CN104104422B - A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback - Google Patents
A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback Download PDFInfo
- Publication number
- CN104104422B CN104104422B CN201410323124.3A CN201410323124A CN104104422B CN 104104422 B CN104104422 B CN 104104422B CN 201410323124 A CN201410323124 A CN 201410323124A CN 104104422 B CN104104422 B CN 104104422B
- Authority
- CN
- China
- Prior art keywords
- nodes
- signal
- feedback
- untrusted
- bits
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention relates to a kind of multiple antennas untrusted relay system based on Limited Feedback, and a kind of adaptively selected transmission method of number of bits of feedback of the multiple antennas untrusted relay system based on Limited Feedback.Model is the communication system of single relaying, including sends signal source, untrusted relaying and legitimate receipt node.Transmission source only needs to know label of the channel quantitative in code book in this strategy, without knowing channel complete state information (CSI).By the reasonable selection of number of bits of feedback, security interrupt probability is minimized in the case where reaching reception Signal to Interference plus Noise Ratio (SINR) threshold requirement, makes system compromise between security and reliability.
Description
Technical field
Multiple antennas cooperative relaying wireless communication system is applied to the present invention relates to one kind, more specifically to a kind of base
In the multiple antennas untrusted relay system of Limited Feedback, and a kind of multiple antennas untrusted relay system based on Limited Feedback
The adaptively selected transmission method of number of bits of feedback.
Background technology
The core concept of radio communication safety of physical layer is to probe into the physical characteristic of wireless communication system to provide safety to lead to
Believe environment.Safety of physical layer technology by making full use of the complicated spatial character of wireless channel and time-varying characteristics, make listener-in without
Method receives secret signal, and the security of information transfer can be directly ensured from physical layer.Information Security Theory based on Shannon,
Wyner first proposed safe capacity concept, is defined as the maximum rate of the energy transmitting information under eavesdropping interference, reflects
Can safe transmission information content number, be weigh security of system can standard.The secure communication of optimization be exactly make it is legal
The maximum capacity of receiving node, while minimizing the capacity of eavesdropping node.
Three node communication models of cooperative relaying network are compared with tradition makes contact traffic model, and the main distinction is that the former is present
Outside eavesdropping node.Even if there be no outside eavesdropping, information is also possible to be relayed by untrusted and eavesdropped.Untrusted relaying is in side
While helping forwarding information, also attempting to eavesdrop information, now untrusted relaying just turns into internal listener-in.It is friendly by introducing
Interfering nodes, the Turbo Detection for Cooperative Communication relayed containing untrusted can be obtained among positive safe capacity after using decoding pass-through mode biography
When defeated, via node receives more accurately decoded signal prior to destination node, it is impossible to obtain positive safe capacity, therefore in untrusted
Typically relayed after communication system using amplification forwarding.
The safety Analysis of current collaboration relay system physical layer mainly includes safe capacity, security interrupt rate etc.;Peace
Full transmission method includes beam forming, cooperation interference etc.;Security node system of selection includes relay selection, friendly interference selection
Deng.Complete CSI known to sending node is assumed in these work.But in many practical communication occasions, sending node is generally difficult
To obtain complete CSI.For this problem, Limited Feedback technology may be such that sending node obtains part CSI.How to be rationally designed with
Number of bits of feedback is limited, the security of safeguards system in the case of part CSI is obtained, while the reliability of system is taken into account, with very
Important realistic meaning.
The content of the invention
It is an object of the invention to overcome the deficiencies in the prior art, for the spy of current cooperative relaying networked physics layer safety
Complete CSI situation can not be obtained by lacking consideration in studying carefully, and the invention provides a kind of multiple antennas untrusted based on Limited Feedback
Relay system, and a kind of adaptively selected biography of number of bits of feedback of the multiple antennas untrusted relay system based on Limited Feedback
Transmission method.
Technical scheme is as follows:
A kind of multiple antennas untrusted relay system based on Limited Feedback, the structure of the communication system includes one and sends letter
Number source S nodes, a untrusted relaying R node and a legitimate receipt D node, S nodes, R nodes and D node antennas number point
Not Wei M, 1, M, R nodes be amplification forwarding untrusted relaying;Using the channel condition information of Limited Feedback technical limit spacing S-R channels
CSI, R-D channel condition information CSI is estimated by training signal.
A kind of adaptively selected transmission side of number of bits of feedback of the multiple antennas untrusted relay system based on Limited Feedback
Method, a complete communication process is completed in two time slots:
First time slot, S nodes send signal to be transmitted to R nodes, while D nodes send artificial noise jamming to R nodes;
Second time slot, the signal that R nodes receive the first time slot is sent after amplifying to D nodes.
Preferably, comprising the following steps that:
Step 1:S nodes and R nodes set up public random code bookWherein N=2B, B is feedback bits
Number;
Step 2:S nodes send training signal to R nodes, and when without training evaluated error, R nodes are by the S-R of acquisition channel
Coefficient hSRIt is normalized to channel direction informationAccording to minimum chordal distance method, you can obtain
WillIt is estimated asCode word sequence number n is fed back to S nodes by R nodes afterwards;
Step 3:First transmission time slot, S nodes and D nodes send a signal to R sections using high specific sending method simultaneously
The beamforming vectors of point, S nodes and D nodes are respectivelyThe reception signal of R nodes
ForWherein, x1What it is for the transmission of S nodes is secret signal, x2Sent for D nodes
It is man made noise's signal, P is average transmitting power, n1For zero-mean complex Gaussian noise variance;
The reception Signal to Interference plus Noise Ratio SINR of R nodes is
Step 4:Second transmission time slot, R nodes send a signal to D nodes after amplification, wherein, relaying amplification because
Son is 1/ | | yR| |, to maximize receiving terminal signal to noise ratio, D nodes are received using maximum-ratio combing mode, then D nodes are carried out from dry
Disturb after elimination, receiving signal is
The reception Signal to Interference plus Noise Ratio SINR of D nodes is
Preferably, further comprising:
Step 5:Only assume the statistical average of the first time slot R-D channel coefficients known to R nodesAnd completely
Known second time slot R-D channel coefficients hRD, and then push away to obtain system security interrupt probability P { γ1<γ2Closure expression be close
In B monotonic increasing function, target capacity is also can be derived from for C0System Transmission probabilityClose timepiece reach
Formula is the monotonous descending function on B;
Step 6:If in the presence of a threshold epsilon>0, as the reception Signal to Interference plus Noise Ratio SINR value γ of destination node2<ε
When, system Transmission;And work as γ2>During ε, system can then be normally received, and obtained number of bits of feedback and be:
Step 7:The selection B of system self-adaption.
Preferably, in step 1, quantifying each code word c in code bookjIt is the multiple unit of the M dimensions generated at random in advance
Vector.
Beneficial effects of the present invention are as follows:
The present invention proposes a kind of adaptively selected transmission method of Limited Feedback bit number based on untrusted relaying.It is whole
Individual transmitting procedure is completed in two transmission time slots.First time slot, S nodes send signal to be transmitted to R nodes, while D nodes
Artificial noise jamming is sent to R nodes, both are all that MRT is sent, and obtain the reception SINR of R nodes;Second time slot, R nodes will
Sent after the signal amplification that first time slot is received to D nodes, and MRC merging is carried out in D nodes, obtain the reception SINR of D nodes;
The monotonicity of security interrupt probability and Transmission probability closure expression formula on number of bits of feedback B is finally obtained, in given D sections
Point obtains optimal B value in the case of receiving SINR threshold values, complete the adaptively selected of number of bits of feedback.It is of the invention with it is existing
The transmission means of consideration safety of physical layer compare, sending strategy when there is no complete CSI is considered first, and give
The Optimal Feedback bit number adaptive selection method of reliability and security is taken into account simultaneously.The present invention can make reception SINR average
Set threshold epsilon is will be greater than, so as to improve the transmission reliability of system, while making number of bits of feedback small as much as possible, to carry
The security of high system.
Brief description of the drawings
Fig. 1 is the communication system architecture figure of the present invention.
Fig. 2 is the flow chart of the communication means of the present invention.
In the case of Fig. 3 is the different number of bits of feedback of selection, security interrupt probability is with SNR (i.e. ρ) change curve;
In the case of Fig. 4 is different number of bits of feedback, the curve that system Transmission probability changes with SNR;
Fig. 5 is the selection change curve of Optimal Feedback bit number under different reception SINR threshold epsilons;
Wherein, antenna number M=4, the R node of fixed S nodes and D nodes are single antenna, and the transmit power of each node is equal
For P, noise power is normalized to σ2It is C that targeted rate is set in=1, Fig. 40SNR fixations value is in=1bps/Hz, Fig. 5
10dB。
Embodiment
The present invention is described in further detail below in conjunction with drawings and Examples.
As shown in figure 1, the structure of communication system include one send signal source S nodes, a untrusted relaying R node and
One legitimate receipt D node.S nodes, R nodes and D node antennas numbers are respectively M, and 1, M, R nodes are that amplification forwarding (AF) is non-
Trusted is relayed.System uses the channel condition information CSI of Limited Feedback technical limit spacing S-R channels, is estimated by training signal
, in the absence of training evaluated error and there is channel reciprocity in R-D channel condition information CSI.
Embodiment of the invention discloses that a kind of adaptively selected transmission method of number of bits of feedback, a complete communication
Process is completed in two time slots.First time slot, S nodes send signal to be transmitted to R nodes, while D nodes are to R node senders
Work noise jamming;Second time slot, the signal that R nodes receive the first time slot is sent after amplifying to D nodes.As shown in Fig. 2 the party
Method is comprised the following steps that:
Step 1:S nodes and R nodes set up public random code bookWherein N=2B, B is feedback bits
Number.Quantify each code word c in code bookjIt is the multiple unit vector of the M dimensions generated at random in advance;
Step 2:S nodes send training signal to R nodes, it is assumed that without training evaluated error, R nodes are by the S-R's of acquisition
Channel coefficients hSRIt is normalized to channel direction informationAccording to minimum chordal distance method, you can obtainWillIt is estimated asCode word sequence number n is fed back to S nodes by R nodes afterwards;
Step 3:First transmission time slot, S nodes and D nodes send (MRT) mode using high specific simultaneously and send signal
Beamforming vectors to R nodes, therefore S nodes and D nodes are respectivelyTherefore R nodes
Reception signal beWherein x1What it is for the transmission of S nodes is secret signal, x2Saved for D
What point was sent is man made noise's signal, and P is average transmitting power, n1For zero-mean complex Gaussian noise variance.Therefore the reception of R nodes
Signal to Interference plus Noise Ratio SINR is
Step 4:Second transmission time slot, R nodes send a signal to D nodes after amplification, wherein relaying amplification factor
For 1/ | | yR| |, to maximize receiving terminal signal to noise ratio, D nodes are received using maximum-ratio combing (MRC) mode, then D nodes are carried out
After self-interference is eliminated, receiving signal isTherefore D nodes
Receiving SINR is
Step 5:Only assume the statistical average of the first time slot R-D channel coefficients known to R nodesAnd completely
Known second time slot R-D channel coefficients hRD, therefore can be derived from system security interrupt probability P { γ1<γ2Closure expression be close
In B monotonic increasing function, target capacity is also can be derived from for C0System Transmission probabilityClose timepiece reach
Formula is the monotonous descending function on B;
Step 6:If in the presence of a threshold epsilon>0, as the reception SINR value γ of destination node2<During ε, system Transmission;And
Work as γ2>During ε, system can then be normally received.Should be small as much as possible in view of number of bits of feedback, to improve the security of system,
Therefore can obtain while the Optimal Feedback bit number for taking into account reliability and security is:
Step 7:The selection B of system self-adaption.
Fig. 3 is given in the case of the different number of bits of feedback of selection, and security interrupt probability is with SNR (i.e. ρ) change curve.By
Simulation result is visible, with the increase of number of bits of feedback, and security interrupt probability rises, i.e., security of system can be deteriorated, and demonstrate peace
Full monotonicity of the interruption rate on number of bits of feedback.It can obtain simultaneously, with becoming larger for number of bits of feedback, security interrupt probability
Spacing is tapered into, i.e., gradually restrain.Fig. 4 is given in the case of different number of bits of feedback, and system Transmission probability becomes with SNR
The curve of change.From simulation result, with the increase of number of bits of feedback, Transmission probability declines, i.e., system reliability is carried
Height, demonstrates monotone decline of the Transmission rate on number of bits of feedback.It can obtain simultaneously, with the increase of number of bits of feedback,
Contribution of the number of bits of feedback to Transmission probability is gradually decreased, and finally tends to convergence.Fig. 5 gives different reception SINR threshold values
The selection change curve of Optimal Feedback bit number under ε, and it is 10dB that SNR, which fixes value,.From simulation result, number of bits of feedback
Lower bound increases with ε increase when the value of threshold epsilon is close to maximum occurrences, and number of bits of feedback lower bound increases very fast.
But in practical application, SINR threshold values are appropriate if receiving, an Optimal Feedback bit being easily achieved is obtained by adaptive
Number.
Above-described embodiment is intended merely to the explanation present invention, and is not used as limitation of the invention.As long as according to this hair
Bright technical spirit, is changed, modification etc. will all fall in the range of the claim of the present invention to above-described embodiment.
Claims (3)
1. a kind of adaptively selected transmission method of number of bits of feedback of the multiple antennas untrusted relay system based on Limited Feedback,
Characterized in that, the multiple antennas untrusted relay system based on Limited Feedback include one send signal source S nodes, one it is non-can
Letter relaying R nodes and a legitimate receipt D node, S nodes, R nodes and D node antennas numbers are respectively M, 1, M;
One complete communication process is completed in two time slots:
First time slot, S nodes send signal to be transmitted to R nodes, while D nodes send artificial noise jamming to R nodes;Second
Time slot, the signal that R nodes receive the first time slot is sent after amplifying to D nodes;
Comprise the following steps that:
Step 1:S nodes and R nodes set up public random code bookWherein N=2B, B is number of bits of feedback;
Step 2:S nodes send training signal to R nodes, and when without training evaluated error, R nodes are by the S-R of acquisition channel coefficients
hSRIt is normalized to channel direction informationAccording to minimum chordal distance method, you can obtainI.e.
WillIt is estimated asCode word sequence number n is fed back to S nodes by R nodes afterwards;
Step 3:First transmission time slot, S nodes and D nodes send a signal to R nodes, S using high specific sending method simultaneously
The beamforming vectors of node and D nodes are respectivelyThe reception signal of R nodes isWherein, x1What it is for the transmission of S nodes is secret signal, x2It is for what D nodes were sent
Man made noise's signal, P is average transmitting power, n1For the zero-mean complex Gaussian noise variance of S nodes;
The reception Signal to Interference plus Noise Ratio SINR of R nodes is
Step 4:Second transmission time slot, R nodes send a signal to D nodes after amplification, wherein, relaying amplification factor is
1/||yR| |, ρ is maximization receiving terminal signal to noise ratio, n2For the zero-mean complex Gaussian noise variance of D nodes;D nodes use high specific
Merging mode is received, then D nodes are carried out after self-interference elimination, is received signal and is
The reception Signal to Interference plus Noise Ratio SINR of D nodes is
Step 5:Only assume the statistical average of the first time slot R-D channel coefficients known to R nodesAnd it is completely known
Second time slot R-D channel coefficients hRD, and then push away to obtain system security interrupt probability P { γ1< γ2Closure expression be on B
Monotonic increasing function, also can be derived from target capacity for C0System Transmission probabilityClosure expression formula
It is the monotonous descending function on B;
Step 6:If in the presence of a threshold epsilon>0, as the reception Signal to Interference plus Noise Ratio SINR value γ of destination node2<During ε, it is
System Transmission;And work as γ2>During ε, system can then be normally received, and obtained number of bits of feedback and be:
Step 7:The selection B of system self-adaption.
2. the number of bits of feedback of the multiple antennas untrusted relay system according to claim 1 based on Limited Feedback is adaptive
The transmission method of selection, it is characterised in that in step 1, quantifies each code word c in code bookjIt is the M dimensions generated at random in advance
Multiple unit vector.
3. a kind of multiple antennas untrusted relay system based on Limited Feedback, it is characterised in that the structure of the communication system includes
One sends signal source S nodes, a untrusted relaying R node and a legitimate receipt D node, S nodes, R nodes and D nodes
Number of antennas is respectively M, and 1, M, R nodes relay for amplification forwarding untrusted;Based on the transmission method described in claim 1 or 2
Communicated;Using the channel condition information CSI of Limited Feedback technical limit spacing S-R channels, estimate R-D's by training signal
Channel condition information CSI.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410323124.3A CN104104422B (en) | 2014-07-08 | 2014-07-08 | A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410323124.3A CN104104422B (en) | 2014-07-08 | 2014-07-08 | A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104104422A CN104104422A (en) | 2014-10-15 |
CN104104422B true CN104104422B (en) | 2017-10-20 |
Family
ID=51672263
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410323124.3A Active CN104104422B (en) | 2014-07-08 | 2014-07-08 | A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104104422B (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102014221893A1 (en) * | 2014-10-28 | 2016-04-28 | Robert Bosch Gmbh | Method and device for generating a secret key |
CN105207706A (en) * | 2015-08-13 | 2015-12-30 | 中国联合网络通信集团有限公司 | Adaptive bit distribution method and multi-point cooperation transmission system |
CN105516997A (en) * | 2015-12-06 | 2016-04-20 | 桂林电子科技大学 | Physical layer safe cognition relay communication method |
CN105680995B (en) * | 2016-02-23 | 2019-03-15 | 北京邮电大学 | A kind of method for transmitting signals, apparatus and system |
CN105744586B (en) * | 2016-03-04 | 2019-10-08 | 上海交通大学 | Full duplex relaying selection method based on expired channel state information |
CN105813081B (en) * | 2016-03-09 | 2019-01-01 | 华侨大学 | The method that selective enhancement recognizes the relay node of junction network security performance |
CN106102044B (en) * | 2016-05-23 | 2018-04-17 | 西安交通大学 | A kind of multi-user's junction network downlink cooperation physical layer method for secret protection |
CN106230476B (en) * | 2016-07-26 | 2018-03-02 | 西安交通大学 | Information secure transmission method based on non-joint man made noise in insincere relay system |
CN106712823B (en) * | 2016-12-21 | 2020-11-13 | 西安电子科技大学 | Beam forming method capable of realizing physical layer safe transmission |
CN106911420A (en) * | 2017-03-15 | 2017-06-30 | 中国人民解放军理工大学 | A kind of RF energy gathers the safe transmission method of many relay systems of untrusted |
CN106992836B (en) * | 2017-03-24 | 2019-04-09 | 华侨大学 | Full duplex scrambling transmission method in a kind of untrusted junction network |
WO2019006712A1 (en) * | 2017-07-05 | 2019-01-10 | 深圳大学 | Mobile device position control method and apparatus based on single bit feedback |
WO2019006713A1 (en) * | 2017-07-05 | 2019-01-10 | 深圳大学 | Mobile device position control method and apparatus based on adaptive noise feedback |
CN112637925B (en) * | 2020-11-28 | 2022-06-03 | 重庆财经学院 | Safe relay selection method based on random forest non-uniform quantitative feature extraction |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101340218A (en) * | 2007-07-04 | 2009-01-07 | 华为技术有限公司 | Communication method and apparatus in MIMO system |
CN101494490A (en) * | 2009-01-04 | 2009-07-29 | 北京邮电大学 | Accidental distributed self-organizing communication method and system based on feedback |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101399794B1 (en) * | 2012-10-23 | 2014-05-27 | 고려대학교 산학협력단 | Limited Feedback Method and Apparatus for Two-Way Wireless Relaying Channels with Physical Networking Coding |
-
2014
- 2014-07-08 CN CN201410323124.3A patent/CN104104422B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101340218A (en) * | 2007-07-04 | 2009-01-07 | 华为技术有限公司 | Communication method and apparatus in MIMO system |
CN101494490A (en) * | 2009-01-04 | 2009-07-29 | 北京邮电大学 | Accidental distributed self-organizing communication method and system based on feedback |
Non-Patent Citations (4)
Title |
---|
MIMO解码转发双向中继系统中的传输侧率与中断概率分析;赵睿;《信号处理》;20100331;第26卷(第3期);第361-368页 * |
The Gaussian multiple access wiretap channel wireless secrecy and cooperative jamming;E.Tekin;《Information Theory and Application Workshop》;20071122;第6页第1段 * |
解码转发MIMO双向中继系统的传输策略与性能;赵睿;《中国科学》;20091231;正文第2-4页 * |
解码转发MIMO双向中继系统的传输策略与性能分析;赵睿;《中国科学》;20091231;第39卷(第12期);正文第2-4页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104104422A (en) | 2014-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104104422B (en) | A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback | |
Liu et al. | Power splitting-based SWIPT with decode-and-forward full-duplex relaying | |
Hu et al. | Covert transmission with a self-sustained relay | |
CN106131823B (en) | Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene | |
CN103702322B (en) | A kind of safe transmission method of physical layer resisting the eavesdropping of unreliable via node | |
Xia et al. | Cache aided decode-and-forward relaying networks: From the spatial view | |
CN106992836B (en) | Full duplex scrambling transmission method in a kind of untrusted junction network | |
CN104320826B (en) | The opportunistic relay system of selection of cooperative communication network under a kind of eavesdropping environment | |
Pratas et al. | Underlay of low-rate machine-type D2D links on downlink cellular links | |
CN104469755A (en) | Physical layer security transmission method for keeping relay and jamming node selection result secret | |
CN101902265A (en) | Safe transmission method of physical layer in wireless communication | |
CN110299934A (en) | A kind of security transmission method for wirelessly taking energy full duplex relaying system | |
Wang et al. | Relay selection of full‐duplex decode‐and‐forward relaying over Nakagami‐m fading channels | |
Wang et al. | Outage probability of full-duplex AF relaying with processing delay and residual self-interference | |
Lv et al. | Achieving covert wireless communication with a multi-antenna relay | |
Li et al. | CUTS: Improving channel utilization in both time and spatial domain in WLANs | |
CN105933894B (en) | The method for carrying out cipher key-extraction using the stochastic behaviour that recipient receives signal | |
CN109039411A (en) | A kind of unidirectional full duplex MIMO relay antenna selection safe transmission method | |
CN105933040A (en) | Secure transmission method adopting information source and relay-combined transmitting antenna selection | |
CN106533496B (en) | A kind of unreliable relaying duplex communication method based on interference cooperation | |
CN102752080B (en) | A kind of anti-eavesdrop coded method based on physical layer | |
Sun et al. | Security performance analysis of relay networks based on-shadowed channels with rhis and cees | |
Vishwakarma et al. | Decode-and-forward relay beamforming for secrecy with finite-alphabet input | |
CN105490721B (en) | A kind of estimation retransmission method of full duplex traffic cooperative communication network | |
CN105978610B (en) | It is a kind of meter and radio physical layer safety base station forwarding multiple antennas processing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |