CN101977111A - Anti-spam method based on privacy protection - Google Patents

Anti-spam method based on privacy protection Download PDF

Info

Publication number
CN101977111A
CN101977111A CN 201010515792 CN201010515792A CN101977111A CN 101977111 A CN101977111 A CN 101977111A CN 201010515792 CN201010515792 CN 201010515792 CN 201010515792 A CN201010515792 A CN 201010515792A CN 101977111 A CN101977111 A CN 101977111A
Authority
CN
China
Prior art keywords
main body
voice mailbox
sub voice
mailbox
email address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 201010515792
Other languages
Chinese (zh)
Other versions
CN101977111B (en
Inventor
何泾沙
徐晶
张玉强
徐菲
马书南
张旸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN2010105157928A priority Critical patent/CN101977111B/en
Publication of CN101977111A publication Critical patent/CN101977111A/en
Application granted granted Critical
Publication of CN101977111B publication Critical patent/CN101977111B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides an anti-spam method based on privacy protection, belonging to the computer network security field. The method is applicable to internet in which email address information needs to be protected. In the method, the frequently-used email address of a user is protected as privacy information without disclosure on the premise of guaranteeing smooth network interaction; and a sub-email address code with term of validity which can be flexibly controlled by the user replaces the frequently-used email address, and the frequently-used email address of the user is hidden as the privacy information, wherein, the sub-email address code is generated according to the email address, the system time and the random number of an interaction party and only used in the case of one-on-one communication between the specific interaction party and the user. The anti-spam method of the invention can keep the frequently-used email address of the user unpublished, emphasize autonomy of the user, and help the user independently judge and identify a spam and stop sending the spam from a source.

Description

A kind of method of the anti-rubbish mail based on secret protection
Technical field
The present invention proposes a kind of under network environment, not only can well protect the subscriber mailbox privacy information, and can effectively prevent the interference of spam and be easy to find the method in the source of spam.Achievement of the present invention is based on anti-rubbish mail model and the method that user's email address commonly used is protected as privacy information, and can be used in needs network application that email address information is protected and spam and source are stoped and search in the Internet.
Background technology
Existing anti-rubbish mail method is a kind of to be to utilize to make laws and regulations to retrain the spam transmit leg, another kind takes technological means to filter in mail server side or user side exactly, and underground oneself the email address of user also is a kind of method, but the strick precaution that this user self has no control under existing interactive mode is weak tendency very, also influence mutual carrying out to a certain extent, in case there is certain network interaction side to obtain user's email address commonly used, the insecurity of network has been easy to cause the permanent leakage of user address commonly used, and user's address commonly used is in case leak, the user does not just have other way to allow it become security information again, user self does not just have ability to reject spam again, and all hope can only be placed on the anti-spam technologies that service provider takes.
Taking technological means is the main method of present anti-rubbish mail, how to find otherwise effective technique fundamentally to address this problem to be main research direction now.The technology of present anti-rubbish mail is the Spam filtering technology of starting with from server end basically, from two aspect classification the filtering technique of distinguishing from the role is arranged, and comprises MAT filtering technique, MDA filtering technique, MIJA filtering technique; From the filtering technique that method is distinguished, comprise filtering technique based on key character, based on the filtering technique of white list based on the filtering technique of blacklist, inverse dns nailing technology, rule-based filtering technique, content-based filtering technique and other filtrating mail technology.These technology have solved a large amount of problem of transmission of spam to a certain extent, but the spam transmit leg also should have new anti-filtering technique to occur mutually, as long as user's email address is arranged, always spam sends the blockade of way breakthrough in delivery of mail process arranged, arrive the destination.
To fundamentally solve the problem that spam spreads unchecked; effective method is exactly that user's email address is protected as privacy information; do not leak to any network interaction side; certainly; this will guarantee under the prerequisite that network interaction can normally carry out; meaningful to user's mailbox commonly used ability of maintaining secrecy, but email address as privacy information protect into the method for the research anti-rubbish mail on basis now also seldom.The present invention realizes a kind of anti-rubbish mail model and method based on secret protection from this source research.
Summary of the invention
The objective of the invention is to utilize a kind of new method for secret protection; user's email address commonly used is effectively protected as privacy information; by changing the network service interactive mode; and adopt the sub voice mailbox address code to replace the method protection user email address commonly used of user's email address commonly used; the user can be autonomous these sub voice mailbox address codes of flexible control; so that autonomous the examination determined spam; find the sender of spam easily; and effectively stop the reception of spam, in time report the spammer.This method is guaranteeing under the prerequisite that network interaction carries out smoothly, on the basis of effectively having protected user privacy information, fundamentally solution spam problem, as shown in Figure 1.
Set membership mailbox tactic pattern is adopted in global design of the present invention.Mailbox commonly used is laid special stress on protecting as user privacy information; carry out in user and other people or other website when mutual; if user's email address need be provided; the user just logins its mailbox server commonly used; mailbox commonly used as father's mailbox; application generates a sub-email address code; this sub voice mailbox address code is only used when mutual for user and specific other people or website; flexibility is strong; not only comprise email address with other people or website of user interactions; also comprise random number information and current time in system; and can be according to the valid expiration date of the mutual situation setting of both sides; cipher mode; security parameters such as digital signature; after the sub voice mailbox address code generates; its contained information is stored by father's mailbox and is bound with father's mailbox; the sub voice mailbox address code that user uncle's mailbox obtains generating; pass to mutual side; so mutual side just also can exchange with the user by this sub voice mailbox address code under the prerequisite that does not obtain user's email address commonly used; father's mailbox is when generating sub voice mailbox address code and storage; the user can independently select the function of this sub voice mailbox address code to open or close; and change sub voice mailbox address code valid expiration date, even cancel this sub voice mailbox address code.Find not only to send the service of some customization to the user by the mutual with it website of this sub voice mailbox address code as the user, also send the unwanted at all spam of some users, the user can close this mailbox or cancel, like this, not only be easy to determine the source of spam, this spam incident of processing that can also independent and flexible.When the user finds that the mail that receives by certain sub voice mailbox address code is the unwanted spam of user, the user can know easily that this is the sub voice mailbox address code with which mutual website, also just known it is the spam which website sends, like this, if the service that the user also needs this website to provide, that just can be linked up with this website, wish that they are not again to the spam of user's transmission except that customize services, linking up successfully, this sub voice mailbox continues to use, avoided the influence of spam, if link up unsuccessful, that user can independently cancel or close this sub voice mailbox address code function, even can report this website behavior to anti-garbage mail system or department.
In the network interaction process, user's Website login and other user interactions often need to fill in user's email address, in our convenient interchange, have also produced a lot of problems, as the leakage of spam, email address.Design a kind of novel mailbox secret protection model at this, adopted this model fundamentally to address this problem.
The present invention has taked following technical scheme.Based on the anti-rubbish mail method of secret protection, the whole framework of realizing this method comprises the owner user of mailbox commonly used, mailbox server and with other people or website of user interactions.The owner user of mailbox commonly used is a main body A, with other people or website of user interactions be object B, mailbox server is C,, this method overall procedure such as Fig. 2 may further comprise the steps:
(1) main body A need be carried out alternately with other people or website object B, and B needs the email address of A to communicate.
(2) main body A detects the email address of whether having known object B.Divide two class situation I and II.
I. detect successfully, main body A obtains the email address of object B.
1) main body A signs in to mail server C, according to email address and random number and the current time in system of object B, uses the SHA-1 algorithm to produce eap-message digest, and uses RSA Algorithm that summary is carried out digital signature, generates the sub voice mailbox address code.
2) main body A obtains the sub voice mailbox address code that mail server C generates according to application information, the mailbox commonly used of sub voice mailbox address code and main body A is bound, and in mailbox commonly used, preserve all sub voice mailbox information, making things convenient for main body A according to mutual situation this sub voice mailbox to be managed afterwards with in the object B reciprocal process, and this sub voice mailbox tentatively is provided with: the security parameters such as abbreviation, interactive service keyword and cipher mode, digital signature that the term of validity, the sub voice mailbox of sub voice mailbox are set.
3) main body A sends to object B to this sub voice mailbox address code, with this as only for the mutual means of communication of using between A, B.
4) object B posts a letter to main body A by the sub voice mailbox address code.
5) main body A verifies to the ID of the mail sender by the communication of sub voice mailbox address code whether sender's email address is identical with the email address of object B, is, the mail that sends to the sub voice mailbox address code is received by master mailbox, otherwise, be rejected.
So just realized and have only main body A and object B to use this sub voice mailbox address code to carry out alternately.The mail that mails to object B from main body A also sends by the sub voice mailbox address, but in communication process concerning main body A the sub voice mailbox address code be transparent.The mail sender who shows in the terminal of object B is the sub voice mailbox address code, rather than the mailbox commonly used of main body A.
II. detect failure, main body A is not known the email address of object B.
1) main body A signs in to mail server C, will be according to random number and current time in system under the situation of the email address of default object B, use the SHA-1 algorithm to produce eap-message digest, and use RSA Algorithm that summary is carried out digital signature, generate special sub voice mailbox address code, simultaneously the mailbox commonly used of special sub voice mailbox address code and main body A is bound, and the information of in mailbox commonly used, preserving all special sub voice mailbox, to make things convenient for main body A this sub voice mailbox is managed.Main body A is open with special sub voice mailbox address code.
2) main body A obtains the special sub voice mailbox address code that mail server C generates according to application information, and special sub voice mailbox tentatively is provided with: the security parameters such as abbreviation, interactive service keyword and cipher mode, digital signature that the term of validity, the sub voice mailbox of sub voice mailbox are set.
3) main body A is told object B special sub voice mailbox address code.
4) object B posts a letter to main body A by special sub voice mailbox address code.
5) special sub voice mailbox address will send the commonly used mailbox of a prompting message to main body A, and this prompting message comprises sender, mail matter topics, outbox time and mail size, information such as mail keyword.
6) main body A is checked prompting message.Interested in the mail, in mailbox commonly used, collect this mail, main body A has just obtained the email address of mutual with it object B like this, to repeat above-mentioned I process, main body A sends to B to sub-email address code of mail server C application, and this sub voice mailbox address code is only for using alternately between A and the B.Main body A is lost interest in to prompting message, thinks that spam just blacklists it, and mail will be deleted automatically.
Use this method that email address commonly used is had a following feature as what user privacy information was protected:
1) different with traditional approach; when user and website are mutual among the present invention; need not directly tell mutual website the email address commonly used of oneself; but the address code of sub voice mailbox flexibly of utilizing a special use replaces email address commonly used; by this sub voice mailbox address; user's mutual website directly sends to user's required service information user's mailbox commonly used, has so not only protected user's email address commonly used but also has finished whole interactive service process.
2) design of antithetical phrase email address code is customer-centric, has characteristics such as provisional, managerial flexibility, and sub voice mailbox is to be generated by user's mailbox commonly used, replace user's email address commonly used to come receiving and dispatching mail, but it has specificity.
3) the present invention is based on the user, considers the difference preference of different user and to different the defining of spam, autonomous spam is positioned and handles flexibly, and according to the mutual situation flexible management sub voice mailbox address code of website.
Description of drawings
Fig. 1 overall application procedure chart of the present invention
The main frame structure applicating flow chart of Fig. 2 the present invention
Embodiment
Illustrate under the prerequisite how the present invention guaranteeing to finish alternately smoothly in user and website in reciprocal process at user and site for service with an example below; protected user's email address information not obtained by irrelevant third party; illustrate and utilize the present invention can well solve the spam problem; and know easily and the source of spam can effectively solve the spam problem from the source.Three instance entity are arranged, main body A-user, object B-weather forecast service website, mailbox server C-Netease mailbox server, flow process and step such as Fig. 2 in this example.
1) user A logins weather forecast service website B, customizes the weather forecast information of half a year, and weather forecast website B needs user A that his email address commonly used is provided, so that the weather forecast information of customization is sent to subscriber mailbox on time.
2) user A is known email address to network address from weather forecast website B, but does not want email address commonly used is informed this website, to prevent this website it is let out, and perplexed by problems such as spam.
3) just login its email address commonly used place mailbox server C of Netease, according to email address, random number, the current time in system of weather forecast service website B, use the SHA-1 algorithm to produce eap-message digest, and use RSA Algorithm that summary is carried out digital signature, generate a sub-email address code.
4) user A obtains the sub voice mailbox address code that mail server C generates according to application information, bundle email address code and user A mailbox commonly used is bound, and in mailbox commonly used, preserve all sub voice mailbox information, according to mutual situation this sub voice mailbox is managed afterwards with in the object B reciprocal process to make things convenient for main body A.This sub voice mailbox tentatively is provided with: sub voice mailbox valid expiration date is 6 months, sub voice mailbox abbreviate the weather forecast mailbox as, the customize services keyword is a weather, cipher mode adopts des encryption, uses information such as digital signature.
5) user A sends to weather forecast service website B to this sub voice mailbox address code, with this as only for the mutual means of communication of using between A, B.
6) weather forecast website B sends weather forecast information to user A by the sub voice mailbox address code.
7) user A verifies the ID of the mail sender by the communication of sub voice mailbox address code, whether sender's email address is identical with the email address of weather forecast website B, is, the mail that sends to the sub voice mailbox address code is received by master mailbox, otherwise, be rejected.So just realized and have only user A and weather forecast website B to use this sub voice mailbox address code to carry out alternately.The mail that mails to weather forecast website B from user A also sends by the sub voice mailbox address, but in communication process concerning user A the sub voice mailbox address code be transparent.
8) the mail sender who shows in the terminal of weather forecast website B is the sub voice mailbox address code, rather than the mailbox commonly used of user A.
After this, the user can be according to finishing the change and the setting of antithetical phrase mailbox functions by the flexible management of sub voice mailbox with the mutual situation in weather forecast website.
The present invention uses the secret protection technology; make that the user can be according to the privacy needs of oneself; antithetical phrase email address code manages flexibly; can find the sender of spam fast and accurately; fundamentally stop the generation of spam incident, protected user's mailbox privacy information commonly used.
Above example only is an implementation example of the present invention; only be used for better illustrating function of the present invention and flow process; do not represent the present invention to only limit to this exemplary application; all in spirit of the present invention, principle and technical scope; the modification of being made, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (1)

1. method based on the anti-rubbish mail of secret protection is characterized in that:
The owner user of mailbox commonly used is a main body A, with other people or website of user interactions be object B, mailbox server is C; Overall procedure technology performing step is as follows:
(1) main body A need be carried out alternately with other people or website object B, and B needs the email address of A to communicate;
(2) main body A detects the email address of whether having known object B; Divide following two class situation I and II.
I. when detecting successfully, main body A obtains the email address of object B:
A) main body A signs in to mail server C, according to email address and random number and the current time in system of object B, uses the SHA-1 algorithm to produce eap-message digest, and uses RSA Algorithm that summary is carried out digital signature, generates the sub voice mailbox address code;
B) main body A obtains the sub voice mailbox address code that mail server C generates according to application information, the mailbox commonly used of sub voice mailbox address code and main body A is bound, and in mailbox commonly used, preserve all sub voice mailbox information, making things convenient for main body A according to mutual situation this sub voice mailbox to be managed afterwards with in the object B reciprocal process, and this sub voice mailbox tentatively is provided with: the term of validity, abbreviation, interactive service keyword and the cipher mode of sub voice mailbox, these security parameters of digital signature that sub voice mailbox is set at least;
C) main body A sends to object B to this sub voice mailbox address code, with this as only for the mutual means of communication of using between A, B;
D) object B posts a letter to main body A by the sub voice mailbox address code;
E) main body A verifies to the ID of the mail sender by the communication of sub voice mailbox address code whether sender's email address is identical with the email address of object B, is, the mail that sends to the sub voice mailbox address code is received by master mailbox, otherwise, be rejected;
If II. detect failure, main body A is not known the email address of object B:
1) main body A signs in to mail server C, will be according to random number and current time in system under the situation of the email address of default object B, produce eap-message digest, and summary carried out digital signature, generate special sub voice mailbox address code, simultaneously the mailbox commonly used of special sub voice mailbox address code and main body A is bound, and the information of in mailbox commonly used, preserving all special sub voice mailbox, to make things convenient for main body A this sub voice mailbox is managed; Main body A is open with special sub voice mailbox address code;
2) main body A obtains the special sub voice mailbox address code that mail server C generates according to application information, and special sub voice mailbox tentatively is provided with: the term of validity, abbreviation, interactive service keyword and the cipher mode of sub voice mailbox, these security parameters of digital signature that sub voice mailbox is set at least;
3) main body A is told object B special sub voice mailbox address code;
4) object B posts a letter to main body A by special sub voice mailbox address code;
5) special sub voice mailbox address will send the commonly used mailbox of a prompting message to main body A, and this prompting message comprises sender, mail matter topics, outbox time and mail size, mail keyword;
6) main body A is checked prompting message; If it is interested in the mail, in mailbox commonly used, collect this mail, main body A has just obtained the email address of mutual with it object B like this, to repeat above-mentioned I process, main body A sends to B to sub-email address code of mail server C application, and this sub voice mailbox address code is only for using alternately between A and the B; If main body A is lost interest in to prompting message, think that spam just blacklists it, mail will be deleted automatically.
CN2010105157928A 2010-10-15 2010-10-15 Anti-spam method based on privacy protection Expired - Fee Related CN101977111B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105157928A CN101977111B (en) 2010-10-15 2010-10-15 Anti-spam method based on privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105157928A CN101977111B (en) 2010-10-15 2010-10-15 Anti-spam method based on privacy protection

Publications (2)

Publication Number Publication Date
CN101977111A true CN101977111A (en) 2011-02-16
CN101977111B CN101977111B (en) 2012-08-15

Family

ID=43576960

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105157928A Expired - Fee Related CN101977111B (en) 2010-10-15 2010-10-15 Anti-spam method based on privacy protection

Country Status (1)

Country Link
CN (1) CN101977111B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663321A (en) * 2012-04-24 2012-09-12 百度在线网络技术(北京)有限公司 Security enhancement system and method for software
CN102685354A (en) * 2011-03-18 2012-09-19 日本冲信息株式会社 Information processing apparatus, multi function printer, and image reading apparatus
CN102843313A (en) * 2012-09-27 2012-12-26 深圳中兴网信科技有限公司 Safety management system of e-mail address and safety management method
CN104463605A (en) * 2014-12-19 2015-03-25 百度在线网络技术(北京)有限公司 Coupon code anti-cheating method and device
CN104660485A (en) * 2013-11-22 2015-05-27 腾讯科技(深圳)有限公司 Message processing method, device and system
CN107743111A (en) * 2016-10-27 2018-02-27 腾讯科技(深圳)有限公司 A kind of E-mail processing method, device and system
CN108737443A (en) * 2018-06-14 2018-11-02 北京大学 A kind of concealment mail address method based on cryptographic algorithm
CN111049738A (en) * 2019-12-24 2020-04-21 杭州安司源科技有限公司 E-mail data security protection method based on hybrid encryption

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040193685A1 (en) * 2003-03-31 2004-09-30 Sony Corporation/Sony Electronics, Inc. Method and apparatus for managing and sharing personal identities in a peer-to-peer environment
CN1601540A (en) * 2004-10-25 2005-03-30 汤溪蔚 Method of preventing electronic refuse mail
CN1794284A (en) * 2005-12-26 2006-06-28 上海洲信信息技术有限公司 Method and system of realizing single account multiuser of electron mail box
US20090259725A1 (en) * 2008-04-14 2009-10-15 Case Western Reserve University Email consumer reputation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040193685A1 (en) * 2003-03-31 2004-09-30 Sony Corporation/Sony Electronics, Inc. Method and apparatus for managing and sharing personal identities in a peer-to-peer environment
CN1601540A (en) * 2004-10-25 2005-03-30 汤溪蔚 Method of preventing electronic refuse mail
CN1794284A (en) * 2005-12-26 2006-06-28 上海洲信信息技术有限公司 Method and system of realizing single account multiuser of electron mail box
US20090259725A1 (en) * 2008-04-14 2009-10-15 Case Western Reserve University Email consumer reputation

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685354A (en) * 2011-03-18 2012-09-19 日本冲信息株式会社 Information processing apparatus, multi function printer, and image reading apparatus
CN102663321A (en) * 2012-04-24 2012-09-12 百度在线网络技术(北京)有限公司 Security enhancement system and method for software
CN102843313A (en) * 2012-09-27 2012-12-26 深圳中兴网信科技有限公司 Safety management system of e-mail address and safety management method
CN102843313B (en) * 2012-09-27 2015-05-20 深圳中兴网信科技有限公司 Safety management system of e-mail address and safety management method
CN104660485A (en) * 2013-11-22 2015-05-27 腾讯科技(深圳)有限公司 Message processing method, device and system
CN104463605A (en) * 2014-12-19 2015-03-25 百度在线网络技术(北京)有限公司 Coupon code anti-cheating method and device
CN107743111A (en) * 2016-10-27 2018-02-27 腾讯科技(深圳)有限公司 A kind of E-mail processing method, device and system
CN108737443A (en) * 2018-06-14 2018-11-02 北京大学 A kind of concealment mail address method based on cryptographic algorithm
CN108737443B (en) * 2018-06-14 2020-06-02 北京大学 Method for hiding mail address based on cryptographic algorithm
CN111049738A (en) * 2019-12-24 2020-04-21 杭州安司源科技有限公司 E-mail data security protection method based on hybrid encryption

Also Published As

Publication number Publication date
CN101977111B (en) 2012-08-15

Similar Documents

Publication Publication Date Title
CN101977111B (en) Anti-spam method based on privacy protection
Hall How to avoid unwanted email
US7711786B2 (en) Systems and methods for preventing spam
CN1535424B (en) Server for processing message
US8572696B1 (en) Contextual data aided security protection
CN1801694B (en) Secure safe sender list
US8090788B2 (en) Method and system for filtering electronic messages
CN109462483A (en) Mail based on block chain deposits card method, apparatus, equipment and storage medium
WO2004107137A2 (en) Method and code for authenticating electronic messages
US20060053202A1 (en) Method and system implementing secure email
CN102918810A (en) Trusted e-mail communication in a multi-tenant environment
CN102202006B (en) Registered E-mail transmission method
CN103973713A (en) Transfer method, extraction method and processing system for electronic mail information
CN105100093B (en) A kind of identity authentication method and server
CN105474585A (en) Private tokens in electronic messages
JP6909233B2 (en) How to authenticate an email containing a certified digital signature on the part of the telecommunications carrier
CN103684981B (en) Instant communication interdynamic method, system and server
CN105323254A (en) A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof
CN103986724B (en) Email real name identification method and system
CN108420290A (en) A kind of method and system of express delivery cabinet compatibility mailbox
CN102413070B (en) Junk mail preventing method for setting rules by addressor
US20100057874A1 (en) Preventing wrongful transmission of message content
CN105450502B (en) The Email that software-oriented defines network denies suppression system and its suppressing method
Roman et al. Protection against spam using pre-challenges
CN107690780B (en) Message sender, receiver, server, method, and computer-readable medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120815

Termination date: 20161015