CN110930552A - Unlocking method, equipment and storage medium based on two-dimensional code - Google Patents
Unlocking method, equipment and storage medium based on two-dimensional code Download PDFInfo
- Publication number
- CN110930552A CN110930552A CN201911182921.3A CN201911182921A CN110930552A CN 110930552 A CN110930552 A CN 110930552A CN 201911182921 A CN201911182921 A CN 201911182921A CN 110930552 A CN110930552 A CN 110930552A
- Authority
- CN
- China
- Prior art keywords
- key information
- door lock
- dimensional code
- intelligent door
- cloud server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 230000004044 response Effects 0.000 claims abstract description 5
- 238000004590 computer program Methods 0.000 claims description 13
- 238000012795 verification Methods 0.000 claims description 12
- 230000006870 function Effects 0.000 description 4
- 238000011161 development Methods 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a method, equipment and a storage medium for unlocking based on a two-dimensional code, which comprises the following steps of S10, connecting an intelligent door lock with a cloud server, and issuing key information to the bound intelligent door lock by the cloud server; s20, the intelligent door lock receives the key information and responds to the cloud server; s30, the cloud server receives the response information of the intelligent door lock and sends the key information to the terminal server; s40, the terminal server generates a two-dimensional code containing key information and sends the two-dimensional code to the mobile terminal; s50, scanning and verifying the two-dimensional code of the mobile terminal by the intelligent door lock. According to the intelligent door lock, the intelligent door lock is opened by scanning the two-dimensional code with certain condition limitation, so that the problem of managing the access control permission of a hotel or other public places is solved, and the use safety of the intelligent door lock is improved.
Description
Technical Field
The invention relates to the technical field of intelligent lock development, in particular to a method, equipment and a storage medium for unlocking based on a two-dimensional code.
Background
With the rapid development of security and protection technology, the intelligent door lock gradually enters thousands of households, occupies an important position in the intelligent home, is a lock different from the traditional mechanical lock, can be opened through instructions such as sound, fingerprints and human faces, is more intelligent, simple and convenient in the aspects of user safety, identification and manageability, and has wide application in the field of intelligent home. However, the above unlocking method is troublesome in setting process, and many steps are required for changing. The intelligent door lock can only be opened by an administrator with management authority, and is not convenient and fast enough. If the unlocking password or the key is directly given to the visitor, the password may be leaked, and a situation that a stranger illegally breaks in the password may occur, so that the safety cannot be guaranteed.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention aims to provide a method, equipment and a storage medium for unlocking based on a two-dimension code, the intelligent door lock is unlocked by scanning the two-dimension code with certain condition limitation through the intelligent door lock, the problem of managing access control permission in hotels or other public places is solved, and the use safety of the intelligent door lock is improved.
One of the purposes of the invention is realized by adopting the following technical scheme:
a method for unlocking based on a two-dimensional code comprises the following steps:
s10, the intelligent door lock is connected with the cloud server, and the cloud server issues key information to the bound intelligent door lock;
s20, the intelligent door lock receives the key information and responds to the cloud server;
s30, the cloud server receives the response information of the intelligent door lock and sends the key information to the terminal server;
s40, the terminal server generates a two-dimensional code containing key information and sends the two-dimensional code to the mobile terminal;
s50, scanning and verifying the two-dimensional code of the mobile terminal by the intelligent door lock.
Further, S50 further includes the following steps:
and S51, the intelligent door lock analyzes the two-dimensional code, and the key information of the two-dimensional code is verified by combining the key information stored by the intelligent door lock.
Further, the method also comprises S52, verifying whether the key information is consistent with the key information stored by the intelligent door lock, if the key information of the two-dimensional code is consistent with the key information of the intelligent door lock, the verification is successful, and the intelligent door lock is opened; and if the key information of the two-dimensional code is inconsistent with the key information of the intelligent door lock, the verification fails and the unlocking cannot be performed.
Further, after the verification is successful, the intelligent door lock informs the cloud server that the key information is consumed, and the cloud server destroys the key information.
Further, still include: s60, the cloud server polls the key information, verifies whether the key information meets the failure condition, and if the key information meets the failure condition, sends a key destroying instruction to control the intelligent door lock to destroy the key information.
Further, S20 further includes the following steps:
and S21, the intelligent door lock stores the key information in the memory of the lock end module.
Further, the failure condition is that the number of times of using the key information reaches a preset number of times, or the time of using the key information exceeds a preset duration.
Further, the S52 further includes: if the verification fails, the intelligent door lock starts the camera device to record and send the record to the cloud server and the mobile terminal.
The second purpose of the invention is realized by adopting the following technical scheme:
an apparatus comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, the processor implementing a method for unlocking based on two-dimensional code as described above when executing the computer program.
The third purpose of the invention is realized by adopting the following technical scheme:
a storage medium having stored thereon a computer program which, when executed, implements a method of unlocking based on a two-dimensional code as described above.
Compared with the prior art, the invention has the beneficial effects that:
the invention provides a method, equipment and a storage medium for unlocking based on a two-dimension code, and an intelligent door lock scans and verifies the two-dimension code containing key information to control access control. The entrance guard unlocking convenience is improved when visitors are received in public places such as hotels and houses, meanwhile, the safety and the privacy of the entrance guard unlocking convenience are improved, the complex procedures of manual registration and identity verification of visitors or consumers are reduced, the management cost is reduced, and meanwhile, higher safety is guaranteed.
Drawings
FIG. 1 is a schematic flow chart of a first embodiment of the present invention;
fig. 2 is a schematic structural diagram of a second embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
Example one
As shown in fig. 1, the invention provides a method for unlocking based on a two-dimensional code, which comprises the following steps:
and S10, binding the intelligent door lock by the administrator, connecting the intelligent door lock with the cloud server, and sending the key information to the bound intelligent door lock by the cloud server.
And S20, the intelligent door lock receives the key information, synchronizes the key information to a lock end module memory of the intelligent door lock, and responds to the cloud server.
And S30, the cloud server receives the response information of the intelligent door lock and sends the key information to the terminal server. And the cloud server receives the response information of the intelligent door lock, represents that the intelligent door lock has received the key information and is stored, and can perform scanning verification at any time. Therefore, the cloud server sends the key information to the terminal server for the terminal server to generate the two-dimensional code.
And S40, the terminal server receives the key information, generates a two-dimensional code containing the key information and sends the two-dimensional code to the mobile terminal. The terminal server can establish connection with the mobile terminal according to communication modes such as a WiFi module or a Bluetooth module and the like, and transmits the two-dimensional code. In the present application, the mobile terminal may refer to a device capable of taking pictures or displaying pictures, such as a mobile phone and a tablet, used by an administrator or a visitor, or may refer to a two-dimensional code photo printed or sent to the visitor by the administrator, which is not limited again.
S50, scanning and verifying the two-dimensional code of the mobile terminal by the intelligent door lock. The user sweeps the code opening to the lock end of intelligent lock by virtue of the two-dimensional code containing the secret key information, awakens the lock end of the intelligent lock to sweep the code opening, and scans and verifies. The specific process also comprises the following steps:
and S51, the intelligent door lock analyzes the two-dimensional code, and the key information of the two-dimensional code is verified by combining the key information stored by the intelligent door lock.
And S52, verifying whether the key information is consistent with the key information stored by the intelligent door lock, if so, successfully verifying, and opening the intelligent door lock. And the intelligent door lock informs the cloud server that the key information is consumed, and the cloud server destroys the key information. If the key information of the two-dimensional code is inconsistent with the key information of the intelligent door lock, the verification fails, the lock cannot be unlocked, and the intelligent door lock starts a camera device to record and send the record to a cloud server and a mobile terminal. The intelligent door lock starts the camera device, shoots the external condition of intelligent door lock to upload cloud platform and mobile terminal, expert administrator looks over and in time handles, improves the security performance that uses the two-dimensional code to unblank.
And more than two, the method further comprises the step of S60, the cloud server polls the cloud server to poll the key information, whether the key information meets the failure condition is verified, and if the key information meets the failure condition, a key destroying instruction is sent out to control the intelligent door lock to destroy the key information. The cloud server issues the key information to the intelligent door lock again, wherein the preset failure condition is that the using times of the key information reach the preset times, or the using time of the key information exceeds the preset duration. The preset times can be set by the user, generally set to 1 time, and the intelligent door lock can not be opened by scanning the two-dimensional code again after being used. The preset time duration can be set to be 1 hour or 1 day, the time when the intelligent door lock receives the key information is used as the effective starting time of the key information, the key information is effective within the time of adding the preset time duration to the starting time, and a user can open the intelligent door lock through the two-dimensional code containing the key information. And after the time is exceeded, the cloud server can judge that the key information is invalid and cannot open the intelligent door lock. And judging that the key information does not meet the failure condition at the cloud server, if the key information is valid, and still opening the intelligent door lock.
If the user takes the invalidated two-dimensional code, the terminal server needs to obtain the two-dimensional code containing the new key information again, and S50 is executed again.
According to the two-dimension code unlocking method, the intelligent door lock scans and verifies the two-dimension code containing the key information to control the access control, so that the convenience of unlocking the access control (passage and elevator) when the visitor is received in public places such as hotels and houses is improved, the safety and the privacy of the access control are improved, the complicated procedures of manual registration and identity verification of visitors or consumers are reduced, the management cost is reduced, and the higher safety is guaranteed.
In addition, the invention also provides a storage medium, wherein the storage medium stores a computer program, and the computer program realizes the steps of the method for alarming the abnormality of the intelligent door lock system when being executed by the processor.
Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, U.S. disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution media, and the like. It should be noted that the computer-readable medium may contain any suitable combination of elements that may be modified in accordance with the requirements of statutory and patent practice in the jurisdiction, for example, in some jurisdictions, computer-readable media may not contain electrical carrier signals or telecommunications signals in accordance with statutory and patent practice.
The invention is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like, as in embodiment two.
Example two
An electronic device, as shown in fig. 2, includes a memory, a processor, and a program stored in the memory, the program is configured to be executed by the processor, and the processor executes the program to implement the above-mentioned method steps of unlocking based on a two-dimensional code.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general processor can be a microprocessor or the processor can be any conventional processor and the like, the processor is a control center of the intelligent door lock, and various interfaces and lines are utilized to connect various parts of a two-dimensional code-based unlocking method.
The memory can be used for storing computer programs and/or modules, and the processor can realize various functions of the unlocking method based on the two-dimensional code by operating or executing the computer programs and/or modules stored in the memory and calling the data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) of the at least one function station advocate, and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, etc. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash-Card) at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.
Claims (10)
1. A method for unlocking based on a two-dimensional code is characterized by comprising the following steps:
s10, the intelligent door lock is connected with the cloud server, and the cloud server issues key information to the bound intelligent door lock;
s20, the intelligent door lock receives the key information and responds to the cloud server;
s30, the cloud server receives the response information of the intelligent door lock and sends the key information to the terminal server;
s40, the terminal server generates a two-dimensional code containing key information and sends the two-dimensional code to the mobile terminal;
s50, scanning and verifying the two-dimensional code of the mobile terminal by the intelligent door lock.
2. The method for unlocking based on the two-dimensional code as claimed in claim 1, wherein the S50 further comprises the following steps:
and S51, the intelligent door lock analyzes the two-dimensional code, and the key information of the two-dimensional code is verified by combining the key information stored by the intelligent door lock.
3. The method for unlocking based on the two-dimensional code as claimed in claim 2, further comprising S52, verifying whether the key information is consistent with the key information stored in the smart door lock, if the key information of the two-dimensional code is consistent with the key information of the smart door lock, the verification is successful, and the smart door lock is opened; and if the key information of the two-dimensional code is inconsistent with the key information of the intelligent door lock, the verification fails and the unlocking cannot be performed.
4. The method for unlocking based on the two-dimensional code of claim 3, wherein after the verification is successful, the smart door lock informs the cloud server that the key information is consumed, and the cloud server destroys the key information.
5. The method for unlocking based on the two-dimensional code as claimed in claim 1, further comprising the steps of:
s60, the cloud server polls the key information, verifies whether the key information meets the failure condition, and if the key information meets the failure condition, sends a key destroying instruction to control the intelligent door lock to destroy the key information.
6. The method for unlocking based on the two-dimensional code as claimed in claim 1, wherein the S20 further comprises the following steps:
and S21, the intelligent door lock stores the key information in the memory of the lock end module.
7. The method for unlocking based on the two-dimensional code as claimed in claim 5, wherein the failure condition is that the number of times of using the key information reaches a preset number of times, or the time of using the key information exceeds a preset duration.
8. The method for unlocking based on the two-dimensional code as claimed in claim 3, wherein the S52 further comprises: if the verification fails, the intelligent door lock starts the camera device to record and send the record to the cloud server and the mobile terminal.
9. An apparatus, comprising a processor, a memory, and a computer program stored on the memory and operable on the processor, wherein the processor executes the computer program to implement the method for unlocking based on two-dimensional code according to any one of claims 1 to 8.
10. A storage medium having stored thereon a computer program which, when executed, implements a method of unlocking based on a two-dimensional code according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911182921.3A CN110930552A (en) | 2019-11-27 | 2019-11-27 | Unlocking method, equipment and storage medium based on two-dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911182921.3A CN110930552A (en) | 2019-11-27 | 2019-11-27 | Unlocking method, equipment and storage medium based on two-dimensional code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110930552A true CN110930552A (en) | 2020-03-27 |
Family
ID=69846667
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911182921.3A Pending CN110930552A (en) | 2019-11-27 | 2019-11-27 | Unlocking method, equipment and storage medium based on two-dimensional code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110930552A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111526210A (en) * | 2020-05-06 | 2020-08-11 | 广东纬德信息科技股份有限公司 | Distribution network safety intelligent cabinet system, control method, medium and terminal equipment |
CN114189863A (en) * | 2021-12-16 | 2022-03-15 | 青岛海尔科技有限公司 | Binding method and device of intelligent door lock, storage medium and electronic device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104063935A (en) * | 2014-06-30 | 2014-09-24 | 深圳市同创新佳科技有限公司 | Hotel guest room management method and system based on electronic key management server |
CN105261096A (en) * | 2015-10-26 | 2016-01-20 | 东莞市点开网络科技有限公司 | Network smart lock system |
CN105427416A (en) * | 2015-11-04 | 2016-03-23 | 广东安居宝数码科技股份有限公司 | Two-dimension code unlocking method and system |
CN107195038A (en) * | 2017-05-11 | 2017-09-22 | 广东汇泰龙科技有限公司 | A kind of intelligent cloud lock system and method for unlocking based on Quick Response Code |
CN109493460A (en) * | 2018-09-18 | 2019-03-19 | 徐州展元信息技术有限公司 | Two dimensional code intelligent unlocking system |
-
2019
- 2019-11-27 CN CN201911182921.3A patent/CN110930552A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104063935A (en) * | 2014-06-30 | 2014-09-24 | 深圳市同创新佳科技有限公司 | Hotel guest room management method and system based on electronic key management server |
CN105261096A (en) * | 2015-10-26 | 2016-01-20 | 东莞市点开网络科技有限公司 | Network smart lock system |
CN105427416A (en) * | 2015-11-04 | 2016-03-23 | 广东安居宝数码科技股份有限公司 | Two-dimension code unlocking method and system |
CN107195038A (en) * | 2017-05-11 | 2017-09-22 | 广东汇泰龙科技有限公司 | A kind of intelligent cloud lock system and method for unlocking based on Quick Response Code |
CN109493460A (en) * | 2018-09-18 | 2019-03-19 | 徐州展元信息技术有限公司 | Two dimensional code intelligent unlocking system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111526210A (en) * | 2020-05-06 | 2020-08-11 | 广东纬德信息科技股份有限公司 | Distribution network safety intelligent cabinet system, control method, medium and terminal equipment |
CN114189863A (en) * | 2021-12-16 | 2022-03-15 | 青岛海尔科技有限公司 | Binding method and device of intelligent door lock, storage medium and electronic device |
CN114189863B (en) * | 2021-12-16 | 2024-03-22 | 青岛海尔科技有限公司 | Binding method and device of intelligent door lock, storage medium and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2016273890B2 (en) | Controlling physical access to secure areas via client devices in a networked environment | |
KR100705325B1 (en) | RF-ID tag reading system for using password and method thereof | |
US8176323B2 (en) | Radio frequency identification (RFID) based authentication methodology using standard and private frequency RFID tags | |
US9854431B2 (en) | Method, apparatus, and system of distributing data of virtual subscriber identity module | |
CN108632253B (en) | Client data security access method and device based on mobile terminal | |
CN108307674A (en) | A kind of method and apparatus ensureing terminal security | |
US10185816B2 (en) | Controlling user access to electronic resources without password | |
CN103907328A (en) | Mobile Device Based Authentication | |
CN107979571B (en) | File use processing method, terminal and server | |
CN103581378A (en) | Smart phone high in safety performance | |
CN105550591A (en) | Security protection device and method for user data in mobile terminal | |
CN103576787A (en) | Panel computer with high safety performance | |
WO2020253197A1 (en) | Method and apparatus for managing virtual user identification card, terminal device and storage medium | |
CN205230158U (en) | Access control system based on two -dimensional code | |
CN110930552A (en) | Unlocking method, equipment and storage medium based on two-dimensional code | |
RU2596587C2 (en) | Mobile communication device | |
CN103582184A (en) | Double-card smart phone high in safety performance | |
US10819711B2 (en) | Data access method, user equipment and server | |
EP3926992B1 (en) | Electronic device, and authentication method in electronic device | |
KR101294805B1 (en) | 2-channel authentication method and system based on authentication application | |
US20210111885A1 (en) | Electronic access control multi-factor authentication using centralized hardware secured credential system and methods of use thereof | |
CN111063061A (en) | Method, equipment and storage medium for using temporary password for intelligent door lock | |
CN110881182B (en) | Terminal and intelligent Bluetooth lock verification method, bluetooth lock and storage medium | |
CN106330899A (en) | Private cloud device account management method and system, electronic device and server | |
JP2005301454A (en) | User identification system and charger/radio ic chip reader |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200327 |