CN103164645A - Information security management method and mobile terminal - Google Patents

Information security management method and mobile terminal Download PDF

Info

Publication number
CN103164645A
CN103164645A CN2011104070955A CN201110407095A CN103164645A CN 103164645 A CN103164645 A CN 103164645A CN 2011104070955 A CN2011104070955 A CN 2011104070955A CN 201110407095 A CN201110407095 A CN 201110407095A CN 103164645 A CN103164645 A CN 103164645A
Authority
CN
China
Prior art keywords
information
people
face
data
matching value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011104070955A
Other languages
Chinese (zh)
Inventor
李琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Konka Group Co Ltd
Original Assignee
Konka Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Konka Group Co Ltd filed Critical Konka Group Co Ltd
Priority to CN2011104070955A priority Critical patent/CN103164645A/en
Publication of CN103164645A publication Critical patent/CN103164645A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses an information security management method. The information security management method comprises the following steps: human face data are collected; feature point information in the human face data is extracted, the feature point information is matched with feature point information in human face data in a password bank, and matching degree of the collected human face data and the human face data in the password bank is determined; and if the matching degree is larger than a first matching value, encrypted information is allowed to be visited. The invention further discloses a mobile terminal. By adopting the information security management method and the mobile terminal, information security on the mobile terminal can be protected effectively and safely.

Description

A kind of information security management method and mobile terminal
Technical field
The present invention relates to information security field, relate in particular to a kind of information security management method and mobile terminal.
Background technology
Along with the development of mobile terminal and universal; mobile terminal such as mobile phone, palm PC etc. bring great convenience to daily life and work; but what be accompanied by is the frequent generation of the user profile leakage of a state or party secret; the a series of serious consequences that often can bring to the user make the level security of information of mobile terminal be badly in need of strengthening.Existing mobile terminal all can provide comparatively simple encrypting and decrypting mechanism; such as one group of special button, one group of password or one group of special touch screen slippery sequence; for example; the user can arrange password to the information of wanting to protect, and inputs the password that sets in advance again when needs are accessed this information it is decrypted.This class mode needs the user to remember corresponding encrypted message, when user's blackout or inadvertent disclosure or when being subjected to Brute Force, can bring great inconvenience and loss to the user.
Summary of the invention
Embodiment of the present invention technical matters to be solved is, a kind of information security management method and mobile terminal are provided, and can protect effectively, safely the information security on mobile terminal.
In order to solve the problems of the technologies described above, the embodiment of the present invention provides a kind of information security management method, comprises the following steps:
Gather people's face data, described people's face data comprise: at least one characteristic point information;
Extract the characteristic point information in described people's face data, and the characteristic point information in the people's face data that preset in described characteristic point information and cryptographic libraries is mated, determine people's face data of described collection and the matching degree of the people's face data that preset in described cryptographic libraries;
If described matching degree greater than the first matching value, allows the information of access encryption;
Wherein, if described matching degree less than the second matching value, described the second matching value is less than the first matching value, the disable access information of encrypting.
Wherein, if described matching degree less than the first matching value, and greater than the second matching value, gathers speech data;
The speech data that presets in the speech data of described collection and cryptographic libraries is compared, determine the similarity of the speech data that presets in the speech data of described collection and cryptographic libraries;
If described similarity greater than the first similar value, allows the information of access encryption, otherwise, the information that disable access is encrypted.
Wherein, people's face data of described collection are in the given time to the rear acquisition of taking pictures after the people's face that meets predetermined size requirements that captures.
Wherein, described characteristic point information comprises: the size information of eyes, the shape information of eyes, the size information of lip, the shape information of lip, the size information of eyebrow, the shape information of eyebrow, the size information of nose, the shape information of nose, the wheel Guo information of people's face, the positional information of eyes in people's face, the positional information of lip in people's face, eyebrow positional information and any one in the positional information of nose in people's face or multinomial in people's face.
Correspondingly, the embodiment of the present invention also provides a kind of mobile terminal, comprising:
Acquisition module is used for gathering people's face data, and described people's face data comprise: at least one characteristic point information;
Processing module, be used for extracting the characteristic point information of described people's face data, and the characteristic point information in the people's face data that preset in described characteristic point information and cryptographic libraries is mated, determine the matching degree of people's face data of presetting in people's face data of described collection and described cryptographic libraries;
Information management module is used for working as described matching degree greater than the first matching value, allows the information of the described encryption of access.
Wherein, described information management module also is used for when described matching degree less than the second matching value, and described the second matching value is less than described the first matching value, the disable access information of encrypting.
Wherein, described processing module also is used for when described matching degree less than the first matching value, and greater than the second matching value, gather speech data, and the speech data that presets in the speech data of described collection and cryptographic libraries is compared, determine the similarity of the speech data that presets in the speech data of described collection and described cryptographic libraries;
Described information management module also is used for when described similarity allowing to access the information of described encryption during greater than the first similar value, otherwise, the information of the described encryption of disable access.
Wherein, people's face data of described collection are in the given time to the rear acquisition of taking pictures after the people's face that meets predetermined size requirements that captures.
Wherein, described characteristic point information comprises: the size information of eyes, the shape information of eyes, the size information of lip, the shape information of lip, the size information of eyebrow, the shape information of eyebrow, the size information of nose, the shape information of nose, the wheel Guo information of people's face, the positional information of eyes in people's face, the positional information of lip in people's face, eyebrow positional information and any one in the positional information of nose in people's face or multinomial in people's face.
Implement the embodiment of the present invention; has following beneficial effect: the access rights of coming management information by the recognition of face to the user; information privacy means compared to traditional cipher; the user does not worry that password is forgotten or inadvertent disclosure etc. brings inconvenience and loss make the more effective and safety of information protection.
Description of drawings
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, the below will do to introduce simply to the accompanying drawing of required use in embodiment or description of the Prior Art, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the schematic flow sheet of the first embodiment of information security management method of the present invention;
Fig. 2 is the schematic flow sheet of the second embodiment of information security management method of the present invention;
Fig. 3 is the structural representation of the embodiment of mobile terminal of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that obtains under the creative work prerequisite.
Please refer to Fig. 1, is the schematic flow sheet of the first embodiment of information security management method of the present invention, and described method comprises:
S11, collection people face data, people's face data comprise: at least one characteristic point information.
Wherein, characteristic point information comprises: the size information of eyes, the shape information of eyes, the size information of lip, the shape information of lip, the size information of eyebrow, the shape information of eyebrow, the size information of nose, the shape information of nose, the profile information of people's face, the positional information of eyes in people's face, the positional information of lip in people's face, eyebrow positional information and any one in the positional information of nose in people's face or multinomial in people's face.
The people's face data that gather are to obtain after in the given time the people's face that meets predetermined size requirements that captures being taken pictures.
The user can check the facial image that camera captures by preview interface.Based on the face recognition algorithms of unique point under the result of degree of accuracy and detection efficiency equilibrium, can be to the camera catcher little requirement that has of being bold: the extraction meeting of larger its unique point of people's face that shows on preview interface be more accurate, discrimination can be higher, otherwise, if the too little meeting of people's face that shows causes unique point therefrom not extract.People's face posting on preview interface can position people's face automatically, and whether the size of the people's face that shows on the variation meeting reminding user people face posting of posting color meets the coupling requirement.
S12, extract the characteristic point information in people's face data, and the unique point in the people's face data that preset in the unique point extracted and cryptographic libraries is mated, determine the matching degree of people's face data of presetting in people's face data of collection and cryptographic libraries.
Face recognition algorithms based on unique point can go out human face characteristic point from people's face extracting data, and both matching degree is mated, calculated to the corresponding unique point of the unique point that extracts and people's face data of presetting one by one.
If the described matching degree of S13 greater than the first matching value, allows the information of access encryption.
Wherein, whether the first matching value is identical with the people's face data that preset for distinguishing the people's face data that gather.
The embodiment of the present invention is by identifying the access rights of management information to user's face characteristic, information privacy means compared to traditional cipher, the user does not worry that password is forgotten or inadvertent disclosure etc. brings inconvenience and loss, more effective and safety.
Please refer to Fig. 2, is the schematic flow sheet of the second embodiment of information security management method of the present invention.Described method comprises:
S21, collection people face data, people's face data comprise: at least one characteristic point information.
This step is identical with S11 in Fig. 1, is not repeated herein.
S22, extract the characteristic point information in people's face data, and the unique point in the people's face data that preset in the unique point extracted and cryptographic libraries is mated, draw the matching degree of the people's face data that preset in people's face data of collection and cryptographic libraries.
This step is identical with S12 in Fig. 1, is not repeated herein.
If the S23 matching degree greater than the first matching value, allows the information of access encryption, process ends.
If the S24 matching degree is less than the second matching value, the second matching value is less than the first matching value, the disable access information of encrypting, process ends.
If the S25 matching degree is less than the first matching value, and greater than the second matching value, gather speech data.
S26, the speech data that presets in the speech data that gathers and cryptographic libraries is compared, determine the similarity of the speech data that presets in the speech data of collection and cryptographic libraries; If similarity greater than the first similar value, allows the information of access encryption, otherwise, the information that disable access is encrypted.
Wherein, whether the first similar value is identical with the speech data of cryptographic libraries for distinguishing the speech data that gathers.
Due to the impact that is subject to the environmental factors such as illumination condition, affect sometimes face identification method to the accuracy of user identity identification, for fear of the error in judgement of user identity, need to do further authentication to user's identity.The second embodiment of the present invention has adopted dual recognition methods: recognition of face+speech recognition.The first matching value of second embodiment of the invention and the numerical value setting of the second matching value can consider from aspects such as degree of accuracy and detection efficiencies, and for example the first matching value can be made as 85%, the second matching value and can be made as 65%.When matching degree is in higher than the second matching value and lower than in the first matching value this fuzzy interval the time, can carry out speech recognition to the user, if the user is by speech recognition, allow the user to access the information of encryption, the method for dual identification has been strengthened reliability and the security of user identity identification greatly.
Above-mentionedly from method flow, embodiments of the invention are introduced, the below introduces corresponding to said method the mobile terminal that uses said method to carry out information encryption.Wherein, the information of encryption can be the file of short message, the picture on mobile terminal, various forms or file etc.
Please refer to Fig. 3, is the structural representation of mobile terminal 100 first embodiment of the present invention.Described mobile terminal 100 comprises:
Acquisition module 110 is used for gathering people's face data, and people's face data comprise: at least one characteristic point information.
Wherein, characteristic point information comprises: the size information of eyes, the shape information of eyes, the size information of lip, the shape information of lip, the size information of eyebrow, the shape information of eyebrow, the size information of nose, the shape information of nose, the profile information of people's face, the positional information of eyes in people's face, the positional information of lip in people's face, eyebrow positional information and any one in the positional information of nose in people's face or multinomial in people's face.
The people's face data that gather are to obtain after acquisition module 110 is taken pictures to the people's face that meets predetermined size requirements that captures in the given time.
The user can check the facial image that camera captures by the preview interface of mobile terminal.Based on the face recognition algorithms of unique point under the result of degree of accuracy and detection efficiency equilibrium, can be to the camera catcher little requirement that has of being bold: the extraction meeting of larger its unique point of people's face that shows on preview interface be more accurate, discrimination can be higher, otherwise, if the too little meeting of people's face that shows causes unique point therefrom not extract.People's face posting on preview interface can position people's face automatically, and whether the size of the people's face that shows on the variation meeting reminding user people face posting of posting color meets the coupling requirement.
Processing module 120, be used for extracting the characteristic point information of the people's face data that gather, and the characteristic point information in the people's face data that preset in this characteristic point information and cryptographic libraries is mated the matching degree of the people's face data that preset in definite people's face data that gather and cryptographic libraries.
Information management module 130 is used for working as matching degree greater than the first matching value, allows the information of the described encryption of access.
The embodiment of the present invention is by identifying the access rights of the information on managing mobile terminal to user's face characteristic, information privacy means compared to traditional cipher, the user does not worry that password is forgotten or inadvertent disclosure etc. brings inconvenience and loss, more effective and safety.
In addition, the information management module 130 in embodiments of the invention also is used for when matching degree less than the second matching value, and the second matching value is less than the first matching value, the disable access information of encrypting.
Processing module 120 also is used for when matching degree less than the first matching value, and greater than the second matching value, gather speech data, and the speech data that presets in the speech data that gathers and cryptographic libraries is compared, determine the similarity of the speech data that presets in the speech data of collection and cryptographic libraries.Information management module 130 also is used for when similarity allowing the information of the described encryption of access during greater than the first similar value, otherwise, the information of disable access encryption.
Due to the impact that is subject to the environmental factors such as illumination condition, affect sometimes face identification method to the accuracy of user identity identification, for fear of the error in judgement of user identity, need to do further authentication to user's identity.The second embodiment of the present invention has adopted dual recognition methods: recognition of face+speech recognition.The first matching value of second embodiment of the invention and the numerical value setting of the second matching value can consider from aspects such as degree of accuracy and detection efficiencies, and for example the first matching value can be made as 85%, the second matching value and can be made as 65%.When matching degree is in higher than the second matching value and lower than in the first matching value this fuzzy interval the time, can carry out speech recognition to the user, if the user is by speech recognition, allow the user to access the information of encryption, the method for dual identification has been strengthened reliability and the security of user identity identification greatly.
One of ordinary skill in the art will appreciate that all or part of flow process that realizes in above-described embodiment method, to come the relevant hardware of instruction to complete by computer program, described program can be stored in a computer read/write memory medium, this program can comprise the flow process as the embodiment of above-mentioned each side method when carrying out.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
Above disclosed is only a kind of preferred embodiment of the present invention, certainly can not limit with this interest field of the present invention, one of ordinary skill in the art will appreciate that all or part of flow process that realizes above-described embodiment, and according to the equivalent variations that claim of the present invention is done, still belong to the scope that invention is contained.

Claims (10)

1. an information security management method, is characterized in that, comprising:
Gather people's face data, described people's face data comprise: at least one characteristic point information;
Extract the characteristic point information in described people's face data, and the characteristic point information in the people's face data that preset in described characteristic point information and cryptographic libraries is mated, determine people's face data of described collection and the matching degree of the people's face data that preset in described cryptographic libraries;
If described matching degree greater than the first matching value, allows the information of access encryption.
2. information security management method as claimed in claim 1, is characterized in that, also comprises:
If described matching degree is less than the second matching value, described the second matching value is less than the first matching value, the disable access information of encrypting.
3. information security management method as claimed in claim 2, is characterized in that, also comprises:
If described matching degree is less than the first matching value, and greater than the second matching value, gather speech data;
The speech data that presets in the speech data of described collection and cryptographic libraries is compared, determine the similarity of the speech data that presets in the speech data of described collection and cryptographic libraries;
If described similarity greater than the first similar value, allows the information of access encryption, otherwise, the information that disable access is encrypted.
4. information security management method as claimed in claim 3, is characterized in that, people's face data of described collection are in the given time to the people's face that meets predetermined size requirements that the captures rear acquisition of taking pictures.
5. information security management method as described in any one in claim 1-3, it is characterized in that, described characteristic point information comprises: the size information of eyes, the shape information of eyes, the size information of lip, the shape information of lip, the size information of eyebrow, the shape information of eyebrow, the size information of nose, the shape information of nose, the profile information of people's face, the positional information of eyes in people's face, the positional information of lip in people's face, eyebrow in people's face positional information and any one in the positional information of nose in people's face.
6. a mobile terminal, is characterized in that, comprising:
Acquisition module is used for gathering people's face data, and described people's face data comprise: at least one characteristic point information;
Processing module, be used for extracting the characteristic point information of described people's face data, and the characteristic point information in the people's face data that preset in described characteristic point information and cryptographic libraries is mated, determine the matching degree of people's face data of presetting in people's face data of described collection and described cryptographic libraries;
Information management module is used for working as described matching degree greater than the first matching value, allows the information of the described encryption of access.
7. mobile terminal as claimed in claim 6, is characterized in that, described information management module also is used for when described matching degree less than the second matching value, and described the second matching value is less than described the first matching value, the disable access information of encrypting.
8. mobile terminal as claimed in claim 7, it is characterized in that, described processing module also is used for when described matching degree less than the first matching value, and greater than the second matching value, gather speech data, and the speech data that presets in the speech data of described collection and cryptographic libraries is compared, determine the similarity of the speech data that presets in the speech data of described collection and described cryptographic libraries;
Described information management module also is used for when described similarity allowing to access the information of described encryption during greater than the first similar value, otherwise, the information of the described encryption of disable access.
9. mobile terminal as claimed in claim 8, is characterized in that, people's face data of described collection are in the given time to the people's face that meets predetermined size requirements that the captures rear acquisition of taking pictures.
10. mobile terminal as described in claim 6-8, it is characterized in that, described characteristic point information comprises: the size information of eyes, the shape information of eyes, the size information of lip, the shape information of lip, the size information of eyebrow, the shape information of eyebrow, the size information of nose, the shape information of nose, the profile information of people's face, the positional information of eyes in people's face, the positional information of lip in people's face, eyebrow in people's face positional information and any one in the positional information of nose in people's face.
CN2011104070955A 2011-12-09 2011-12-09 Information security management method and mobile terminal Pending CN103164645A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011104070955A CN103164645A (en) 2011-12-09 2011-12-09 Information security management method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011104070955A CN103164645A (en) 2011-12-09 2011-12-09 Information security management method and mobile terminal

Publications (1)

Publication Number Publication Date
CN103164645A true CN103164645A (en) 2013-06-19

Family

ID=48587725

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011104070955A Pending CN103164645A (en) 2011-12-09 2011-12-09 Information security management method and mobile terminal

Country Status (1)

Country Link
CN (1) CN103164645A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103400082A (en) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 File encryption/decryption method and system
CN104424427A (en) * 2013-08-28 2015-03-18 联发科技(新加坡)私人有限公司 Password authentication method and device
CN105939336A (en) * 2016-03-07 2016-09-14 李明 Identity authentication method and system
CN105991652A (en) * 2016-03-07 2016-10-05 李明 Identity authentication method and system
WO2017166652A1 (en) * 2016-03-29 2017-10-05 乐视控股(北京)有限公司 Permission management method and system for application of mobile device
CN108053219A (en) * 2017-12-29 2018-05-18 浙江万里学院 A kind of safe Intelligent logistics reimbursement of expense method
CN108053218A (en) * 2017-12-29 2018-05-18 宁波大学 A kind of safe method of mobile payment
CN108389290A (en) * 2018-02-22 2018-08-10 陈崇 A kind of intelligent home furnishing control method based on Internet of Things
CN109902644A (en) * 2019-03-07 2019-06-18 北京海益同展信息科技有限公司 Face identification method, device, equipment and computer-readable medium
CN110868558A (en) * 2019-11-26 2020-03-06 秒针信息技术有限公司 Recording processing method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1439997A (en) * 2002-02-22 2003-09-03 杭州中正生物认证技术有限公司 Fingerprint identifying method and system
US20060158307A1 (en) * 2005-01-13 2006-07-20 Samsung Electronics Co., Ltd. System and method for face recognition
CN101238705A (en) * 2005-07-22 2008-08-06 夏普株式会社 Mobile information terminal apparatus
CN101510257A (en) * 2009-03-31 2009-08-19 华为技术有限公司 Human face similarity degree matching method and device
CN101872413A (en) * 2009-04-21 2010-10-27 宋光宇 Fingerprint and face integrated identity authentication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1439997A (en) * 2002-02-22 2003-09-03 杭州中正生物认证技术有限公司 Fingerprint identifying method and system
US20060158307A1 (en) * 2005-01-13 2006-07-20 Samsung Electronics Co., Ltd. System and method for face recognition
CN101238705A (en) * 2005-07-22 2008-08-06 夏普株式会社 Mobile information terminal apparatus
CN101510257A (en) * 2009-03-31 2009-08-19 华为技术有限公司 Human face similarity degree matching method and device
CN101872413A (en) * 2009-04-21 2010-10-27 宋光宇 Fingerprint and face integrated identity authentication system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103400082A (en) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 File encryption/decryption method and system
CN104424427A (en) * 2013-08-28 2015-03-18 联发科技(新加坡)私人有限公司 Password authentication method and device
CN105939336A (en) * 2016-03-07 2016-09-14 李明 Identity authentication method and system
CN105991652A (en) * 2016-03-07 2016-10-05 李明 Identity authentication method and system
WO2017166652A1 (en) * 2016-03-29 2017-10-05 乐视控股(北京)有限公司 Permission management method and system for application of mobile device
CN108053219A (en) * 2017-12-29 2018-05-18 浙江万里学院 A kind of safe Intelligent logistics reimbursement of expense method
CN108053218A (en) * 2017-12-29 2018-05-18 宁波大学 A kind of safe method of mobile payment
CN108389290A (en) * 2018-02-22 2018-08-10 陈崇 A kind of intelligent home furnishing control method based on Internet of Things
CN109902644A (en) * 2019-03-07 2019-06-18 北京海益同展信息科技有限公司 Face identification method, device, equipment and computer-readable medium
CN110868558A (en) * 2019-11-26 2020-03-06 秒针信息技术有限公司 Recording processing method and device

Similar Documents

Publication Publication Date Title
CN103164645A (en) Information security management method and mobile terminal
CN105260669B (en) The transmission method and Transmission system of photo
CN103400082A (en) File encryption/decryption method and system
CN104239815A (en) Electronic document encryption and decryption method and method based on iris identification
CN102509053A (en) Authentication and authorization method, processor, equipment and mobile terminal
CN101458750B (en) Data safety processing method and data safety storage apparatus
CN105354509B (en) The processing method and processing system of picture
CN104899490A (en) Terminal positioning method and user terminal
CN105184179A (en) Embedded encrypted mobile storage device and operation method thereof
CN103902029A (en) Mobile terminal and unlocking method thereof
CN105335643A (en) Processing method and processing system of files
CN103532960B (en) Decrypt device
CN103269481A (en) Method and system for encrypting and protecting procedure or file of portable electronic equipment
CN104778392A (en) Privilege validation method and system on basis of biological identification
CN108038363A (en) Improve the method and device of Terminal security
CN105187640A (en) Anti-theft method and system of mobile terminal
WO2020073916A1 (en) Encryption method and apparatus for storage device, and storage medium
CN105574387A (en) Information security processing method and user terminal
CN102385673B (en) Human body lock
CN203552331U (en) Intelligent identification door control system
CN105808994A (en) Computer software encryption protection device
CN105303085A (en) File sharing method and sharing system
US20100287349A1 (en) Information storage protector
CN109542305B (en) Application control method and related device
CN204883719U (en) System for it is external to cell -phone control and protect file through iris recognition device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20130619

RJ01 Rejection of invention patent application after publication