CN107818028A - A kind of computer data backup and restoring method - Google Patents

A kind of computer data backup and restoring method Download PDF

Info

Publication number
CN107818028A
CN107818028A CN201711035155.9A CN201711035155A CN107818028A CN 107818028 A CN107818028 A CN 107818028A CN 201711035155 A CN201711035155 A CN 201711035155A CN 107818028 A CN107818028 A CN 107818028A
Authority
CN
China
Prior art keywords
computer
user
file
data
storage device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711035155.9A
Other languages
Chinese (zh)
Inventor
任静
杨俊清
刘肖
滑亚慧
刘晓乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Aeronautical University
Original Assignee
Xian Aeronautical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Aeronautical University filed Critical Xian Aeronautical University
Publication of CN107818028A publication Critical patent/CN107818028A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Databases & Information Systems (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of computer data backup and restoring method, it is related to technical field of data security, after the data-interface of movable storage device insertion computer, a hidden partition is established on movable storage device, and the file for needing to back up is stored in hidden partition, the backup file being stored in hidden partition is invisible, it is possible to prevente effectively from user misoperation deletes file, movable storage device is chronically at off-line state simultaneously, reduce the probability for receiving virus or assault, need to perform on the computer of Backup Data in restoring data, it is also required to pass through password authentification simultaneously, greatly it ensure that secure user data.

Description

A kind of computer data backup and restoring method
Technical field
The present invention relates to technical field of data security, more particularly to a kind of computer data backup and restoring method.
Background technology
At present, the harmfulness of computer virus and online hacker are increasing, often directly threaten the number of computer user According to safety and normal use.So computer user will to the security of computer and computer data, particularly hard disc data Seek also more and more higher.Then there is the computer security software such as antivirus software and fire wall.But up to the present, not yet Have the bright antivirus software of theoretical model table can to removing all unknown virus or Hacker Program, although therefore antivirus software can be with Remove most of virus, but it has certain hysteresis quality, user is also needed to often to viral code is upgraded on website, and upgrading is not Just, it is also possible to the viral or object as assault of infection newly when and surfing the Net;Moreover, it cannot be guaranteed that removing institute is ill Poison and Hacker Program.
And fire wall has certain effect for the safety of network, but it is nor very reliable (particularly black to taking precautions against Visitor).And antivirus software, firewall software installation it is latter as there is real-time monitor (RTM) to run in systems, one can be taken The system resource divided, reduce the performance of computer.And because being both system monitor, asking for compatibility is also had sometimes Topic, can be clashed with other softwares and cause the more serious consequence such as systemic breakdown (such as by KV3000, Rising, KILL and The anti-virus softwares such as NORTON are arranged on same computer, will make the frequent blue screen of computer).This two classes software pair simultaneously File caused by loss caused by the maloperation of user or system crash, which is lost, has no idea to avoid.
The content of the invention
The embodiments of the invention provide a kind of computer data backup and restoring method, to solve to exist in the prior art The problem of.
A kind of computer data backup method, including:
Judge whether current time reaches the automated back-up time set in advance, if the time reaches set in advance automatic BACKUP TIME, prompt the user whether to carry out automated back-up;
If user selects to carry out automated back-up, the data duplication that the needs that user is specified back up, which is preserved to computer, deposits The position set in advance of storage device;
After Computer Memory Unit preserves the data for needing to back up, whether computer real-time detector data interface inserts shifting Dynamic storage device, if detecting insertion movable storage device, being detected by data-interface in the movable storage device of insertion is It is no that there is hidden partition;
If having hidden partition in movable storage device, whether detection Computer Memory Unit position set in advance deposits Backup file is placed with, if storage has backup file, prompts user's input validation password, by the checking password and power of user's input The Authority Verification password deposited in limit checking file is compared, if the two is identical, by the backup in Computer Memory Unit File replicates storage into the hidden partition of movable storage device, while the basic letter of renewal authority checking file Computer Breath.
Preferably, when whether there is hidden partition in the movable storage device of detection insertion, if movable storage device In do not have hidden partition, the hidden partition of a default size is created in movable storage device, and in the hidden partition An Authority Verification file is generated, essential information and the Authority Verification that current computer is recorded in the Authority Verification file are close Code.
Preferably, when whether having deposited backup file in detection Computer Memory Unit position set in advance, if meter Without storage backup file in calculation machine storage device, prompt the user whether to carry out data backup operation, if user's selection is to carry Show the data that user specifies needs to back up, after user specifies the data for needing to back up, prompt user's input validation password, will use The Authority Verification password deposited in the checking password and Authority Verification file of family input is compared, need to if the two is identical The data duplication to be backed up is deposited into hidden partition, while the essential information of renewal authority checking file Computer.
Preferably, the data duplication backed up in the needs for specifying user preserves presetting to Computer Memory Unit Position after, delete the file of last backup.
The embodiment of the present invention additionally provides a kind of computer data restoring method, including:
Whether computer real-time detector data interface inserts movable storage device, if detecting that the mobile storage of insertion is set It is standby, prompt the user whether to carry out Data Restore Handles Technique;
If user selects to carry out Data Restore Handles Technique, the Authority Verification text in movable storage device hidden partition is read Part, judge the computer in Authority Verification file essential information whether the computer with being currently inserted into essential information it is identical;
If the essential information for the computer being currently inserted into is identical with the essential information of the computer in Authority Verification file, User's input validation password is prompted, the Authority Verification password deposited in the checking password and Authority Verification file of user's input is entered Row compares, if the two is identical, the backup file deposited in movable storage device hidden partition is restored into computer storage dress The specified location put.
Preferably, the backup deposited in movable storage device hidden partition file is being restored to Computer Memory Unit Afterwards, the backup file in flash memory device hidden partition is deleted.
A kind of computer data backup and restoring method in the embodiment of the present invention, when movable storage device insertion computer After data-interface, a hidden partition is established on movable storage device, and the file for needing to back up is stored in hidden partition In, the backup file being stored in hidden partition is invisible, it is possible to prevente effectively from user misoperation deletes file, while movement is deposited Storage equipment is chronically at off-line state, reduces the probability for receiving virus or assault, needs backing up in restoring data Performed on the computer of data, while be also required to, by password authentification, greatly ensure that secure user data.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of computer data backup method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of restoring method corresponding with backup method in Fig. 1.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Reference picture 1, the embodiments of the invention provide a kind of computer data backup method, this method comprises the following steps:
Step 100, judge whether current time reaches the automated back-up time set in advance, if it is, into step 110, otherwise repeat this step;In the present embodiment, the automated back-up time is the special time in a time cycle, such as often Individual 4 points of Friday afternoon;
Step 110, prompt the user whether to carry out automated back-up, if user's selection is to need to back up by what user specified Data duplication preserve to the position set in advance of Computer Memory Unit, while delete the file of last backup, go forward side by side Enter step 120, if user's selection is no, terminate this operation;
Step 120, whether computer real-time detector data interface inserts movable storage device, described movement in of the invention Storage device includes but is not limited to following instance:CF cards, SM cards, memory stick, SD card, multimedia card, xD-Picture cards, IBM Microdrive, hard disk and flash memory;If detecting insertion movable storage device, into step 130, otherwise return to step 100;
Step 130, whether have hidden partition, if do not had if being detected by data-interface in the movable storage device of insertion Have, then into step 140, if then entering step 150;
Step 140, the hidden partition of a default size is created in movable storage device, and it is raw in the hidden partition Into an Authority Verification file, essential information and the Authority Verification that current computer is recorded in the Authority Verification file are close Code;
Step 150, detect whether Computer Memory Unit position set in advance has deposited backup file, if so, then Into step 160, otherwise into step 170;
Step 160, user's input validation password is prompted, will be deposited in the checking password and Authority Verification file of user's input Authority Verification password be compared, if the two is identical, by Computer Memory Unit backup file replicate storage to move In the hidden partition of dynamic storage device, while the essential information of renewal authority checking file Computer, and delete computer and deposit Backup file in storage device, this operation terminate;If deposited in the checking password and Authority Verification file of user's input Authority Verification password differs, then repeats this step;
Step 170, prompt the user whether to carry out data backup operation, it is no into step 180 if user's selection is Then terminate this operation;
Step 180, prompt user to specify the data for needing to back up, after user specifies the data for needing to back up, prompt to use Family input validation password, the Authority Verification password deposited in the checking password and Authority Verification file of user's input is compared Compared with if the two is identical, it would be desirable to which the data duplication of backup is deposited into hidden partition, while renewal authority checking file is fallen into a trap The essential information of calculation machine, this operation terminate;If the authority deposited in the checking password and Authority Verification file of user's input Checking password differs, then repeats this step.
Based on identical inventive concept, the embodiment of the present invention additionally provides a kind of computer data restoring method, such as Fig. 2 institutes Show, the implementation of the restoring method is referred to the implementation of above-mentioned backup method, repeats part and repeats no more:
Step 200, whether computer real-time detector data interface inserts movable storage device, if detecting insertion movement Storage device, then into step 210, otherwise repeat this step;
Step 210, prompt the user whether to carry out Data Restore Handles Technique, if user's selection is, into step 220, otherwise This operation terminates;
Step 220, the Authority Verification file in movable storage device hidden partition is read, is judged in Authority Verification file The essential information of computer whether the computer with being currently inserted into essential information it is identical, if then entering step 230, otherwise carry Show subscriber computer essential information exception, and terminate this operation;
Step 230, user's input validation password is prompted, will be deposited in the checking password and Authority Verification file of user's input Authority Verification password be compared, if the two is identical, by the backup file deposited in movable storage device hidden partition also As far as the specified location of Computer Memory Unit, while the backup file in flash memory device hidden partition is deleted, this behaviour Work terminates;If the Authority Verification password deposited in the checking password and Authority Verification file of user's input differs, repeat This step.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (6)

  1. A kind of 1. computer data backup method, it is characterised in that including:
    Judge whether current time reaches the automated back-up time set in advance, if the time reaches automated back-up set in advance Time, prompt the user whether to carry out automated back-up;
    If user selects to carry out automated back-up, the data duplication that the needs that user is specified back up is preserved to computer to store and filled The position set in advance put;
    After Computer Memory Unit preserves the data for needing to back up, whether computer real-time detector data interface, which inserts movement, is deposited Equipment is stored up, if detecting insertion movable storage device, is detected in the movable storage device of insertion and whether had by data-interface There is hidden partition;
    If having hidden partition in movable storage device, whether detection Computer Memory Unit position set in advance has deposited Backup file, if storage has backup file, user's input validation password is prompted, the checking password of user's input and authority are tested The Authority Verification password deposited in card file is compared, if the two is identical, by the backup file in Computer Memory Unit Storage is replicated into the hidden partition of movable storage device, while the essential information of renewal authority checking file Computer.
  2. 2. the method as described in claim 1, it is characterised in that whether have in the movable storage device of detection insertion and hide During subregion, if not having hidden partition in movable storage device, one default size of establishment is hidden in movable storage device Subregion is hidden, and an Authority Verification file is generated in the hidden partition, current computer has been recorded in the Authority Verification file Essential information and Authority Verification password.
  3. 3. the method as described in claim 1, it is characterised in that whether detecting Computer Memory Unit position set in advance When storage has backup file, if prompting the user whether that progress data are standby without storage backup file in Computer Memory Unit Part operation, if user's selection is the data for prompting user to specify needs to back up, after user specifies the data for needing to back up, User's input validation password is prompted, the Authority Verification password deposited in the checking password and Authority Verification file of user's input is entered Row compares, if the two is identical, it would be desirable to which the data duplication of backup is deposited into hidden partition, while renewal authority checking file The essential information of Computer.
  4. 4. the method as described in claim 1, it is characterised in that the data duplication that the needs for specifying user back up preserve to Behind the position set in advance of Computer Memory Unit, the file of last backup is deleted.
  5. A kind of 5. computer data restoring method, it is characterised in that including:
    Whether computer real-time detector data interface inserts movable storage device, if detecting insertion movable storage device, carries Show whether user carries out Data Restore Handles Technique;
    If user selects to carry out Data Restore Handles Technique, the Authority Verification file in movable storage device hidden partition is read, is sentenced The essential information of computer in disconnected Authority Verification file whether the computer with being currently inserted into essential information it is identical;
    If the essential information for the computer being currently inserted into is identical with the essential information of the computer in Authority Verification file, prompt User's input validation password, the Authority Verification password deposited in the checking password and Authority Verification file of user's input is compared Compared with if the two is identical, the backup file deposited in movable storage device hidden partition is restored into Computer Memory Unit Specified location.
  6. 6. method as claimed in claim 5, it is characterised in that in the backup text that will be deposited in movable storage device hidden partition After part is restored to Computer Memory Unit, the backup file in flash memory device hidden partition is deleted.
CN201711035155.9A 2017-04-26 2017-10-30 A kind of computer data backup and restoring method Pending CN107818028A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201720445126 2017-04-26
CN2017204451269 2017-04-26

Publications (1)

Publication Number Publication Date
CN107818028A true CN107818028A (en) 2018-03-20

Family

ID=61604622

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711035155.9A Pending CN107818028A (en) 2017-04-26 2017-10-30 A kind of computer data backup and restoring method

Country Status (1)

Country Link
CN (1) CN107818028A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111198785A (en) * 2019-12-27 2020-05-26 宇龙计算机通信科技(深圳)有限公司 Data backup method and device, storage medium and terminal
CN111858175A (en) * 2020-07-20 2020-10-30 上海云轴信息科技有限公司 Method and equipment for backing up cloud platform data based on mobile storage device
CN111858185A (en) * 2020-08-26 2020-10-30 河南工业大学 Computer information backup and restoration system
CN111931016A (en) * 2020-08-13 2020-11-13 西安航空学院 Situation evaluation method of reliability transmission algorithm based on root node priority search
CN113378245A (en) * 2021-07-07 2021-09-10 北京安天网络安全技术有限公司 Operation and maintenance method and device of safety state data, electronic equipment and storage medium
CN113378216A (en) * 2021-05-29 2021-09-10 深圳市得一微电子有限责任公司 eMMC control method, system and storage medium thereof

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101546295A (en) * 2008-03-24 2009-09-30 上海梅山钢铁股份有限公司 Method for backing up and restoring data based on computer hard disc partitions
CN102457567A (en) * 2010-11-08 2012-05-16 中标软件有限公司 Mirror image backup/recovery method and tool of web management mode

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101546295A (en) * 2008-03-24 2009-09-30 上海梅山钢铁股份有限公司 Method for backing up and restoring data based on computer hard disc partitions
CN102457567A (en) * 2010-11-08 2012-05-16 中标软件有限公司 Mirror image backup/recovery method and tool of web management mode

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨沛东: "轻松解决U盘数据的安全问题", 《教育教学论坛》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111198785A (en) * 2019-12-27 2020-05-26 宇龙计算机通信科技(深圳)有限公司 Data backup method and device, storage medium and terminal
CN111198785B (en) * 2019-12-27 2023-05-09 宇龙计算机通信科技(深圳)有限公司 Data backup method and device, storage medium and terminal
CN111858175A (en) * 2020-07-20 2020-10-30 上海云轴信息科技有限公司 Method and equipment for backing up cloud platform data based on mobile storage device
CN111931016A (en) * 2020-08-13 2020-11-13 西安航空学院 Situation evaluation method of reliability transmission algorithm based on root node priority search
CN111931016B (en) * 2020-08-13 2022-05-27 西安航空学院 Situation evaluation method of reliability transmission algorithm based on root node priority search
CN111858185A (en) * 2020-08-26 2020-10-30 河南工业大学 Computer information backup and restoration system
CN113378216A (en) * 2021-05-29 2021-09-10 深圳市得一微电子有限责任公司 eMMC control method, system and storage medium thereof
CN113378245A (en) * 2021-07-07 2021-09-10 北京安天网络安全技术有限公司 Operation and maintenance method and device of safety state data, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107818028A (en) A kind of computer data backup and restoring method
CN109831420B (en) Method and device for determining kernel process permission
CN104915219B (en) Program updating method of single chip processor and device
CN110784446B (en) User permission-based cloud resource acquisition method and device and computer equipment
CN109376078B (en) Mobile application testing method, terminal equipment and medium
CN112395616B (en) Vulnerability processing method and device and computer equipment
KR101132197B1 (en) Apparatus and Method for Automatically Discriminating Malicious Code
CN105868056B (en) Obtain the method, apparatus and secure virtual machine of deleted document in Windows virtual machine
CN109815697B (en) Method and device for processing false alarm behavior
KR101649909B1 (en) Method and apparatus for virtual machine vulnerability analysis and recovery
CN109214171A (en) A kind of detection method of software, device, equipment and medium
CN105512562B (en) Vulnerability mining method and device and electronic equipment
CN113792341A (en) Privacy compliance automation detection method, device, equipment and medium for application program
CN106021027A (en) Terminal data processing method and system
JP2006330864A (en) Control method for server computer system
CN105550573B (en) The method and apparatus for intercepting bundled software
CN105022663B (en) Power system monitoring and control system
EP3445001B1 (en) Method and device for auditing virtual network function
CN107798244A (en) A kind of method and device for detecting Remote Code Execution Vulnerability
CN105912431A (en) Reboot testing method of server, server, control device and system
CN115237441A (en) Upgrade test method, device and medium based on cloud platform
CN105701399A (en) Method and device for security detection of application program
CN106933876B (en) Filtering method and device for screen recording file
CN105487847A (en) Function release method and apparatus
CN117131515B (en) Application request execution method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180320

RJ01 Rejection of invention patent application after publication