CN102004868A - Role access control-based information system data storage layer and building method - Google Patents

Role access control-based information system data storage layer and building method Download PDF

Info

Publication number
CN102004868A
CN102004868A CN2009101949427A CN200910194942A CN102004868A CN 102004868 A CN102004868 A CN 102004868A CN 2009101949427 A CN2009101949427 A CN 2009101949427A CN 200910194942 A CN200910194942 A CN 200910194942A CN 102004868 A CN102004868 A CN 102004868A
Authority
CN
China
Prior art keywords
user
role
data
data table
infosystem
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009101949427A
Other languages
Chinese (zh)
Inventor
潘毅民
沙洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sanda University
Original Assignee
Sanda University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sanda University filed Critical Sanda University
Priority to CN2009101949427A priority Critical patent/CN102004868A/en
Publication of CN102004868A publication Critical patent/CN102004868A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a role access control-based information system data storage layer and a building method. User name, password and login times of information system registered users are stored through a user data table; a plurality of roles with access authorities of different levels are stored through a role data table; and a matching relationship between the users and the roles is stored through a user and role relationship data table. The data tables of the data storage layer are called by an information system to realize modification of system user information and matching between the users and the roles and further fulfill the purpose of endowing and controlling the access authorities of the users.

Description

A kind of data of information system accumulation layer and construction method based on role access control
Technical field
The present invention relates to the data information system data storage technology, more particularly, relate to a kind of data of information system accumulation layer and construction method based on role access control.
Background technology
At present increasing need of work uses various infosystems, and the security of infosystem more and more obtains people's attention, for example aspect the access control of infosystem, just need to pay attention to its security, in an infosystem, have the different various users of rank, specific user can only visit specific data, if and safety practice is not in place, the user can be occurred so and the data that it should not be visited can be had access to, thereby cause accident such as divulge a secret, cause the loss that is difficult to retrieve just may for country and enterprise.
As seen need carry out the design of related security policies for the user capture of infosystem, thereby reach the purpose that the visit of different user is controlled.Relevant security strategy comprises the user's control strategy based on role authorization, and for using this tactful infosystem, its data storage layer also is a problem to be solved.
Summary of the invention
The object of the present invention is to provide a kind of data of information system accumulation layer and construction method based on role access control, the tables of data by this data storage layer realizes purpose that the visit of different user is controlled.
According to a first aspect of the invention, provide a kind of data of information system accumulation layer, comprising based on role access control:
User data table is in order to user name, password and the login times of storing described infosystem registered user;
The role data table, in order to store some roles with different stage access rights, described each role's access rights comprise the set of some access profiles of described data of information system;
User and role relation tables of data are in order to store described user and role's matching relationship.
Described user data table in order to the user registration that realizes described infosystem, add user and deletion user, user's login times of described user data table storage adds one in the described infosystem of the every login of described user after once.
Interpolation role and the deletion role of described role data table in order to realize described infosystem, described role data table character stored name is as the major key with unique ID of this tables of data.
Described user and role relation tables of data are carried out the operation that described role adds user, deletion user role and inquiring user role in order to realize described infosystem, the user of described user and role relation data table stores and role's matching relationship comprises one to one, one-to-many and many-one.
On the other hand, the present invention also provides a kind of construction method of the data of information system accumulation layer based on role access control, may further comprise the steps:
Set up user data table, make its user name of storing described infosystem registered user, password and login times;
Set up the role data table, make its some roles with different stage access rights of storage, described each role's access rights comprise the set of some access profiles of described data of information system;
Set up user and role relation tables of data, make it store described user and role's matching relationship;
Described infosystem user data, role data and user and role relation data are write the data storage layer of described tables of data formation based on data table stores.
Described user data table in order to the user registration that realizes described infosystem, add user and deletion user, user's login times of described user data table storage adds one in the described infosystem of the every login of described user after once.
Interpolation role and the deletion role of described role data table in order to realize described infosystem, described role data table character stored name is as the major key with unique ID of this tables of data.
Described user and role relation tables of data are carried out the operation that described role adds user, deletion user role and inquiring user role in order to realize described infosystem, the user of described user and role relation data table stores and role's matching relationship comprises one to one, one-to-many and many-one.
Adopt a kind of data of information system accumulation layer and construction method of the present invention based on role access control, store described infosystem registered user's user name, password and login times by user data table, by the some roles of role data table storage, by user and described user of role relation data table stores and role's matching relationship with different stage access rights.These tables of data of this data storage layer are called for infosystems, realize the coupling between modification, user and the role of system user information, and then realize purpose that user's access rights are given and controlled.
Description of drawings
Fig. 1 is the theory diagram of data storage layer of the present invention;
Fig. 2 is the process flow diagram of the method for the invention;
Fig. 3 is the process flow diagram based on role authorization of the present invention.
Embodiment
Further specify technical scheme of the present invention below in conjunction with drawings and Examples, describe by the present invention is applied in graduate's management system.
With reference to figure 1, Fig. 1 has shown a kind of data of information system accumulation layer 100 based on role access control, comprises user data table 101, role data table 102 and user and role relation tables of data 103, is introduced successively below:
User data table 101, user name, password and login times and student number or job number in order to store described infosystem registered user see Table 1.Described user data table 101 in order to the user registration that realizes described infosystem, add user and deletion user, user's login times of described user data table 101 storages adds one in the described infosystem of the every login of described user after once.
Table 1-user data table
The row name Data type Allow empty
Name (major key) Nvarchar(20) Not
password Nvarchar(20) Not
counts Numeric(18,0) Be
idmap Nvarchar(10) Not
User name when the name in the table 1 represents that the user logins, data type is that length is the character types of 20 characters, user name does not allow sky certainly.Password is exactly the password of user when logining, and the same of data type and name also is that length is the character types of 20 characters.Counts represents user's login times, adds one after the every login once of user, and data type is that length is 18, the numeric type that fraction part is 0.Idmap represents user's student number or job number, and data type is that length is the character types of 10 characters.
Role data table 102, in order to store some roles with different stage access rights, described each role's access rights comprise the set of some access profiles of described data of information system, see Table 2.Interpolation role and the deletion role of described role data table 102 in order to realize described infosystem, described role data table 102 character stored name is as the major key with unique ID of this tables of data.
Table 2-role data table
The row name Data type Allow empty
Rolename (major key) Nvarchar(20) Not
Rolename represents role name in the table, and data type is that length is the character types of 20 characters, does not allow for sky.
User and role relation tables of data 103 in order to store described user and role's matching relationship, see Table 3.Described user and role relation tables of data 103 are carried out the operation that described role adds user, deletion user role and inquiring user role in order to realize described infosystem, the user that described user and role relation tables of data 103 are stored and role's matching relationship comprises one to one, one-to-many and many-one.
Table 3-user and role relation tables of data
The row name Data type Allow empty
ID (major key) Numeric(18,0) Not
Name Nvarchar(20) Not
Role Nvarchar(20) Not
ID in the table represents serial number, because the corresponding relation between name and the role is not one to one, so need a unique ID to be used as major key.
Referring to Fig. 2, the present invention also provides a kind of construction method 200 of the data of information system accumulation layer based on role access control, may further comprise the steps:
201, set up user data table, make its user name of storing described infosystem registered user, password and login times.
Described user data table in order to the user registration that realizes described infosystem, add user and deletion user, user's login times of described user data table storage adds one in the described infosystem of the every login of described user after once.
202, set up the role data table, make its some roles with different stage access rights of storage, described each role's access rights comprise the set of some access profiles of described data of information system.
Interpolation role and the deletion role of described role data table in order to realize described infosystem, described role data table character stored name is as the major key with unique ID of this tables of data.
203, set up user and role relation tables of data, make it store described user and role's matching relationship.
Described user and role relation tables of data are carried out the operation that described role adds user, deletion user role and inquiring user role in order to realize described infosystem, the user of described user and role relation data table stores and role's matching relationship comprises one to one, one-to-many and many-one.
204, described infosystem user data, role data and user and role relation data are write the data storage layer of described tables of data formation based on data table stores.
Introduce data storage layer below based on the described infosystem of above-mentioned tables of data, it is how mating information system call, realize the coupling between modification, user and the role of system user information, and then realize purpose that user's access rights are given and controlled.
Set up the user class file of described infosystem, make described user class file comprise the method for handling the described user data table of operation; Call described user class file, described user class file by in the data analysis layer that returns described infosystem to data accumulation layer method of operating realize operation to described user data table, described operation comprise add user, deletion user, update user information, according to the user name inquiry and return certain user profile.The user class file is made as the User class when specifically setting up, wherein comprise add user, deletion user, update user information, according to the user name inquiry and return method such as certain user profile.Such is mainly by returning in DAL layer (data analysis layer) the SLogin class data accumulation layer method of operating, realizes the function that needs, thereby has guaranteed the security of data storage layer.By following code structure, the backstage code of the page only need call the function that methods such as interpolation in the User class, deletion just just can realize correspondence.When realizing registering functional, at first set up a SLogin model, obtain all information of this model, set up the object of an operation then, call adding method again and get final product as needs.Its specific code is as follows:
SLogin?mySLogin=new?SLogin();
mySLogin.name=name.Text.Trim();
mySLogin.password=name.Text.Trim();
mySLogin.idmap=name.Text.Trim();
Users?opUser=new?Users();
opUser.CreatUser(mySLogin);
Also similar this structure of all the other function codes.
Set up the role class file of described infosystem, make described role class file comprise the method for handling the described role data table of operation.Call described role class file, described role class file is by realizing operation to described role data table to data accumulation layer method of operating in the data analysis layer that returns described infosystem, and described operation comprises to be added role, deletion role and judge whether to exist certain role.The role class file is made as the roles class when specifically setting up, wherein comprise to add role, deletion role and judge whether to exist method such as certain role.Method in such also is to realize concrete function by the method for returning in the DAL layer.When realizing corresponding function, set up the model of a SRoleLib equally earlier and obtain relevant information, just can realize the function of being correlated with by the correlation technique that calls Roles class the inside then.
Set up the user and the role relation class file of described infosystem, make described user and role relation class file comprise the method for handling described user of operation and role relation tables of data.Call described user and role relation class file, described user and role relation class file by in the data analysis layer that returns described infosystem to data accumulation layer method of operating realize operation to described user and role relation tables of data, described operation comprise to the role add the user, return certain all role of user set, return the given role of one group of user's user name coupling, from certain role, delete one group of user.User and role relation class file are made as the Users-Roles class when specifically setting up, the Users-Roles class is exactly the class that user and role are connected, wherein to the role add the user, return certain all role of user set, return the given role of their user name coupling of one group of user, one group of method such as user of deletion from certain role.Method in such also is to realize concrete function by the method for returning SRole class in the DAL layer.When realizing corresponding function, set up the model of a SRole equally earlier and obtain relevant information, just can realize the function of being correlated with by the correlation technique that calls Users-Roles class the inside then.
Referring to 3, here introduce the application of mandate in role access control, mandate (role-based authorization) based on the role, this authorization is not to authorize according to the user, but by distributing role (role) to the user, thereby by being set, the authority that the role has realizes giving subscriber authorisation again.As seen from Figure 2, its process is divided into: user role distributes, and role-security distributes and according to this several steps of limiting operation.
It is to be noted, construction method 200 and a kind of data of information system accumulation layer 100 of the present invention of a kind of data of information system accumulation layer based on role access control of the present invention based on role access control, both are being identical or similar aspect principle and the embodiment, so both repeating parts repeat no more.
Those of ordinary skill in the art will be appreciated that, above embodiment is used for illustrating the present invention, and be not to be used as limitation of the invention, as long as in connotation scope of the present invention, all will drop in claims scope of the present invention variation, the modification of above embodiment.

Claims (8)

1. the data of information system accumulation layer based on role access control is characterized in that, comprising:
User data table is in order to user name, password and the login times of storing described infosystem registered user;
The role data table, in order to store some roles with different stage access rights, described each role's access rights comprise the set of some access profiles of described data of information system;
User and role relation tables of data are in order to store described user and role's matching relationship.
2. data storage layer as claimed in claim 1, it is characterized in that, described user data table is in order to realize user's registration, interpolation user and the deletion user of described infosystem, user's login times of described user data table storage adds one in the described infosystem of the every login of described user after once.
3. data storage layer as claimed in claim 1 or 2 is characterized in that, interpolation role and the deletion role of described role data table in order to realize described infosystem, and described role data table character stored name is as the major key with unique ID of this tables of data.
4. data storage layer as claimed in claim 3, it is characterized in that, described user and role relation tables of data are carried out the operation that described role adds user, deletion user role and inquiring user role in order to realize described infosystem, the user of described user and role relation data table stores and role's matching relationship comprises one to one, one-to-many and many-one.
5. the construction method based on the data of information system accumulation layer of role access control is characterized in that, may further comprise the steps:
Set up user data table, make its user name of storing described infosystem registered user, password and login times;
Set up the role data table, make its some roles with different stage access rights of storage, described each role's access rights comprise the set of some access profiles of described data of information system;
Set up user and role relation tables of data, make it store described user and role's matching relationship;
Described infosystem user data, role data and user and role relation data are write the data storage layer of described tables of data formation based on data table stores.
6. method as claimed in claim 5, it is characterized in that, described user data table in order to the user registration that realizes described infosystem, add user and deletion user, user's login times of described user data table storage adds one in the described infosystem of the every login of described user after once.
7. as claim 5 or 6 described methods, it is characterized in that, interpolation role and the deletion role of described role data table in order to realize described infosystem, described role data table character stored name is as the major key with unique ID of this tables of data.
8. method as claimed in claim 7, it is characterized in that, described user and role relation tables of data are carried out the operation that described role adds user, deletion user role and inquiring user role in order to realize described infosystem, the user of described user and role relation data table stores and role's matching relationship comprises one to one, one-to-many and many-one.
CN2009101949427A 2009-09-01 2009-09-01 Role access control-based information system data storage layer and building method Pending CN102004868A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101949427A CN102004868A (en) 2009-09-01 2009-09-01 Role access control-based information system data storage layer and building method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101949427A CN102004868A (en) 2009-09-01 2009-09-01 Role access control-based information system data storage layer and building method

Publications (1)

Publication Number Publication Date
CN102004868A true CN102004868A (en) 2011-04-06

Family

ID=43812225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101949427A Pending CN102004868A (en) 2009-09-01 2009-09-01 Role access control-based information system data storage layer and building method

Country Status (1)

Country Link
CN (1) CN102004868A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194169A (en) * 2011-05-19 2011-09-21 深圳市路特斯网络技术有限公司 Unified communication management method and system
CN102402663A (en) * 2011-12-01 2012-04-04 浪潮电子信息产业股份有限公司 Method for customizing role authorization in management information system
CN102567675A (en) * 2012-02-15 2012-07-11 合一网络技术(北京)有限公司 User authority management method and system in business system
CN102611699A (en) * 2012-02-22 2012-07-25 浪潮(北京)电子信息产业有限公司 Method and system for access control in cloud operation system
CN105022941A (en) * 2015-06-24 2015-11-04 上海斐讯数据通信技术有限公司 Management method and system of username password
CN106178509A (en) * 2016-07-07 2016-12-07 深圳市豹风网络股份有限公司 The game role digital data recording system of mobile terminal network game
CN106850512A (en) * 2015-12-07 2017-06-13 北京航天长峰科技工业集团有限公司 A kind of information system design method for meeting cascade protection requirement
CN107103228A (en) * 2017-04-22 2017-08-29 成都牵牛草信息技术有限公司 Man-to-man permission grant method and system of the based role to user
CN107844711A (en) * 2017-10-16 2018-03-27 平安科技(深圳)有限公司 Data manipulation authority partition method, application server and computer-readable recording medium
CN108280365A (en) * 2017-09-19 2018-07-13 平安科技(深圳)有限公司 Data access authority management method, device, terminal device and storage medium
CN108711037A (en) * 2017-05-27 2018-10-26 成都牵牛草信息技术有限公司 The commission of examination and approval workflow and its recommit method
CN108764826A (en) * 2017-05-16 2018-11-06 成都牵牛草信息技术有限公司 The method of workflow approval node setting examination & approval role based on form fields
CN108830565A (en) * 2017-06-30 2018-11-16 成都牵牛草信息技术有限公司 The menu authorization method of based role
CN108875054A (en) * 2017-07-07 2018-11-23 成都牵牛草信息技术有限公司 The field value-acquiring method of role's property field in list
CN108898317A (en) * 2017-07-01 2018-11-27 成都牵牛草信息技术有限公司 The method that list operating right is authorized respectively according to form field values
CN108920915A (en) * 2017-07-05 2018-11-30 成都牵牛草信息技术有限公司 Form field values operating right authorization method
CN109033861A (en) * 2017-08-07 2018-12-18 成都牵牛草信息技术有限公司 The method that authorised operator is authorized in system
CN113032770A (en) * 2021-04-14 2021-06-25 湖南快乐阳光互动娱乐传媒有限公司 User classification authority management method and device and intelligent terminal
US11507679B2 (en) 2017-07-01 2022-11-22 Chengdu Qianniucao Information Technology Co., Ltd. Authorization method for form related information

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194169A (en) * 2011-05-19 2011-09-21 深圳市路特斯网络技术有限公司 Unified communication management method and system
CN102194169B (en) * 2011-05-19 2013-09-04 深圳市路特斯网络技术有限公司 Unified communication management method and system
CN102402663A (en) * 2011-12-01 2012-04-04 浪潮电子信息产业股份有限公司 Method for customizing role authorization in management information system
CN102567675A (en) * 2012-02-15 2012-07-11 合一网络技术(北京)有限公司 User authority management method and system in business system
CN102567675B (en) * 2012-02-15 2015-09-30 合一网络技术(北京)有限公司 Method for managing user right under a kind of operation system and system
CN102611699A (en) * 2012-02-22 2012-07-25 浪潮(北京)电子信息产业有限公司 Method and system for access control in cloud operation system
CN105022941A (en) * 2015-06-24 2015-11-04 上海斐讯数据通信技术有限公司 Management method and system of username password
CN106850512A (en) * 2015-12-07 2017-06-13 北京航天长峰科技工业集团有限公司 A kind of information system design method for meeting cascade protection requirement
CN106178509A (en) * 2016-07-07 2016-12-07 深圳市豹风网络股份有限公司 The game role digital data recording system of mobile terminal network game
CN107103228B (en) * 2017-04-22 2021-02-02 成都牵牛草信息技术有限公司 Role-based one-to-one authorization method and system for user permission
CN107103228A (en) * 2017-04-22 2017-08-29 成都牵牛草信息技术有限公司 Man-to-man permission grant method and system of the based role to user
CN108764826A (en) * 2017-05-16 2018-11-06 成都牵牛草信息技术有限公司 The method of workflow approval node setting examination & approval role based on form fields
CN108764826B (en) * 2017-05-16 2022-04-22 成都牵牛草信息技术有限公司 Method for setting approval roles of workflow approval nodes based on form fields
CN108711037A (en) * 2017-05-27 2018-10-26 成都牵牛草信息技术有限公司 The commission of examination and approval workflow and its recommit method
CN108711037B (en) * 2017-05-27 2021-12-17 成都牵牛草信息技术有限公司 Delegation and re-delegation method for approval workflow
CN108830565A (en) * 2017-06-30 2018-11-16 成都牵牛草信息技术有限公司 The menu authorization method of based role
WO2019001322A1 (en) * 2017-06-30 2019-01-03 成都牵牛草信息技术有限公司 Role-based menu authorization method
US11507679B2 (en) 2017-07-01 2022-11-22 Chengdu Qianniucao Information Technology Co., Ltd. Authorization method for form related information
CN108898317A (en) * 2017-07-01 2018-11-27 成都牵牛草信息技术有限公司 The method that list operating right is authorized respectively according to form field values
CN108898317B (en) * 2017-07-01 2021-04-06 成都牵牛草信息技术有限公司 Method for respectively authorizing form operation authority according to form field values
WO2019007291A1 (en) * 2017-07-01 2019-01-10 成都牵牛草信息技术有限公司 Method for granting form operation authority respectively according to form field values
CN108920915B (en) * 2017-07-05 2021-10-29 成都牵牛草信息技术有限公司 Form field value operation authority authorization method
CN108920915A (en) * 2017-07-05 2018-11-30 成都牵牛草信息技术有限公司 Form field values operating right authorization method
US11507651B2 (en) 2017-07-05 2022-11-22 Chengdu Qianniucao Information Technology Co., Ltd. Method for authorizing operation permissions of form-field values
WO2019007261A1 (en) * 2017-07-07 2019-01-10 成都牵牛草信息技术有限公司 Method for obtaining field value of character property field in form
CN108875054A (en) * 2017-07-07 2018-11-23 成都牵牛草信息技术有限公司 The field value-acquiring method of role's property field in list
CN108875054B (en) * 2017-07-07 2021-04-09 成都牵牛草信息技术有限公司 Method for acquiring field value of role property field in form
CN109033861A (en) * 2017-08-07 2018-12-18 成都牵牛草信息技术有限公司 The method that authorised operator is authorized in system
CN109033861B (en) * 2017-08-07 2022-03-22 成都牵牛草信息技术有限公司 Method for authorizing authorized operator in system
US11824865B2 (en) 2017-08-07 2023-11-21 Chengdu Qianniucao Information Technology Co., Ltd. Method for authorizing authorization operator in system
CN108280365B (en) * 2017-09-19 2019-04-12 平安科技(深圳)有限公司 Data access authority management method, device, terminal device and storage medium
CN108280365A (en) * 2017-09-19 2018-07-13 平安科技(深圳)有限公司 Data access authority management method, device, terminal device and storage medium
CN107844711A (en) * 2017-10-16 2018-03-27 平安科技(深圳)有限公司 Data manipulation authority partition method, application server and computer-readable recording medium
CN107844711B (en) * 2017-10-16 2019-06-07 平安科技(深圳)有限公司 Data manipulation permission partition method, application server and computer readable storage medium
CN113032770A (en) * 2021-04-14 2021-06-25 湖南快乐阳光互动娱乐传媒有限公司 User classification authority management method and device and intelligent terminal

Similar Documents

Publication Publication Date Title
CN102004868A (en) Role access control-based information system data storage layer and building method
CN102004866A (en) Method and device for user identity verification and access control of information system
CN101952830A (en) Methods and systems for user authorization
CN100495422C (en) Controlling method of business operations authority
CN101971184B (en) Client/server system for communicating according to the standard protocol OPC UA and having single sign-on mechanisms for authenticating, and method for performing single sign-on in such a system
CN101478398B (en) Authorization management system oriented to resource management and establishing method
CN102752741B (en) To the method, system and device of protecting terminal data
CN104966340A (en) Access control system, access control method and cloud service platform
CN101754182A (en) Packed-based network contact list implementation method and system
CN103065074A (en) Uniform Resource Locator (URL) authority control method based on fine granularity
CN103078859A (en) Service system authority management method, equipment and system
CN102468971A (en) Authority management method and device, and authority control method and device
CN102438019A (en) Business information system access authority control method and system thereof
CN102402663A (en) Method for customizing role authorization in management information system
CN101588242A (en) Method and system for realizing authority management
CN102339367A (en) Method and device for controlling permission
CN101621518A (en) Method for managing permission
CN103500298A (en) Method for achieving authorization distribution based on rule management
CN109191649B (en) Method and device for sharing control authority of intelligent door lock
US20140227979A1 (en) Automated Method for Coupling a Mobile Communication Terminal to a Central Computation Unit in a Motor Vehicle
CN101316182A (en) Authorization number control method and equipment of user terminal
CN112466013B (en) Digital key management method, device, system and storage medium
CN113570758A (en) Remote monitoring terminal and vehicle Bluetooth key management method
CN106127888A (en) Smart lock operational approach and smart lock operating system
CN109543365A (en) A kind of authorization method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110406