CN112016072A - Method and device for opening network disk file - Google Patents

Method and device for opening network disk file Download PDF

Info

Publication number
CN112016072A
CN112016072A CN202011127890.4A CN202011127890A CN112016072A CN 112016072 A CN112016072 A CN 112016072A CN 202011127890 A CN202011127890 A CN 202011127890A CN 112016072 A CN112016072 A CN 112016072A
Authority
CN
China
Prior art keywords
file
file path
opening
biomarker
path
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011127890.4A
Other languages
Chinese (zh)
Inventor
郎健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Lenovo Synergy Technology Co Ltd
Original Assignee
Beijing Lenovo Synergy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Lenovo Synergy Technology Co Ltd filed Critical Beijing Lenovo Synergy Technology Co Ltd
Priority to CN202011127890.4A priority Critical patent/CN112016072A/en
Publication of CN112016072A publication Critical patent/CN112016072A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • G06F16/1824Distributed file systems implemented using Network-attached Storage [NAS] architecture

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a method and a device for opening a network disk file, wherein a first biological identifier is recorded in advance, and a first file path is associated with the first biological identifier and corresponds to a first target file, and the method comprises the following steps: acquiring a second biological identifier; when the second biomarker matches the first biomarker, determining a first file path associated with the matching first biomarker; according to the first file path, opening a first target file corresponding to the first file path; the matched first biological identification and the associated first file path are determined by acquiring the second biological identification, so that the first target file is directly opened through a quick way, the process of searching by human eyes is avoided, the process of opening the file is clicked manually, the specific path of the file does not need to be memorized, and the method is simpler and more convenient; the accuracy and the safety of opening the first target file in a quick way are ensured through the matching of the biological identifiers.

Description

Method and device for opening network disk file
Technical Field
The invention relates to the technical field of computers, in particular to a method and a device for opening a network disk file.
Background
The net disk is a common technology familiar to the public and is installed and used by a large number of users. The interactive logic for opening a specific file in the network disk is very similar to the traditional interactive logic of the PC side. The specific file is opened finally by searching with human eyes and manually clicking the path where the file is opened layer by layer.
The traditional interaction mode is used in the network disk, so that the operation of a user is complicated and inconvenient. And the user needs to have some memory of the file path. If the user does not determine the specific path of the file, it has to take time to search. Especially, when a user needs to open some common files with high access amount, the files cannot be opened quickly, and time and labor are wasted.
Disclosure of Invention
The invention provides a method and a device for opening a network disk file, which at least solve the technical problems in the prior art.
In a first aspect, the present invention provides a method for opening a network disk file, which pre-records a first biometric identifier, and associates a first file path with the first biometric identifier, where the first file path corresponds to a first target file, and the method includes:
acquiring a second biological identifier;
when the second biomarker matches the first biomarker, determining a first file path associated with the matching first biomarker;
and opening a first target file corresponding to the first file path according to the first file path.
Preferably, associating a first file path for the first biomarker, where the first file path corresponds to a first target file includes:
determining a first target file and determining a first file path of the first target file;
associating the first file path for the first biomarker; the number of the first file paths associated with the first biomarker is one or more.
Preferably, the first biomarker comprises:
fingerprint identification, face identification, voiceprint identification and/or iris identification.
Preferably, the second biometric identifier comprises:
fingerprint identification, face identification, voiceprint identification and/or iris identification.
Preferably, before the acquiring the second biometric identifier, the method further comprises:
starting a quick authentication interface;
the obtaining the second biometric identifier includes obtaining the second biometric identifier through the shortcut authentication interface.
Preferably, the method further comprises the following steps:
and recording a first password in advance, and associating a second file path for the first password, wherein the second file path corresponds to a second target file.
Preferably, the method further comprises the following steps:
acquiring a second password;
when the second password is matched with the first password, determining a second file path associated with the matched first password;
and opening a second target file corresponding to the second file path according to the second file path.
In a second aspect, the present invention provides an apparatus for opening a network disk file, including:
the system comprises an association module, a first storage module and a second storage module, wherein the association module is used for recording a first biological identifier in advance and associating a first file path for the first biological identifier, and the first file path corresponds to a first target file;
the acquisition module is used for acquiring a second biological identifier;
a first file path determination module to determine a first file path associated with the matching first biomarker when the second biomarker matches the first biomarker;
and the opening module is used for opening a first target file corresponding to the first file path according to the first file path.
In a third aspect, the present invention provides a computer-readable storage medium, which stores a computer program for executing the method for opening a network disk file according to the present invention.
In a fourth aspect, the present invention provides an electronic device comprising:
a processor;
a memory for storing the processor-executable instructions;
the processor is used for reading the executable instruction from the memory and executing the instruction to realize the method for opening the network disk file.
Compared with the prior art, the method and the device for opening the network disk file provided by the invention have the advantages that the matched first biological identification and the associated first file path are determined by acquiring the second biological identification, so that the first target file is directly opened through a quick way, the search by human eyes is avoided, the process of opening the file is manually clicked, the specific path of the file is not required to be memorized, and the method and the device are simpler and more convenient; the accuracy and the safety of opening the first target file in a quick way are ensured through the matching of the biological identifiers.
Drawings
Fig. 1 is a schematic flowchart illustrating a method for opening a network disk file according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of another method for opening a network disk file according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of another method for opening a network disk file according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an apparatus for opening a network disk file according to an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Summary of the application
The interactive logic for opening a specific file in the network disk is very similar to the traditional interactive logic of the PC side. The specific file is opened finally by searching with human eyes and manually clicking the path where the file is opened layer by layer.
The traditional interaction mode is used in the network disk, so that the operation of a user is complicated and inconvenient. And the user needs to memorize the path of the file, and if the user does not determine the specific path of the file, the user has to spend time searching. Especially, when a user needs to open some common files with high access amount, the files cannot be opened quickly, and time and labor are wasted.
Exemplary method
Therefore, embodiments of the present invention provide a method for opening a network disk file, so as to solve at least the above technical problems in the prior art.
In this embodiment, a first biometric identifier is pre-recorded, and a first file path is associated with the first biometric identifier, where the first file path corresponds to a first target file. The first biometric is representative of a legitimate biometric of the user. The type of the first biometric identifier may specifically be a fingerprint identifier, a face identifier, a voiceprint identifier, an iris identifier, or the like. In practical applications, any one type of the above embodiments may be selected, or any combination of multiple types may be selected, which is not limited in this embodiment. The first file path is the storage path of the first target file. In this embodiment, the first biometric identifier is associated with the first file path in advance, which means that the first biometric identifier can be used as a shortcut for opening the corresponding first target file. The number of first biomarkers may be at least one and the number of first target files may be at least one. Typically the first biometric identifier and the first target file may be a one-to-one association; in other cases, one-to-many or many-to-one association may be provided as desired.
As shown in fig. 1, the method in this embodiment includes the following steps:
step 101, acquiring a second biological identification.
The second biometric is the biometric entered by the user when the first target file needs to be opened this time. The type of the second biometric identifier may specifically be a fingerprint identifier, a face identifier, a voiceprint identifier, an iris identifier, or the like.
Step 102, when the second biological identification is matched with the first biological identification, determining a first file path associated with the matched first biological identification.
After the second biological identification is obtained, the second biological identification is firstly identified, and whether the second biological identification is matched with any first biological identification is judged. When the second biological identification can be matched with any first biological identification, the user can be considered to wish to open the first target file associated with the matched first biological identification through a quick way. The first file path associated with the matching first biomarker is further determined according to the pre-established association relationship.
And 103, opening a first target file corresponding to the first file path according to the first file path.
And according to the determined first file path, directly opening the corresponding first target file. Therefore, the first target file required by the user is opened through a quick way. From the perspective of the user side, the first target file can be directly opened only by inputting the correct biological identification, so that the eye searching is avoided, the process of opening the file is manually clicked, the specific path of the file does not need to be memorized, and the method is simpler and more convenient.
The present embodiment may be combined with the following exemplary description:
the first target file includes document a and document B. The first biometric associated with the first file path of document a is a left-hand thumb fingerprint previously entered by the user. The first biometric associated with the first file path of document B is a right-hand thumb fingerprint previously entered by the user.
When the user wishes to open the document a in a quick way, the left thumb fingerprint can be entered as the second biometric identifier. Through the identification judgment, the second biological identification can be determined to be matched with the first biological identification corresponding to the document A, and then the first file path of the document A can be further determined. Document a is then opened directly according to the first file path. Similarly, the user can also open the document B through a shortcut way by inputting the fingerprint of the thumb of the right hand.
In contrast, if the user inputs other biometrics identifiers other than the left-hand thumb fingerprint and the right-hand thumb fingerprint as the second biometrics identifier, the user cannot successfully match any first biometrics identifier, and thus cannot successfully open any first target file. If any of the other users input any of the biometrics as the second biometrics, the other users also cannot successfully match any of the first biometrics, and cannot successfully open any of the first target files. Therefore, the accuracy and the safety of opening the first target file in a quick way are ensured.
According to the technical scheme, the beneficial effects of the embodiment are as follows: the matched first biological identification and the associated first file path are determined by acquiring the second biological identification, so that the first target file is directly opened through a quick way, the process of searching by human eyes is avoided, the process of opening the file is clicked manually, the specific path of the file does not need to be memorized, and the method is simpler and more convenient; the accuracy and the safety of opening the first target file in a quick way are ensured through the matching of the biological identifiers.
Fig. 1 shows only a basic embodiment of the method of the present invention, and based on this, certain optimization and expansion can be performed, and other preferred embodiments of the method can also be obtained.
Fig. 2 shows another embodiment of the method for opening a network disk file according to the present invention. The present embodiment is further developed on the basis of the foregoing embodiments. In this embodiment, at least one first target file may be predetermined, and a first file path of each first target file may be determined. At least one first biometric identifier is also determined, and a first file path is associated with each first biometric identifier. The number of first file paths associated with each first biomarker may be one or more.
The method specifically comprises the following steps:
step 201, starting a shortcut authentication interface.
Step 202, acquiring a second biometric identifier through the shortcut authentication interface.
In this embodiment, the shortcut authentication interface may be started when the user needs to open the first target file through a shortcut. The shortcut authentication interface may be used as a way to obtain the second biometric identifier. Therefore, the second biological identification can be prevented from being input by mistake, and the first target file can be prevented from being opened by mistake under the condition that the user does not need the second biological identification.
Step 203, when the second biological mark is matched with the first biological mark, determining a first file path associated with the matched first biological mark.
Step 204, opening a first target file corresponding to the first file path according to the first file path.
When the first biomarker is associated with a first file path, the corresponding first target file can be directly opened according to the first file path. When the first biomarker is associated with a plurality of first file paths, the basic information of each corresponding first target file, such as a file name, creation time, modification time, and the like, can be obtained according to each first file path. And then, displaying the basic information of each first target file to a user, so that the user can select one of the first target files to open.
Typically, the number of first biomarkers available for user entry is limited. For example, a user has only a maximum of 10 different fingerprints. However, by associating multiple first file paths with one first biomarker, a greater number of first target files can be opened in a shortcut manner.
Fig. 3 shows another embodiment of the method for opening a network disk file according to the present invention. On the basis of rapidly opening the target file based on the biometric identifier shown in fig. 1-2, the target file can be rapidly opened through the password in the embodiment. In this embodiment, the first password may be pre-recorded, and the first password may be associated with a second file path, where the second file path corresponds to a second target file. The first password represents a legal password set by the user. The second file path is the storage path of the second target file. In this embodiment, the first password and the second file path are associated in advance, which means that the first password can be used as a shortcut way for opening the corresponding second target file. The number of the first passwords may be at least one, and the number of the second target files may be at least one. Typically the first password and the second target file may be a one-to-one association; in other cases, one-to-many or many-to-one association may be provided as desired.
Then the method in this embodiment further includes:
and 301, acquiring a second password.
Step 302, when the second password is matched with the first password, determining a second file path associated with the matched first password.
Step 303, according to the second file path, opening a second target file corresponding to the second file path.
The second password is the password that the user inputs when the user needs to open the second target file. After the second password is acquired, whether the second password is matched with any first password is judged. When the second password can be matched with any first password, the user can be considered to wish to open the second target file associated with the matched first password through a quick way. And further determining a second file path associated with the matched first password according to the pre-established association relationship. And according to the determined second file path, directly opening the corresponding second target file. Therefore, the second target file required by the user is opened through a quick way.
In the embodiment, the password is used as another shortcut way for directly opening the target file, and the embodiment shown in fig. 1-2 is supplemented. So as to help the user to realize the function of quickly opening the target file under the condition that the user can not stably input the biological identification.
Exemplary devices
Fig. 4 shows an embodiment of the device for opening a network disk file according to the present invention. The apparatus of this embodiment is a physical apparatus for performing the method described in fig. 1 to 3. The technical solution is essentially the same as that in the above embodiment, and the corresponding description in the above embodiment is also applicable to this embodiment. The device in this embodiment includes:
the association module 401 is configured to pre-record the first biometric identifier, and associate a first file path for the first biometric identifier, where the first file path corresponds to the first target file.
An obtaining module 402, configured to obtain a second biometric identifier.
A first file path determination module 403, configured to determine a first file path associated with the matching first biomarker when the second biomarker matches the first biomarker.
The opening module 404 is configured to open a first target file corresponding to the first file path according to the first file path.
In addition, on the basis of the embodiment shown in fig. 4, it is preferable that:
the association module 401 includes:
the first object file determining unit 411 is configured to determine a first object file and determine a first file path of the first object file.
An associating unit 412 for associating a first file path for the first biomarker; the number of first file paths associated with the first biomarker is one or more.
The obtaining module 402 includes:
the interface unit 421 is configured to start a shortcut authentication interface.
An obtaining unit 422, configured to obtain the second biometric identifier through the shortcut authentication interface.
The password association module 405 is configured to pre-record the first password, and associate a second file path with the first password, where the second file path corresponds to the second target file.
And the password obtaining module 406 is configured to obtain the second password.
And a second file path determining module 407, configured to determine, when the second password matches the first password, a second file path associated with the matching first password.
The opening module 404 is further configured to open a second target file corresponding to the second file path according to the second file path.
Exemplary computer program product and computer-readable storage Medium
In addition to the above-described methods and apparatus, embodiments of the present application may also be a computer program product comprising computer program instructions that, when executed by a processor, cause the processor to perform the steps in the methods according to the various embodiments of the present application described in the "exemplary methods" section of this specification, above.
The computer program product may be written with program code for performing the operations of embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present application may also be a computer-readable storage medium having stored thereon computer program instructions that, when executed by a processor, cause the processor to perform steps in a method according to various embodiments of the present application described in the "exemplary methods" section above of this specification.
The computer-readable storage medium may take any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing describes the general principles of the present application in conjunction with specific embodiments, however, it is noted that the advantages, effects, etc. mentioned in the present application are merely examples and are not limiting, and they should not be considered essential to the various embodiments of the present application. Furthermore, the foregoing disclosure of specific details is for the purpose of illustration and description and is not intended to be limiting, since the foregoing disclosure is not intended to be exhaustive or to limit the disclosure to the precise details disclosed.
The block diagrams of devices, apparatuses, systems referred to in this application are only given as illustrative examples and are not intended to require or imply that the connections, arrangements, configurations, etc. must be made in the manner shown in the block diagrams. These devices, apparatuses, devices, systems may be connected, arranged, configured in any manner, as will be appreciated by those skilled in the art. Words such as "including," "comprising," "having," and the like are open-ended words that mean "including, but not limited to," and are used interchangeably therewith. The words "or" and "as used herein mean, and are used interchangeably with, the word" and/or, "unless the context clearly dictates otherwise. The word "such as" is used herein to mean, and is used interchangeably with, the phrase "such as but not limited to".
It should also be noted that in the devices, apparatuses, and methods of the present application, the components or steps may be decomposed and/or recombined. These decompositions and/or recombinations are to be considered as equivalents of the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, the description is not intended to limit embodiments of the application to the form disclosed herein. While a number of example aspects and embodiments have been discussed above, those of skill in the art will recognize certain variations, modifications, alterations, additions and sub-combinations thereof.

Claims (10)

1. A method for opening a network disk file is characterized in that a first biological identification is recorded in advance, a first file path is associated with the first biological identification, and the first file path corresponds to a first target file, and the method comprises the following steps:
acquiring a second biological identifier;
when the second biomarker matches the first biomarker, determining a first file path associated with the matching first biomarker;
and opening a first target file corresponding to the first file path according to the first file path.
2. The method of claim 1, wherein associating a first file path for the first biomarker, the first file path corresponding to a first target file comprises:
determining a first target file and determining a first file path of the first target file;
associating the first file path for the first biomarker; the number of the first file paths associated with the first biomarker is one or more.
3. The method of claim 1, wherein the first biomarker comprises:
fingerprint identification, face identification, voiceprint identification and/or iris identification.
4. The method of claim 3, wherein the second biometric identifier comprises:
fingerprint identification, face identification, voiceprint identification and/or iris identification.
5. The method of claim 1, wherein prior to said obtaining the second biometric identifier, the method further comprises:
starting a quick authentication interface;
the obtaining the second biometric identifier includes obtaining the second biometric identifier through the shortcut authentication interface.
6. The method according to any one of claims 1 to 5, further comprising:
and recording a first password in advance, and associating a second file path for the first password, wherein the second file path corresponds to a second target file.
7. The method of claim 6, further comprising:
acquiring a second password;
when the second password is matched with the first password, determining a second file path associated with the matched first password;
and opening a second target file corresponding to the second file path according to the second file path.
8. An opening device for a network disk file, comprising:
the system comprises an association module, a first storage module and a second storage module, wherein the association module is used for recording a first biological identifier in advance and associating a first file path for the first biological identifier, and the first file path corresponds to a first target file;
the acquisition module is used for acquiring a second biological identifier;
a first file path determination module to determine a first file path associated with the matching first biomarker when the second biomarker matches the first biomarker;
and the opening module is used for opening a first target file corresponding to the first file path according to the first file path.
9. A computer-readable storage medium storing a computer program for executing the method for opening a web disk file according to any one of claims 1 to 7.
10. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
the processor is configured to read the executable instructions from the memory and execute the instructions to implement the method for opening a network disk file according to any one of claims 1 to 7.
CN202011127890.4A 2020-10-21 2020-10-21 Method and device for opening network disk file Pending CN112016072A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011127890.4A CN112016072A (en) 2020-10-21 2020-10-21 Method and device for opening network disk file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011127890.4A CN112016072A (en) 2020-10-21 2020-10-21 Method and device for opening network disk file

Publications (1)

Publication Number Publication Date
CN112016072A true CN112016072A (en) 2020-12-01

Family

ID=73527385

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011127890.4A Pending CN112016072A (en) 2020-10-21 2020-10-21 Method and device for opening network disk file

Country Status (1)

Country Link
CN (1) CN112016072A (en)

Similar Documents

Publication Publication Date Title
US10223512B2 (en) Voice-based liveness verification
EP2973013B1 (en) Associating metadata with images in a personal image collection
WO2017080311A1 (en) Method and device for improving fingerprint template and terminal device
US9596087B2 (en) Token authentication for touch sensitive display devices
US20080221885A1 (en) Speech Control Apparatus and Method
KR20160086830A (en) Identity authentication by using human biological characteristics
JP2007156790A (en) Authentication technique for authentication using a plurality of types of biometric information
CN106098069B (en) Identity authentication method and terminal equipment
CN106888204B (en) Implicit identity authentication method based on natural interaction
US20140354533A1 (en) Tagging using eye gaze detection
US11736463B2 (en) Non-transitory computer readable medium and information processing apparatus
JP2010049357A (en) Authentication device, authentication system, and authentication method
KR102558741B1 (en) Device and method to register user
KR101944698B1 (en) Method for auto login of single sign on using the login result of computer operating system, and computer readable recording medium applying the same
JP2006023944A5 (en)
CN103984415B (en) A kind of information processing method and electronic equipment
US20070233667A1 (en) Method and apparatus for sample categorization
JP2003150557A (en) Automatic input method of information by organismic authentication, its automatic input system and its automatic input program
JP6241165B2 (en) Authentication method, authentication device, authentication system, and authentication program
CN112016072A (en) Method and device for opening network disk file
US20220383319A1 (en) Multi-factor authentication security system and method for verifying identification using evolving personal data combined with biometrics
US20200193001A1 (en) Password authentication with input pattern analysis
TWM574283U (en) Trading system using living body and face recognition to carry out provisioning for card-free transaction and automated teller machine
US11934498B2 (en) Method and system of user identification
CN108985035A (en) Control method, device, storage medium and the electronic equipment of user's operation permission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201201