CN106027503A - Cloud storage data encryption method based on TPM - Google Patents

Cloud storage data encryption method based on TPM Download PDF

Info

Publication number
CN106027503A
CN106027503A CN201610300097.7A CN201610300097A CN106027503A CN 106027503 A CN106027503 A CN 106027503A CN 201610300097 A CN201610300097 A CN 201610300097A CN 106027503 A CN106027503 A CN 106027503A
Authority
CN
China
Prior art keywords
tpm
data
key
cloud storage
platform module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610300097.7A
Other languages
Chinese (zh)
Inventor
张卫品
戴鸿君
于治楼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Group Co Ltd
Original Assignee
Inspur Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Group Co Ltd filed Critical Inspur Group Co Ltd
Priority to CN201610300097.7A priority Critical patent/CN106027503A/en
Publication of CN106027503A publication Critical patent/CN106027503A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention discloses a cloud storage data encryption method based on a TPM. An implementation process of the cloud storage data encryption method is as follows: when a data file of a user is necessary to store, a secret key for encrypting data to be stored is generated in the TPM; then, the secret key is encrypted and stored in external storage equipment; and, when data is necessary to decrypt, the TPM extracts and decrypts the encrypted secret key from the external equipment at first, and then, decrypts data of the user by using the decrypted secret key. Compared with the prior art, the cloud storage data encryption method based on the TPM has the advantages that: the TPM is introduced into an encryption model; a security data encryption model based on the TPM is constructed; therefore, the data security is effectively ensured; the data encryption and secret key management problems in cloud storage can be effectively solved; and the cloud storage data encryption method based on the TPM is high in practicability, wide in application range and easy to popularize.

Description

A kind of cloud storage data ciphering method based on TPM
Technical field
The present invention relates to field of cloud computer technology, a kind of cloud storage data ciphering method practical, based on TPM.
Background technology
A kind of application that cloud storage is actually in cloud computing, is developing progressively an industry.It passes through Intel Virtualization Technology and distributed file system, will be distributed over the hardware storage device of different geographical by Intel Virtualization Technology by its United Dispatching, forms one cloud storage server, provides data storage and management to service for client.Under cloud storage pattern, Data Hosting is stored in third party and stores in platform, and user need not be concerned about how cloud storage service area realizes these functions, worries about without for the work such as upgrading computer, virus killing.But providing the user easily simultaneously, there is also potential safety hazard.Data Hosting is mass computing center on network, and just departing from the span of control of data owner, its safety is highly dependent on cloud service provider.Such that make data preserve with the form of ciphertext, still can there are some potential safety hazards in cloud service provider.
Actually one entity computer having software and hardware of credible calculating platform, it can be provided the user by the credible calculating platform of self and ensure that the safety of computer software, hardware and all data is with credible.Its basic thought is: utilize the credibility of credible platform, provides the user a safe and reliable calculating service.Set up the most basic function that inter-trust domain is credible calculating platform, and under the management of this inter-trust domain by authentic authentication one-level one-level to whole network delivery, be finally reached and make the most believable purpose of network really.And creditable calculation modules TPM is credible calculating platform " root of trust ", it protects the hardware layer of calculating equipment by bottom hardware.
In consideration of it, now provide a kind of based on above-mentioned cloud storage and the data ciphering method of credible calculating platform TPM.
Summary of the invention
The technical assignment of the present invention is for above weak point, it is provided that a kind of cloud storage data ciphering method practical, based on TPM.
A kind of cloud storage data ciphering method based on TPM, it realizes process: when subscriber data file needs storage, in credible platform module TPM, generate the key that encryption needs the data of storage, then this key is encrypted, then preserves to External memory equipment;When data need deciphering, first credible platform module TPM extracts from external equipment and deciphers encryption key, the most again by the key decrypted user data after deciphering.
Above-mentioned subscriber data file encryption storing process is: subscriber data file encryption uses symmetric key, first the symmetric key that this encryption file is used is submitted to credible platform module TPM, store in the fdisk specified after the public key encryption of the unsymmetrical key then generated by credible platform module TPM, and ensure that the user that encryption key can be authorized to accesses.
The detailed process of subscriber data file encryption storage is:
User is to cloud storage server application memory space, and after application, cloud storage server is that it sets up corresponding memory space;
Meanwhile, credible platform module TPM is a pair symmetric key of its stochastic generation, a pair unsymmetrical key and for verifying the digital certificate of identity, and wherein digital certificate is sent to client, for later authentication;Symmetric key is stored on hard disk by after the public key encryption of unsymmetrical key;
During storage data, after cloud storage server notice credible platform module TPM checking identity, user sends data;
Credible platform module TPM extracts from hidden partition and uses private key decrypted symmetric key, for encryption data, then the data after encryption is stored in cloud storage server.
The detailed process of credible platform module TPM checking user identity is: first user sends request to cloud storage server, cloud storage server notice credible platform module TPM verifies its identity, i.e. credible platform module TPM asks for digital certificate to user, user is sent to credible platform module TPM by after digital certificate public key encryption, after credible platform module TPM deciphers with private key, verify the legitimacy of its identity, after identity validation, setting up vpn tunneling, user sends data.
Data decrypting process in External memory equipment is: when user asks for data, and credible platform module TPM, from the secrete key multi-subarea extracting symmetric key of External memory equipment, sends to user after solving ciphertext data.
When user needs to use storage data file, the symmetric key that cryptograph files is used is read from corresponding External memory equipment, the ciphertext of encryption is sent to the symmetric key after credible platform module TPM, credible platform module TPM use deciphering ciphertext is decrypted.
A kind of based on TPM cloud storage data ciphering method of the present invention, has the advantage that
A kind of based on TPM cloud storage data ciphering method that the present invention provides, by TPM trusted module is incorporated in Encryption Model, build the data encryption model of the safety of safety based on TPM, the safety of data is effectively ensured, the effective data encryption solved in cloud storage and cipher key management considerations, practical, applied widely, it is easy to promote.
Accompanying drawing explanation
Accompanying drawing 1 realizes schematic diagram for the present invention.
Detailed description of the invention
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings.
In order to solve the potential safety hazard during cloud storage, ensure the data that user is hosted in third party cloud storage platform.As shown in Figure 1, a kind of based on TPM cloud storage data ciphering method of the present invention, credible platform module TPM trusted module is incorporated in Encryption Model, builds the data encryption model of the safety of safety based on credible platform module TPM.
It realizes process:
When subscriber data file needs storage, credible platform module TPM generates the key that encryption needs the data of storage, then this key is encrypted, then preserves to External memory equipment;When data need deciphering, first credible platform module TPM extracts from external equipment and deciphers encryption key, the most again by the key decrypted user data after deciphering.
Owing to TPM is hardware device, disabled user cannot break through in theory, therefore can ensure that the key of user and the safety of data.
Above-mentioned subscriber data file encryption storing process is: subscriber data file encryption uses symmetric key, first the symmetric key that this encryption file is used is submitted to credible platform module TPM, store in the fdisk specified after the public key encryption of the unsymmetrical key then generated by credible platform module TPM, and ensure that the user that encryption key can be authorized to accesses.
The detailed process of subscriber data file encryption storage is:
User is to cloud storage server application memory space, and after application, cloud storage server is that it sets up corresponding memory space;
Meanwhile, credible platform module TPM is a pair symmetric key of its stochastic generation, a pair unsymmetrical key and for verifying the digital certificate of identity, and wherein digital certificate is sent to client, for later authentication;Symmetric key is stored on hard disk by after the public key encryption of unsymmetrical key;
During storage data, after cloud storage server notice credible platform module TPM checking identity, user sends data;
Credible platform module TPM extracts from hidden partition and uses private key decrypted symmetric key, for encryption data, then the data after encryption is stored in cloud storage server.
The detailed process of credible platform module TPM checking user identity is: first user sends request to cloud storage server, cloud storage server notice credible platform module TPM verifies its identity, i.e. credible platform module TPM asks for digital certificate to user, user is sent to credible platform module TPM by after digital certificate public key encryption, after credible platform module TPM deciphers with private key, verify the legitimacy of its identity, after identity validation, setting up vpn tunneling, user sends data.
Data decrypting process in External memory equipment is: when user asks for data, and credible platform module TPM, from the secrete key multi-subarea extracting symmetric key of External memory equipment, sends to user after solving ciphertext data.
When user needs to use storage data file, the symmetric key that cryptograph files is used is read from corresponding External memory equipment, the ciphertext of encryption is sent to the symmetric key after credible platform module TPM, credible platform module TPM use deciphering ciphertext is decrypted.
In the present invention, the symmetric key that encryption file is used is submitted to credible platform module TPM, the PKI of the unsymmetrical key then generated by credible platform module TPM is encrypted, and is stored in the fdisk specified afterwards, and ensures that data encryption key can access with authorized user.Here specifying SRK is appointment father's key that unsymmetrical key generates, because SRK can the most any user access.SRK, as one-level key (also referred to as master key), is stored in safety zone, with it, the encryption of secondary key information is generated secondary key.The like, father node encipherment protection child node, constitute whole hierarchical encryption tree construction.In key hierarchical tree, leaf node is all various data encryption key and realizes data signing key.These actions should be all coherent close case operation.By contrast, the encryption system of pure software is difficult to the operation of close case.If but the critical data such as master key, AES, program Solidification in hardware device TPM, a difficult problem for close case operation just can be solved.
When needs use key, read the symmetric key that used of encryption data from relevant position, and the ciphertext of encryption is sent to the symmetric key after credible platform module TPM, credible platform module TPM use deciphering ciphertext is decrypted.
Above-mentioned detailed description of the invention is only the concrete case of the present invention; the scope of patent protection of the present invention includes but not limited to above-mentioned detailed description of the invention; suitably change that it is done by claims of a kind of based on TPM cloud storage data ciphering method of any present invention of meeting and any described technical field those of ordinary skill or replace, all should fall into the scope of patent protection of the present invention.

Claims (6)

1. a cloud storage data ciphering method based on TPM, it is characterized in that, it realizes process and is: when subscriber data file needs storage, generates the key that encryption needs the data of storage in credible platform module TPM, then this key is encrypted, then preserves to External memory equipment;When data need deciphering, first credible platform module TPM extracts from external equipment and deciphers encryption key, the most again by the key decrypted user data after deciphering.
A kind of cloud storage data ciphering method based on TPM the most according to claim 1, it is characterized in that, above-mentioned subscriber data file encryption storing process is: subscriber data file encryption uses symmetric key, first the symmetric key that this encryption file is used is submitted to credible platform module TPM, store in the fdisk specified after the public key encryption of the unsymmetrical key then generated by credible platform module TPM, and ensure that the user that encryption key can be authorized to accesses.
A kind of cloud storage data ciphering method based on TPM the most according to claim 2, it is characterised in that the detailed process of subscriber data file encryption storage is:
User is to cloud storage server application memory space, and after application, cloud storage server is that it sets up corresponding memory space;
Meanwhile, credible platform module TPM is a pair symmetric key of its stochastic generation, a pair unsymmetrical key and for verifying the digital certificate of identity, and wherein digital certificate is sent to client, for later authentication;Symmetric key is stored on hard disk by after the public key encryption of unsymmetrical key;
During storage data, after cloud storage server notice credible platform module TPM checking identity, user sends data;
Credible platform module TPM extracts from hidden partition and uses private key decrypted symmetric key, for encryption data, then the data after encryption is stored in cloud storage server.
A kind of cloud storage data ciphering method based on TPM the most according to claim 3, it is characterized in that, the detailed process of credible platform module TPM checking user identity is: first user sends request to cloud storage server, cloud storage server notice credible platform module TPM verifies its identity, i.e. credible platform module TPM asks for digital certificate to user, user is sent to credible platform module TPM by after digital certificate public key encryption, after credible platform module TPM deciphers with private key, verify the legitimacy of its identity, after identity validation, set up vpn tunneling, user sends data.
A kind of cloud storage data ciphering method based on TPM the most according to claim 2, it is characterized in that, data decrypting process in External memory equipment is: when user asks for data, credible platform module TPM, from the secrete key multi-subarea extracting symmetric key of External memory equipment, sends to user after solving ciphertext data.
A kind of cloud storage data ciphering method based on TPM the most according to claim 5, it is characterized in that, when user needs to use storage data file, the symmetric key that cryptograph files is used is read from corresponding External memory equipment, the ciphertext of encryption is sent to the symmetric key after credible platform module TPM, credible platform module TPM use deciphering ciphertext is decrypted.
CN201610300097.7A 2016-05-09 2016-05-09 Cloud storage data encryption method based on TPM Pending CN106027503A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610300097.7A CN106027503A (en) 2016-05-09 2016-05-09 Cloud storage data encryption method based on TPM

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610300097.7A CN106027503A (en) 2016-05-09 2016-05-09 Cloud storage data encryption method based on TPM

Publications (1)

Publication Number Publication Date
CN106027503A true CN106027503A (en) 2016-10-12

Family

ID=57099082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610300097.7A Pending CN106027503A (en) 2016-05-09 2016-05-09 Cloud storage data encryption method based on TPM

Country Status (1)

Country Link
CN (1) CN106027503A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778326A (en) * 2016-11-28 2017-05-31 福建升腾资讯有限公司 A kind of method and system for realizing movable storage device protection
CN106878293A (en) * 2017-01-23 2017-06-20 深圳市中博科创信息技术有限公司 Date storage method and device based on cloud storage platform
CN107733766A (en) * 2017-11-02 2018-02-23 平安科技(深圳)有限公司 Safe interconnected method, device, equipment and storage medium between cloud platform proprietary network
CN108449753A (en) * 2018-03-22 2018-08-24 北京可信华泰科技有限公司 A kind of method that cell phone apparatus reads the data in trusted computation environment
CN108768978A (en) * 2018-05-16 2018-11-06 浙江大学 A kind of remote storage method of servicing and system based on SGX
CN108989015A (en) * 2017-05-31 2018-12-11 北京京东尚科信息技术有限公司 A kind of method and apparatus of encryption
CN109462474A (en) * 2018-11-14 2019-03-12 郑州云海信息技术有限公司 The generation method and relevant apparatus of Fernet key in a kind of Keystone
CN109564615A (en) * 2018-10-31 2019-04-02 算丰科技(北京)有限公司 Loading method, device, equipment and the storage medium of model data
CN109802832A (en) * 2017-11-17 2019-05-24 中国移动通信集团公司 A kind of processing method of data file, system, big data processing server and computer storage medium
CN110138556A (en) * 2019-05-28 2019-08-16 上海兆芯集成电路有限公司 Data processing equipment and data processing method
CN110855429A (en) * 2019-11-20 2020-02-28 上海思赞博微信息科技有限公司 Software key protection method based on TPM
CN110968743A (en) * 2019-12-13 2020-04-07 支付宝(杭州)信息技术有限公司 Data storage and data reading method and device for private data
CN111079158A (en) * 2019-11-21 2020-04-28 支付宝(杭州)信息技术有限公司 Data storage and reading method and device
CN111756754A (en) * 2017-07-28 2020-10-09 创新先进技术有限公司 Method and device for training model
US11398899B2 (en) 2019-05-28 2022-07-26 Shanghai Zhaoxin Semiconductor Co., Ltd. Data processing device and data processing method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984146A (en) * 2012-11-23 2013-03-20 江苏乐买到网络科技有限公司 Data management method for cloud computing
CN103534976A (en) * 2013-06-05 2014-01-22 华为技术有限公司 Data security protection method, server, host, and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984146A (en) * 2012-11-23 2013-03-20 江苏乐买到网络科技有限公司 Data management method for cloud computing
CN103534976A (en) * 2013-06-05 2014-01-22 华为技术有限公司 Data security protection method, server, host, and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
贾然: ""基于TPM的云存储数据加密机制"", 《中国优秀硕士学位论文全文数据库》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778326A (en) * 2016-11-28 2017-05-31 福建升腾资讯有限公司 A kind of method and system for realizing movable storage device protection
CN106878293A (en) * 2017-01-23 2017-06-20 深圳市中博科创信息技术有限公司 Date storage method and device based on cloud storage platform
CN108989015A (en) * 2017-05-31 2018-12-11 北京京东尚科信息技术有限公司 A kind of method and apparatus of encryption
CN111756754A (en) * 2017-07-28 2020-10-09 创新先进技术有限公司 Method and device for training model
CN111756754B (en) * 2017-07-28 2023-04-07 创新先进技术有限公司 Method and device for training model
CN107733766A (en) * 2017-11-02 2018-02-23 平安科技(深圳)有限公司 Safe interconnected method, device, equipment and storage medium between cloud platform proprietary network
CN109802832B (en) * 2017-11-17 2020-12-01 中移动信息技术有限公司 Data file processing method and system, big data processing server and computer storage medium
CN109802832A (en) * 2017-11-17 2019-05-24 中国移动通信集团公司 A kind of processing method of data file, system, big data processing server and computer storage medium
CN108449753A (en) * 2018-03-22 2018-08-24 北京可信华泰科技有限公司 A kind of method that cell phone apparatus reads the data in trusted computation environment
CN108768978B (en) * 2018-05-16 2020-12-11 浙江大学 SGX-based remote storage service method and system
CN108768978A (en) * 2018-05-16 2018-11-06 浙江大学 A kind of remote storage method of servicing and system based on SGX
CN109564615A (en) * 2018-10-31 2019-04-02 算丰科技(北京)有限公司 Loading method, device, equipment and the storage medium of model data
CN109462474A (en) * 2018-11-14 2019-03-12 郑州云海信息技术有限公司 The generation method and relevant apparatus of Fernet key in a kind of Keystone
CN110138556A (en) * 2019-05-28 2019-08-16 上海兆芯集成电路有限公司 Data processing equipment and data processing method
US11398899B2 (en) 2019-05-28 2022-07-26 Shanghai Zhaoxin Semiconductor Co., Ltd. Data processing device and data processing method
CN110855429A (en) * 2019-11-20 2020-02-28 上海思赞博微信息科技有限公司 Software key protection method based on TPM
CN111079158A (en) * 2019-11-21 2020-04-28 支付宝(杭州)信息技术有限公司 Data storage and reading method and device
CN111079158B (en) * 2019-11-21 2022-04-12 支付宝(杭州)信息技术有限公司 Data storage and reading method and device
CN110968743A (en) * 2019-12-13 2020-04-07 支付宝(杭州)信息技术有限公司 Data storage and data reading method and device for private data
CN110968743B (en) * 2019-12-13 2021-07-06 支付宝(杭州)信息技术有限公司 Data storage and data reading method and device for private data

Similar Documents

Publication Publication Date Title
CN106027503A (en) Cloud storage data encryption method based on TPM
CN110855671B (en) Trusted computing method and system
TWI709314B (en) Data processing method and device
US9424400B1 (en) Digital rights management system transfer of content and distribution
TWI601405B (en) Method and apparatus for cloud-assisted cryptography
US9342701B1 (en) Digital rights management system and methods for provisioning content to an intelligent storage
CN102271037B (en) Based on the key protectors of online key
US20140112470A1 (en) Method and system for key generation, backup, and migration based on trusted computing
CA3123268C (en) A method of data transfer, a method of controlling use of data and a cryptographic device
CN103138939B (en) Based on the key access times management method of credible platform module under cloud memory module
JP2017139811A5 (en)
CN104378386A (en) Method for cloud data confidentiality protection and access control
US11831753B2 (en) Secure distributed key management system
CN104980477A (en) Data access control method and system in cloud storage environment
CN105122265A (en) Data security service system
CN109478214A (en) Device and method for certificate registration
CN103560887A (en) Intelligent terminal remote attestation method and system
US11783091B2 (en) Executing entity-specific cryptographic code in a cryptographic coprocessor
Shen et al. SecDM: Securing data migration between cloud storage systems
CN106992978B (en) Network security management method and server
KR101639714B1 (en) A method for authenticating a device of smart grid
CN102999710A (en) Method, equipment and system for safely sharing digital content
KR102055888B1 (en) Encryption and decryption method for protecting information
Jang-Jaccard et al. Portable key management service for cloud storage
KR101508439B1 (en) Method for ensuring data confidentiality, method and system for sharing data for using the same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161012