CN105306441A - Peer-to-peer (P2P) network online transmission based burn after reading method and device - Google Patents
Peer-to-peer (P2P) network online transmission based burn after reading method and device Download PDFInfo
- Publication number
- CN105306441A CN105306441A CN201510598646.9A CN201510598646A CN105306441A CN 105306441 A CN105306441 A CN 105306441A CN 201510598646 A CN201510598646 A CN 201510598646A CN 105306441 A CN105306441 A CN 105306441A
- Authority
- CN
- China
- Prior art keywords
- customer end
- server
- file
- namely
- burn
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Cardiology (AREA)
- General Health & Medical Sciences (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a peer-to-peer (P2P) network online transmission based burn after reading method and device, relating to the field of data security. The method and device have the beneficial effects that data direct exchange is performed totally based on P2P without relying on a transit server; a burn after reading file is encrypted in transmission; and a special reader is adopted for reading the file, thereby limiting operations like screenshot, printing, copying, sharing and so on, and the file is destructed when the reader is turned off. Compared with existing burn after reading technologies, the method and device are safer, are more user-friendly, can be widely used by client groups with high requirement on file confidentiality, like war industry, enterprises and public institutions and so on, and have a good market prospect.
Description
Technical field
The invention belongs to data security arts, be specifically related to a kind ofly namely burn method and apparatus based on after the readding of P2P network on-line normalization.
Background technology
Have a lot of equipment and technology can be included into the ranks of P2P on the market at present, these equipment and technology generally have following characteristic:
1. allow user to communicate with each other and exchange message, swap file.But information interchange is not direct, needs the server being positioned at center and coordinate.Because the number of server only has one (even if having multiple also very limited), easily there is single failpoint in system.
2. single server is in the face of numerous clients, and due to the restriction of CPU ability, memory size, the network bandwidth, the client that can simultaneously serve is very limited, poor expandability.
3. the data on server are easily subject to network attack, or the problem of server own brings security threat.
4., on namely burning after readding, the outer originating party of file cannot confirm whether read rear file is really destroyed, is not replicated.
The explanation of nouns that the present invention relates to:
P2P: the abbreviation being peer-to-peer, the meanings such as peer has in English " (status, ability etc.) coordinate ", " colleague " and " partner ".P2P can be understood as the meaning of " partner is to partner ", or is called Peer-To-Peer.Briefly, P2P is exactly computer, the swap file that people can be directly connected to other users, instead of is connected to server as before and goes to browse and download.
Namely burn after readding (Burnafterreading): just can know from literal meaning: file viewed from reader after oneself destroy (self-destructing), be a kind of technology of administering digital file survival mechanism.
Network address translation NAT (NetworkAddressTranslators): network address translation produces when IP address lacks day by day, its main purpose is exactly in order to can address reuse.NAT is divided into two large classes from historical development, basic NAT and NAPT (NetworkAddress/PortTranslator).NAPT not only can change the IP address of the IP datagram through this NAT device, also can change the TCP/UDP port of IP datagram.
IP address of internal network: refer to the private address used in A/B/C class, the IP address of distribution is not feared in the whole world uniqueness, also therefore directly cannot be accessed by other outer net main frame.
Public network IP address: refer to have globally unique IP address, can directly by other host access.
TCP (TransmissionControlProtocol): belong to transport layer protocol is the reliable data transmission under IP world, and the service that it provides comprises data stream, reliability, effectively Flow Control, full-duplex operation and multiplexed.By SCCP connection-oriented, end-to-end and reliable Packet Generation.
UDP (UserDatagramProtocol): belong to transport layer protocol is the agreement corresponding with TCP.It is that it does not connect with the other side towards disconnected agreement, but directly just Packet Generation is gone over.
Advanced Encryption Standard (AdvancedEncryptionStandard, AES): the specification being encrypted electronic data used for American National Standard and technical research is a new cryptographic algorithm that may be used for protecting electronic data.Specifically, AES is the password of an iteration, symmetric key grouping, and it can use 128,192 and 256 keys, and with 128 (16 byte) block encryptions and data decryption.Symmetric key cipher uses identical secret key encryption and data decryption.The figure place of the enciphered data returned by block cipher is identical with input data.Iterative cryptographic uses a loop structure, repeats displacement in the cycle and replaces input data.AES256 uses 256 secret key encryptions and data decryption exactly.
Summary of the invention
The present invention is directed to the deficiencies in the prior art, provide and a kind ofly namely burn method and apparatus based on after the readding of P2P network on-line normalization, after existing readding can be solved, namely burn the lower and problem of the inadequate hommization of operating experience of technical security.
For overcoming the above problems, the technical solution used in the present invention is as follows: a kind ofly namely burn method based on after the readding of P2P network on-line normalization, and comprises the following steps:
S1, customer end A and customer end B send heartbeat to the outside index server of server end S, and customer end A sets up transient port, obtains temporary duty;
The outside index server of S2, server end S sends notice, allows customer end B send out detection packet to NAT211.133.*;
S3, customer end B send detection packet to customer end A;
S4, customer end B send feedback packet to the outside index server of server end S;
The outside index server of S5, server end S forwards feedback packet to customer end A;
S6, customer end A and customer end B set up P2PChannel, create interim shared room;
S7, customer end A select outgoing document, enciphered data, generate after readding and namely burn file;
Namely S8, customer end A burn file and password read after customer end B transmission is read;
S9, customer end B collect file, read, exit rear destruction file.
As preferably, the concrete grammar of S6 is as follows:
S61, customer end A and customer end B arrange a coded lock jointly, and coded lock is as the shared room secret key of agreement;
S62, customer end A and customer end B input username and password lock, the simultaneously outside index server of logon server end S;
The outside index server of S63, server end S generates an online customer list, comprises each client user's name, secret key;
If S64 customer end A is identical with the secret key of customer end B, then both sides can receive the online buddy list of password the same as oneself;
S65, customer end A and customer end B find each other, start communication.
As preferably, the enciphered data described in S7 adopts AES256 encryption standard.
As preferably, destroy described in S9 and namely burn document after readding and adopt the data area to document stores all to fill out 0 operation.
For overcoming the above problems, the present invention additionally uses following technical scheme: a kind ofly namely burn device based on after the readding of P2P network on-line normalization, and comprises the outside index server of customer end A, customer end B and server end S; Wherein, customer end A and customer end B send heartbeat to the outside index server of server end S, and customer end A sets up transient port, obtains temporary duty; The outside index server of server end S sends notice, allows customer end B send out detection packet to NAT211.133.*; Customer end B sends detection packet to customer end A; Customer end B sends feedback packet to the outside index server of server end S; The outside index server of server end S forwards feedback packet customer end A to customer end A and customer end B sets up P2PChannel, creates interim shared room; Customer end A selects outgoing document, enciphered data, generates after readding and namely burns file; Namely customer end A burns file and password read after customer end B transmission is read; Customer end B collects file, reads, exits rear destruction file.
As preferably, described customer end A is mobile terminal device or desktop computer.
As preferably, described customer end B is mobile terminal device or desktop computer.
Beneficial effect of the present invention is as follows:
1. carry out data based on P2P completely directly to exchange, do not rely on transfer server;
2. namely burn document after pair readding to be encrypted in transmitting procedure;
3. use exclusive reader reading documents, operations such as limiting screenshotss, printing, copy, share, and when closing reader, destroy document.
In sum, it is higher that namely method and apparatus of the present invention burns technical security after existing readding, and hommization more, the customers higher to file confidentiality requirement can be widely used in, as military project, enterprises and institutions etc., there are good market prospects.
Accompanying drawing explanation
Namely Fig. 1 burns main flow chart after P2P reads;
Fig. 2 is for creating interim shared room main flow chart;
Fig. 3 for generate, read, destroy read after namely burn file main flow chart.
Embodiment
For making object of the present invention, technical scheme and advantage clearly understand, to develop simultaneously embodiment referring to accompanying drawing, the present invention is described in further details.
Principles and methods:
Intranet penetrates: namely NAT penetrates, and term when network connects, being commonly called as " burrowing ", is set up the most important step of P2PChannel.Have UDP " to burrow " in existing Intranet through-transmission technique and TCP " burrows ", but conventional penetrating is that UDP " burrows " at present.When a computer in Intranet will access public network, packet is sent to NAT gateway, packet header comprises public network IP, port and the machine IP, port, NAT gateway can replace to the machine IP, port oneself public network IP, a untapped port, and write down this mapping relations, for later forwarding data bag uses, and then data are issued public network.Public network is made a response after receiving data, and send data to that untapped port of NAT gateway, then NAT gateway is by data retransmission to the computer of that in Intranet, realizes the communication of Intranet and public network.
Embodiment:
In order to describe the inventive method in detail, setting forth further by reference to the accompanying drawings: a kind ofly namely burn method based on after the readding of P2P network on-line normalization, as shown in Figure 1, comprising the following steps:
1, customer end A (P1), the ClientA namely in figure and customer end B (P2), the ClientB namely in figure does not know how to connect at first, so all send heartbeat to the outside index server of server end S (ServerS).Customer end A (P1) client sets up transient port, as 6000, obtains temporary duty;
2, the outside index server of server end S sends notice, allows P2 send out detection packet to NAT211.133.*;
3, customer end B (P2) sends detection packet to customer end A (P1);
4, customer end B (P2) sends feedback packet to the outside index server of server end S;
5, the outside index server of server end S forwards feedback packet to customer end A (P1);
6, customer end A (P1) and customer end B (P2) set up P2PChannel, create interim shared room; (detailed process is shown in Fig. 2);
7, customer end A (P1) selects outgoing document, enciphered data, generates after readding and namely burns file (detailed process is shown in Fig. 3);
8, customer end A (P1) namely burns file and password read after customer end B (P2) transmission is read;
9, customer end B (P2) collects file, reads, exits rear destruction file (detailed process is shown in Fig. 3).
As shown in Figure 2,
1, customer end A (P1) and customer end B (P2) agreement coded lock jointly, coded lock is as the shared room secret key of agreement;
2, customer end A (P1) and customer end B (P2) input username and password lock, simultaneously the outside index server of logon server end S;
3, the outside index server of server end S generates an online customer list, comprises each client user's name, secret key;
If 4 customer end A (P1) are identical with the secret key of customer end B (P2), then both sides can receive the online buddy list of password the same as oneself;
5, customer end A (P1) and customer end B (P2) find each other, start communication.
As shown in Figure 3,
1, customer end A (P1) selects the file of wanting outgoing to share;
2, by format conversion, by dissimilar file, special PDF file is converted to;
3, by special PDF file, special PDF reader (when shielding file is read, the screenshotss of computer, record shields, print, the function such as to be copied), destroy program packing, namely setting burns the time after readding, generate one executable read after namely burn file.
4, using AES256 encryption standard to be encrypted namely burning executable file after readding, key string being left in after readding and namely burning executable file head; Customer end A (P1) will namely burn executable file after being read by P2P and key issues customer end B (P2);
5, customer end B (P2) namely burns executable file after obtaining and readding, and obtains key, deciphering;
6, special PDF reader file reading, reduction display file content, customer end B (P2) reading file;
7, customer end B (P2) closes special PDF reader, starts destruction program, destroys pdf document.Namely destruction is burnt document and is adopted the data area to document stores all to fill out 0 operation after readding.
Those of ordinary skill in the art will appreciate that, embodiment described here is to help reader understanding's implementation method of the present invention, should be understood to that protection scope of the present invention is not limited to so special statement and embodiment.Those of ordinary skill in the art can make various other various concrete distortion and combination of not departing from essence of the present invention according to these technology enlightenment disclosed by the invention, and these distortion and combination are still in protection scope of the present invention.
Claims (7)
1. namely burn a method based on after the readding of P2P network on-line normalization, it is characterized in that, comprise the following steps:
S1, customer end A and customer end B send heartbeat to the outside index server of server end S, and customer end A sets up transient port, obtains temporary duty;
The outside index server of S2, server end S sends notice, allows customer end B send out detection packet to NAT211.133.*;
S3, customer end B send detection packet to customer end A;
S4, customer end B send feedback packet to the outside index server of server end S;
The outside index server of S5, server end S forwards feedback packet to customer end A;
S6, customer end A and customer end B set up P2PChannel, create interim shared room;
S7, customer end A select outgoing document, enciphered data, generate after readding and namely burn file;
Namely S8, customer end A burn file and password read after customer end B transmission is read;
S9, customer end B collect file, read, exit rear destruction file.
2. according to claim 1ly a kind ofly namely burn method based on after the readding of P2P network on-line normalization, it is characterized in that, the concrete grammar of S6 is as follows:
S61, customer end A and customer end B arrange a coded lock jointly, and coded lock is as the shared room secret key of agreement;
S62, customer end A and customer end B input username and password lock, the simultaneously outside index server of logon server end S;
The outside index server of S63, server end S generates an online customer list, comprises each client user's name, secret key;
If S64 customer end A is identical with the secret key of customer end B, then both sides can receive the online buddy list of password the same as oneself;
S65, customer end A and customer end B find each other, start communication.
3. according to claim 1 and 2ly a kind ofly namely burn method based on after the readding of P2P network on-line normalization, it is characterized in that, the enciphered data described in S7 adopts AES256 encryption standard.
4. namely a kind of according to claim or 3 burn method based on after the readding of P2P network on-line normalization, and it is characterized in that, destroys namely to burn document after readding and adopt the data area to document stores all to fill out 0 operation described in S9.
5. according to claim 1ly a kind ofly namely burn device based on after the readding of P2P network on-line normalization, it is characterized in that, comprise the outside index server of customer end A, customer end B and server end S; Wherein, customer end A and customer end B send heartbeat to the outside index server of server end S, and customer end A sets up transient port, obtains temporary duty; The outside index server of server end S sends notice, allows customer end B send out detection packet to NAT211.133.*; Customer end B sends detection packet to customer end A; Customer end B sends feedback packet to the outside index server of server end S; The outside index server of server end S forwards feedback packet customer end A to customer end A and customer end B sets up P2PChannel, creates interim shared room; Customer end A selects outgoing document, enciphered data, generates after readding and namely burns file; Namely customer end A burns file and password read after customer end B transmission is read; Customer end B collects file, reads, exits rear destruction file.
6. according to claim 7ly a kind ofly namely to burn based on after the readding of P2P network on-line normalization, it is characterized in that, described customer end A is mobile terminal device or desktop computer.
7. according to claim 7ly a kind ofly namely to burn based on after the readding of P2P network on-line normalization, it is characterized in that, described customer end B is mobile terminal device or desktop computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510598646.9A CN105306441A (en) | 2015-09-18 | 2015-09-18 | Peer-to-peer (P2P) network online transmission based burn after reading method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510598646.9A CN105306441A (en) | 2015-09-18 | 2015-09-18 | Peer-to-peer (P2P) network online transmission based burn after reading method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105306441A true CN105306441A (en) | 2016-02-03 |
Family
ID=55203196
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510598646.9A Pending CN105306441A (en) | 2015-09-18 | 2015-09-18 | Peer-to-peer (P2P) network online transmission based burn after reading method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105306441A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110493118A (en) * | 2019-04-26 | 2019-11-22 | 北京国信冠群技术有限公司 | Rear destroyed system and method is read in a kind of realization of Email |
CN111090887A (en) * | 2019-12-30 | 2020-05-01 | 论客科技(广州)有限公司 | Conversation content destroying method and device based on instant chat tool |
CN112165425A (en) * | 2020-09-23 | 2021-01-01 | 即时匹配(上海)网络科技有限公司 | Burn after reading communication method and communication system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6981141B1 (en) * | 1998-05-07 | 2005-12-27 | Maz Technologies, Inc | Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files |
CN1805388A (en) * | 2005-01-12 | 2006-07-19 | 腾讯科技(深圳)有限公司 | Method for establishing pier-to-pier direct channels |
CN103268452A (en) * | 2013-05-31 | 2013-08-28 | 福建伊时代信息科技股份有限公司 | Method and device for file processing |
CN103634754A (en) * | 2012-08-20 | 2014-03-12 | 中国电信股份有限公司 | Short message receiving method and realization method, and terminal |
CN104066060A (en) * | 2014-06-26 | 2014-09-24 | 福州大学 | Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication |
CN104092600A (en) * | 2014-07-28 | 2014-10-08 | 国家电网公司 | Mail burning-after-reading method, device and system |
CN104640085A (en) * | 2015-02-17 | 2015-05-20 | 陈包容 | Burn after reading information sending method and device |
-
2015
- 2015-09-18 CN CN201510598646.9A patent/CN105306441A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6981141B1 (en) * | 1998-05-07 | 2005-12-27 | Maz Technologies, Inc | Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files |
CN1805388A (en) * | 2005-01-12 | 2006-07-19 | 腾讯科技(深圳)有限公司 | Method for establishing pier-to-pier direct channels |
CN103634754A (en) * | 2012-08-20 | 2014-03-12 | 中国电信股份有限公司 | Short message receiving method and realization method, and terminal |
CN103268452A (en) * | 2013-05-31 | 2013-08-28 | 福建伊时代信息科技股份有限公司 | Method and device for file processing |
CN104066060A (en) * | 2014-06-26 | 2014-09-24 | 福州大学 | Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication |
CN104092600A (en) * | 2014-07-28 | 2014-10-08 | 国家电网公司 | Mail burning-after-reading method, device and system |
CN104640085A (en) * | 2015-02-17 | 2015-05-20 | 陈包容 | Burn after reading information sending method and device |
Non-Patent Citations (1)
Title |
---|
马光志等: "《基于对等组的P2P安全通信机制》", 《计算机应用研究》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110493118A (en) * | 2019-04-26 | 2019-11-22 | 北京国信冠群技术有限公司 | Rear destroyed system and method is read in a kind of realization of Email |
CN111090887A (en) * | 2019-12-30 | 2020-05-01 | 论客科技(广州)有限公司 | Conversation content destroying method and device based on instant chat tool |
CN112165425A (en) * | 2020-09-23 | 2021-01-01 | 即时匹配(上海)网络科技有限公司 | Burn after reading communication method and communication system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107018134B (en) | Power distribution terminal safety access platform and implementation method thereof | |
US7231664B2 (en) | System and method for transmitting and receiving secure data in a virtual private group | |
US9237059B2 (en) | Method and apparatus for dynamic mapping | |
US8024560B1 (en) | Systems and methods for securing multimedia transmissions over the internet | |
US20050198499A1 (en) | System and method for efficiently transferring media across firewalls | |
Wiley | Dust: A blocking-resistant internet transport protocol | |
Lucena et al. | Syntax and semantics-preserving application-layer protocol steganography | |
Zhang et al. | An approach of covert communication based on the Ethereum whisper protocol in blockchain | |
Chen et al. | Blockchain meets covert communication: A survey | |
De Raadt et al. | Cryptography in OpenBSD: An Overview. | |
CN105306441A (en) | Peer-to-peer (P2P) network online transmission based burn after reading method and device | |
CN101997875B (en) | Secure multi-party network communication platform and construction method and communication method thereof | |
CN108206738A (en) | A kind of quantum key output method and system | |
CN100376092C (en) | Firewall and invasion detecting system linkage method | |
Trabelsi et al. | A novel covert channel based on the IP header record route option | |
Savchenko et al. | Analytical review of methods of providing internet anonymity | |
CN108989486B (en) | Communication method and communication system | |
Goudar et al. | Secure data transmission by using steganography | |
Blaze | Key escrow from a safe distance: looking back at the clipper chip | |
Lindqvist et al. | Privacy management for secure mobility | |
Abukari et al. | A secured video conferencing system architecture using a hybrid of two homomorphic encryption schemes: A case of zoom | |
Black | Techniques of network steganography and covert channels | |
CN115834246B (en) | Cloud terminal-to-local terminal data transmission safety protection method and system | |
Al-Jarrah et al. | A thin security layer protocol over IP protocol on TCP/IP suite for security enhancement | |
CN115174076B (en) | Private pursuit and edge computing network construction method based on alliance chain technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160203 |