CN105306441A - Peer-to-peer (P2P) network online transmission based burn after reading method and device - Google Patents

Peer-to-peer (P2P) network online transmission based burn after reading method and device Download PDF

Info

Publication number
CN105306441A
CN105306441A CN201510598646.9A CN201510598646A CN105306441A CN 105306441 A CN105306441 A CN 105306441A CN 201510598646 A CN201510598646 A CN 201510598646A CN 105306441 A CN105306441 A CN 105306441A
Authority
CN
China
Prior art keywords
customer end
server
file
namely
burn
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510598646.9A
Other languages
Chinese (zh)
Inventor
梁效宁
杨明
甘元军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SICHUAN XLY INFORMATION SAFETY TECHNOLOGY Co Ltd
Original Assignee
SICHUAN XLY INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN XLY INFORMATION SAFETY TECHNOLOGY Co Ltd filed Critical SICHUAN XLY INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority to CN201510598646.9A priority Critical patent/CN105306441A/en
Publication of CN105306441A publication Critical patent/CN105306441A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/256NAT traversal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a peer-to-peer (P2P) network online transmission based burn after reading method and device, relating to the field of data security. The method and device have the beneficial effects that data direct exchange is performed totally based on P2P without relying on a transit server; a burn after reading file is encrypted in transmission; and a special reader is adopted for reading the file, thereby limiting operations like screenshot, printing, copying, sharing and so on, and the file is destructed when the reader is turned off. Compared with existing burn after reading technologies, the method and device are safer, are more user-friendly, can be widely used by client groups with high requirement on file confidentiality, like war industry, enterprises and public institutions and so on, and have a good market prospect.

Description

Namely method and apparatus is burnt based on after the readding of P2P network on-line normalization
Technical field
The invention belongs to data security arts, be specifically related to a kind ofly namely burn method and apparatus based on after the readding of P2P network on-line normalization.
Background technology
Have a lot of equipment and technology can be included into the ranks of P2P on the market at present, these equipment and technology generally have following characteristic:
1. allow user to communicate with each other and exchange message, swap file.But information interchange is not direct, needs the server being positioned at center and coordinate.Because the number of server only has one (even if having multiple also very limited), easily there is single failpoint in system.
2. single server is in the face of numerous clients, and due to the restriction of CPU ability, memory size, the network bandwidth, the client that can simultaneously serve is very limited, poor expandability.
3. the data on server are easily subject to network attack, or the problem of server own brings security threat.
4., on namely burning after readding, the outer originating party of file cannot confirm whether read rear file is really destroyed, is not replicated.
The explanation of nouns that the present invention relates to:
P2P: the abbreviation being peer-to-peer, the meanings such as peer has in English " (status, ability etc.) coordinate ", " colleague " and " partner ".P2P can be understood as the meaning of " partner is to partner ", or is called Peer-To-Peer.Briefly, P2P is exactly computer, the swap file that people can be directly connected to other users, instead of is connected to server as before and goes to browse and download.
Namely burn after readding (Burnafterreading): just can know from literal meaning: file viewed from reader after oneself destroy (self-destructing), be a kind of technology of administering digital file survival mechanism.
Network address translation NAT (NetworkAddressTranslators): network address translation produces when IP address lacks day by day, its main purpose is exactly in order to can address reuse.NAT is divided into two large classes from historical development, basic NAT and NAPT (NetworkAddress/PortTranslator).NAPT not only can change the IP address of the IP datagram through this NAT device, also can change the TCP/UDP port of IP datagram.
IP address of internal network: refer to the private address used in A/B/C class, the IP address of distribution is not feared in the whole world uniqueness, also therefore directly cannot be accessed by other outer net main frame.
Public network IP address: refer to have globally unique IP address, can directly by other host access.
TCP (TransmissionControlProtocol): belong to transport layer protocol is the reliable data transmission under IP world, and the service that it provides comprises data stream, reliability, effectively Flow Control, full-duplex operation and multiplexed.By SCCP connection-oriented, end-to-end and reliable Packet Generation.
UDP (UserDatagramProtocol): belong to transport layer protocol is the agreement corresponding with TCP.It is that it does not connect with the other side towards disconnected agreement, but directly just Packet Generation is gone over.
Advanced Encryption Standard (AdvancedEncryptionStandard, AES): the specification being encrypted electronic data used for American National Standard and technical research is a new cryptographic algorithm that may be used for protecting electronic data.Specifically, AES is the password of an iteration, symmetric key grouping, and it can use 128,192 and 256 keys, and with 128 (16 byte) block encryptions and data decryption.Symmetric key cipher uses identical secret key encryption and data decryption.The figure place of the enciphered data returned by block cipher is identical with input data.Iterative cryptographic uses a loop structure, repeats displacement in the cycle and replaces input data.AES256 uses 256 secret key encryptions and data decryption exactly.
Summary of the invention
The present invention is directed to the deficiencies in the prior art, provide and a kind ofly namely burn method and apparatus based on after the readding of P2P network on-line normalization, after existing readding can be solved, namely burn the lower and problem of the inadequate hommization of operating experience of technical security.
For overcoming the above problems, the technical solution used in the present invention is as follows: a kind ofly namely burn method based on after the readding of P2P network on-line normalization, and comprises the following steps:
S1, customer end A and customer end B send heartbeat to the outside index server of server end S, and customer end A sets up transient port, obtains temporary duty;
The outside index server of S2, server end S sends notice, allows customer end B send out detection packet to NAT211.133.*;
S3, customer end B send detection packet to customer end A;
S4, customer end B send feedback packet to the outside index server of server end S;
The outside index server of S5, server end S forwards feedback packet to customer end A;
S6, customer end A and customer end B set up P2PChannel, create interim shared room;
S7, customer end A select outgoing document, enciphered data, generate after readding and namely burn file;
Namely S8, customer end A burn file and password read after customer end B transmission is read;
S9, customer end B collect file, read, exit rear destruction file.
As preferably, the concrete grammar of S6 is as follows:
S61, customer end A and customer end B arrange a coded lock jointly, and coded lock is as the shared room secret key of agreement;
S62, customer end A and customer end B input username and password lock, the simultaneously outside index server of logon server end S;
The outside index server of S63, server end S generates an online customer list, comprises each client user's name, secret key;
If S64 customer end A is identical with the secret key of customer end B, then both sides can receive the online buddy list of password the same as oneself;
S65, customer end A and customer end B find each other, start communication.
As preferably, the enciphered data described in S7 adopts AES256 encryption standard.
As preferably, destroy described in S9 and namely burn document after readding and adopt the data area to document stores all to fill out 0 operation.
For overcoming the above problems, the present invention additionally uses following technical scheme: a kind ofly namely burn device based on after the readding of P2P network on-line normalization, and comprises the outside index server of customer end A, customer end B and server end S; Wherein, customer end A and customer end B send heartbeat to the outside index server of server end S, and customer end A sets up transient port, obtains temporary duty; The outside index server of server end S sends notice, allows customer end B send out detection packet to NAT211.133.*; Customer end B sends detection packet to customer end A; Customer end B sends feedback packet to the outside index server of server end S; The outside index server of server end S forwards feedback packet customer end A to customer end A and customer end B sets up P2PChannel, creates interim shared room; Customer end A selects outgoing document, enciphered data, generates after readding and namely burns file; Namely customer end A burns file and password read after customer end B transmission is read; Customer end B collects file, reads, exits rear destruction file.
As preferably, described customer end A is mobile terminal device or desktop computer.
As preferably, described customer end B is mobile terminal device or desktop computer.
Beneficial effect of the present invention is as follows:
1. carry out data based on P2P completely directly to exchange, do not rely on transfer server;
2. namely burn document after pair readding to be encrypted in transmitting procedure;
3. use exclusive reader reading documents, operations such as limiting screenshotss, printing, copy, share, and when closing reader, destroy document.
In sum, it is higher that namely method and apparatus of the present invention burns technical security after existing readding, and hommization more, the customers higher to file confidentiality requirement can be widely used in, as military project, enterprises and institutions etc., there are good market prospects.
Accompanying drawing explanation
Namely Fig. 1 burns main flow chart after P2P reads;
Fig. 2 is for creating interim shared room main flow chart;
Fig. 3 for generate, read, destroy read after namely burn file main flow chart.
Embodiment
For making object of the present invention, technical scheme and advantage clearly understand, to develop simultaneously embodiment referring to accompanying drawing, the present invention is described in further details.
Principles and methods:
Intranet penetrates: namely NAT penetrates, and term when network connects, being commonly called as " burrowing ", is set up the most important step of P2PChannel.Have UDP " to burrow " in existing Intranet through-transmission technique and TCP " burrows ", but conventional penetrating is that UDP " burrows " at present.When a computer in Intranet will access public network, packet is sent to NAT gateway, packet header comprises public network IP, port and the machine IP, port, NAT gateway can replace to the machine IP, port oneself public network IP, a untapped port, and write down this mapping relations, for later forwarding data bag uses, and then data are issued public network.Public network is made a response after receiving data, and send data to that untapped port of NAT gateway, then NAT gateway is by data retransmission to the computer of that in Intranet, realizes the communication of Intranet and public network.
Embodiment:
In order to describe the inventive method in detail, setting forth further by reference to the accompanying drawings: a kind ofly namely burn method based on after the readding of P2P network on-line normalization, as shown in Figure 1, comprising the following steps:
1, customer end A (P1), the ClientA namely in figure and customer end B (P2), the ClientB namely in figure does not know how to connect at first, so all send heartbeat to the outside index server of server end S (ServerS).Customer end A (P1) client sets up transient port, as 6000, obtains temporary duty;
2, the outside index server of server end S sends notice, allows P2 send out detection packet to NAT211.133.*;
3, customer end B (P2) sends detection packet to customer end A (P1);
4, customer end B (P2) sends feedback packet to the outside index server of server end S;
5, the outside index server of server end S forwards feedback packet to customer end A (P1);
6, customer end A (P1) and customer end B (P2) set up P2PChannel, create interim shared room; (detailed process is shown in Fig. 2);
7, customer end A (P1) selects outgoing document, enciphered data, generates after readding and namely burns file (detailed process is shown in Fig. 3);
8, customer end A (P1) namely burns file and password read after customer end B (P2) transmission is read;
9, customer end B (P2) collects file, reads, exits rear destruction file (detailed process is shown in Fig. 3).
As shown in Figure 2,
1, customer end A (P1) and customer end B (P2) agreement coded lock jointly, coded lock is as the shared room secret key of agreement;
2, customer end A (P1) and customer end B (P2) input username and password lock, simultaneously the outside index server of logon server end S;
3, the outside index server of server end S generates an online customer list, comprises each client user's name, secret key;
If 4 customer end A (P1) are identical with the secret key of customer end B (P2), then both sides can receive the online buddy list of password the same as oneself;
5, customer end A (P1) and customer end B (P2) find each other, start communication.
As shown in Figure 3,
1, customer end A (P1) selects the file of wanting outgoing to share;
2, by format conversion, by dissimilar file, special PDF file is converted to;
3, by special PDF file, special PDF reader (when shielding file is read, the screenshotss of computer, record shields, print, the function such as to be copied), destroy program packing, namely setting burns the time after readding, generate one executable read after namely burn file.
4, using AES256 encryption standard to be encrypted namely burning executable file after readding, key string being left in after readding and namely burning executable file head; Customer end A (P1) will namely burn executable file after being read by P2P and key issues customer end B (P2);
5, customer end B (P2) namely burns executable file after obtaining and readding, and obtains key, deciphering;
6, special PDF reader file reading, reduction display file content, customer end B (P2) reading file;
7, customer end B (P2) closes special PDF reader, starts destruction program, destroys pdf document.Namely destruction is burnt document and is adopted the data area to document stores all to fill out 0 operation after readding.
Those of ordinary skill in the art will appreciate that, embodiment described here is to help reader understanding's implementation method of the present invention, should be understood to that protection scope of the present invention is not limited to so special statement and embodiment.Those of ordinary skill in the art can make various other various concrete distortion and combination of not departing from essence of the present invention according to these technology enlightenment disclosed by the invention, and these distortion and combination are still in protection scope of the present invention.

Claims (7)

1. namely burn a method based on after the readding of P2P network on-line normalization, it is characterized in that, comprise the following steps:
S1, customer end A and customer end B send heartbeat to the outside index server of server end S, and customer end A sets up transient port, obtains temporary duty;
The outside index server of S2, server end S sends notice, allows customer end B send out detection packet to NAT211.133.*;
S3, customer end B send detection packet to customer end A;
S4, customer end B send feedback packet to the outside index server of server end S;
The outside index server of S5, server end S forwards feedback packet to customer end A;
S6, customer end A and customer end B set up P2PChannel, create interim shared room;
S7, customer end A select outgoing document, enciphered data, generate after readding and namely burn file;
Namely S8, customer end A burn file and password read after customer end B transmission is read;
S9, customer end B collect file, read, exit rear destruction file.
2. according to claim 1ly a kind ofly namely burn method based on after the readding of P2P network on-line normalization, it is characterized in that, the concrete grammar of S6 is as follows:
S61, customer end A and customer end B arrange a coded lock jointly, and coded lock is as the shared room secret key of agreement;
S62, customer end A and customer end B input username and password lock, the simultaneously outside index server of logon server end S;
The outside index server of S63, server end S generates an online customer list, comprises each client user's name, secret key;
If S64 customer end A is identical with the secret key of customer end B, then both sides can receive the online buddy list of password the same as oneself;
S65, customer end A and customer end B find each other, start communication.
3. according to claim 1 and 2ly a kind ofly namely burn method based on after the readding of P2P network on-line normalization, it is characterized in that, the enciphered data described in S7 adopts AES256 encryption standard.
4. namely a kind of according to claim or 3 burn method based on after the readding of P2P network on-line normalization, and it is characterized in that, destroys namely to burn document after readding and adopt the data area to document stores all to fill out 0 operation described in S9.
5. according to claim 1ly a kind ofly namely burn device based on after the readding of P2P network on-line normalization, it is characterized in that, comprise the outside index server of customer end A, customer end B and server end S; Wherein, customer end A and customer end B send heartbeat to the outside index server of server end S, and customer end A sets up transient port, obtains temporary duty; The outside index server of server end S sends notice, allows customer end B send out detection packet to NAT211.133.*; Customer end B sends detection packet to customer end A; Customer end B sends feedback packet to the outside index server of server end S; The outside index server of server end S forwards feedback packet customer end A to customer end A and customer end B sets up P2PChannel, creates interim shared room; Customer end A selects outgoing document, enciphered data, generates after readding and namely burns file; Namely customer end A burns file and password read after customer end B transmission is read; Customer end B collects file, reads, exits rear destruction file.
6. according to claim 7ly a kind ofly namely to burn based on after the readding of P2P network on-line normalization, it is characterized in that, described customer end A is mobile terminal device or desktop computer.
7. according to claim 7ly a kind ofly namely to burn based on after the readding of P2P network on-line normalization, it is characterized in that, described customer end B is mobile terminal device or desktop computer.
CN201510598646.9A 2015-09-18 2015-09-18 Peer-to-peer (P2P) network online transmission based burn after reading method and device Pending CN105306441A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510598646.9A CN105306441A (en) 2015-09-18 2015-09-18 Peer-to-peer (P2P) network online transmission based burn after reading method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510598646.9A CN105306441A (en) 2015-09-18 2015-09-18 Peer-to-peer (P2P) network online transmission based burn after reading method and device

Publications (1)

Publication Number Publication Date
CN105306441A true CN105306441A (en) 2016-02-03

Family

ID=55203196

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510598646.9A Pending CN105306441A (en) 2015-09-18 2015-09-18 Peer-to-peer (P2P) network online transmission based burn after reading method and device

Country Status (1)

Country Link
CN (1) CN105306441A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493118A (en) * 2019-04-26 2019-11-22 北京国信冠群技术有限公司 Rear destroyed system and method is read in a kind of realization of Email
CN111090887A (en) * 2019-12-30 2020-05-01 论客科技(广州)有限公司 Conversation content destroying method and device based on instant chat tool
CN112165425A (en) * 2020-09-23 2021-01-01 即时匹配(上海)网络科技有限公司 Burn after reading communication method and communication system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6981141B1 (en) * 1998-05-07 2005-12-27 Maz Technologies, Inc Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files
CN1805388A (en) * 2005-01-12 2006-07-19 腾讯科技(深圳)有限公司 Method for establishing pier-to-pier direct channels
CN103268452A (en) * 2013-05-31 2013-08-28 福建伊时代信息科技股份有限公司 Method and device for file processing
CN103634754A (en) * 2012-08-20 2014-03-12 中国电信股份有限公司 Short message receiving method and realization method, and terminal
CN104066060A (en) * 2014-06-26 2014-09-24 福州大学 Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication
CN104092600A (en) * 2014-07-28 2014-10-08 国家电网公司 Mail burning-after-reading method, device and system
CN104640085A (en) * 2015-02-17 2015-05-20 陈包容 Burn after reading information sending method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6981141B1 (en) * 1998-05-07 2005-12-27 Maz Technologies, Inc Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files
CN1805388A (en) * 2005-01-12 2006-07-19 腾讯科技(深圳)有限公司 Method for establishing pier-to-pier direct channels
CN103634754A (en) * 2012-08-20 2014-03-12 中国电信股份有限公司 Short message receiving method and realization method, and terminal
CN103268452A (en) * 2013-05-31 2013-08-28 福建伊时代信息科技股份有限公司 Method and device for file processing
CN104066060A (en) * 2014-06-26 2014-09-24 福州大学 Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication
CN104092600A (en) * 2014-07-28 2014-10-08 国家电网公司 Mail burning-after-reading method, device and system
CN104640085A (en) * 2015-02-17 2015-05-20 陈包容 Burn after reading information sending method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
马光志等: "《基于对等组的P2P安全通信机制》", 《计算机应用研究》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493118A (en) * 2019-04-26 2019-11-22 北京国信冠群技术有限公司 Rear destroyed system and method is read in a kind of realization of Email
CN111090887A (en) * 2019-12-30 2020-05-01 论客科技(广州)有限公司 Conversation content destroying method and device based on instant chat tool
CN112165425A (en) * 2020-09-23 2021-01-01 即时匹配(上海)网络科技有限公司 Burn after reading communication method and communication system

Similar Documents

Publication Publication Date Title
CN107018134B (en) Power distribution terminal safety access platform and implementation method thereof
US7231664B2 (en) System and method for transmitting and receiving secure data in a virtual private group
US9237059B2 (en) Method and apparatus for dynamic mapping
US8024560B1 (en) Systems and methods for securing multimedia transmissions over the internet
US20050198499A1 (en) System and method for efficiently transferring media across firewalls
Wiley Dust: A blocking-resistant internet transport protocol
Lucena et al. Syntax and semantics-preserving application-layer protocol steganography
Zhang et al. An approach of covert communication based on the Ethereum whisper protocol in blockchain
Chen et al. Blockchain meets covert communication: A survey
De Raadt et al. Cryptography in OpenBSD: An Overview.
CN105306441A (en) Peer-to-peer (P2P) network online transmission based burn after reading method and device
CN101997875B (en) Secure multi-party network communication platform and construction method and communication method thereof
CN108206738A (en) A kind of quantum key output method and system
CN100376092C (en) Firewall and invasion detecting system linkage method
Trabelsi et al. A novel covert channel based on the IP header record route option
Savchenko et al. Analytical review of methods of providing internet anonymity
CN108989486B (en) Communication method and communication system
Goudar et al. Secure data transmission by using steganography
Blaze Key escrow from a safe distance: looking back at the clipper chip
Lindqvist et al. Privacy management for secure mobility
Abukari et al. A secured video conferencing system architecture using a hybrid of two homomorphic encryption schemes: A case of zoom
Black Techniques of network steganography and covert channels
CN115834246B (en) Cloud terminal-to-local terminal data transmission safety protection method and system
Al-Jarrah et al. A thin security layer protocol over IP protocol on TCP/IP suite for security enhancement
CN115174076B (en) Private pursuit and edge computing network construction method based on alliance chain technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160203