[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN108881244A - Intellectual property protection method for network short texts based on block chains - Google Patents

Intellectual property protection method for network short texts based on block chains Download PDF

Info

Publication number
CN108881244A
CN108881244A CN201810674499.2A CN201810674499A CN108881244A CN 108881244 A CN108881244 A CN 108881244A CN 201810674499 A CN201810674499 A CN 201810674499A CN 108881244 A CN108881244 A CN 108881244A
Authority
CN
China
Prior art keywords
intellectual property
cryptographic hash
reprinting
server
network short
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810674499.2A
Other languages
Chinese (zh)
Inventor
邓文平
王宝生
盖方宇
彭伟
黄金
陈红艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN201810674499.2A priority Critical patent/CN108881244A/en
Publication of CN108881244A publication Critical patent/CN108881244A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Primary Health Care (AREA)
  • Health & Medical Sciences (AREA)
  • Operations Research (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention belongs to the field of intellectual property protection, and provides a block chain-based intellectual property protection method for a network short text, aiming at the technical problems that whether works are infringed or not is difficult to detect and the 'plagiarism degree' quantification is lacked in the existing intellectual property protection for the network short text, which comprises the following steps: the first stage is as follows: an intellectual property statement; and a second stage: authorizing the transshipment; and a third stage: and (5) maintaining the right. The invention can set the granularity of the protection of the intellectual property rights of the network short texts, and the original author of the network short texts can declare the intellectual property rights of the network short texts in a fine-grained manner, and after finding the infringement, the server compares the illegal reprinting content with the hash value array of the original article to obtain the reprinting proportion value, thereby quantifying the plagiarism degree, being more convenient for the original author to maintain the own right according to the infringement degree of the infringement, and improving the protection of the intellectual property rights of the network short texts.

Description

A kind of network short essay intellectual property protection method based on block chain
Technical field
The invention belongs to intellectual property protection fields, and in particular to network of the one kind based on block chain (Blockchain) is short Literary intellectual property protection method.
Background technique
With the rapid development of the social platforms such as microblogging, wechat, a kind of emerging media format has been increasingly becoming from media. Expand the influence power of oneself by way of issuing original article from media, to obtain attention rate and income.However, derived from mutual The opening of networking, the article on internet are extremely easy to be reprinted and plagiarized.In the publication and communication process of original article, The intellectual property of author is unable to get statement well and protection.From media platform itself to the side of the intellectual property protection of author Method is only limitted to play " original " label to original article or hits plagiarist by modes such as report, but can not fundamentally protect The right of authorship.
Block chain technology is the core technology of bit coin (Bitcoin), has gathered distributed system, P2P network, cryptography Etc. multinomial mature technology, a kind of account book of decentralization that can not be distorted is provided, so that the encryption of bit coin one kind Currency can reliably can be traded in the case where the regulatory agencies such as no bank control.In addition to electronic banking field, Block chain technology also has revolutionary application by providing point-to-point trust under distributed environment, in other fields.Example Such as in copyright protection field, author can be using Hash (hash) value of oneself works as a part of information preservation of transaction in area In block chain, as the intellectual property statement to oneself works.It can not be distorted using data in block chain, the characteristic that can be traced, Protect the right of oneself.
There is preferable application using intellectual properties fields such as block chain protection picture, music in the prior art, but in net In terms of the intellectual property protection of network short essay, also have the following drawbacks and deficiency:
(1) plagiarist of network short essay may can't original text reprint original article, but part of plagiarism paragraph or sentence, It is difficult to entire article progress Hash to detect whether works are encroached right merely;
(2) cribbing of network short essay cannot only lean on single cryptographic Hash to compare and determine, lack to " plagiarizing degree " Quantization.
Summary of the invention
The present invention exists for the intellectual property protection of existing network short essay is difficult to detect whether works are encroached right and lacked pair The technical issues of " plagiarizing degree " quantization, a kind of network short essay intellectual property protection method based on block chain is provided, by setting The granularity of network short essay intellectual property protection is set, the authorship of network short essay can be with fine granularity to network short essay intellectual property It is stated, after discovery is encroached right, illegal content of reprinting is carried out cryptographic Hash after Hash processing with original article by server Array compares, the ratio value reprinted, and then to " plagiarizing degree " quantization, more convenient authorship is according to infringer Infringement degree safeguard oneself right, improve the protection of network short essay intellectual property.
Technical solution of the present invention includes intellectual property statement, authorization reprinting, right-safeguarding three phases, is included the following steps:
First stage:Intellectual property statement, has main steps that:
1.1 authors upload onto the server the original article of oneself, and select the granularity of intellectual property protection, and note is known The granularity for knowing property right protection is segment;
The intellectual property protection granularity that 1.2 servers use hash algorithm to choose according to user, owns original article Fragment computations cryptographic Hash;
1.3 servers establish archives to the works, save the Hash of full text and the cryptographic Hash array of each segment;
1.4 servers are that each cryptographic Hash in array creates a transaction in block chain, save it in transaction In Optional Field, while authorship's identity information and the timestamp of transaction being saved in the server;
Second stage:Authorization is reprinted, and is had main steps that:
2.1 reprinting persons will reprint content uploading to server, request authorship's authorization;
2.2 authorships check reprinting content, if agreeing to reprint, with oneself private key to the cryptographic Hash of reprinting content into Row signature, submits to server for the cryptographic Hash of original article and its private key signature;If disagreeing reprinting, turn the phase III;
After 2.3 server authentications signature, a block chain transaction is created, by the cryptographic Hash of original article, reprints content Cryptographic Hash and authorship sign in the Optional Field that deposit is traded;Simultaneously by the time of the identity information of the reprinting person and transaction Stamp saves in the server, to retrieve corresponding block, and informs authorship;
Phase III:Right-safeguarding has main steps that:
3.1, when authorship has found illegal reprint, will illegally reprint content uploading to server;
3.2 servers calculate the cryptographic Hash of each segment after dividing article of encroaching right according to intellectual property protection granularity, obtain To cryptographic Hash array;Then the cryptographic Hash array of obtained cryptographic Hash array and original article is compared, the ratio reprinted Value;
3.3 users submit to the ratio value as the evidence of infringement degree from media platform or the progress of other right-safeguarding departments Network short essay intellectual property right-safeguarding.
As the further improvement of technical solution of the present invention, in the step 1.1, granularity, that is, piece of intellectual property protection Section is sentence or paragraph.
Following technical effect can achieve using the present invention:
1, in step 1.1 of the present invention be arranged the intellectual property protection of network short essay granularity, can be sentence or paragraph, in turn The authorship of network short essay with fine granularity can state solve part in the prior art to network short essay intellectual property Paragraph or sentence plagiarized, is difficult to entire article progress Hash the technical issues of whether works are encroached right detected merely.
2, in the second stage authorization reprinting stage of the present invention, feelings are reprinted in the authorization that authorship can see oneself works Condition.
3, the present invention discovery encroached right after, in step 3.2, server will illegally reprint content carry out Hash processing after with The cryptographic Hash array of original article compares, the ratio value reprinted, and then to " plagiarizing degree " quantization, authorship will The ratio value is submitted to from media platform or other right-safeguarding departments as the evidence of infringement degree and carries out network short essay intellectual property Right-safeguarding, by the quantization to " plagiarizing degree ", more convenient authorship safeguards the power of oneself according to the infringement degree of infringer Benefit.
Detailed description of the invention
Fig. 1 is the network short essay intellectual property protection method flow diagram the present invention is based on block chain;
Fig. 2 is first stage intellectual property statement treatment process figure of the invention;
Fig. 3 is that treatment process figure is reprinted in second stage authorization of the present invention;
Fig. 4 is phase III right-safeguarding process flow diagram of the invention.
Specific embodiment
Fig. 1 is the network short essay intellectual property protection method flow diagram the present invention is based on block chain.Technical side of the invention Case includes intellectual property statement, authorization reprinting, right-safeguarding three phases, is included the following steps:First stage:Intellectual property statement; Second stage:Authorization is reprinted;Phase III:Right-safeguarding.
Fig. 2 is first stage intellectual property statement treatment process figure of the invention.It has main steps that:
1.1 authors upload onto the server the original article of oneself, and select the granularity of intellectual property protection, and note is known The granularity for knowing property right protection is segment;
The Hash granularity intellectual property protection granularity that 1.2 servers use hash algorithm to choose according to user, to original text All fragment computations cryptographic Hash of chapter;
1.3 servers establish archives to the works, save the Hash of full text and the cryptographic Hash array of each segment;
1.4 servers are that each cryptographic Hash in array creates a transaction in block chain, save it in transaction In Optional Field, while authorship's identity information and the timestamp of transaction being saved in the server.
Fig. 3 is that treatment process figure is reprinted in second stage authorization of the present invention.It has main steps that:
2.1 reprinting persons will reprint content uploading to server, request authorship's authorization;
2.2 authorships check reprinting content, if agreeing to reprint, with oneself private key to the cryptographic Hash of reprinting content into Row signature, submits to server for the cryptographic Hash of original article and its private key signature;If disagreeing reprinting, turn the phase III;
After 2.3 server authentications signature, a block chain transaction is created, by the cryptographic Hash of original article, reprints content Cryptographic Hash and authorship sign in the Optional Field that deposit is traded;Simultaneously by the time of the identity information of the reprinting person and transaction Stamp saves in the server, to retrieve corresponding block, and informs authorship.
Fig. 4 is phase III right-safeguarding process flow diagram of the invention.It has main steps that:
3.1, when authorship has found illegal reprint, will illegally reprint content uploading to server;
3.2 servers calculate the cryptographic Hash of each segment after dividing article of encroaching right according to intellectual property protection granularity, obtain To cryptographic Hash array;Then the cryptographic Hash array of obtained cryptographic Hash array and original article is compared, the ratio reprinted Value;
3.3 users submit to the ratio value as the evidence of infringement degree from media platform or the progress of other right-safeguarding departments Network short essay intellectual property right-safeguarding.

Claims (2)

1. a kind of network short essay intellectual property protection method based on block chain, which is characterized in that including intellectual property statement, award Power reprinting, right-safeguarding three phases, process are as follows:
First stage:Intellectual property statement, has main steps that:
1.1 authors upload onto the server the original article of oneself, and select the granularity of intellectual property protection, and note knowledge produces The granularity of power protection is segment;
The intellectual property protection granularity that 1.2 servers use hash algorithm to choose according to user, to all segments of original article Calculate cryptographic Hash;
1.3 servers establish archives to the works, save the Hash of full text and the cryptographic Hash array of each segment;
1.4 servers are that each cryptographic Hash in array creates a transaction in block chain, save it in the optional of transaction In field, while authorship's identity information and the timestamp of transaction being saved in the server;
Second stage:Authorization is reprinted, and is had main steps that:
2.1 reprinting persons will reprint content uploading to server, request authorship's authorization;
2.2 authorships check reprinting content, if agreeing to reprint, are signed with the private key of oneself to the cryptographic Hash for reprinting content Name, submits to server for the cryptographic Hash of original article and its private key signature;If disagreeing reprinting, turn the phase III;
After 2.3 server authentications signature, a block chain transaction is created, by the Hash of the cryptographic Hash of original article, reprinting content Value and authorship sign in the Optional Field that deposit is traded;The identity information of the reprinting person and the timestamp of transaction are protected simultaneously In presence server, and inform authorship;
Phase III:Right-safeguarding has main steps that:
3.1, when authorship has found illegal reprint, will illegally reprint content uploading to server;
3.2 servers calculate the cryptographic Hash of each segment after dividing article of encroaching right according to intellectual property protection granularity, breathed out Uncommon value array;Then the cryptographic Hash array of obtained cryptographic Hash array and original article is compared, the ratio value reprinted;
The ratio value is submitted to as the evidence of infringement degree from media platform or other right-safeguarding departments and carries out network by 3.3 users Short essay intellectual property right-safeguarding.
2. the network short essay intellectual property protection method based on block chain as described in claim 1, which is characterized in that the step In rapid 1.1, granularity, that is, segment of intellectual property protection is sentence or paragraph.
CN201810674499.2A 2018-06-27 2018-06-27 Intellectual property protection method for network short texts based on block chains Pending CN108881244A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810674499.2A CN108881244A (en) 2018-06-27 2018-06-27 Intellectual property protection method for network short texts based on block chains

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810674499.2A CN108881244A (en) 2018-06-27 2018-06-27 Intellectual property protection method for network short texts based on block chains

Publications (1)

Publication Number Publication Date
CN108881244A true CN108881244A (en) 2018-11-23

Family

ID=64294957

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810674499.2A Pending CN108881244A (en) 2018-06-27 2018-06-27 Intellectual property protection method for network short texts based on block chains

Country Status (1)

Country Link
CN (1) CN108881244A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011785A (en) * 2018-12-28 2019-07-12 阿里巴巴集团控股有限公司 A kind of method and device that based on block chain structuring works deposit with card
CN110060154A (en) * 2018-12-28 2019-07-26 阿里巴巴集团控股有限公司 Works based on block chain deposit card method, system, device and equipment
CN110310147A (en) * 2019-06-05 2019-10-08 上海易点时空网络有限公司 Original content declares method and device
CN110598190A (en) * 2019-09-06 2019-12-20 湖南天河国云科技有限公司 Method for determining authority of text data on chain based on block chain
CN111339188A (en) * 2020-02-20 2020-06-26 百度在线网络技术(北京)有限公司 Block chain-based media content processing method, apparatus, device, and medium
CN111444479A (en) * 2018-12-29 2020-07-24 北京奇虎科技有限公司 Method and system for verifying ownership of digital fingerprint
CN112215732A (en) * 2020-09-07 2021-01-12 深圳市安络科技有限公司 Intellectual property protection method and device based on block chain
CN112307440A (en) * 2020-10-29 2021-02-02 云南师范大学 Method for protecting online education and teaching video property right by using block chain technology

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250721A (en) * 2016-07-28 2016-12-21 杭州云象网络技术有限公司 A kind of electronic copyright protection method based on block chain
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
CN107659610A (en) * 2017-08-02 2018-02-02 北京瑞卓喜投科技发展有限公司 Copyright protection methods, devices and systems based on block chain technology
US20180068091A1 (en) * 2016-09-06 2018-03-08 Intel Corporation Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content
CN107832384A (en) * 2017-10-28 2018-03-23 北京安妮全版权科技发展有限公司 Infringement detection method, device, storage medium and electronic equipment
CN107967416A (en) * 2016-10-19 2018-04-27 华为技术有限公司 The methods, devices and systems of copyright right-safeguarding detection

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250721A (en) * 2016-07-28 2016-12-21 杭州云象网络技术有限公司 A kind of electronic copyright protection method based on block chain
US20180068091A1 (en) * 2016-09-06 2018-03-08 Intel Corporation Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content
CN107967416A (en) * 2016-10-19 2018-04-27 华为技术有限公司 The methods, devices and systems of copyright right-safeguarding detection
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
CN107659610A (en) * 2017-08-02 2018-02-02 北京瑞卓喜投科技发展有限公司 Copyright protection methods, devices and systems based on block chain technology
CN107832384A (en) * 2017-10-28 2018-03-23 北京安妮全版权科技发展有限公司 Infringement detection method, device, storage medium and electronic equipment

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110060154A (en) * 2018-12-28 2019-07-26 阿里巴巴集团控股有限公司 Works based on block chain deposit card method, system, device and equipment
CN110011785A (en) * 2018-12-28 2019-07-12 阿里巴巴集团控股有限公司 A kind of method and device that based on block chain structuring works deposit with card
WO2020134628A1 (en) * 2018-12-28 2020-07-02 阿里巴巴集团控股有限公司 Method and apparatus for performing evidence storage on structured work based on blockchain
CN111444479A (en) * 2018-12-29 2020-07-24 北京奇虎科技有限公司 Method and system for verifying ownership of digital fingerprint
CN111444479B (en) * 2018-12-29 2024-05-14 北京奇虎科技有限公司 Digital fingerprint ownership verification method and system
CN110310147A (en) * 2019-06-05 2019-10-08 上海易点时空网络有限公司 Original content declares method and device
CN110598190A (en) * 2019-09-06 2019-12-20 湖南天河国云科技有限公司 Method for determining authority of text data on chain based on block chain
CN110598190B (en) * 2019-09-06 2024-03-08 湖南天河国云科技有限公司 Method for determining right of text data on chain based on block chain
CN111339188B (en) * 2020-02-20 2023-10-31 百度在线网络技术(北京)有限公司 Media content processing method, device, equipment and medium based on blockchain
CN111339188A (en) * 2020-02-20 2020-06-26 百度在线网络技术(北京)有限公司 Block chain-based media content processing method, apparatus, device, and medium
CN112215732A (en) * 2020-09-07 2021-01-12 深圳市安络科技有限公司 Intellectual property protection method and device based on block chain
CN112307440A (en) * 2020-10-29 2021-02-02 云南师范大学 Method for protecting online education and teaching video property right by using block chain technology
CN112307440B (en) * 2020-10-29 2023-11-14 云南师范大学 Method for protecting online education and teaching video property by using blockchain technology

Similar Documents

Publication Publication Date Title
CN108881244A (en) Intellectual property protection method for network short texts based on block chains
US11379771B2 (en) Management of workflows
US8601276B2 (en) Managing access to a secure content-part of a PPCD following introduction of the PPCD into a workflow
CN103201746B (en) For the technology that the safety management at data storage device place is supplied
US20160365978A1 (en) Making cryptographic claims about stored data using an anchoring system
US20150120567A1 (en) System and method for monitoring third party access to a restricted item
Zhang et al. Blockchain-based secure data provenance for cloud storage
US8984298B2 (en) Managing access to a secure content-part of a PPCD using a key reset point
CN105701367A (en) Security system for Internet original commercial works
KR102002488B1 (en) Document Acquisition System Using Off-Chain Distributed Storage Based on Block chain
CN104021318B (en) Anti-replay-attack device and anti-replay-attack method
Ayed et al. The blockchain technology: applications and threats
CN109582641A (en) A kind of screening technique and screening system of the works typing based on block chain
Krishnasamy et al. An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm
Gurulian et al. You can’t touch this: Consumer-centric android application repackaging detection
Miao et al. Digital copyright works management system based on DOSA
CN116361823A (en) Selective audit processing of blockchains for privacy protection
Saini A survey on watermarking web contents for protecting copyright
Motwani et al. A proposed digital rights management system for 3d graphics using biometric watermarks
US7958102B1 (en) Method and apparatus for searching a storage system for confidential data
CN114363068B (en) Picture and text issuing method and device, electronic equipment and storage medium
CN105046112B (en) A kind of digital literary property protection method
Saini et al. Securing web contents through invisible text watermarking for copyright protection
Li et al. Information sharing and privacy protection of electronic nursing record management system
CN109284615A (en) Mobile device digital resource method for managing security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181123

WD01 Invention patent application deemed withdrawn after publication