CN104217012A - Font library issuing method and font library protection system - Google Patents

Font library issuing method and font library protection system Download PDF

Info

Publication number
CN104217012A
CN104217012A CN201410485133.2A CN201410485133A CN104217012A CN 104217012 A CN104217012 A CN 104217012A CN 201410485133 A CN201410485133 A CN 201410485133A CN 104217012 A CN104217012 A CN 104217012A
Authority
CN
China
Prior art keywords
character
character library
library
information
font library
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410485133.2A
Other languages
Chinese (zh)
Other versions
CN104217012B (en
Inventor
朱信
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410485133.2A priority Critical patent/CN104217012B/en
Publication of CN104217012A publication Critical patent/CN104217012A/en
Application granted granted Critical
Publication of CN104217012B publication Critical patent/CN104217012B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Controls And Circuits For Display Device (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a font library issuing method. A font library comprises character encoding index information. The font issuing method comprises the following steps: A, receiving demanded information; B, retrieving demanded characters according to the matching of the demanded information and the character encoding index information in the font library; C, combining the retrieved demanded characters to form a sub-font library calling file. A sub-font library can be extracted from the font library according to a small number of text demands of users, and the complete font library is prevented from being stolen by calling the sub-font library with a small number of characters; due to the uniqueness of character sets used by the users respectively, the whole font library is fully protected. The font library issuing method is a great progress of a large-character-set font library burglary protection technology.

Description

A kind of character library distributing method and character library protection system
Technical field
The present invention relates to computer library process field, particularly relate to a kind of character library distributing method and character library protection system.
Background technology
Up to now, computer library technology is all based on truetype(opentype(.ttf .otf .ttc) wherein ttc be a kind of intersection of ttf), ttf, otf etc. are curve of order 2 technology (turn two curved), and what Chinese character used substantially is all ttf or otf technology.
Chinese ttf character library comes from applying mechanically west truetype technology.First, it is a technology based on Western Culture.Western Culture is on language all based on phonetic alphabet, and the maximum person of the Latin alphabet of the horizontal spelling of western language is also no more than " small size character set " character library of 100.
For small size character set character library, often in a word, all letters in character library will all be used one time.If carry out this case so-called " encryption " for this small size character set character library, actually without any Practical significance, because in careless one section of short essay or a few words, all characters are just called one time.Character library is the image set of character, and object all will be seen to people.Its graphic style, after the character seeing this character library, can capture by people easily, then is generated by character library edit routine editor.Pirate character libary is too simple.Moreover also need expressly to call in the middle of the present computer technology, thus present age computer technology never carries out any Encryption Design to character library.
But Chinese is large character set, up to now, the Chinese word library of the universal standard, the character set of minimum character library also makes by GB GB_2312-80, has 6763 Chinese characters.For user, although the most frequently used is text word, but as enlivening the lemma, the core language of advertisement design, various package design, Brand Design, label design etc. of the space of a whole page, each only use several word or tens words in Chinese character base, only account for 1% even 1 ‰ of whole character set.
The character library industry of China Today, is in the condition scraped the bottom of the barrel nearly ten years always.Basic reason is exactly pirate, because the cost of manufacture of large character set character library is so high, even if there is now instrument can make a Hanzi font library, even be exactly word for word read through, is also a huge engineering relative ease.Coinage company drops into huge fund and produces character library, as long as the mode of sale character library has traditionally sold one, just completely likely thoroughly pirate, thus causes the scene that No kernels or seeds are gathered, as in a year of scarcity.Market also occurred so-called character library encryption technology, but character library still can be derived by user in various manners, like this, its encrypted work done is equal to nothing and plays due effect
Thus existing character library anti-piracy technique need to improve.
Summary of the invention
In view of above-mentioned the deficiencies in the prior art part, the object of the present invention is to provide a kind of character library distributing method and character library protection system, utilize the mode extracting small library use in large character library, be to solve character library easily by the problem of piracy.
In order to achieve the above object, this invention takes following technical scheme:
A kind of character library distributing method, comprise character library, described character library comprises character code index information, and described method comprises step:
A, reception demand information;
B, according to demand information mate with character code index information in character library, Search Requirement character;
The demand character that C, merging retrieve, forms sub-character library and calls file.
In described character library distributing method, described demand information comprises character code and authorization information.
Described character library distributing method, also comprises step before steps A:
A0, loading user's registration information or the information of purchase.
In described character library distributing method, step B comprises:
B1, loading authorization information, whether authentication of users is registered or is bought, if then perform step B2, otherwise performs step B3;
B2, to mate with character code index information in character library according to described character code code character, Search Requirement character;
B3, end coupling.
A character library protection system for described character library distributing method, comprising:
Character library, it comprises character code index information;
MIM message input module, for receiving demand information;
Matching module, for reading the demand information that described MIM message input module receives, and mate with described character code index information according to described demand information, character needed for retrieval, by character merging needed for retrieving, forms sub-character library and calls file.
In described character library protection system, described demand information comprises character code and authorization information.
Described character library protection system, also comprises memory module, for storing log-on message or its purchase information of user.
Described character library protection system; also comprise authentication module; for log-on message described in described authorization information and described memory module and described purchase information being compared, if comparison success, described character code code character is sent to described matching module, otherwise the sub-character library of prompting refusal coupling.
Compared to prior art; a kind of character library distributing method provided by the invention and system; sub-character library can be extracted in character library according to the word demand of the smallest number of user; call by having the sub-character library of a small amount of character to this; avoid this complete character library stolen; because each time of user uses the uniqueness of sub-character library, thus whole character library being adequately protected, is the anti-piracy much progress of large character set word-base technology.
Accompanying drawing explanation
The process flow diagram of the character library distributing method that Fig. 1 provides for the application.
Flow chart of steps is mated in the character library distributing method that Fig. 2 provides for the application.
The process flow diagram of the another kind of embodiment of the character library distributing method that Fig. 3 provides for the application.
The structured flowchart of the character library publishing system that Fig. 4 provides for the application.
Embodiment
The invention provides a kind of character library distributing method and system, for making the object of the application, technical scheme and effect clearly, clearly, referring to the accompanying drawing embodiment that develops simultaneously, the application being further described.Should be appreciated that specific embodiment described herein only in order to explain the application, and be not used in restriction the application.
The application provides a kind of character library distributing method and system; character library for the protection of large character set is not stolen, and described large character set comprises GB_2312-80(6763), big5(13060), GBK(20902), the imperfect character set and self-defining character collection etc. of nonstandard (neither international standard also non-national standard).
So-called character library, its essence is the image set of same style font.Then multiple preservation and indexed mode can be had as image set.The preservation form of the large character set character library mentioned in the application is not limited to character library form ttf, otf, ttc etc., and other preserving types as character pictures such as bitmap format or polar plot forms are all the directions of equal importance that the application applies.
The preservation form of the large character set mentioned in the application is not limited to character library form ttf etc., and such as the character library preserving type such as bitmap format or polar plot form is all the Main way that the application applies.Certainly, for ensureing the convenience that character library is called, first the application should set up character library distribution website or program, is convenient to exchange with user.It should be noted that in described website or program and can preserve multiple character library, its form comprises ttf, ttc, otf or character picture (collection) etc., is supplied to user and selects.
Below, extract sub-character library with single character library and preserve the method step calling file, the character library distributing method that the application provides is described in detail.Refer to Fig. 1, the process flow diagram of its character library distributing method provided for the application.As shown in Figure 1, described method comprises:
S100, reception demand information;
S200, according to demand information mate with character code index information in character library, Search Requirement character;
The demand character that S300, merging retrieve, forms sub-character library and calls file.
See also Fig. 4, the structured flowchart of its character library guard method provided for the application.As shown in Figure 2, described character library publishing system comprises character library 100, MIM message input module 200 and matching module 300.Described MIM message input module 200, described matching module 300 are connected successively with described character library 100.
Wherein, character code index information is comprised in described character library 100; Described character code index information comprises the international standard character code code of each character of described character library 100; Described character code index information comprises each character positional information in described character library 100 in described character library 100; Described positional information comprises matrix information or order information, and corresponding region-position code information is then matrix position or ordinal position.Concrete, the character picture that each character code is corresponding unified.
Described MIM message input module 200, for receiving the demand information that user sends; The demand information that described matching module 300 receives for reading described MIM message input module 100, and mate with described character code index information according to described demand information, character needed for retrieval, by character merging needed for retrieving, forms sub-character library and calls file.
During concrete enforcement, user provides demand information to described MIM message input module 200, the demand information of acceptance is sent to described matching module 300 by described MIM message input module 200, required for user character extracts according to described demand information by described matching module 300 in character library 100, synthon character library, so that user uses.Wherein, described character comprises the picture/mb-type such as bitmap format character, polar plot formatted file.
Wherein, institute's bitmap file collection and vector map file collection effectively can expand the usable range of described sub-character library, and sub-character library preserves the diversity of form, character library can be made to issue safer.Such as, character library distribution website or program are after saving limited sub-character library, and the form that the sub-character library of preservation calls file can be changed (such as changing ttc form into by ttf form), even if make malicious user can take multiple sub-character library, can not synthesize character library.
Concrete, in further implementing, described demand information comprises character code and authorization information.Described character-coded concrete number looks character library size free setting; In the present embodiment, described character-coded number should control below 50, has this control that character library then can be made to be extracted respectively, downloads, the probability of split piracy reduces greatly.
Further, consider the use safety of described character library protection system, also comprised before described step S100: load user's registration information and the information of purchase.
During concrete enforcement, described character library protection system also comprises memory module 400, for storing log-on message and its purchase information of user.Described user's registration information and the information of purchase can be certificate load mode.
Further, see also Fig. 2, described step S200 specifically comprises:
S201, loading authorization information, whether authentication of users is registered, if then perform step S202, otherwise performs step S203;
S202, to mate with character code index information in character library according to described character code code character, Search Requirement character;
S203, end coupling.
Described character library protection system also comprises authentication module 500; for log-on message described in described authorization information and described memory module and described purchase information are compared; if comparison success, is sent to described matching module 300 by described character code code character, otherwise the sub-character library information of prompting refusal coupling.So ensure that character library is not taken arbitrarily.
Further, see also Fig. 3, consider that user is when using sub-character library, may be transplanted in other softwares, and need to call described sub-character library, therefore described character library guard method also comprises step:
S400, transmission demand information are to sub-character library;
If comprise word needed for demand information in the sub-character library of S500, then perform step S600, otherwise perform step S100;
S600, export word in sub-character library, terminate to call.
In the specific implementation, above-mentioned sub-character library is saved in relevant position and calls by user, and in use, first user searches for required Word message in sub-font file, if comprise the Word message required by user in described sub-character library, then by the corresponding font display of required word; If there is no corresponding Word message in sub-character library, just need user to be again sent in character library by demand information, carry out the coupling of new sub-character library.
Certainly, consider the character library distributing method that the protection the application more optimized provides, in described step S300, when synthon character library calls file, it calls file and comprises following distortion:
Distortion 1: raise the price and become large character library.According to the sub-character library that the character of user's request generates, then in described sub-character library, add several extremely seldom used words, for user provides on the basis of a larger character library, also protect the risk that former character library is not stolen.
Distortion 2: the shadow character library making several variants, described shadow character library is the variant character library of former character library, and wherein character is deformed characters or mess code character, is the prosthese character that cannot use; Time each user asks a small library, described small library is inserted in described shadow character library, synthesis call word library file.
Below, with a kind of embodiment, the application is described in detail.
The certificate of log-on message and the information of purchase is loaded in described character library protection system by user, the demand information of 10 characters is sent to described MIM message input module 200, now, described authentication module 400 verifies the authorization information in described demand information, judge whether user buys, if then the character code code character of 10 characters is sent to described matching module 300, described matching module 300 mates in character library 100 according to described character code code character, the sub-character library of synthesis containing 10 characters, and then described sub-character library is saved as ttf form by described matching module 300, sub-character library can be applied in other office, if authentication of users is not bought, then prompting can not provide character library rights of using.When user reuses the special efficacy of identical word, only need search accordingly in described sub-character library and use, if the sub-character library of preserving calls the data that file does not have user's request word, then need the coupling of carrying out new sub-character library in user to character library.
Definition about character library: no matter be ttf, otf or picture (collection), character library is all the set of character picture.So-called " set ", its basic meaning has the character picture of some in being all, and style is identical.According to us known character set pattern and conventional Environmental Support, generally have several as follows:
1. GB_2312-80; Namely within 1980, announce and implement national standard, amount to 6763 Chinese characters.Certainly, according to actual conditions, often also have increase or the change of some character, such as “ Rong " word etc.
2. Big5; Taiwan standard, amounts to 13060 Chinese characters.Also the change (mainly increasing) of with good grounds situation instantly.Japan and Korea S's character set.There is the coinage company of market abroad according to the character set of distribution of Japan and Korean market.And this character set is contained among Big5 more and (does not admit simplified Chinese character abroad).Word in also having certain future which country to adopt according to the needs of oneself in the world, character set how, whether admits that simplified Chinese character is just unknown.
3. 9078; 9078 is domestic a kind of variant collection played according to GB_2312-80.Be meant to, GB_2312-80 only has simplified form of Chinese Character word, and the needs (as external distribution etc.) of simplified text often useful complex form of Chinese characters performance, the method that coinage company provides is then set up " XXX body is numerous " so a kind of font according to the principle of complicated and simple correspondence, during use, open or choose simplified text, then choosing " XXX body is numerous " display to transfer the complex form of Chinese characters to.But the method is too simple and crude, because have one-to-many problem during simplified Chinese characters, such as, in simplified form of Chinese Character, " queen ", " front and back " are all correct, but are then " queen ", " front Hou " in Chinese-traditional environment, if " emperor Hou ", laugh at exactly.The word of this one-to-many probably has about 120, mostly is everyday character.In fact, complicated and simple all characters all coexist in Unicode, so there is character library to be exactly simply in the light of actual conditions, compile in collaboration with complicated and simple, define the wonderful work form being only confined to GB_2312-80 character set and corresponding complex form of Chinese characters collection of this 9078 patterns.Note, this character set is a kind of common format, and country does not admit that it is standard.
4. GBK; That the international Unicode of process comprising GB_2312-80, big5, Hong Kong word, japanese character etc. organizes accreditation, comparatively popular standardized characters collection.Certainly in the Unicode coding assignment of two-byte character, also have 6400 Chinese characters of expansion A, but less use.
5. 3755 or say 4000 words, this is when specifying GB_2312-80 standard originally, the Modern Chinese everyday character drawn by statistics of data acquisition widely.Although this statistics of possibility is out-of-date at the moment, everyday character frequency there occurs certain change, reasonable.Character library is used, if you are only for the theoretical current events text of general policy, use this scale character library also not have much problems, at least get only an examination.
6. self-defined collection.So-called " self-defined collection " refers to various numberless wordbook (" Xinhua dictionary ", " modern Chinese dictionary " especially since the establishment of the nation etc.) since the dawn of human civilization, has one to understand the character set of (nonstandard) according to editor oneself.General this character set all contains the everyday character part of GB_2312-80, just comes in and goes out in non-common character segment mutual.Common are " conventional 3000,4000,5000,6000,7000,8000 words " etc.
About the storage style issues of character library.Character library is the file layout that the digital products such as a kind of computing machine are extensively supported.No matter it is stored in any carrier, and the digital character of character library is constant.We discuss character library issuing way problem, should no matter character library Store form, because only relate to character set size issue here.
The what is called " large character library " mentioned in this patent document, refers to the character library of independent distribution meaning, namely client take this character library for oneself document display (can show can typesetting, publication, printing, and produce commercial value) time generally effective.Above-mentioned 6 kinds of character set are all the character set of " large character library ", have stronger general meaning.And this patent so-called " small library ", then refer to the character set being less than 1000 words.
In sum, the character library guard method that the application provides and system, by calling the sub-character library of a complete character library, first successfully can meet client and using word demand normally.Meanwhile, even if there is the sub-character library of sufficient amount in client's hand, wants this character library again to synthesize and also only there is theoretic possibility and by no means easy.Process like this then reaches protection character library not by pirate effect.This is a much progress of protection large character set character library distribution.
Be understandable that, for those of ordinary skills, can be equal to according to the technical scheme of the application and application design thereof and replace or change, and all these change or replace the protection domain that all should belong to the claim appended by the application.

Claims (8)

1. a character library distributing method, is characterized in that, comprises character library, and described character library comprises character code index information, and described method comprises step:
A, reception demand information;
B, according to demand information mate with character code index information in character library, Search Requirement character;
The demand character that C, merging retrieve, forms sub-character library and calls file.
2. character library distributing method according to claim 1, is characterized in that, described demand information comprises character code and authorization information.
3. character library distributing method according to claim 1, is characterized in that, also comprise step before steps A:
A0, loading user's registration information or the information of purchase.
4. character library distributing method according to claim 3, it is characterized in that, step B comprises:
B1, loading authorization information, whether authentication of users is registered or is bought, if then perform step B2, otherwise performs step B3;
B2, to mate with character code index information in character library according to described character code code character, Search Requirement character;
B3, end coupling.
5. utilize a character library protection system for character library distributing method described in claim 1, it is characterized in that, comprising:
Character library, it comprises character code index information;
MIM message input module, for receiving demand information;
Matching module, for reading the demand information that described MIM message input module receives, and mate with described character code index information according to described demand information, character needed for retrieval, by character merging needed for retrieving, forms sub-character library and calls file.
6. character library protection system according to claim 5, is characterized in that, described demand information comprises character code and authorization information.
7. character library protection system according to claim 6, is characterized in that, also comprise memory module, for storing log-on message or its purchase information of user.
8. character library protection system according to claim 7; it is characterized in that; also comprise authentication module; for log-on message described in described authorization information and described memory module and described purchase information are compared; if comparison success, is sent to described matching module by described character code code character, otherwise the sub-character library of prompting refusal coupling.
CN201410485133.2A 2014-09-22 2014-09-22 A kind of character library distributing method and character library protect system Expired - Fee Related CN104217012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410485133.2A CN104217012B (en) 2014-09-22 2014-09-22 A kind of character library distributing method and character library protect system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410485133.2A CN104217012B (en) 2014-09-22 2014-09-22 A kind of character library distributing method and character library protect system

Publications (2)

Publication Number Publication Date
CN104217012A true CN104217012A (en) 2014-12-17
CN104217012B CN104217012B (en) 2018-07-27

Family

ID=52098502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410485133.2A Expired - Fee Related CN104217012B (en) 2014-09-22 2014-09-22 A kind of character library distributing method and character library protect system

Country Status (1)

Country Link
CN (1) CN104217012B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111881648A (en) * 2020-08-06 2020-11-03 上海触讯信息科技有限公司 Method for generating electronic book font file

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833747A (en) * 2010-05-10 2010-09-15 深圳市永达电子股份有限公司 Method and system for generating digital watermark-based safe word stock
CN101887713A (en) * 2009-05-13 2010-11-17 深圳市文鼎创数据科技有限公司 Encryption method and device for font library
CN102043782A (en) * 2009-10-19 2011-05-04 英业达股份有限公司 Search system and method capable of establishing index according to codes
CN102289511A (en) * 2011-08-31 2011-12-21 深圳市茁壮网络股份有限公司 Word stock file downloading method, user terminal and server
CN102486821A (en) * 2010-12-02 2012-06-06 北大方正集团有限公司 Word stock copyright control method and device
WO2013097826A1 (en) * 2011-12-31 2013-07-04 北京大学 Chinese character constructing method and device, character constructing method and device, and font library building method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101887713A (en) * 2009-05-13 2010-11-17 深圳市文鼎创数据科技有限公司 Encryption method and device for font library
CN102043782A (en) * 2009-10-19 2011-05-04 英业达股份有限公司 Search system and method capable of establishing index according to codes
CN101833747A (en) * 2010-05-10 2010-09-15 深圳市永达电子股份有限公司 Method and system for generating digital watermark-based safe word stock
CN102486821A (en) * 2010-12-02 2012-06-06 北大方正集团有限公司 Word stock copyright control method and device
CN102289511A (en) * 2011-08-31 2011-12-21 深圳市茁壮网络股份有限公司 Word stock file downloading method, user terminal and server
WO2013097826A1 (en) * 2011-12-31 2013-07-04 北京大学 Chinese character constructing method and device, character constructing method and device, and font library building method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
刘树东等: ""高级小字库技术"", 《计算机应与软件》 *
闫宗孝: "索引汉子小字库的生成和调用", 《电脑编程技巧与维护》 *
陈家祺: "一种汉字小字库的生成方法", 《现代计算机》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111881648A (en) * 2020-08-06 2020-11-03 上海触讯信息科技有限公司 Method for generating electronic book font file

Also Published As

Publication number Publication date
CN104217012B (en) 2018-07-27

Similar Documents

Publication Publication Date Title
US11886806B2 (en) Templating process for a multi-page formatted document
US20120042236A1 (en) Integrated document viewer
CN104572685B (en) Data reordering method
CN103049491A (en) Method and device for managing picture file
US6678688B1 (en) Method and apparatus for composite font generation
CN104424192A (en) Method and device for forming multi-font font library and method and device for displaying different fonts
US7197706B1 (en) Method and system for ensuring accurate font matching in documents
CN112422543A (en) Anti-crawler method and device
US20150113391A1 (en) Document processing system, document processing method and storage medium
US10311060B2 (en) Glyph management in texture atlases
Whitington PDF explained
CN103413104A (en) Processing method and device for transaction sensitive information
CN103488441A (en) Implementation method for printing Arabic on POS (point-of-sale) terminals
US20120091203A1 (en) Method of encoding and decoding text on a matrix code symbol
CN104217012A (en) Font library issuing method and font library protection system
CN101369953B (en) Font network distribution method and system
US9442898B2 (en) Electronic document that inhibits automatic text extraction
CN113486097B (en) Big data export method, device, equipment and storage medium
CN108985759B (en) Address generating method, system, equipment and storage medium for cryptocurrency
CN107943760B (en) Method and device for optimizing fonts of PDF document editing, terminal equipment and storage medium
JP2005215915A (en) Personal information delivery system
CN101840483A (en) Method and system for protecting computer document contents
CN110008663B (en) Method for quickly embedding and extracting information for PDF document protection and distribution tracking
CN113569289A (en) Data desensitization method and device
CN115104092A (en) Data synchronization method and related device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180727

Termination date: 20190922

CF01 Termination of patent right due to non-payment of annual fee