CN101834858B - Trust and replacement-based privacy information protection method in data sharing - Google Patents

Trust and replacement-based privacy information protection method in data sharing Download PDF

Info

Publication number
CN101834858B
CN101834858B CN 201010152506 CN201010152506A CN101834858B CN 101834858 B CN101834858 B CN 101834858B CN 201010152506 CN201010152506 CN 201010152506 CN 201010152506 A CN201010152506 A CN 201010152506A CN 101834858 B CN101834858 B CN 101834858B
Authority
CN
China
Prior art keywords
information
privacy
data
trust
owner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 201010152506
Other languages
Chinese (zh)
Other versions
CN101834858A (en
Inventor
何泾沙
高枫
吴旭
马书南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN 201010152506 priority Critical patent/CN101834858B/en
Publication of CN101834858A publication Critical patent/CN101834858A/en
Application granted granted Critical
Publication of CN101834858B publication Critical patent/CN101834858B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a trust and replacement-based privacy information protection method in data sharing, which belongs to the field of computer network security and is used for protecting the privacy information in the data sharing. The invention aims to provide a trust and replacement-based privacy information protection method in the data sharing, and solves the problem that a user does not hope to share all the data thereof with an entity but hope to share specified data with a familiar or trusted entity thereof in the data sharing. The amount of the privacy information is calculated by setting the privacy information range and screening the information which comprises privacy in the data sharing. When the amount of the privacy information exceeds a range in which the privacy information can be shared by a shared data object, the data in a shared data set is replaced by a replacement method, the aims of data sharing and privacy protection are fulfilled, and the method can be flexibly applied to various data sharing environments.

Description

In a kind of data sharing based on the method for protecting privacy of trusting and replacing
Technical field
The present invention relates to a kind of method of privacy information protection, specifically in a kind of data sharing based on the method for protecting privacy of trusting and replacing, be used for network environment to the protection of privacy information, belong to computer network security field.
Background technology
The shared data of user that develop into of network technology provide convenience, but have brought thus the problem of secret protection.In the process of data sharing, the user does not wish to share all own data with entity, only wishes to be familiar with or the shared specific data of entity of trust with own.Therefore, be safely necessary and effective based on the method for protecting privacy of trusting for the guarantee data sharing.
Method for secret protection in the present existing data sharing; mainly there are following two shortcomings: first; existing method for protecting privacy comprises 1) by formulating access control policy; sharing of control privacy information; the method is to ensureing that privacy information has certain effect safely; but owing to carrying out strict access control policy, the availability of the data sharing between the entity has been subject to certain restriction.2) adopt anonymous technology to protect privacy information; the method has played effectively protective effect to most privacy information; but do not consider that some privacy informations itself comprise the information relevant with personal identification; such as individual photo etc., therefore adopt privacy information protect of anonymous technology during data are shared to have certain restricted.The second, method for protecting privacy is for specific applied environment in the existing data sharing, such as point-to-point calculating, online community network etc., does not have versatility.
Summary of the invention
The purpose of this invention is to provide in a kind of data sharing based on the method for protecting privacy of trusting and replacing, use the method can realize in the data sharing process purpose to the entity privacy information protection.Use the method for replacing effectively to improve the availability of data sharing between the entity among the present invention, improve the success rate of sharing.
The present invention is by quantizing the information that comprises privacy; according to trusting the amount of information that comprises privacy of determining that entity can be shared; when the shared information of entity comprises the privacy information amount that can share above the trust of shared object, by the replacement of information being realized the purpose of data sharing and secret protection.By adjusting the corresponding relation of privacy information amount and trust so that the present invention can flexible Application among various data sharings are used.
The present invention takes following technical scheme.Based on the method for protecting privacy of trusting and replacing, realize that the whole framework of this method comprises the owner (hereinafter to be referred as the owner) of the information of sharing, object (hereinafter to be referred as object), privacy information amount computing module, information replacement module and the Trust Valuation Model of shared information in the data sharing.Wherein, can adopt multiple Trust Valuation Model to finish and realize the present invention, in the present invention, only use the result of trust evaluation and be indifferent to the process of trust evaluation.For the calculating of probability function, can adopt several different methods to calculate, such as methods such as utilization beta functions.
Method for protecting privacy based on information theory and trust is characterized in that, concrete steps are as follows:
1.) object sends the data sharing request to the owner;
2.) share information and choose, the information table that the user holds is shown D 1, D 2... D m∈ D (m is the integer more than or equal to 0), the data { D that the user is all 1, D 2... D mForming a logical data base, D is the space of user data.The owner chooses from data space D and prepares shared information, forms a set of preparing shared information.
3.) owner calls trust model, and object is done trust evaluation;
4.) owner calculates the amount of information of the privacy information that comprises in the information aggregate of preparing to share, and calculation procedure comprises following a few step:
4.1) the privacy information scope definition
For defining of privacy information scope, adopt the user to set the mode of setting combination with system default, if the user does not do setting, then defining by the system default setting of privacy information scope finished.In the user set, the keyword of the selected own privacy information of user was with set K{k/k ∈ (k 1, k 2... k n) (n is the integer more than or equal to 0) expression, and the feature of own privacy information, with set C{c/c ∈ (c 1, c 2... c o) (o is the integer more than or equal to 0) expression.System is that universally recognized, as to contain privacy information is processed as privacy information (can be with reference to the setting in " computer information system classified criteria for security protectil " (GB 1785921999) etc. to the default setting of privacy information.In this standard, the regulation sensitivity label is expression object level of security and one group of information describing the object data sensitive.Therefore, in the system with the information of sensitivity label, be defaulted as privacy information).The user arranges with the system default setting and combines, and forms the scope definition of privacy information, namely contains keyword { k/k ∈ (k 1, k 2... k n) or feature { c/c ∈ (c 1, c 2... c o) or in system default privacy information scope with interior information, be privacy information.
4.2) the privacy information screening
The information aggregate that the scanning owner prepares to share if a certain information belongs within the privacy information scope, is charged to set D ' { d/d ∈ (d to this information 1, d 2... d v) (v is the integer more than or equal to 1).
4.3) calculating of privacy amount
4.3.1) according to trust model, step 2) and the trust evaluation result and user's privacy protection policy, T aExpression discloses the required trust that reaches of privacy information, T bThe trust that the object of the shared information of expression has reached.Conditional probability P=prob (T a/ T b) be illustrated in and share information object and reached T bCondition be issued to and disclose the required trust T of this privacy information aProbability.Wherein, T aAnd T bType and value size decide according to the actual Trust Valuation Model of selecting, the span of conditional probability P is (0,1).Disclose a privacy information and need t credentials, P i=prob (T Ai/ T Bi) (i=1,2 ... t) i conditional probability in the needed t of the expression credentials.Wherein, i is the integer to t since 1, and the value of t is the integer more than or equal to zero, and concrete value is obtained by privacy protection policy.
4.3.2) the pretreatment condition probability, r 1, r 2... r uThe initial value of expression conditional probability P calculates
Figure GSA00000086102500031
Value, j is the integer to u since 1, then passes through preliminary treatment
The value of conditional probability P is designated as s later on 1, s 2... s u, the value of u is the integer more than or equal to 1;
4.3.3) for each the bar information among the set D ', calculate the amount of information H ' of each bar privacy information,
Figure GSA00000086102500032
A is the integer to u since 1.
4.3.4) the amount of information summation of every privacy information among the set D ',
Figure GSA00000086102500033
L is the integer from 1 to v, and H represents that all comprise the amount of information sum of privacy information during shared data set is closed.
5.) according to trust model and privacy protection policy; formulate the corresponding relation of trusting with the privacy information amount; namely for known trust, the amount of information scope that comprises privacy that can share determines, this corresponding relation is selected according to concrete trust model and privacy protection policy.If the H that calculates can share the amount of information of privacy information less than the trust (being drawn by step 2 trust evaluation) of object, then turn to 7), otherwise turn to 6);
6.) some data of user form a replacement data S set, the formation of replacement data set can be that the user chooses some data and gathers as an alternative in principal and subordinate's data space, also can be that system default is set, namely system's random some data of selecting from data space be gathered as an alternative.The information aggregate D ' that the comprises privacy { d/d ∈ (d for preparing to share for the owner 1, d 2... d v) (v=1,2, ...), wherein data (one or more) are replaced with data in the S set, execution in step 4.3) to step 5), if H can share the amount of information of privacy information less than the trust of object, the new data acquisition system that then the process replacement process is formed merges as shared data set and turns to 7), otherwise turn to 8);
7.) owner closes shared data set and object-sharing;
8.) data sharing failure finishes this data sharing.
The present invention proposes in a kind of data sharing based on the method for protecting privacy of trusting and replacing; the method can realize the purpose to the entity privacy information protection in data sharing; use the method for replacing effectively to improve the availability of data sharing between the entity, improve the success rate of data sharing.Among the present invention, the user can independently select the privacy information scope of oneself so that the present invention can flexible Application in various computing environment, very high adaptability and versatility are arranged.
Description of drawings
Fig. 1 application framework structure figure of the present invention
Fig. 2 application process flow chart of the present invention
Embodiment
Specific embodiment of the invention user's in the wireless point to point network data sharing is protected and reaches the purpose of data sharing as example to user's privacy information.
User A, B are the users of wireless network, and user A is ready to share with user B oneself some information (such as entertainment, photo, diary etc.).User B sends to user A and shares request of data, wherein, is not described in detail about trust evaluation and probability calculation computational process, only is concerned about the result of trust evaluation and probability calculation.
1. the information select to prepare shared of user A forms and shares information aggregate G, and G comprises three photos of user, 2 pieces of diaries, 1 film, 10 collection TV play;
2. user A calls trust model, and user B is done trust evaluation;
3. user A calculates the amount of information of the privacy information that comprises in the information of preparing to share, and comprises the steps:
3.1) the privacy information scope definition
The information table that user A holds is shown D 1, D 2... D m∈ D (m is the integer more than or equal to 0), the data { D that user A is all 1, D 2... D mForming a logical data base, D is the space of the data of user A.The keyword of the selected own privacy information of user A is A (being the Real Name of user A) and 26 years old (being the real age of user A), with set K{k/k ∈ (k 1, k 2) expression, and the feature of own privacy information " diary " and " photo ", with set C{c/c ∈ (c 1, c 2) expression.System to the default setting of privacy information with reference to the setting in " computer information system classified criteria for security protectil " (GB 1785921999), in the system with the information of responsive label as privacy information.The user arranges with the system default setting and combines, and forms the scope definition of privacy information, namely contains keyword { k/k ∈ (k 1, k 2) or feature { c/c ∈ (c 1, c 2) or in system default privacy information scope with interior information, be privacy information.
3.2) the privacy information screening
The information aggregate G that scan A prepare to be shared obtains three photos of user A, 2 pieces of diaries belong within the privacy information scope, and these 5 information are charged to set D ' { d/d ∈ (d 1, d 2... d 5) (v=1,2 ... 5)
3.3) calculating of privacy amount
3.3.1) according to trust model, step 2) and the trust evaluation result who draws and user's privacy protection policy, T a=0.9 expression discloses the required trust that reaches of privacy information " photo ", T bThe trust that=0.5 expression information sharing person B has reached, conditional probability P=prob (T a/ T b) be illustrated in B and reached T b=0.5 condition is issued to and discloses the required trust T of this privacy information a=0.9 probability.Disclose privacy information " photo " and need 3 credentials, P i=prob (T Ai/ T Bi) conditional probability of i in needed 3 credentials of (i=1,2,3) expression.Wherein, i be since 1 to 3 integer.
3.3.2) the pretreatment condition probability, r 1=0.6, r 2=0.8, r 3The=0.6th, the initial value of conditional probability P, s 1, s 2, s 3Be the value through conditional probability P after the preliminary treatment, calculate
Figure GSA00000086102500051
Value, draw s 1=0.3, s 2=0.4, s 3=0.3;
3.3.3) for the information " photo " among the set D ', calculate privacy information amount H ', Value, so k=2 draws H=1.0264.The privacy information amount of in like manner calculating " diary " is H=1.0212.
3.3.4) the amount of information sum of every privacy information among the set of computations D ', represent with H,
Figure GSA00000086102500053
Namely the summation of the privacy information amount of 3 " photos " and 2 pieces " diaries ", H=3*1.0264+2*1.0212=5.1216.
4. call trust model and privacy protection policy, according to the trust of A to B, the information that A and B share comprises the privacy information amount and is 5 to the maximum, and H=5.1216 has surpassed the amount of information that this trust can be shared privacy information, therefore need to do replacement to the data that A prepares to share;
5.A some data form a replacement data S set, data acquisition system " photo " wherein that user A prepare is shared replaces with the data " music " in the S set, execution in step 3.3) to step 4), the H that draws can share the amount of information of privacy information less than the trust of B;
6. the new shared data set that forms through replacement process being closed (2 pieces of diaries, 1 film, 10 collection TV play, 3 songs) shares with B.
By top example; can draw; close the privacy that has reduced user A through the shared data set of replacing; improved simultaneously the success rate of user A data sharing; because if work as A according to its trust model and privacy policy; the data of then preparing to share are subject to the restriction of secret protection, namely share in order to protect privacy to have to abandon this secondary data.Use the present invention, user A had both finished the purpose of data sharing, had effectively protected again the privacy information of A.
Employing the present invention can arrive the purpose that improves the data sharing success rate and effectively protect privacy.Among the present invention, the user can independently select the privacy information scope of oneself so that the present invention can flexible Application among various computing environment, have good compatibility and applicability.

Claims (1)

  1. In the data sharing based on the method for protecting privacy of trusting and replacing, it is characterized in that, the whole framework of realizing this method comprises the owner of the information of sharing, the object of shared information, privacy information amount computing module, information replacement module and Trust Valuation Model, wherein share the owner of information, hereinafter to be referred as the owner, share the object of information, hereinafter to be referred as object; Step is as follows:
    1.) object sends the data sharing request to the owner;
    2.) share information and choose, the information table that the owner holds is shown D 1, D 2... .D m∈ D, m are the integers greater than 0, all data { D 1, D 2... .D mForming a logical data base, D is data space; The owner chooses from data space D and prepares shared information, forms a set of preparing shared information;
    3.) owner calls trust model, and object is done trust evaluation;
    4.) owner calculates the amount of information of the privacy information that comprises in the information aggregate of preparing to share, and calculation procedure comprises following a few step:
    4.1) the privacy information scope definition
    For defining of privacy information scope, adopt the owner to set the mode of setting combination with system default, if the owner does not do setting, then defining by the system default setting of privacy information scope finished; In the owner set, the keyword of the selected own privacy information of the owner was with set K{k/k ∈ (k 1, k 2... k n) expression, n is the integer greater than 0; And the feature of own privacy information, with set C{c/c ∈ (c 1, c 2... .c o) represent that o is the integer greater than 0; The owner arranges with the system default setting and combines, and forms the scope definition of privacy information, namely contains keyword { k/k ∈ (k 1, k 2... .k n) or feature { c/c ∈ (c 1, c 2... .c o) or in system default privacy information scope with interior information, be privacy information;
    4.2) the privacy information screening
    The information aggregate that the scanning owner prepares to share if a certain information belongs within the privacy information scope, is charged to set D ' { d/d ∈ (d to this information 1, d 2... .d v), v gets the integer greater than 0;
    4.3) calculating of privacy amount
    4.3.1) according to trust model, step 2) and trust evaluation result and possessory privacy protection policy, T aExpression discloses the required trust that reaches of privacy information, T bThe trust that the object of the shared information of expression has reached; Conditional probability P=prob (T a/ T b) be illustrated in and share information object and reached T bCondition be issued to and disclose the required trust T of this privacy information aProbability; The span of conditional probability P is (0,1); Disclose a privacy information and need t credentials, P i=prob (T Ai/ T Bi) the individual conditional probability of i in the expression needed t credentials; Wherein, i is the integer to t since 1, and the value of t is the integer more than or equal to 1;
    4.3.2) the pretreatment condition probability, r 1, r 2... .r uThe initial value of expression conditional probability P calculates
    Figure FSB00000971546600021
    Value, wherein, j gets since 1 to u integer, then the value through conditional probability P after the preliminary treatment is designated as s 1, s 2... .s u, the value of u is the integer greater than zero;
    4.3.3) for each the bar information among the set D ', calculate the amount of information H ' of each bar privacy information, H ′ = - k ( Σ a = 1 u s a log s a ) , Wherein, Σ a = 1 u s a = 1 , k = r 1 + r 2 + · · · · + r u , A is the integer to u since 1;
    4.3.4) the amount of information summation of every privacy information among the set D ',
    Figure FSB00000971546600024
    L is the integer from 1 to v, and H represents that all comprise the amount of information sum of privacy information during shared data set is closed;
    5.) according to trust model and privacy protection policy, formulate the corresponding relation of trusting with the privacy information amount, namely for known trust, the amount of information scope that comprises privacy that can share determines, this corresponding relation is selected according to concrete trust model and privacy protection policy; If the H that calculates can share the amount of information of privacy information less than the trust of object, the trust of object is by step 3) trust evaluation draw, then turn to 7), otherwise turn to 6);
    6.) more possessory data form a replacement data S set, the formation of replacement data set is that the owner chooses some data and gathers as an alternative in principal and subordinate's data space, perhaps system default is set, and namely system's random some data of selecting from data space are gathered as an alternative; The information aggregate D ' that the comprises privacy { d/d ∈ (d for preparing to share for the owner 1, d 2... .d v), wherein, v gets the integer greater than 0, be wherein one or more data replacement data in the S set, execution in step 4.3)-5), if H can share the amount of information of privacy information less than the trust of object, the new data acquisition system that then the process replacement process is formed merges as shared data set and turns to 7), otherwise turn to 8);
    7.) owner closes shared data set and object-sharing;
    8.) share data failure, finish this and share.
CN 201010152506 2010-04-16 2010-04-16 Trust and replacement-based privacy information protection method in data sharing Expired - Fee Related CN101834858B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010152506 CN101834858B (en) 2010-04-16 2010-04-16 Trust and replacement-based privacy information protection method in data sharing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010152506 CN101834858B (en) 2010-04-16 2010-04-16 Trust and replacement-based privacy information protection method in data sharing

Publications (2)

Publication Number Publication Date
CN101834858A CN101834858A (en) 2010-09-15
CN101834858B true CN101834858B (en) 2013-04-03

Family

ID=42718789

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010152506 Expired - Fee Related CN101834858B (en) 2010-04-16 2010-04-16 Trust and replacement-based privacy information protection method in data sharing

Country Status (1)

Country Link
CN (1) CN101834858B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704930A (en) * 2017-09-25 2018-02-16 阿里巴巴集团控股有限公司 Modeling method, device, system and electronic equipment based on shared data

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104008345B (en) * 2013-02-27 2018-09-04 腾讯科技(深圳)有限公司 Guard method to the privacy of user data of application program and device
CN103327183B (en) * 2013-06-13 2015-05-20 中国科学院信息工程研究所 Black box protecting method and system for private data of Android user based on tag
CN104573532A (en) * 2013-10-29 2015-04-29 镇江睿泰信息科技有限公司 Privacy protection method orienting data sharing
CN104219304A (en) * 2014-09-01 2014-12-17 北京优特捷信息技术有限公司 Device and method for protecting privacy information of users
CN105991670B (en) * 2015-01-28 2020-02-14 中兴通讯股份有限公司 Data sharing method, data sharing device and terminal
US11088834B2 (en) * 2015-04-28 2021-08-10 Palo Alto Research Center Incorporated System for privacy-preserving monetization of big data and method for using the same
KR20160140185A (en) * 2015-05-29 2016-12-07 삼성전자주식회사 Device and method for performing communication service
CN105590066B (en) * 2015-12-02 2018-08-10 中国银联股份有限公司 The safe fusion method of big data of privacy is not revealed
CN107944299B (en) * 2017-12-29 2020-03-03 西安电子科技大学 Method, device and system for processing privacy information
CN110138778B (en) * 2019-05-15 2020-05-08 福州大学 Game theory-based network attack risk control method and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1845545A (en) * 2006-03-14 2006-10-11 武汉大学 Method for directly sharing private communication information

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7496578B2 (en) * 1999-11-04 2009-02-24 Aol Llc Shared internet storage resource, user interface system, and method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1845545A (en) * 2006-03-14 2006-10-11 武汉大学 Method for directly sharing private communication information

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Feng Gao et al..A Quantifying Metric for Privacy Protection Based on Information Theory.《Intelligent Information Technology and Security Informatics》.2010,第216-220页. *
邹妍等.XML信息共享中隐私保护技术研究.《赤峰学院学报(自然科学版)》.2010,第26卷(第2期),第35-37页. *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704930A (en) * 2017-09-25 2018-02-16 阿里巴巴集团控股有限公司 Modeling method, device, system and electronic equipment based on shared data
CN107704930B (en) * 2017-09-25 2021-02-26 创新先进技术有限公司 Modeling method, device and system based on shared data and electronic equipment

Also Published As

Publication number Publication date
CN101834858A (en) 2010-09-15

Similar Documents

Publication Publication Date Title
CN101834858B (en) Trust and replacement-based privacy information protection method in data sharing
CN106127075B (en) Encryption method can search for based on secret protection under a kind of cloud storage environment
KR101735136B1 (en) A privacy vault for maintaining the privacy of user profiles
CN102843366B (en) A kind of network resource accession authority control method and device
EP3061280B1 (en) A method for anonymization of data collected within a mobile communication network
CN108418681A (en) A kind of searching ciphertext system and method based on attribute for supporting proxy re-encryption
CN109951498A (en) A kind of block chain access control method and device based on ciphertext policy ABE encryption
WO2017176075A1 (en) Private data aggregation framework for untrusted servers
CA2834785A1 (en) Method for handling privacy data
CN105592085B (en) The method for secret protection of facing position perception recommender system
CN101493874B (en) Personal context information privacy protection policy automatic generating method
CN102111407B (en) Access control privacy protection method using user as center
CN105072165B (en) Control method and device are locally stored in a kind of data based on mixed mode mobile application
CN109194664B (en) Mobile position privacy protection access control method based on game theory
CN110413652A (en) A kind of big data privacy search method based on edge calculations
CN108234493A (en) The space-time crowdsourcing statistical data dissemination method of secret protection under insincere server
CN107484178A (en) A kind of two-way frequency spectrum distributing method of approximate auctioneer's maximum revenue
CN105407482A (en) Protection method for user location privacy in mobile crowd sensing network
CN110892403B (en) Method for securely accessing data
CN105809552A (en) Insurance actuarial system and method based on search keywords
CN109728904A (en) A kind of spatial network querying method for protecting privacy
CN104717292A (en) Position privacy protection method combining k-anonymity and cloud end
CN101841529B (en) Privacy information protection method based on informationism and trust
CN111241583A (en) Wearable device classification attribute personalized local differential privacy protection method and system
CN107742141B (en) Intelligent identity information acquisition method and system based on RFID technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130403

Termination date: 20160416

CF01 Termination of patent right due to non-payment of annual fee