CN104104422B - A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback - Google Patents

A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback Download PDF

Info

Publication number
CN104104422B
CN104104422B CN201410323124.3A CN201410323124A CN104104422B CN 104104422 B CN104104422 B CN 104104422B CN 201410323124 A CN201410323124 A CN 201410323124A CN 104104422 B CN104104422 B CN 104104422B
Authority
CN
China
Prior art keywords
nodes
signal
feedback
untrusted
bits
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410323124.3A
Other languages
Chinese (zh)
Other versions
CN104104422A (en
Inventor
赵睿
吴亚峰
贺玉成
龚艳君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaqiao University
Original Assignee
Huaqiao University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaqiao University filed Critical Huaqiao University
Priority to CN201410323124.3A priority Critical patent/CN104104422B/en
Publication of CN104104422A publication Critical patent/CN104104422A/en
Application granted granted Critical
Publication of CN104104422B publication Critical patent/CN104104422B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to a kind of multiple antennas untrusted relay system based on Limited Feedback, and a kind of adaptively selected transmission method of number of bits of feedback of the multiple antennas untrusted relay system based on Limited Feedback.Model is the communication system of single relaying, including sends signal source, untrusted relaying and legitimate receipt node.Transmission source only needs to know label of the channel quantitative in code book in this strategy, without knowing channel complete state information (CSI).By the reasonable selection of number of bits of feedback, security interrupt probability is minimized in the case where reaching reception Signal to Interference plus Noise Ratio (SINR) threshold requirement, makes system compromise between security and reliability.

Description

A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback
Technical field
Multiple antennas cooperative relaying wireless communication system is applied to the present invention relates to one kind, more specifically to a kind of base In the multiple antennas untrusted relay system of Limited Feedback, and a kind of multiple antennas untrusted relay system based on Limited Feedback The adaptively selected transmission method of number of bits of feedback.
Background technology
The core concept of radio communication safety of physical layer is to probe into the physical characteristic of wireless communication system to provide safety to lead to Believe environment.Safety of physical layer technology by making full use of the complicated spatial character of wireless channel and time-varying characteristics, make listener-in without Method receives secret signal, and the security of information transfer can be directly ensured from physical layer.Information Security Theory based on Shannon, Wyner first proposed safe capacity concept, is defined as the maximum rate of the energy transmitting information under eavesdropping interference, reflects Can safe transmission information content number, be weigh security of system can standard.The secure communication of optimization be exactly make it is legal The maximum capacity of receiving node, while minimizing the capacity of eavesdropping node.
Three node communication models of cooperative relaying network are compared with tradition makes contact traffic model, and the main distinction is that the former is present Outside eavesdropping node.Even if there be no outside eavesdropping, information is also possible to be relayed by untrusted and eavesdropped.Untrusted relaying is in side While helping forwarding information, also attempting to eavesdrop information, now untrusted relaying just turns into internal listener-in.It is friendly by introducing Interfering nodes, the Turbo Detection for Cooperative Communication relayed containing untrusted can be obtained among positive safe capacity after using decoding pass-through mode biography When defeated, via node receives more accurately decoded signal prior to destination node, it is impossible to obtain positive safe capacity, therefore in untrusted Typically relayed after communication system using amplification forwarding.
The safety Analysis of current collaboration relay system physical layer mainly includes safe capacity, security interrupt rate etc.;Peace Full transmission method includes beam forming, cooperation interference etc.;Security node system of selection includes relay selection, friendly interference selection Deng.Complete CSI known to sending node is assumed in these work.But in many practical communication occasions, sending node is generally difficult To obtain complete CSI.For this problem, Limited Feedback technology may be such that sending node obtains part CSI.How to be rationally designed with Number of bits of feedback is limited, the security of safeguards system in the case of part CSI is obtained, while the reliability of system is taken into account, with very Important realistic meaning.
The content of the invention
It is an object of the invention to overcome the deficiencies in the prior art, for the spy of current cooperative relaying networked physics layer safety Complete CSI situation can not be obtained by lacking consideration in studying carefully, and the invention provides a kind of multiple antennas untrusted based on Limited Feedback Relay system, and a kind of adaptively selected biography of number of bits of feedback of the multiple antennas untrusted relay system based on Limited Feedback Transmission method.
Technical scheme is as follows:
A kind of multiple antennas untrusted relay system based on Limited Feedback, the structure of the communication system includes one and sends letter Number source S nodes, a untrusted relaying R node and a legitimate receipt D node, S nodes, R nodes and D node antennas number point Not Wei M, 1, M, R nodes be amplification forwarding untrusted relaying;Using the channel condition information of Limited Feedback technical limit spacing S-R channels CSI, R-D channel condition information CSI is estimated by training signal.
A kind of adaptively selected transmission side of number of bits of feedback of the multiple antennas untrusted relay system based on Limited Feedback Method, a complete communication process is completed in two time slots:
First time slot, S nodes send signal to be transmitted to R nodes, while D nodes send artificial noise jamming to R nodes; Second time slot, the signal that R nodes receive the first time slot is sent after amplifying to D nodes.
Preferably, comprising the following steps that:
Step 1:S nodes and R nodes set up public random code bookWherein N=2B, B is feedback bits Number;
Step 2:S nodes send training signal to R nodes, and when without training evaluated error, R nodes are by the S-R of acquisition channel Coefficient hSRIt is normalized to channel direction informationAccording to minimum chordal distance method, you can obtain WillIt is estimated asCode word sequence number n is fed back to S nodes by R nodes afterwards;
Step 3:First transmission time slot, S nodes and D nodes send a signal to R sections using high specific sending method simultaneously The beamforming vectors of point, S nodes and D nodes are respectivelyThe reception signal of R nodes ForWherein, x1What it is for the transmission of S nodes is secret signal, x2Sent for D nodes It is man made noise's signal, P is average transmitting power, n1For zero-mean complex Gaussian noise variance;
The reception Signal to Interference plus Noise Ratio SINR of R nodes is
Step 4:Second transmission time slot, R nodes send a signal to D nodes after amplification, wherein, relaying amplification because Son is 1/ | | yR| |, to maximize receiving terminal signal to noise ratio, D nodes are received using maximum-ratio combing mode, then D nodes are carried out from dry Disturb after elimination, receiving signal is
The reception Signal to Interference plus Noise Ratio SINR of D nodes is
Preferably, further comprising:
Step 5:Only assume the statistical average of the first time slot R-D channel coefficients known to R nodesAnd completely Known second time slot R-D channel coefficients hRD, and then push away to obtain system security interrupt probability P { γ12Closure expression be close In B monotonic increasing function, target capacity is also can be derived from for C0System Transmission probabilityClose timepiece reach Formula is the monotonous descending function on B;
Step 6:If in the presence of a threshold epsilon>0, as the reception Signal to Interference plus Noise Ratio SINR value γ of destination node2<ε When, system Transmission;And work as γ2>During ε, system can then be normally received, and obtained number of bits of feedback and be:
Step 7:The selection B of system self-adaption.
Preferably, in step 1, quantifying each code word c in code bookjIt is the multiple unit of the M dimensions generated at random in advance Vector.
Beneficial effects of the present invention are as follows:
The present invention proposes a kind of adaptively selected transmission method of Limited Feedback bit number based on untrusted relaying.It is whole Individual transmitting procedure is completed in two transmission time slots.First time slot, S nodes send signal to be transmitted to R nodes, while D nodes Artificial noise jamming is sent to R nodes, both are all that MRT is sent, and obtain the reception SINR of R nodes;Second time slot, R nodes will Sent after the signal amplification that first time slot is received to D nodes, and MRC merging is carried out in D nodes, obtain the reception SINR of D nodes; The monotonicity of security interrupt probability and Transmission probability closure expression formula on number of bits of feedback B is finally obtained, in given D sections Point obtains optimal B value in the case of receiving SINR threshold values, complete the adaptively selected of number of bits of feedback.It is of the invention with it is existing The transmission means of consideration safety of physical layer compare, sending strategy when there is no complete CSI is considered first, and give The Optimal Feedback bit number adaptive selection method of reliability and security is taken into account simultaneously.The present invention can make reception SINR average Set threshold epsilon is will be greater than, so as to improve the transmission reliability of system, while making number of bits of feedback small as much as possible, to carry The security of high system.
Brief description of the drawings
Fig. 1 is the communication system architecture figure of the present invention.
Fig. 2 is the flow chart of the communication means of the present invention.
In the case of Fig. 3 is the different number of bits of feedback of selection, security interrupt probability is with SNR (i.e. ρ) change curve;
In the case of Fig. 4 is different number of bits of feedback, the curve that system Transmission probability changes with SNR;
Fig. 5 is the selection change curve of Optimal Feedback bit number under different reception SINR threshold epsilons;
Wherein, antenna number M=4, the R node of fixed S nodes and D nodes are single antenna, and the transmit power of each node is equal For P, noise power is normalized to σ2It is C that targeted rate is set in=1, Fig. 40SNR fixations value is in=1bps/Hz, Fig. 5 10dB。
Embodiment
The present invention is described in further detail below in conjunction with drawings and Examples.
As shown in figure 1, the structure of communication system include one send signal source S nodes, a untrusted relaying R node and One legitimate receipt D node.S nodes, R nodes and D node antennas numbers are respectively M, and 1, M, R nodes are that amplification forwarding (AF) is non- Trusted is relayed.System uses the channel condition information CSI of Limited Feedback technical limit spacing S-R channels, is estimated by training signal , in the absence of training evaluated error and there is channel reciprocity in R-D channel condition information CSI.
Embodiment of the invention discloses that a kind of adaptively selected transmission method of number of bits of feedback, a complete communication Process is completed in two time slots.First time slot, S nodes send signal to be transmitted to R nodes, while D nodes are to R node senders Work noise jamming;Second time slot, the signal that R nodes receive the first time slot is sent after amplifying to D nodes.As shown in Fig. 2 the party Method is comprised the following steps that:
Step 1:S nodes and R nodes set up public random code bookWherein N=2B, B is feedback bits Number.Quantify each code word c in code bookjIt is the multiple unit vector of the M dimensions generated at random in advance;
Step 2:S nodes send training signal to R nodes, it is assumed that without training evaluated error, R nodes are by the S-R's of acquisition Channel coefficients hSRIt is normalized to channel direction informationAccording to minimum chordal distance method, you can obtainWillIt is estimated asCode word sequence number n is fed back to S nodes by R nodes afterwards;
Step 3:First transmission time slot, S nodes and D nodes send (MRT) mode using high specific simultaneously and send signal Beamforming vectors to R nodes, therefore S nodes and D nodes are respectivelyTherefore R nodes Reception signal beWherein x1What it is for the transmission of S nodes is secret signal, x2Saved for D What point was sent is man made noise's signal, and P is average transmitting power, n1For zero-mean complex Gaussian noise variance.Therefore the reception of R nodes Signal to Interference plus Noise Ratio SINR is
Step 4:Second transmission time slot, R nodes send a signal to D nodes after amplification, wherein relaying amplification factor For 1/ | | yR| |, to maximize receiving terminal signal to noise ratio, D nodes are received using maximum-ratio combing (MRC) mode, then D nodes are carried out After self-interference is eliminated, receiving signal isTherefore D nodes Receiving SINR is
Step 5:Only assume the statistical average of the first time slot R-D channel coefficients known to R nodesAnd completely Known second time slot R-D channel coefficients hRD, therefore can be derived from system security interrupt probability P { γ12Closure expression be close In B monotonic increasing function, target capacity is also can be derived from for C0System Transmission probabilityClose timepiece reach Formula is the monotonous descending function on B;
Step 6:If in the presence of a threshold epsilon>0, as the reception SINR value γ of destination node2<During ε, system Transmission;And Work as γ2>During ε, system can then be normally received.Should be small as much as possible in view of number of bits of feedback, to improve the security of system, Therefore can obtain while the Optimal Feedback bit number for taking into account reliability and security is:
Step 7:The selection B of system self-adaption.
Fig. 3 is given in the case of the different number of bits of feedback of selection, and security interrupt probability is with SNR (i.e. ρ) change curve.By Simulation result is visible, with the increase of number of bits of feedback, and security interrupt probability rises, i.e., security of system can be deteriorated, and demonstrate peace Full monotonicity of the interruption rate on number of bits of feedback.It can obtain simultaneously, with becoming larger for number of bits of feedback, security interrupt probability Spacing is tapered into, i.e., gradually restrain.Fig. 4 is given in the case of different number of bits of feedback, and system Transmission probability becomes with SNR The curve of change.From simulation result, with the increase of number of bits of feedback, Transmission probability declines, i.e., system reliability is carried Height, demonstrates monotone decline of the Transmission rate on number of bits of feedback.It can obtain simultaneously, with the increase of number of bits of feedback, Contribution of the number of bits of feedback to Transmission probability is gradually decreased, and finally tends to convergence.Fig. 5 gives different reception SINR threshold values The selection change curve of Optimal Feedback bit number under ε, and it is 10dB that SNR, which fixes value,.From simulation result, number of bits of feedback Lower bound increases with ε increase when the value of threshold epsilon is close to maximum occurrences, and number of bits of feedback lower bound increases very fast. But in practical application, SINR threshold values are appropriate if receiving, an Optimal Feedback bit being easily achieved is obtained by adaptive Number.
Above-described embodiment is intended merely to the explanation present invention, and is not used as limitation of the invention.As long as according to this hair Bright technical spirit, is changed, modification etc. will all fall in the range of the claim of the present invention to above-described embodiment.

Claims (3)

1. a kind of adaptively selected transmission method of number of bits of feedback of the multiple antennas untrusted relay system based on Limited Feedback, Characterized in that, the multiple antennas untrusted relay system based on Limited Feedback include one send signal source S nodes, one it is non-can Letter relaying R nodes and a legitimate receipt D node, S nodes, R nodes and D node antennas numbers are respectively M, 1, M;
One complete communication process is completed in two time slots:
First time slot, S nodes send signal to be transmitted to R nodes, while D nodes send artificial noise jamming to R nodes;Second Time slot, the signal that R nodes receive the first time slot is sent after amplifying to D nodes;
Comprise the following steps that:
Step 1:S nodes and R nodes set up public random code bookWherein N=2B, B is number of bits of feedback;
Step 2:S nodes send training signal to R nodes, and when without training evaluated error, R nodes are by the S-R of acquisition channel coefficients hSRIt is normalized to channel direction informationAccording to minimum chordal distance method, you can obtainI.e. WillIt is estimated asCode word sequence number n is fed back to S nodes by R nodes afterwards;
Step 3:First transmission time slot, S nodes and D nodes send a signal to R nodes, S using high specific sending method simultaneously The beamforming vectors of node and D nodes are respectivelyThe reception signal of R nodes isWherein, x1What it is for the transmission of S nodes is secret signal, x2It is for what D nodes were sent Man made noise's signal, P is average transmitting power, n1For the zero-mean complex Gaussian noise variance of S nodes;
The reception Signal to Interference plus Noise Ratio SINR of R nodes is
Step 4:Second transmission time slot, R nodes send a signal to D nodes after amplification, wherein, relaying amplification factor is 1/||yR| |, ρ is maximization receiving terminal signal to noise ratio, n2For the zero-mean complex Gaussian noise variance of D nodes;D nodes use high specific Merging mode is received, then D nodes are carried out after self-interference elimination, is received signal and is
The reception Signal to Interference plus Noise Ratio SINR of D nodes is
Step 5:Only assume the statistical average of the first time slot R-D channel coefficients known to R nodesAnd it is completely known Second time slot R-D channel coefficients hRD, and then push away to obtain system security interrupt probability P { γ1< γ2Closure expression be on B Monotonic increasing function, also can be derived from target capacity for C0System Transmission probabilityClosure expression formula It is the monotonous descending function on B;
Step 6:If in the presence of a threshold epsilon>0, as the reception Signal to Interference plus Noise Ratio SINR value γ of destination node2<During ε, it is System Transmission;And work as γ2>During ε, system can then be normally received, and obtained number of bits of feedback and be:
Step 7:The selection B of system self-adaption.
2. the number of bits of feedback of the multiple antennas untrusted relay system according to claim 1 based on Limited Feedback is adaptive The transmission method of selection, it is characterised in that in step 1, quantifies each code word c in code bookjIt is the M dimensions generated at random in advance Multiple unit vector.
3. a kind of multiple antennas untrusted relay system based on Limited Feedback, it is characterised in that the structure of the communication system includes One sends signal source S nodes, a untrusted relaying R node and a legitimate receipt D node, S nodes, R nodes and D nodes Number of antennas is respectively M, and 1, M, R nodes relay for amplification forwarding untrusted;Based on the transmission method described in claim 1 or 2 Communicated;Using the channel condition information CSI of Limited Feedback technical limit spacing S-R channels, estimate R-D's by training signal Channel condition information CSI.
CN201410323124.3A 2014-07-08 2014-07-08 A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback Active CN104104422B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410323124.3A CN104104422B (en) 2014-07-08 2014-07-08 A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410323124.3A CN104104422B (en) 2014-07-08 2014-07-08 A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback

Publications (2)

Publication Number Publication Date
CN104104422A CN104104422A (en) 2014-10-15
CN104104422B true CN104104422B (en) 2017-10-20

Family

ID=51672263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410323124.3A Active CN104104422B (en) 2014-07-08 2014-07-08 A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback

Country Status (1)

Country Link
CN (1) CN104104422B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102014221893A1 (en) * 2014-10-28 2016-04-28 Robert Bosch Gmbh Method and device for generating a secret key
CN105207706A (en) * 2015-08-13 2015-12-30 中国联合网络通信集团有限公司 Adaptive bit distribution method and multi-point cooperation transmission system
CN105516997A (en) * 2015-12-06 2016-04-20 桂林电子科技大学 Physical layer safe cognition relay communication method
CN105680995B (en) * 2016-02-23 2019-03-15 北京邮电大学 A kind of method for transmitting signals, apparatus and system
CN105744586B (en) * 2016-03-04 2019-10-08 上海交通大学 Full duplex relaying selection method based on expired channel state information
CN105813081B (en) * 2016-03-09 2019-01-01 华侨大学 The method that selective enhancement recognizes the relay node of junction network security performance
CN106102044B (en) * 2016-05-23 2018-04-17 西安交通大学 A kind of multi-user's junction network downlink cooperation physical layer method for secret protection
CN106230476B (en) * 2016-07-26 2018-03-02 西安交通大学 Information secure transmission method based on non-joint man made noise in insincere relay system
CN106712823B (en) * 2016-12-21 2020-11-13 西安电子科技大学 Beam forming method capable of realizing physical layer safe transmission
CN106911420A (en) * 2017-03-15 2017-06-30 中国人民解放军理工大学 A kind of RF energy gathers the safe transmission method of many relay systems of untrusted
CN106992836B (en) * 2017-03-24 2019-04-09 华侨大学 Full duplex scrambling transmission method in a kind of untrusted junction network
WO2019006712A1 (en) * 2017-07-05 2019-01-10 深圳大学 Mobile device position control method and apparatus based on single bit feedback
WO2019006713A1 (en) * 2017-07-05 2019-01-10 深圳大学 Mobile device position control method and apparatus based on adaptive noise feedback
CN112637925B (en) * 2020-11-28 2022-06-03 重庆财经学院 Safe relay selection method based on random forest non-uniform quantitative feature extraction

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340218A (en) * 2007-07-04 2009-01-07 华为技术有限公司 Communication method and apparatus in MIMO system
CN101494490A (en) * 2009-01-04 2009-07-29 北京邮电大学 Accidental distributed self-organizing communication method and system based on feedback

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101399794B1 (en) * 2012-10-23 2014-05-27 고려대학교 산학협력단 Limited Feedback Method and Apparatus for Two-Way Wireless Relaying Channels with Physical Networking Coding

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340218A (en) * 2007-07-04 2009-01-07 华为技术有限公司 Communication method and apparatus in MIMO system
CN101494490A (en) * 2009-01-04 2009-07-29 北京邮电大学 Accidental distributed self-organizing communication method and system based on feedback

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
MIMO解码转发双向中继系统中的传输侧率与中断概率分析;赵睿;《信号处理》;20100331;第26卷(第3期);第361-368页 *
The Gaussian multiple access wiretap channel wireless secrecy and cooperative jamming;E.Tekin;《Information Theory and Application Workshop》;20071122;第6页第1段 *
解码转发MIMO双向中继系统的传输策略与性能;赵睿;《中国科学》;20091231;正文第2-4页 *
解码转发MIMO双向中继系统的传输策略与性能分析;赵睿;《中国科学》;20091231;第39卷(第12期);正文第2-4页 *

Also Published As

Publication number Publication date
CN104104422A (en) 2014-10-15

Similar Documents

Publication Publication Date Title
CN104104422B (en) A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback
Liu et al. Power splitting-based SWIPT with decode-and-forward full-duplex relaying
Hu et al. Covert transmission with a self-sustained relay
CN106131823B (en) Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene
CN103702322B (en) A kind of safe transmission method of physical layer resisting the eavesdropping of unreliable via node
Xia et al. Cache aided decode-and-forward relaying networks: From the spatial view
CN106992836B (en) Full duplex scrambling transmission method in a kind of untrusted junction network
CN104320826B (en) The opportunistic relay system of selection of cooperative communication network under a kind of eavesdropping environment
Pratas et al. Underlay of low-rate machine-type D2D links on downlink cellular links
CN104469755A (en) Physical layer security transmission method for keeping relay and jamming node selection result secret
CN101902265A (en) Safe transmission method of physical layer in wireless communication
CN110299934A (en) A kind of security transmission method for wirelessly taking energy full duplex relaying system
Wang et al. Relay selection of full‐duplex decode‐and‐forward relaying over Nakagami‐m fading channels
Wang et al. Outage probability of full-duplex AF relaying with processing delay and residual self-interference
Lv et al. Achieving covert wireless communication with a multi-antenna relay
Li et al. CUTS: Improving channel utilization in both time and spatial domain in WLANs
CN105933894B (en) The method for carrying out cipher key-extraction using the stochastic behaviour that recipient receives signal
CN109039411A (en) A kind of unidirectional full duplex MIMO relay antenna selection safe transmission method
CN105933040A (en) Secure transmission method adopting information source and relay-combined transmitting antenna selection
CN106533496B (en) A kind of unreliable relaying duplex communication method based on interference cooperation
CN102752080B (en) A kind of anti-eavesdrop coded method based on physical layer
Sun et al. Security performance analysis of relay networks based on-shadowed channels with rhis and cees
Vishwakarma et al. Decode-and-forward relay beamforming for secrecy with finite-alphabet input
CN105490721B (en) A kind of estimation retransmission method of full duplex traffic cooperative communication network
CN105978610B (en) It is a kind of meter and radio physical layer safety base station forwarding multiple antennas processing method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant