terminal equipment control method based on cryptography Download PDFInfo
- Publication number
- CN109670840A CN109670840A CN201811481735.5A CN201811481735A CN109670840A CN 109670840 A CN109670840 A CN 109670840A CN 201811481735 A CN201811481735 A CN 201811481735A CN 109670840 A CN109670840 A CN 109670840A
- Authority
- CN
- China
- Prior art keywords
- terminal device
- terminal
- password
- private key
- cryptography
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000006855 networking Effects 0.000 claims description 17
- 238000012790 confirmation Methods 0.000 claims description 9
- 230000001360 synchronised effect Effects 0.000 claims description 7
- 238000003860 storage Methods 0.000 claims description 5
- 230000008676 import Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims 11
- 238000005516 engineering process Methods 0.000 abstract description 2
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 abstract 1
- 239000010931 gold Substances 0.000 abstract 1
- 229910052737 gold Inorganic materials 0.000 abstract 1
- 230000006870 function Effects 0.000 description 5
- 230000007958 sleep Effects 0.000 description 4
- 230000004913 activation Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 241001062009 Indigofera Species 0.000 description 1
- 230000001154 acute effect Effects 0.000 description 1
- 235000019577 caloric intake Nutrition 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000005059 dormancy Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000000284 resting effect Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 230000036578 sleeping time Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The present invention is a kind of block chain terminal equipment control method based on cryptography, and core technology is to be dissolved into ideal money wallet in intelligence wearing product, improves the safety of intelligence wearing product and the convenient and practical property of ideal money wallet.The coin amount that ideal money is added simultaneously shows that function makes the product have the function of the appreciation of the valuables such as gold, jewelry, value preserving.And the safety and unique identification of product are improved using iris recognition or fingerprint identification function.
Description
Technical field
The present invention relates to a kind of intelligent wearable technologies.
Background technique
Existing Intelligent bracelet and smartwatch generally have a time showing, movement statistics, sleep monitor or call reminding,
The functions such as social activity sharing.Time showing: have implicitly and explicitly, pass through LED or various screens;Movement statistics: it including step number and climbs
Number of floor levels, to calculate move distance and calorie consumption;Hypnograph: being switched to after sleep pattern can be by sleep procedure
The active level of limbs counts the parameters such as depth sleeping time.And be to automatically record, it is not necessarily to manual switching.Free time reminds:
A time span t can be set, when resting between when reaching t can vibration reminding user, to the frequent crowd's ratio for sitting office
It is more helpful.But existing Intelligent bracelet or wrist-watch do not have reserve value.
Product of the ideal money as e-commerce, starts to play the part of more and more important role, moreover, increasingly and real
The world crosses.The industrialization of ideal money will form ideal money market.If the appearance of stock market be industrial capital with
The product that financial capital combines, then ideal money will be the product for servicing capital in conjunction with financial capital.Modern service industry, it is special
It is not personalized Modern Information Service Industry, the Industry Foundation of individualized virtual currency will be become.
The invention is illustrated using ideal money as a typical case.The concept of ideal money is initially by middle acute hearing
It was proposed in 2009, according to the P2P network of the open source software and construction of middle clever thinking design issue thereon.Ideal money
It is a kind of digital cash of P2P form.It is point-to-point to transmit the payment system for meaning a decentralization.
Different from most of currency, ideal money is not against specific currency authority releases, it is according to special algorithm, by big
The calculating of amount generates, and ideal money economy is confirmed simultaneously using the distributed data base that nodes numerous in entire P2P network are constituted
All trading activities are recorded, and are designed to ensure that money flow links safety using cryptography.P2P's goes to center
Changing characteristic and algorithm itself may insure artificially manipulate value of money by largely manufacturing ideal money.Setting based on cryptography
Meter can make ideal money that can only be shifted or be paid by true owner.This also ensures that currency ownership and negotiation
Anonymity.Ideal money and the maximum difference of other ideal moneys, are that its total quantity is very limited, are had extremely strong rare
Property.The money-system is once only no more than 10,500,000 in 4 years, and total quantity later will be permanently limited in 21,000,000.
Ideal money can be used to fulfil, and can be exchanged into the currency of most countries.Ideal money is stored in ideal money wallet,
Ideal money wallet is a kind of software for abiding by special ideal money network protocol, it can be used to store, send, collecting virtual goods
Coin.
Although many ideal money fans are considered as hardware wallet the guarantee for guaranteeing encryption currency safety, actual conditions
It is that these equipment are still prohibitively expensive, and most people all uses, it is clear that be not-so-practical.The central hardware of ideal money is set
It is standby, such as TREZOR, in the very stick of performance in the eyes of ideal money user, but for common people, but without great significance.Together
When it is also inconvenient to carry, it is undesirable with the carrier mobile phone interaction of mobile Internet at this stage.
Summary of the invention
The present invention solves the problems, such as that above-mentioned prior art exists, and design provides a kind of block chain terminal based on cryptography
Apparatus control method.
The encrypting step of the terminal device includes:
Step 1 imports private key in terminal device;
Step 2 stores default verifying password and iris password or finger-print cipher in terminal device;
Step 3, iris password or finger-print cipher encrypt verifying password, obtain encrypted verifying password and are stored in terminal
In equipment;
Step 4, verifying password obtain encrypted private key and are stored in terminal device for private key to be encrypted;
Step 5, private key generate public key by elliptic curve (ECPoint);
The decryption step of the terminal device includes:
Step 2.1, networking end are connect by bluetooth or USB port with terminal;
Step 2.2, user input public key and verifying password on networking end APP, are transmitted to terminal;
Step 2.3, terminal device input iris password or finger-print cipher, are decrypted the verifying password of encryption;
Step 2.4 is decrypted the private key for being verified password encryption with the verifying password decrypted;
Whether step 2.5 is matched using the private key after public key and decryption, correct with confirmation verifying password.
Preferably, it is by microphotography equipment embedded above terminal device screen that terminal device, which reads the mode of iris,
Acquisition is read out to iris image.
Preferably, it in the step 2.2, is preset in terminal device and networking end APP display end when password is verified in input
The arrangement of digital button is combined, and the combining random of starting input password occurs every time.
Preferably, the private key is the array of 32 byte composition, and the total number of private key is 2^ (8*32)=2^256.
Preferably, after the terminal device used for the first time is connected to networking end APP, verifying password is set in networking end APP
Afterwards, terminal shows a seed.
Preferably, the display mode of the Seed uses the display mode of LED or OLED.
Preferably, it is to the method for terminal input private key:
By inputting Seed after USB or bluetooth connection to the networking end end APP, private key is restored by Seed;Or,
The ciphertext for reading in private key from other cold storage equipment by bluetooth, is recovering private key by decipherment algorithm.
Preferably, the terminal device shows quantity and the time of jewelry by the display mode of LED or OLED.
Preferably, it when being traded using terminal device, comprises the following steps:
Step 3.1, user input ideal money public key, number of transaction and verifying password on networking end APP, and by bluetooth or
USB port is transmitted to terminal;
Step 3.2, terminal device are decrypted by decryption step, if successful decryption, carry out step 3;
Step 3.3, user confirm Transaction Information, are digitally signed using private key to above- mentioned information, after generating digital signature
Transaction Information;
Step 3.4, terminal device send networking end for the Transaction Information after signature by bluetooth or USB;
Number after the number of ideal money and this signature that step 3.5, user are possessed by networking end APP verifying carries out pair
Than confirming this transaction if number is less than the quantity possessed;
Step 3.6, user confirm transaction post command networking end APP to the transaction of ideal money Web broadcast;
Step 3.7, terminal device and networking end synchronize the newest balance of terminal device corresponding address.
Preferably, in step 3.2, if successful decryption, Transaction Information is shown by OLED/LED, so that user is manually true
Recognize;
If occurring password mistake in step 3.2, mistake is prompted by OLED/LED.
Preferably, the balance is synchronous is completed by automatically and manually two ways;
Under automated manner, networking end the transaction for receiving or sending ideal money every time obtain the whole network node confirmation after automatically by
Bluetooth or USB send terminal for the address for end confirmation of networking and newest balance to the synchronous balance of terminal device application
Equipment, terminal device checkout transaction address are consistent with private key is locally stored, and update the balance of synchronous local maintenance;
When automatic synchronization fails or can not carry out, user initiates balance synchronization request, and people by end software of networking manually
Work confirmation balance is synchronously completed.
The present invention not only has the function of wrist-watch, note step, sleep monitor etc., while the equipment also has the number of hardware wallet
Signature processing function.The device can be carried, and can show the owning amount of ideal money, and for ideal money, this sees this device
Lose, impalpable virtual goods assign beautiful, fashion a entity appearance, the reserve value with jewelry.In the invention
The ideal money being related to, is not limited solely to existing ideal money, and all ideal moneys based on P2P agreement are included in this
In the scope of invention.
Detailed description of the invention
Fig. 1 is the encrypting step of terminal device of the present invention.
Specific embodiment
In order to be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, tie below
Closing specific embodiment, the present invention will be further described in detail, the range of but do not limit the invention in any way.
A kind of block chain terminal device based on cryptography proposed by the present invention, concrete operations process are as follows: (with mobile phone
For APP, desktop software function is similar)
The encrypting step of the terminal device includes:
Step 1 imports private key in terminal device;
Step 2 stores default verifying password and iris password or finger-print cipher in terminal device;
Step 3, iris password or finger-print cipher encrypt verifying password, obtain encrypted verifying password and are stored in terminal
In equipment;
Step 4, verifying password obtain encrypted private key and are stored in terminal device for private key to be encrypted;
Step 5, private key generate public key by elliptic curve;
The decryption step of the terminal device includes:
Step 2.1, mobile phone are connect by bluetooth or USB port with terminal;
Step 2.2, user input public key and verifying password in cell phone application, are transmitted to terminal;
Step 2.3, terminal device input iris password or finger-print cipher, are decrypted the verifying password of encryption;
Step 2.4 is decrypted the private key for being verified password encryption with the verifying password decrypted;
Whether step 2.5 is matched using the private key after public key and decryption, correct with confirmation verifying password.
Further, it is by microphotography device embedded above terminal device screen that terminal device, which reads the mode of iris,
Material is read out acquisition to iris image.In the step 2.2, input is shown when verifying password in terminal device and cell phone application
The arrangement combination of preset number button in end, and the combining random of starting input password occurs every time.The private key is 32
The array of byte composition, the total number of private key are 2^ (8*32)=2^256.
After the terminal device used for the first time is connected to cell phone application, after cell phone application sets verifying password, terminal device
One seed of end display.The display mode of the Seed uses the display mode of LED or OLED.Private key is inputted to terminal
Method be: by inputting Seed after USB or bluetooth connection to cell phone application end, private key is restored by Seed;Or, passing through bluetooth
The ciphertext that private key is read in from other cold storage equipment, is recovering private key by decipherment algorithm.
When being traded using terminal device, comprise the following steps:
Step 3.1, user input ideal money public key, number of transaction and verifying password in cell phone application, and by bluetooth or
USB port is transmitted to terminal;
Step 3.2, terminal device are decrypted by decryption step, if successful decryption, carry out step 3;
Step 3.3, user confirm Transaction Information, are digitally signed using private key to above- mentioned information, after generating digital signature
Transaction Information;
Step 3.4, terminal device send mobile phone for the Transaction Information after signature by bluetooth or USB;
Number after the number of ideal money and this signature that step 3.5, user are possessed by cell phone application verifying carries out pair
Than confirming this transaction if number is less than the quantity possessed;
Step 3.6, user confirm transaction post command cell phone application to the transaction of ideal money Web broadcast;
Step 3.7, terminal device and mobile phone synchronize the newest balance of terminal device corresponding address.
In step 3.2, if successful decryption, Transaction Information is shown by OLED/LED, for user's manual confirmation;
If occurring password mistake in step 3.2, mistake is prompted by OLED/LED.
The balance is synchronous to be completed by automatically and manually two ways;
Under automated manner, mobile phone is after the transaction for receiving or sending ideal money every time obtains the confirmation of the whole network node automatically by indigo plant
Tooth or USB send terminal device for the address to confirm phone and newest balance to the synchronous balance of terminal device application,
Terminal device checkout transaction address is consistent with private key is locally stored, and updates the balance of synchronous local maintenance;In automatic synchronization
When failing or can not carry out, user initiates balance synchronization request by cell phone software manually, and manual confirmation balance is same
Step is completed.
The equipment is in standby or Low-power-consumptiodormancy dormancy state in inactive situation.There are many kinds of modes for activation: such as
The equipment that fruit has key, is activated using touch key, short touching, the key modes such as long-pressing enter pattern switching or enter to
Machine state.If there are the modules such as gravity sensor, gyroscope inside equipment, enter activation, mode by the way of tapping screen
Switching and standby mode.If USB interface, USB interface is connected, into operating mode.If there is bluetooth or
If the interfaces such as WIFI, pass through host/networked devices one end active activation.
Client switches into coin amount display pattern through the above way, and terminal device can be according to ideal money in storage equipment
Quantity make display or the hidden displaying shown.Such as: the quantity of ideal money can be shown by LED.It can when display
To be segmented display, such as the unit of 0.001BTC(ideal money) shown below as 0, it is greater than 0.001 less than 1 display 1,1 ~ 100
The forms such as 2 are shown to show the quantity of ideal money.It can also be shown using Multicolor LED lamp, the color of coin amount difference LED light
It is different.Simultaneously coin amount number can also be showed by microphone devices such as loudspeakers.There is no coin then not sounding, loudspeaker meeting
The size of volume and the frequency of loudspeaker are adjusted according to the difference of coin amount.Sound is very brief or difference is arranged in long can pass through
Frequency values indicate.
If client's entry time display pattern, current time can accurately be shown.The display mode of time can use LED
Display, for example first read clock shown minute again or shown using OLED screen curtain.Since time showing is most basic
Function, system can also be time modes with the preferred mode that setting standby mode returns.
Role of the present invention is storage wholesale ideal money, and the core of ideal money wallet is the safety of private key, this
Invention is calculated by the oval Encryption Algorithm and SHA256 encryption of setting verifying password and quick password and operation ideal money
Method is reached under loss situation of the present invention, the recovery of ideal money account to save private key and signature by the generation of Seed,
So that the present invention is made absolute safety while Show, it is more stronger than existing valuables anti-theft.
It is discussed in detail although the contents of the present invention have passed through above-mentioned preferred embodiment, but it should be appreciated that above-mentioned retouches
It states and is not considered as limitation of the invention.After those skilled in the art have read above content, for of the invention a variety of
Modifications and substitutions all will be apparent.Therefore, protection scope of the present invention should be by the attached claims.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811481735.5A CN109670840A (en) | 2018-12-05 | 2018-12-05 | A kind of block chain terminal equipment control method based on cryptography |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811481735.5A CN109670840A (en) | 2018-12-05 | 2018-12-05 | A kind of block chain terminal equipment control method based on cryptography |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109670840A true CN109670840A (en) | 2019-04-23 |
Family
ID=66144234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811481735.5A Pending CN109670840A (en) | 2018-12-05 | 2018-12-05 | A kind of block chain terminal equipment control method based on cryptography |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109670840A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104811310A (en) * | 2015-03-30 | 2015-07-29 | 赵宇翔 | Display method and wearing device |
CN107819571A (en) * | 2017-09-29 | 2018-03-20 | 广东中科南海岸车联网技术有限公司 | The generation method and device of private key |
CN108256866A (en) * | 2016-12-29 | 2018-07-06 | 陈新 | Digital asset wallet |
-
2018
- 2018-12-05 CN CN201811481735.5A patent/CN109670840A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104811310A (en) * | 2015-03-30 | 2015-07-29 | 赵宇翔 | Display method and wearing device |
CN108256866A (en) * | 2016-12-29 | 2018-07-06 | 陈新 | Digital asset wallet |
CN107819571A (en) * | 2017-09-29 | 2018-03-20 | 广东中科南海岸车联网技术有限公司 | The generation method and device of private key |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113420281B (en) | Enhanced authentication based on secondary device interaction | |
ES2712150T3 (en) | Systems and methods for secure communication | |
CN104811310B (en) | A kind of methods of exhibiting and wearable device | |
JP5407147B2 (en) | Method, mobile terminal, processing apparatus and program for executing verification process | |
US20160104158A1 (en) | Method and apparatus for providing real time mutable credit card information with future timestamp functionality | |
US11997193B2 (en) | Secure communication method and smart lock system based thereof | |
US11057196B2 (en) | Establishing shared key data for wireless pairing | |
CN103955733B (en) | Electronic identity card chip card, card reader and electronic identity card verification system and method | |
CN108762387A (en) | Promote the access to the information specific to position using wireless device | |
AU2025205061A1 (en) | Systems and methods for cryptographic authentication of contactless cards | |
AU2001242982B2 (en) | Method and system for encryption and authentication | |
CN104978144A (en) | Gesture password input device and system and method for transaction based on system | |
US12032973B1 (en) | Methods and apparatus for configuring wearable devices | |
CN107104795A (en) | Method for implanting, framework and the system of RSA key pair and certificate | |
WO2019096021A1 (en) | Method and device for generating dynamic credit card security code, bank card, and authentication method | |
US20240152902A1 (en) | Systems and methods for currency transfer using virtual or augmented reality environments | |
CN109670840A (en) | A kind of block chain terminal equipment control method based on cryptography | |
CN104104505B (en) | A kind of electronic signature equipment and its implementation and client | |
CN109508986A (en) | A kind of portable block chain terminal wearable device control method | |
CN107169751A (en) | A kind of paying based on Internet of Things uses the Self-service payment system and method for equipment | |
CN114448649B (en) | Data circulation method, system, storage medium and electronic equipment | |
JPH09153014A (en) | Terminal equipment for electronic network | |
CN106910059B (en) | Off-line payment method for visible light and bar code bidirectional public key system authentication | |
CN109246154B (en) | Wrist type cipher device and cipher communication method | |
CN204759393U (en) | Gesture password input device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190423 |